last executing test programs: 3m33.60043234s ago: executing program 0 (id=688): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0x4, 0x12}, 0x50) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000000c0)={0x9294}, 0x8) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000140)={@fallback=r1, r0, 0x4}, 0x20) socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000010000104a5270b7357000000925e4a44", @ANYRES32, @ANYBLOB="0dfa130016000000240012000c00010000000000000000000c0002f60800000001180000080001"], 0x44}, 0x1, 0x0, 0x0, 0x40010}, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x6a855000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000080000000000000064ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r2, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001440)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfffffffffffffcac, 0xfffffffffffffffd}}, 0x10) 3m33.212745662s ago: executing program 0 (id=700): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b85, 0x2, @perf_bp={&(0x7f0000000580)}, 0x88, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='mnt\x00', 0x0, &(0x7f0000000000), 0x0, 0x248, &(0x7f0000000940)="$eJzs3T9oFFkcB/DfzO5eLsly5O6ag4O7g+M47gIh1x3YxEYhICGICCpERGyURIgJdomVjYXWKqlsgtgZrdMEG0Ww8k+K2AgaLAwWWqzsTiLRbDBxN7uS+Xxg2JnZee/3hp3v221mNoDc6omIgYgoRERvRJQiIll/wB/Z0rO6OdO5MBJRqRx8ndSOy7Yza+26I2I6Iv6PiPk0idPFiMm5o0tvH+//+9JE6a8bc0c6W3qSq5aXFg+sXB+6eHvwv8kHj14OJTEQ5U/Oq/mSOvuKScRPO1HsG5EU2z0CtmL4/K0n1dz/HBF/1vJfijSyD+/y+Hfzpfj32mZtr7x6+Gsrxwo0X6VSqn4HTleA3EkjohxJ2hcR2Xqa9vVlv+GfFrrSM2Pj53pPjU2Mnmz3TAU0Szlicd/djjvdn+X/RSHLP7B7VfN/aHj2WXV9pdDu0QCtVM1/7/Gpf0L+IXfkH/JL/iG/5B/yS/4hv+Qf8kv+Ydf4frsN5B/yS/4hv+Qf8mt9/gGAfKl0tPsOZKBd2j3/AAAAAAAAAAAAAAAAAAAAG810LoysLa2qee9qxPLeiCjWq1+o/R/x2qNNu94k1cM+SrJmDTn2e4MdNOjmDt59vZVHuv3wfOfqb8X935rZW3nbLaZGI6YvRER/sbjx+ktWr7+v9+MX3i+daLBAg/Ycbm/997Otq1Wqs2+wkmQr/fXmnzR+qb3Wn3/Km/S5HWffNdgBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALfMhAAD//+M2bGo=") sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='mnt/encrypted_dir\x00', 0x0) chdir(&(0x7f0000000700)='mnt/encrypted_dir\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x121c80, 0x47) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000280)=0x40000000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0xff, 0x0, 0x7fff0026}]}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0x0, 0x0, 0x14, 0x0, "0af5a212a1bd3bbda613efd9c8b4965dca66db42f66a86e5781cf86717055a7c1d1408407e5a774ef95f2fc1b947e00f000000123f2f1d34b0882e83d41b67cb9ff147c6d33a097d2269351b3ed300"}, 0xd8) recvmsg$can_raw(r0, &(0x7f0000000900)={&(0x7f0000000180)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000bc0)=""/230, 0xe6}, {&(0x7f0000000d00)=""/248, 0xf8}, {&(0x7f0000000300)=""/190, 0xbe}], 0x3, &(0x7f0000000e00)=""/101, 0x65}, 0x10001) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7}}, 0x0, 0x0, 0xe, 0x0, "5496a5dddc12b8ad4394a6a4d4dd5e5003c2cc26e095388c3dcf697675feed1499a8e540d53a3993d6386d8607e255ec6bf788c74746e54dbb6129e96bc8b7ce178a7c9e3ef1cf49704783a34f4df6f5"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xffffffff}}, 0x0, 0x0, 0x2, 0x0, "a1c1dd75a68473ba07d945c3b03e10950cd4b347113e55eb4285bf274bca67efbff2fdf98328de9434031348589bf28046d14810000000e3ffffff00"}, 0xd8) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x50, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7f, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffc00, 0x3, 0x2, 0xfffffffd, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101a42, 0xa3) pwritev2(r2, &(0x7f0000000cc0)=[{&(0x7f0000000240)=';', 0xffffffbc}], 0x1, 0xfff, 0xc, 0x4) 3m32.692040252s ago: executing program 0 (id=713): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[], 0x18}}, 0x20004000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=@gettaction={0x24, 0x32, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x4}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4048840) set_mempolicy(0x4, 0x0, 0x5) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x80000100008b}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c00028005000100000000000800074000000001"], 0x64}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e0000000000101040000000000000000020000001c00188008000140a080000008000240000000020800034000000002240001801400018008000100e000000108000200e00000010c0002800500010000000000040016404400108008000140fffff800080002400000000108000140ffff1fc5080001400000068708000140000000040800034000000c1a080003400000000908"], 0xe0}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000010000d0428bd7000fcdbff2500008000", @ANYRES32=0x0, @ANYBLOB="1000000000000000280012800b0001006272696467650000180002"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32=0x0, @ANYBLOB="0300000000000000280012800a00010076786c616e00"], 0x50}, 0x1, 0x0, 0x0, 0x13d33d22cca65c15}, 0x4008840) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket(0x10, 0x3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x161) mount$tmpfs(0x0, &(0x7f0000000440)='./file0/../file0\x00', &(0x7f0000000380), 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') ppoll(&(0x7f0000000000)=[{r4, 0x24b0}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000100)='./file0/../file0\x00', 0x9) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)={0x1c, r6, 0xc4fc9e906872338b, 0x70bd2a, 0x25dfdbff, {{0x15}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x40084) sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000580)={0x7c, r6, 0x2, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x1}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4040001}, 0x80) sendmsg$NFNL_MSG_ACCT_DEL(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="540000000307010800000000000000000500000a0800154000000003080005400000000208000540000000010c000240000000000000000908000540000000030c00064000000000800000000800054000000000"], 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x5) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000700), r3) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x2c, r7, 0x10, 0x70bd2a, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRET={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) ioctl$FS_IOC_GETFSUUID(r2, 0x80111500, &(0x7f0000000900)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0500000001000000400000000500000041000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000b0ac000000000000000000000000cb70c65a0d69f5435e053d1e6732451000000000"], 0x50) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000840)={0x0, 0x8e, "7560c7edc146bf9f4a600b3ef0b73adaae2bc2b1845e5d04e7c62e71ded9e1fe61c7f0b7ee59970f26766468957293e4c17703ed0927d2310063230377101d76e36972015e3da0d47a1f7f888d826b587ce56fcca6ef9131c9ff7dd5cb8ab579e41fb8a87ce8c41261d2c365cb2415b9887766a2ead71a2f866dcf204bddd20642efdf729330f73c98fc13f41ab0"}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000180), 0x1003, r8}, 0x38) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) 3m31.855265671s ago: executing program 1 (id=731): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000060000000400000000000007000000000400000000e7ff080100000000000000010000850000000000000000020000000000000000000000da00"], 0x0, 0x4e, 0x0, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) r3 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=[{0x10, 0x10b}, {0x18, 0x110, 0xc, ')'}], 0x28}, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000240)={0x3, &(0x7f0000000000)=[{0x30, 0x0, 0xfd, 0x5ae9}, {0x20, 0x7f, 0x6, 0xfffff00c}, {0x6, 0x0, 0xa1, 0x1000}]}, 0x10) sendmmsg$inet(r1, &(0x7f0000002c40)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000a80)="2a73ed35", 0x732a}], 0x1}}], 0x400000000000292, 0x0) close(r0) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) listen(r4, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r5, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x21081e, &(0x7f00000001c0)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x9}}, {@journal_path={'journal_path', 0x3d, './file1'}}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$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") r6 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) 3m31.677169051s ago: executing program 1 (id=732): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073013a000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) write$cgroup_int(r1, &(0x7f0000000200)=0x1, 0x12) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x8f, &(0x7f0000000980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x0, 0x0, &(0x7f0000000a00), 0x8, 0x8f, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500), 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/306], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'/19, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r5, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3m31.676023402s ago: executing program 0 (id=733): syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000000), 0x1, 0x478, &(0x7f0000000300)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) syz_io_uring_setup(0x152, &(0x7f0000000140)={0x0, 0x8206, 0x400, 0x43, 0x26}, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x56ab, &(0x7f0000000040)={0x0, 0x36d, 0xc000, 0xc, 0xa0002f5}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000000)=0x1201a, 0x4) io_uring_enter(r0, 0x2219, 0x7721, 0x14, 0x0, 0x0) 3m31.549015509s ago: executing program 0 (id=736): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x6, 0x4d0fb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r1, 0x2000012, 0xe1e, 0x2, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x66) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x4e) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_aout(r3, &(0x7f00000000c0)=ANY=[], 0x20) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x6, 0x5, 0x1a, 0xc, 0x18, @empty, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7800, 0x8016, 0x2, 0x4}}) r5 = syz_open_procfs(0x0, &(0x7f00000042c0)='mounts\x00') pread64(r5, &(0x7f0000002240)=""/237, 0xed, 0x4eb) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000440)={r2, 0xffffffffffffffff}, 0x4) r7 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f00000001c0)=0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={0x1, 0xffffffffffffffff}, 0x4) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3ff, &(0x7f0000000500)=0x0) io_submit(r11, 0x2, &(0x7f0000000300)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r9, 0x0, 0x4e}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x4, 0x6, r10, &(0x7f00000001c0)='m', 0x1, 0x1}]) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x50) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f00000004c0)='./file0\x00', 0x0, 0xc018}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x8, &(0x7f0000000140)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x9}, @alu={0x4, 0x1, 0xe, 0x4, 0x9, 0xc}, @generic={0x6, 0xb, 0x4, 0x6, 0x9}], &(0x7f0000000180)='GPL\x00', 0x4, 0xcd, &(0x7f0000000200)=""/205, 0xb0ebad3f4bee4ed9, 0x22, '\x00', r4, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x0, 0x4, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r5, r6, r7, r8, r10, r12, 0x1, r13], 0x0, 0x10, 0x7}, 0x94) setxattr$system_posix_acl(&(0x7f00000001c0)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', &(0x7f0000000580)={{}, {}, [], {0x4, 0x7}, [], {}, {0x20, 0x2}}, 0x24, 0x0) r14 = accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) r15 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_FIOSETOWN(r15, 0x8901, 0x0) bind$unix(r14, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 3m31.516205491s ago: executing program 1 (id=738): sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x80, 0x39, 0x1, 0x70bd29, 0x25dfdbfe, {0xd}, [@generic="5176d6394ede8cceee5c4ac13fa889b9e2f70f96fda7f416fc9ff6b71a81a60d2377357d84726f21a1e11346e8e7e18ed63754c45612fcbcd724bb58795dcf28863ed55d03d19a8a0e067d063225e3a0c04a0ea663926c311fd6f19a880b3813a915afc406c94bf63e"]}, 0x80}, 0x1, 0x0, 0x0, 0x90}, 0x20000010) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r0, 0x8010550e, &(0x7f0000000200)={0x9079, &(0x7f0000000180)="82a879cfd4422b7d312405afe5da4f0a656956cadfc328cac15a59df66b7a40b55365bbf09e29983197166c773010f266737ef9155adff2b2856c440257cbb9c954f7960bb55224fcf6e765182369c02194dba6f2d3d6fc5085761fc09c6576d77caa9c9a70410ec52b06f00218903b94b46cf1b264c54ac5d3300603dec3d"}) getsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5000940e, &(0x7f00000002c0)={{r0}, "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"}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f00000012c0)={{0x1, 0x1, 0x18, r0, {0xb9}}, './file0\x00'}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001300)={0x0, 0x7a, "7df656c6f32e5b23709ac44060397ed0e5cc40306071ec18c7592003d5d489a8cdc8d018724483357bbda294179a0053a993777dd821224f1d98b652ba5c49d734398b6ea21eab6c00e1284ee145560e025986ab0bc45cf330344c113e0605cd018930c2a2733a566b7d6600b1e7035146010069382e6277b30a"}, &(0x7f00000013c0)=0x82) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000001400)={r2, 0x5}, 0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000001440)='nv', 0x2) quotactl_fd$Q_SYNC(r0, 0xffffffff80000102, 0x0, 0x0) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f0000001480)=[{0x0, 0x3, {0x1, 0xf0, 0x3}, {0x1, 0xf0, 0x4}, 0x2, 0x1}, {0x1, 0x3, {0x0, 0xff}, {0x0, 0x0, 0x3}, 0x2, 0xfd}], 0x40) r3 = open(&(0x7f00000014c0)='./file0\x00', 0x109000, 0xf5) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000001600)={'wlan0\x00', &(0x7f0000001500)=@ethtool_perm_addr={0x20, 0xd0, "b3949ebf0098288417a34bd44b3fa5017468088332bc6ecb9adde589a7030088de0d9c28155797775baed04daf12c24fce0262b19b2213996274828b7877c135fb4ec9dd81c1f77d9961cee82b0d27cb8d50f28e0378073916c4e93393e2835922cb77eec85c712ac56d33185117e8d58ea7cdc924a4e87002ef94d392d8f0d0eb11abe557f6172aaf18ec146e2b8c53523a72ecd5c727e48ddb46eccf62d306fa373e8cab9bd162f7869e522463bea29d4d6225395257c1f5db5e9278ffc7265418c1963ec83ff30262760b130d0f9d"}}) write$P9_RREADDIR(r1, &(0x7f0000001640)={0x112, 0x29, 0x2, {0x6, [{{0x4, 0x4}, 0x5, 0x1, 0x10, './file0/../file0'}, {{0x40, 0x3, 0x8}, 0x2ea9, 0xfd, 0x7, './file0'}, {{0x10, 0x1, 0x3}, 0x1ff, 0x2, 0x7, './file0'}, {{0xa2, 0x3, 0x4}, 0xa, 0xfc, 0x7, './file0'}, {{0x10, 0x2, 0x1}, 0x7fffffff, 0x9, 0x7, './file0'}, {{0x8, 0x4, 0x8}, 0x1, 0x0, 0xd, './file0/file0'}, {{0x80, 0x0, 0x3}, 0x73d0622b, 0xff, 0x7, './file0'}, {{0x0, 0x1, 0x8}, 0xec, 0x3, 0x7, './file0'}]}}, 0x112) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000001840)={'syztnl1\x00', &(0x7f00000017c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x27, 0x66, 0x61, @dev={0xfe, 0x80, '\x00', 0x3c}, @empty, 0x8000, 0x8000, 0x9, 0x80000001}}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001880)={0x0, 0x0}, &(0x7f00000018c0)=0xc) sendmsg$nl_xfrm(r1, &(0x7f0000001bc0)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001b80)={&(0x7f0000001900)=@updsa={0x258, 0x1a, 0x200, 0x70bd27, 0x25dfdbfb, {{@in=@multicast2, @in=@broadcast, 0x4e24, 0x400, 0x4e20, 0x81, 0x8, 0x20, 0x80, 0x3b, r4, r5}, {@in=@empty, 0x4d6, 0x6c}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, {0x6, 0x2, 0x2, 0x4, 0x5, 0x5, 0x7, 0x10000}, {0x4, 0x9, 0x8, 0x7fff}, {0x4, 0x8, 0x3}, 0x70bd25, 0x3504, 0xa, 0x2, 0xfb, 0x22}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x4d4, 0x32}, 0xa, @in6=@dev={0xfe, 0x80, '\x00', 0xd}, 0x3506, 0x4, 0x2, 0x5, 0xfffffffa, 0xc6, 0xfff}]}, @proto={0x5, 0x19, 0x6c}, @algo_auth_trunc={0xe5, 0x14, {{'sha256-arm64\x00'}, 0x4c8, 0x180, "63fbc688e9d61284586bd506b0aa47311e5b14b0a143339845bfc8d85bdebde4de4b312a4da62b08280365ad2927da9bbf8d0143a67488606208ecfad4750c2c27ac90dfcc9b54b88fc5d3eecb442975e60fe01657cbf169445e93992aa6b1897c54756d2eab76f55dae55719b9848c22531a0434205e6731feb2530f6b2422ce57e853f2df99198206ea9f312154c9a1da592e19f621775d0"}}, @lastused={0xc, 0xf, 0xfffffffffffffffa}, @address_filter={0x28, 0x1a, {@in6=@mcast1, @in=@multicast1, 0x2, 0x7}}]}, 0x258}, 0x1, 0x0, 0x0, 0x90}, 0x0) preadv2(r3, &(0x7f0000002140)=[{&(0x7f0000001c00)=""/208, 0xd0}, {&(0x7f0000001d00)=""/178, 0xb2}, {&(0x7f0000001dc0)=""/218, 0xda}, {&(0x7f0000001ec0)=""/32, 0x20}, {&(0x7f0000001f00)=""/21, 0x15}, {&(0x7f0000001f40)=""/26, 0x1a}, {&(0x7f0000001f80)=""/120, 0x78}, {&(0x7f0000002000)=""/245, 0xf5}, {&(0x7f0000002100)=""/15, 0xf}], 0x9, 0x400, 0x5, 0x7) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000002200)={r2, 0x1, 0x6}, 0x8) copy_file_range(r0, &(0x7f0000002240)=0x4, r0, 0x0, 0x8, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002580)={&(0x7f0000002280)=@rc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000002300)=""/186, 0xba}, {&(0x7f00000023c0)=""/40, 0x28}, {&(0x7f0000002400)=""/192, 0xc0}], 0x3, &(0x7f0000002500)=""/87, 0x57}, 0x40010100) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f00000025c0), 0x6000, 0x0) r7 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000028c0)={0x6, 0x14, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, [@jmp={0x5, 0x0, 0x2, 0x1, 0x0, 0xffffffffffffffe0, 0xfffffffffffffffc}, @generic={0x40, 0x7, 0x5, 0x7fff, 0x52}, @map_fd={0x18, 0x6, 0x1, 0x0, r0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f00000026c0)='syzkaller\x00', 0x6, 0xf3, &(0x7f0000002700)=""/243, 0x40f00, 0x3c, '\x00', r4, 0x25, r7, 0x8, &(0x7f0000002800)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000002840)={0x0, 0x0, 0x1, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002880)=[r1, r3], 0x0, 0x10, 0x7}, 0x94) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000002980)={r2, 0x4}, &(0x7f00000029c0)=0x8) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002a40), r0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r6, &(0x7f0000003c40)={&(0x7f0000002a00)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000003c00)={&(0x7f0000002a80)={0x1150, r8, 0x728, 0x5, 0x25dfdbff, {}, [@ETHTOOL_A_FEATURES_WANTED={0x108c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "ee41c5c687b3435b16466712e0931aca987cfa21f2e45a28086a0bfaf91ff71abd33c6d91eab6d09939bbc53b15c8e5f57a9a2929bd701e1ea2e54a839a909e6598dd386c02b8cc7e139782a9dd3a62afe11eea4d43d671977a194966e3aed25076c0e135cc99c09d97a"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xf1}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}]}, @ETHTOOL_A_FEATURES_WANTED={0x98, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x59, 0x4, "aab260c17537dedf70600d7de4259d566eb406c901ef7656db4e3c35b4c2c8117a6aecf00e5a090bb90482e69e9cae54db2903ad9076391743e6c38f18a38ced3ea82f495adac6fdf954d42bc287edcb5b014fef7b"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x26, 0x4, "14f20ef7e06247015cf5671ba94b257d00048e2d4fa6d175701275661113131c5220"}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}]}, 0x1150}, 0x1, 0x0, 0x0, 0x4000000}, 0x4810) ioctl$PPPIOCGIDLE64(r6, 0x8010743f, &(0x7f0000003c80)) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r6, 0x84, 0x7, &(0x7f0000003cc0)={0x1}, 0x4) pwritev2(0xffffffffffffffff, &(0x7f00000040c0)=[{&(0x7f0000003d40)="fdb2f1d157e4666f5cf5ce0f1a7f865588807904ef60d67503a6889a42f3317c520dd06115f9114e5e359d23f962407fa274a42615c20fbfaa790def93266965aa764cae1b7659d2bbb47663852b9d112a1d11c62267c12896d008ec68161458686c5a0f0b5ad2c6868d34c3c733e366de3d6f", 0x73}, {&(0x7f0000003dc0)="ba3c6f6568785638dd0afb2e766f94e834ea83c8129bbd8ec460e30551e5b0a2e552b3903374ceec9caa7b55ca38a8b95759a3ae7f422938def381e6fafcf7140636f1aa6160eb56c8c725404282a2d7da94625969a8d79dbd274346dbca9d86b1539e92b6d76654a84303fe4372189cbb79cb197d10a0ed204c22af723634c6d3ee93", 0x83}, {&(0x7f0000003e80)="63699b6f0880956e9d14c658c82937059645e62091f7c528ed8a5362a8e5343450d30dc4fbeee371ba54757cde53c9429b537d9072dad09c0c815d7424ce9354f84c54c2a1b14e882c9fe3cff3c2d9f8f6de1a714650c1ad9960c93a00159fc2521302f77cf3a98472eea38c486bfd1b9bbdc1c7b92ae192eeebcb32d303715a601ea2976ca73f5e2ed35e0979a4192b4068b247f6eb3dd0799fa1386d6966ae4a116aed639196c71ec8e6cb1643a9d601bc2a45dac4b0a4ffa6b2ac2ece70062ff593e04370614db16b5b57994fadbe49ee9ede3e3f1b47ad6c9fe6037fc3eacaeb90cb1e23a822ccfa7c186e47dddb546758367152a415", 0xf8}, {&(0x7f0000003f80)="30e0dd2d902df20d17d7dee6b2415aee4e18ef85a26b33be9d93707db1ebfced831c891aec9015d39859eda24a7d1d9bfb5ab4d4cdd3f8dac6b4fe3315d3b96945a3b2324d90b6f36962b3aafba169c8263d3b8851d7cbcaeb2c6f05b35811e8e5594bd13c02fb52182437211991ffd0252fcf24b942d8698a78f5f798e54863a633d105400ecc3a13d58a8bf78cff39296871266bbca19d440b11ce55213e9309838694ac51aacd5cbe42995847", 0xae}, {&(0x7f0000004040)="ece3cdecdae722940b7458b82fdff07c9c1e3011ed161493b135d3bbffd16c393963923839125c721db228dfd16ba8cbbd01c804f627f8990cb5aeb02fe15622ae161a80798f4c73d1700859c5b14d30a9a2bcacc8f111d48b3b8b4dce", 0x5d}], 0x5, 0x7fffffff, 0x8, 0x0) 3m31.489692793s ago: executing program 1 (id=740): r0 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f00000006c0)='./binderfs2/binder-control\x00', 0xc02, 0x0) preadv(r0, &(0x7f0000000a00), 0x0, 0x8, 0x1000003) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000001080)='./bus\x00', 0x80, &(0x7f0000000600)=ANY=[@ANYBLOB="666c7573682c6e6f646f74732c646973636172642c646d61736b3d30303030303030303030303030303030303030303030322c646d61736b3d30303030303030303030303030303030303030303137372c646f74732c6e6f646f74732c71756965742c646f74732c0023c3cb4d2e3cbf18508098fe0de2af38db67d42d1bc4ab714d52f019082433fc9ca2d7174b2c4ece31c9f4c7a4d53914e100"/167], 0x1, 0x140, &(0x7f0000000000)="$eJzs27Fq21AUBuDj2m3ddvFcOgi6dDJtn6CluFAqaEnwkEwJOFnsYIgXJZMfJS8YCJ683ZAo2Imxhwy2IPq+RT/8CO4dpMMV6OjT2XAwnpyO/8+i3WhE60dkMW9EJ15FM0rTAABeknlKcZNSSm+n8e4qUkpVrwgA2DbzHwDqx/wHgPox/wGgfvYPDv/+zPPeXpa1I66nRb/ol9ey//0n733N7nWWd82Kot9c9N/KPnvav473D/33tf2b+PK57O+6X//ylf5DDLa/fQAAAKiFbraw9nzf7W7qy/To+8DK+b0VH1s72wYA8AyTi8vh8Wh0ci4IgrAIVb+ZgG1bPvRVrwQAAAAAAAAAAAAAANhkF78TVb1HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAWHUbAAD//0DvUik=") syz_read_part_table(0x5e4, &(0x7f0000000000)="$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") r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x80101) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xa7, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x1a2d, 0x0, 0x7fc, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0xffffffff, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x25, 0x0, @void}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="19000000e4a81fa800"/20, @ANYRESHEX=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES64=r2, @ANYRESHEX], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) close(0x3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(0x3) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x482, 0x0) r5 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01f71800000000000000240000002400000002000000000000000000000400000003000000000000000000000000000000000000000d020000000000000600"/94], 0xffffffffffffffff, 0x3e, 0xb1, 0xa}, 0x1b) timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r5}, &(0x7f0000000000)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) dup3(0xffffffffffffffff, r4, 0x80000) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan1\x00'}) r6 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) ptrace$setregset(0x4205, r6, 0x1, &(0x7f0000000100)={&(0x7f0000000840)="dcef58b7f29c1f7c93d183044aedba283413e674c7719c33a4b17f07e2ad50248c6130863b0f7433c7fbc9b978a39eae88bffd05d139cedbee444f7c704df92b0f64462b4b470bedced2125e0b1f38fbaa348c6d75aa1a4011e9cdae15ecb9309b0101edbf6dd6d111d6132f1821a4e4cbec8438c571a70e7ca7b045991a6cc55c00d81318c5136bcdc3784459a028d6a7be1c00e5a3e65a2b9d859f11bef5396babb47aa8a97f40ab561753a7fbe1b3b6fa64cf266f617f1614318a4a0a27f5999a05", 0xc3}) 3m31.427944446s ago: executing program 0 (id=742): r0 = socket$nl_route(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x4, 0x0, &(0x7f0000000180)={r1, r2+10000000}, &(0x7f0000000200)) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x4, 0x2, 0xe2, 0x4, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, @remote, 0x7, 0x1, 0x9, 0xffffffff}}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001900200029bd7000fbdbdf250a201405fc03fe01002000000800060010000000080017006b030000060015000400000008000400", @ANYRES32=r3, @ANYBLOB="aa6ed762af285529e847e014f666d84f1a7c0bbe4e70ce2987a972be24c4f1f11a4e4a0574c948f4ff4806a77193fd4773c5abef6cb8641068576ea5c3a037c3a033994e"], 0x3c}}, 0x0) 3m31.044020649s ago: executing program 1 (id=749): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a300000000040000000030a01837700000000000000010000000900030073797a310000000014000480080002400000000008000140000000000900010073797a300000000078000000060a010400000000000000000100000008000b40000000000900010073797a30000000005000048020000180070001007274000014000280080001400000001508000240000000012c0001800900010068617368000000001c00028008000440fffff3e0080002400000001708000740"], 0x100}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x13bb711e) ioctl$RTC_PIE_OFF(r1, 0x7006) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x18, 0x11, "f252fe415cca87b215fcca9db52fdf1cec9914d4650c3841e957120bbed875c068049db11bf0635552a2984b85b76e45b51ae7806606e5f6845e4666309d596d", "b8e5419adb5bfb85d4fcd97e7979178caa6f725370ffc037aa75858c6300b06e6bb0422fc616aac77049b71ab83e4dab18b98a8cf6e4d33a56f5f822f2616278", "89be7093823240c5953521131a3a36f1dc7907fb526137639a29e8e7eb87a1e3", [0x5, 0x1]}) 3m30.089293124s ago: executing program 1 (id=755): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x111, 0x4b4, 0x138, 0xd4feffff, 0x270, 0x20a, 0x278, 0x270, 0x278, 0x3, 0x0, {[{{@ipv6={@private2={0xfc, 0x2, '\x00', 0xfd}, @loopback, [0x0, 0x0, 0xff000000], [], 'bond_slave_1\x00', 'team_slave_0\x00', {}, {}, 0x6}, 0x0, 0x110, 0x138, 0x0, {}, [@common=@unspec=@devgroup={{0x38}, {0x3a1726ca1f63d893, 0x10, 0x11b8, 0x10001}}, @common=@inet=@tcp={{0x30}, {[], [], 0x0, 0x0, 0x2, 0xa}}]}, @common=@inet=@TCPMSS={0x28}}, {{@ipv6={@mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, [0xff, 0xff, 0xff, 0xff], [0xffffff, 0xffffff00, 0xffffffff, 0xffffff00], 'wlan0\x00', 'veth1_to_bridge\x00', {0xff}, {}, 0xf, 0x2, 0x3, 0x40}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x2, 0x400, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) socket$igmp(0x2, 0x3, 0x2) r1 = syz_io_uring_setup(0x6440, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, 0x0, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x40, 0x0, 0x3, 0x1, 0x0, 0x7ff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB='.'], 0x118) write$selinux_validatetrans(r4, &(0x7f0000000200)={'system_u:object_r:hald_var_run_t:s0', 0x20, 'system_u:object_r:usbmon_device_t:s0', 0x20, 0x3541, 0x20, 'unconfined\x00'}, 0x69) io_uring_register$IORING_REGISTER_RESIZE_RINGS(r4, 0x21, &(0x7f0000000380)={0x0, 0xb1ec, 0x4000, 0x2, 0x146, 0x0, r1}, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r4, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_MKDIRAT={0x25, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r1, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 3m30.065762166s ago: executing program 32 (id=755): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x138, 0x111, 0x4b4, 0x138, 0xd4feffff, 0x270, 0x20a, 0x278, 0x270, 0x278, 0x3, 0x0, {[{{@ipv6={@private2={0xfc, 0x2, '\x00', 0xfd}, @loopback, [0x0, 0x0, 0xff000000], [], 'bond_slave_1\x00', 'team_slave_0\x00', {}, {}, 0x6}, 0x0, 0x110, 0x138, 0x0, {}, [@common=@unspec=@devgroup={{0x38}, {0x3a1726ca1f63d893, 0x10, 0x11b8, 0x10001}}, @common=@inet=@tcp={{0x30}, {[], [], 0x0, 0x0, 0x2, 0xa}}]}, @common=@inet=@TCPMSS={0x28}}, {{@ipv6={@mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, [0xff, 0xff, 0xff, 0xff], [0xffffff, 0xffffff00, 0xffffffff, 0xffffff00], 'wlan0\x00', 'veth1_to_bridge\x00', {0xff}, {}, 0xf, 0x2, 0x3, 0x40}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x2, 0x400, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) socket$igmp(0x2, 0x3, 0x2) r1 = syz_io_uring_setup(0x6440, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, 0x0, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x40, 0x0, 0x3, 0x1, 0x0, 0x7ff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB='.'], 0x118) write$selinux_validatetrans(r4, &(0x7f0000000200)={'system_u:object_r:hald_var_run_t:s0', 0x20, 'system_u:object_r:usbmon_device_t:s0', 0x20, 0x3541, 0x20, 'unconfined\x00'}, 0x69) io_uring_register$IORING_REGISTER_RESIZE_RINGS(r4, 0x21, &(0x7f0000000380)={0x0, 0xb1ec, 0x4000, 0x2, 0x146, 0x0, r1}, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r4, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_MKDIRAT={0x25, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r1, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 3m24.273380263s ago: executing program 3 (id=824): r0 = socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x3, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_config_ext={0x4, 0xb}, 0x2, 0x10000, 0x0, 0x8, 0x8, 0x20005, 0x20, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f00000000c0)={0x1d, r2}, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)={0x1, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a5976ac6bcd41fd8"}}, 0x48}}, 0x410) sendmsg$can_bcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)={0x1, 0x282, 0xd1cf, {}, {}, {}, 0x1, @can={{}, 0xfc, 0x3, 0x0, 0x0, "ee6a491530f05065"}}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x20, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setrlimit(0x7, &(0x7f0000000200)={0x5, 0xb}) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x2d, 0x0, @val=@netfilter={0x2, 0x0, 0x7, 0x1}}, 0x20) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x3f4, 0x100, 0x70bd2b, 0x25dfdbfe, "bce7"}, 0x14}, 0x1, 0x0, 0x0, 0x4058800}, 0x20000006) 3m24.251286675s ago: executing program 3 (id=827): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x4004000) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) close_range(r1, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r3, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x400000000, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0xa, @mcast2}, {0xa, 0x0, 0xffff, @remote, 0x3}, r4, 0xffffffff}}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) 3m24.207579227s ago: executing program 3 (id=828): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x1, 0x12) write$cgroup_pid(r0, &(0x7f0000000140), 0x12) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0xe0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x8f, &(0x7f0000000980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x0, 0x0, &(0x7f0000000a00), 0x8, 0x8f, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500), 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/306], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'/19, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r4, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3m24.114507903s ago: executing program 3 (id=831): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="4001000010000100fefffffffdc9df25fe880000000000000000000000000001ac141417000000000000000000000000000107344e230005000000803c000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ffffffff000000000000000000000000000004d46c000000e0000002000000000000000000000000000000000000000092010000000000000600000000000000ffff0000000000001c250800000000000200000000000000f8ffffffffffffff0200000000000020ffffffffffffffff2a000000000000001f00000000000000b80700000000000007000000fcffffffbcffffff2abd700000350000020001002000000000000000480003006465666c6174650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008001f0002"], 0x140}, 0x1, 0x0, 0x0, 0x48801}, 0x0) (async) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x62181) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000500)={0x0, 0xe, 0x1, 'queue0\x00'}) (async) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="5c0100001000130700000000f9dbdf25e000000100000000000000000000000000000000000000000000ffffe0000002000400004e2100020000000021000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="00000000000000000000000000000001000004d632000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000010001000000000001000000ffffffff0200000000000000030000000000000043050000000000000400004000000000ffffffffffffff7f0300000000000000010000000000000000000000000000008bf200002cbd70000035000002000000500000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000", @ANYRES8=r2], 0x15c}, 0x1, 0x0, 0x0, 0x880}, 0x2014) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x8, &(0x7f0000000040)={[{@inlinecrypt}, {@nolazytime}]}, 0x21, 0x4f3, &(0x7f0000000f80)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file7\x00', 0x16c) renameat2(0xffffffffffffff9c, &(0x7f0000000440)='./file7\x00', 0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0) 3m23.853227548s ago: executing program 3 (id=836): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) fsetxattr$security_evm(r1, &(0x7f0000000140), 0x0, 0x0, 0x2) r2 = socket$unix(0x1, 0x2, 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)=0x10) bind$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f00000003c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000000)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000740)={0x48, r4, 0x1, 0xfffffffd, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_SEC_DEVKEY={0x2c, 0x2f, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x1}, @NL802154_DEVKEY_ATTR_ID={0x14, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}]}]}]}, 0x89}}, 0x4044080) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000828bd7000fcdbdf25210000000a0001007770616e3300000009001f007068793000000000050020000100000009001f00c04e03b6b8ce1b710065f12a4770706879310000"], 0x4c}, 0x1, 0x0, 0x0, 0x840}, 0x40820) r7 = socket$netlink(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0x7, &(0x7f0000000040)={0x0, 0x100}, 0x0) fsopen(&(0x7f0000000040)='binfmt_misc\x00', 0x0) sendmsg$netlink(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000002c0)={0x18, 0x20, 0x601, 0x0, 0x0, "", [@typed={0x7, 0x0, 0x0, 0x0, @str='\a\x00\x00'}]}, 0x18}], 0x1}, 0x0) 3m23.629406091s ago: executing program 3 (id=840): r0 = socket$pppl2tp(0x18, 0x1, 0x1) (async) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc000000190001002dbd7000ffdbdf2500000000000000000000000000000001ac1414aa00000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000c00000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000000000000000000000000000000a000000000000feffffffff7f40000200000000000008000000000000000001000000000000004400050000000000000000000000000000000001002200003c00000002000000ff0200000000000000000000000000010600000004"], 0xfc}}, 0x0) (async) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x32) (async) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x4e22, 0x9, @empty, 0x2}, 0x1c) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x8, 0x4, 0x400, 0x10, {0xa, 0x0, 0xe38, @private0}}}, 0x32) 3m16.27864218s ago: executing program 33 (id=742): r0 = socket$nl_route(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x4, 0x0, &(0x7f0000000180)={r1, r2+10000000}, &(0x7f0000000200)) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x4, 0x2, 0xe2, 0x4, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, @remote, 0x7, 0x1, 0x9, 0xffffffff}}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001900200029bd7000fbdbdf250a201405fc03fe01002000000800060010000000080017006b030000060015000400000008000400", @ANYRES32=r3, @ANYBLOB="aa6ed762af285529e847e014f666d84f1a7c0bbe4e70ce2987a972be24c4f1f11a4e4a0574c948f4ff4806a77193fd4773c5abef6cb8641068576ea5c3a037c3a033994e"], 0x3c}}, 0x0) 3m13.024976909s ago: executing program 5 (id=944): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x10, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x3, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000dc0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GET(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000a40)={0x50, r2, 0x1, 0x70bd27, 0x25dfdbfc, {0x27}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}]}, 0x50}, 0x1, 0x0, 0x0, 0xc040}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f00000000c0)={0x84, r2, 0x10, 0x70bd27, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x4}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x401}, {0x6}}]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000100001ff00000000000000000000000a2c000000050a01020000000000000000020000000900030073797a32000000000900010073797a300000000014000000020a031747d21400000000000000000014000000110001"], 0x68}, 0x1, 0x0, 0x0, 0xc044}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000100001000b000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f08000340000000045c0000000c0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000300003802c00008028000180230001"], 0xe8}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={{0x14, 0x10, 0x9000, 0x6, 0x0, {0xa}}, [@NFT_MSG_DELSETELEM={0x2c, 0xe, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0x74}}, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x54}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x4) writev(r5, &(0x7f0000000080)=[{&(0x7f0000000340)="480000001400190d09034beafd0d36020a841a000000230f00000000a2bc5603ca00000f7f89004e00200000000101ff00c00e03000200000000000000000300005839c900910000", 0x48}], 0x1) 3m12.918199206s ago: executing program 5 (id=946): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000008c80)=ANY=[@ANYBLOB="2c00000026000506"], 0x2c}}, 0x800) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x4004) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, 0x0, 0x2c000010) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000002, @in, 0x0, 0x0, 0x1000, 0x0, 0xa, 0x20}, {}, {0x1, 0x6, 0x0, 0xfffffffffffffffe}}}, 0xb8}, 0x1, 0x0, 0x0, 0x404c830}, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x6, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000c00)=ANY=[@ANYBLOB="020000000000000002004e1fe0"], 0x110) 3m12.764753275s ago: executing program 5 (id=948): socket$nl_generic(0x10, 0x3, 0x10) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) mbind(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4003, &(0x7f00000001c0)=0x5, 0x6, 0x2) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = fcntl$dupfd(r0, 0x406, r0) write$tun(r1, &(0x7f0000000400)=ANY=[], 0xa2) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x4004, @fd_index=0x3, 0x0, 0x0}) io_uring_enter(0xffffffffffffffff, 0x3516, 0x0, 0x0, 0x0, 0x0) 3m12.685022029s ago: executing program 5 (id=950): syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000040)='./file2\x00', 0x1010051, &(0x7f0000000080)={[{@errors_remount}, {@delalloc}, {@bh}, {@dioread_lock}, {@i_version}, {@data_writeback}]}, 0x2, 0x550, &(0x7f0000000900)="$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") mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x84022, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x0, &(0x7f0000000640), 0x1, 0x5c3, &(0x7f0000000f40)="$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") 3m12.371869718s ago: executing program 5 (id=953): r0 = io_uring_setup(0x6452, &(0x7f0000000000)={0x0, 0x43ad, 0x80, 0x2, 0x2e6}) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000100)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000003c0), 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_clone3(&(0x7f0000000300)={0x200004400, 0x0, 0x0, 0x0, {0x18}, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x58) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x11, &(0x7f0000000100)={[{@noblock_validity}, {@noinit_itable}, {@norecovery}, {@min_batch_time={'min_batch_time', 0x3d, 0x71d}}, {@abort}]}, 0x1, 0x610, &(0x7f0000000a40)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x100, 0x42) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0x8004587d, &(0x7f0000000080)={@desc={0x1, 0x0, @desc2}}) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x80044940, &(0x7f00000010c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f00000003c0), &(0x7f0000000340)='.\x00', 0x126a4b5, &(0x7f0000004140)=ANY=[@ANYRES16=r8, @ANYRES64=r7, @ANYRES16=r6, @ANYRES16=r8, @ANYRES64, @ANYRES16=r5, @ANYRES16, @ANYBLOB="9a7f40ad4c7145903a868b9020e1e8899ed5747db23004fc9d248900abcaa6b065cf0800930a71dcd8b8955d93c78b9d4e5e06d8d5c9ac9b75d177754d6eba23e6d2be546c0dfecdf61baf732950a5729c01fbdc11e36cb411be200a9135657acd97d21ee46aac313ebdddd9265af16558dd3e5ba4836659a6abfe08aad84276acf949bdaa34bdf7f7b2dfb2fe8b9d6d225dcecebeb6e15f649994728842bd99fc94897d24315ac2d17bf6c2acfbfa8464d80f36304f88b906b78ab359be3479db5b0e7555f04416807c2202d6551f2425440be741dbe053e0bfeb845623e722a9293843f1cf0a71119dcadf7e353af4da52aed3086d6e5a095774248be9a1b1418dec1c03a2cb0ece0840ebeaaf7b67867da45943b700e2d6dad775ae6f33e55aa86ca84c336c91e3b7d7224f7a9a10d5b45a6ce0769d875415bea136b5508e5e0a88290792da3b11b2284a3d757c301cec78b55d3fcfa073615ccb089f66c5b9a5c84f6c1bb78c3370c4687eab260711fa05525687c7709e15cddea061f70798cbf940ad929eb80f33ad8bb4fcd322dd0558f111d7d01351147976b425a27e573402490055054cf3d80bebde6a89f3086170633740f08780aac3a73f17eaeda8deb642c2887962596b4d78c0ffffb28d0e64073b0641f89cf83a69afaaea03ba6070838fdbdaccb81630a6fdaa77fc10146013b9fd79e965a320daf81c1a51f032a3f462f2740e579eb116cad80b4e233326bf94fea52184517accf608b1fbfb395942869841b9ca0f314beff6b2dc0a74d7599012274b24775f0382e72907c1f0c571b994f048c0266feb775d893fec84e5733cd66a96cd45b60f63743b17b05d99c427a2d00a27fef17cadf128059a2e227b80701755b0bc706f32255c8cd619fa995cc7649f28337361a62cff46669fa4cf095a2d148987a9fafa6e1fb9f59b5ac5ff10a4c62e0187a3c75a983f7f5211142c6c09170a13e29c2044e5568bda8055cee4722e445e83ea01307c42cbe63a5bc529e1200e5874f7500275abacd6cc0e3bf8fd38ab7bab39f54d180d60892e2e3a713a3e654c89b8e9ba4474909991844514c04b655c66ccd6f2a17e29ff69d343ebac7ac5e1510ad4ff52e6a932a97bb0d814259da6545022152dd63f06219a1d66ec2278b694876ed6195b0543b8c9289b8438e8ee57dd38bcdb045a6fc4cede28effaa0354afbd4190fcbccd9a0e91508e4399e0e30a0bfdedcc19454b6dd7c2785a6e4fe74a0ece1d683ad07d76eafec02fb0d88debfeacd3531413185da0ffa4fb9b5e6d5a916f7bb5d51efc8ab61e4953fc6b2d1e670769f3ca56d51b804ceb118278acc90422e1f51e448a27d2fe4f93c88cf7c6148474bf650902dd6dd96541044113d244cf938150ec426e7ed63e1f153bbe328f4232552b104c8dee60b0c4e4c25f2605e97cc6f4263d32e8340be2d167137682373ae4cd501fdc9c5359b40f52803a5e4c0e04a5de0412c5cbd4d05e6135a1209d4b2dff50d39e481f1d1b01ed71004fb0c18e736af8ab176f833a439a85c9132e6d2296f665771c6a284eadc08c94ffa520dcc37fd6426c152364699514b15d4df6732fff39834e8ba29688b19db27a970d9d7fbee973c76bee04fb6164963969ebde0f785606781d63726736d8b60a713d5f72207a23f6f00420fdf24d14c069f36a7e236620481cc7a63857cc1355bac8d4f9a3f32785ad4d9d81719077a816b33b98006c322ee473aa9f8f83fae86a4d421104b298a9e42357c44b773e3504b3f9eb5b29330411b776b78fdb6dd9713dd1aee0cc9c7ee8bd23a50d4c8babaf6d74bc25377009a8c57c941f80e58ac08c93a275656cbad3864df9e791305d66103ab30983b07553ede5b5d5b0aab157f805eb6c11c75dd7f297c2cc9110551131a797164dec422b13799f1c261464c765a62c201eb9c8686eee94642d59f429cd137cba0d1a8126dcdfc28ea5c201526c61164a86f480dfde0c60fdf6afd3cd64719de1d89b5a362e058054a9db73aaffac324b04e8903060e1f14ca4ac31c82183066e6d581685efbe3452a20a665166b03808220770d66051971b61d8114376e22a4511cae9fdf7bbed68bb9f45b57eee1c15775730ef1434731d7b82a7cbcd6155396263984edfcea62196189da0ba9908d7d5ef514d75a3e1d4ae42654365083873fc4ce969fa4fac51d640be8d948bb9464d1a7e494c8df98bd5a569ff7fe1aca542c34610148a8f1dc9d60ff0f761270577f286a362f32164184ffce3ad132637e9f0381e9ce76a11f296f9d1e835cdc44926104e1df4d0a282a84b9fbc23064bfcab0d221c6e3124ae8ba6022e62f170dcc2d655f73b40f83fd65f5c705bc1f9e8df13adeadff9e1fe4660a55be7dc969cfffaed607190162dcd09d0cd86a297b22142b88f0eb28dd1a45152a4f4f2dca0d96d39fa594349040f486cd486af619b7083236cf90324cddc6f1ed0f6a103c8d936d7f2f31d420ef50931838e66721bff7494617b6b4bc385f3e51b3f81cf5d6953ac7fddc0f3466682911b38bc7f082e0c18e3ae0badf7f3fd3e186ebc2bab71fa26f77bb14cd97e6761c93c8c25887c0ef1f3dc1d8d86ce0fb73190f66f4deca77977e8d6064bfeeac3fad2bc50488c144e2a1a82fcc1e1c12ac54bf3e2d468e8f53241e4a6ad9e466746a45b053452ded5caa20461881d78d8235e986ba8b77e83601655d2650bf1b64ce17c75314216b43bbd1101a2e12e57525bb7d3b136a70635bdac8af24367a24ce2fe2a72ef2b0e56ff8dc62a82946f86f9b6b1418a89b1971372dfe7d5ce2e6611befff721f04a19bce7f90b1551a4cdead136662c50513fdde6f9d4a199c3907ed8799f231f54dd8347c71d829ff8ddc5d96b5aac2fe58652c81ff7f54e2568119dff2763ef435aa420630dacc7e9414340ee8688f46c7a8ab96d860937641042b3cdf6857ff1d2d4e47cec1f23e65fe541f38cb96b132666f999002e89cd1896ca58c2e63b87382e1a6c1ee9afa56cf3ba923fa9c989e20bff313f37252632fdcff03fbdd2d334ee93baf75c1bdae30feaa81fb2ac1b63c42dda06f20ce8c9d003eb3efed7931def342fb874fce92763f6f477c7f589b75d2129419fc4cb7a8893a1d3f94533ed9fdf9f21fc254fd80aa74750833d390327a2107e761240928d35a36c5eaca61fd848116b8dd7ec8157928bc2dd87f7756aa517cf6a61d2009fd4ba0579ca3b3129cfd5403546f5ab6d0575799a008fc67da9658427636d8f806d9b8cad64aee438d0a9b45957f31a5afe3ed894add9acadfd347246099c6ff0b4ec6f19ac61557daf8739e528185ab1468ca72d6d72e4f026e371e540b774b6576df3014dcc9e91b2cd1f0403a4fcaa6627b22682bb54f92150c2917acaee1972b2b03bc2bd37fdb9e7352c654d94ef196b7229e4da5ee62b7d395ecdd5177f2563242ea49ff78151a4a816a94e89b03f41c7e6684f8be3e5802e9338e7cbd3b43f708c062f944a59f31b02ca9a177e6b681accee8785d2467d2d78636be4330febaa3f6907db07992a2de74e459f3ae8ee6adae20cbc75aabd2d5d3424de0ddcc3ddd981c3a4966c57f8fdb1c42db87395f0bc800ff8ddb4c228a7d793d8a997885494a8578f5433d3f82886ea573641bf16065efbc25718c88f7277ce04c94af560d8deb7968496f849d3fad78741272b08bf7aec3f3c777428d3b8b897333ae5afb6823af63cb7347601ee2e8d4e21b21a12e6d42f66a1aac26d296bc68a998d8ba179ed5f756c2efd8a7acc0e3f08093bb4a83d37f15b4fe07c90858058ad1ff0e21bb7bf4363079c5d452dba5972b21c8f41daf6f11a51d321d3c1d544190238036d907d965ff469ce4895eb7675f3e94a15f83b837b892a40390d87d76e9b15eda02366299d3dd93943466bceeb2f9e465adccc08e1a02c3ac01815931627ed327e0ffbe09563221a365b88c4f2449bd3634920d5bfbde7cdc92c4cb16a579f35f07dafc87ce6ce4de7bf9e8ff0e80b81cdab8f2164a25a0a6929679ce9ae0dc2ac7ed41a787446676f091597551dc2e8c054224bac6652bba5fb675c0b2c94d2faac160f11b7b96fc96415aca8a47fa03658b8afa24b6bd97f7dbeead9ae5f7ec1cb0d000055f41a5043c6c4c97212398b168b5cb9ee650726eabcc31b6712e815fdaae77885350884fb36d6d5444d5e5500a7d636d4eced14b9d411c765b36a4be06ca9be2965d6d6c06c3b6bcb38babeb2999ee71295d48926bf6e39363fabf74de5e57aa0b59f9dddeca142d0c50ab7ff198196c69c971e6ab591220f4e42d6525e2dbd99b6c57949c854e4ee0e4581f9e3e160b3f66b01f23f4d0472c0a1f307837ac8dac0a257d09ab82975148dcd764fe6359a5f21b9cbe2ae7b9b277489a8b3285b8289a84ff854508b4488ffcf68f47ec7a5c18a8c3d06e26b32f754ac74ea8e93a554147fd3b3daf1fbe924e2e389cac13a5f80f3a21dbd250d3917f7b5acfc739a63f2b3d6b3f099efb4be7a842215c89fc87bd8550d11ba2a4af0f111ab124503b26feeae3be3ee24168dd4553a226b9168edb11c3e61bc850adf995b4d6f1aace6db0b91f805c3d1789a3e6b470e5470968f429d5b05c8f76ca2981e37f5bde4ad00a09755c76774ead7d93f3f41255b1d56152e3699b133b2e0b277427c992323d1b4d8c438434e9e901ddd43788f80cb9a975e9dd1671ce16be5ff8033d5da824f00fd78b540edbcd69a2e9aff03e31af9afefb809434f52b4a1239fdd241ed3a268258addde19d1724155a1a4c877bd59b0659b7a786886f6ffcb5999d1f9c007d615020926f7165a9ddd4aaa3c7b631d30cc951e328131d99282ac06a18f88373092320ea5308f06c376e711aecda4cd1c2b639d9ea7a2613d4e9eaa9a0ef72774fdec622f7d131b45135d577897bf686b460a371083070139ea544bda15012251d6c8e7163c25412841faefba76765648ca7cd1b423403a654b6b5754588ae6c309621477db20f7c9236af1e422ebd3fb6d6a712e7a6d00d58416b7d65a53a2514bf51bedfe9207f16a4d79418600389b98ea8b9e06b8da708a86f191e567925af39a09ac9fd7902e8f8e77567baf1b75c05ba1eb7089b424801405afc982a8d79c80fada184a1ab3bab526a3b0a5e20d2dc6bcdd2c5cb7c49f735f3e8f4d36a388ca805876ae08f0e3acca5dd864c1fa1552068bf799095221480374fd2dcaeddb74be93470eff4fe278e190f0a131f32340ada9cca518af769f42943875f4c5707beee2179771da21cd66405b9973648bd047a516d1cf902fa1f0fcdcbc3f4c1f20fc22f9a7e9f4c3a52576399604c46f83ede44f542d06d54e6e8a1e693a2cfcbb16c178d1bace976133e72cc4533bd02b1c4ec2cc22097435aff5a682ca7227414895450831560fa682493f4814ce8fbdb190f8ce2b533ed9582638511bda93aeae5d0690f745b788db622864ba3fb60952f119427fbe66754c5c038c5fb2cb87c326d65862e353c14950bd1fa7c70e36323e9cf90c81f6275e59c7926acac1560a0b6bbc7a850817f2effa19d485315a219d49e293f871278294d02765cf72caa2f438de3337ed205bf68ff6ddaaa5e4b80de5fba022dfcf9cf074a319678df11eb77b3ef66e512b67ba5182265a60eaf457691e973d23cbaf6000537f886695074ebb616f9cdad9de7c6fe9ecfbd13d537d64c34a7c90ca56b50e60d6a7067e391e63561793edf6ed3c2eeb8555909a59ce73da1f096d41fb42de44494128324a9", @ANYRESHEX=0x0, @ANYRES32=r4], 0x5, 0x0, &(0x7f0000000000)) r9 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000001240), r1) sendmsg$IEEE802154_SCAN_REQ(r1, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000001280)=ANY=[@ANYBLOB="14000000", @ANYRES16=r9, @ANYBLOB="01002cbd70000000002509000000"], 0x14}, 0x1, 0x0, 0x0, 0x4c840}, 0x4010) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) vmsplice(r10, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}], 0x1, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0xe, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xfffffedf, 0x10, &(0x7f0000000040), 0xffffff95, 0x0, 0xffffffffffffffff, 0xd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r11, 0x0, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x9ffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$nl_route(0x10, 0x3, 0x0) r12 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b85, 0x2, @perf_bp={0x0}, 0x88, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, r13) r14 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0xff, 0x0, 0x7fff0026}]}) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r15, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0x0, 0x0, 0x14, 0x0, "0af5a212a1bd3bbda613efd9c8b4965dca66db42f66a86e5781cf86717055a7c1d1408407e5a774ef95f2fc1b947e00f000000123f2f1d34b0882e83d41b67cb9ff147c6d33a097d2269351b3ed300"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r15, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7}}, 0x0, 0x0, 0xe, 0x0, "5496a5dddc12b8ad4394a6a4d4dd5e5003c2cc26e095388c3dcf697675feed1499a8e540d53a3993d6386d8607e255ec6bf788c74746e54dbb6129e96bc8b7ce178a7c9e3ef1cf49704783a34f4df6f5"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r15, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xffffffff}}, 0x0, 0x0, 0x2, 0x0, "a1c1dd75a68473ba07d945c3b03e10950cd4b347113e55eb4285bf274bca67efbff2fdf98328de9434031348589bf28046d14810000000e3ffffff00"}, 0xd8) close_range(r14, 0xffffffffffffffff, 0x0) 3m11.837260859s ago: executing program 5 (id=954): prctl$PR_SCHED_CORE(0x46, 0x0, 0x0, 0x0, 0x0) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000002000)='./file0\x00', 0x0) 3m11.796979271s ago: executing program 34 (id=954): prctl$PR_SCHED_CORE(0x46, 0x0, 0x0, 0x0, 0x0) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000002000)='./file0\x00', 0x0) 3m8.552348431s ago: executing program 35 (id=840): r0 = socket$pppl2tp(0x18, 0x1, 0x1) (async) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc000000190001002dbd7000ffdbdf2500000000000000000000000000000001ac1414aa00000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000c00000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000000000000000000000000000000a000000000000feffffffff7f40000200000000000008000000000000000001000000000000004400050000000000000000000000000000000001002200003c00000002000000ff0200000000000000000000000000010600000004"], 0xfc}}, 0x0) (async) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x32) (async) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x4e22, 0x9, @empty, 0x2}, 0x1c) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x8, 0x4, 0x400, 0x10, {0xa, 0x0, 0xe38, @private0}}}, 0x32) 3m0.444684944s ago: executing program 8 (id=1083): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="00800000000000000045a9000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xf}, 0x50) 3m0.372462638s ago: executing program 8 (id=1086): socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket(0x40000000015, 0x5, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) setns(r2, 0x24020000) syz_clone(0x12000000, 0x0, 0x16, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000080)=0x4, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x4003, 0x4, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x80}, 0x0, 0x10000, 0x0, 0x1, 0x4, 0x83, 0xb, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) 3m0.169750619s ago: executing program 8 (id=1090): r0 = syz_io_uring_setup(0x3d5f, &(0x7f0000000180)={0x0, 0xad52, 0x20, 0x2, 0xe8}, &(0x7f0000000200), &(0x7f0000000240)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xedcf3963df1c86b9, 0x10010, r0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) socket$inet_mptcp(0x2, 0x1, 0x106) (async) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) (async) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) listen(r1, 0x1) (async) listen(r1, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000140)=ANY=[@ANYBLOB="ffff7fffffffffffffffffff0806000609000604"], 0x0) mlock2(&(0x7f0000361000/0x2000)=nil, 0x2000, 0x0) (async) mlock2(&(0x7f0000361000/0x2000)=nil, 0x2000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=@can_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_DST_IF={0x8}, @CGW_SRC_IF={0x8}]}, 0x24}}, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) (async) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r4, 0x6, 0x9, &(0x7f0000000100)=0x8, 0x4) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x15) (async) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x15) get_mempolicy(&(0x7f00000000c0), &(0x7f0000000100), 0xbf0, &(0x7f0000a69000/0x3000)=nil, 0x4) capget(&(0x7f0000000000)={0x20071026}, 0x0) rt_sigqueueinfo(r2, 0x24, &(0x7f0000000040)={0x13, 0x7, 0x8}) 3m0.068376025s ago: executing program 8 (id=1093): r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x2, 0x8, 0x9, 0x0, 0x806, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x2000, 0x7f, 0x9, 0x0, 0x4, 0x145d, 0x1, 0x0, 0x3f8, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x100000001}, 0x4000, 0x2, 0xffffffff, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = socket$packet(0x11, 0x3, 0x300) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./bus\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x549, &(0x7f0000001800)="$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") setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x1c) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001200)=ANY=[@ANYBLOB="5000000010006a70dbe558f1340cab6ad00effff", @ANYRES32=0x0, @ANYBLOB="320a050023080000280012800b00010069703667726500001800028014000700ff0000000000000000000000000000010800040000000100"], 0x50}, 0x1, 0x0, 0x0, 0x4000080}, 0xc010) quotactl$Q_SETINFO(0xffffffff80000601, &(0x7f0000000000)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f00000001c0)={0x6, 0x8}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="5c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002c00128009000100766c616e000000001c0002800600010000000000100003800c0001007f0000006000000008000500", @ANYRES32=r3, @ANYBLOB="801af4de84e1d1be67a4c22a4f5be30f2936c10c6940f1c9212c017082705360956af3fb694e5e975fe5d2386d6e756300"/77, @ANYRES32=0x0, @ANYBLOB], 0x5c}}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)=0x4, 0x12) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000a40)={0x6, 0x6, 0x800002, 0x2, 0xffffffff, 0x2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xffffffffffffff1a, 0x0, &(0x7f0000000a80)="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", 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x50) r5 = syz_open_dev$sg(&(0x7f0000000140), 0x6f5e, 0x0) ioctl$FIBMAP(r5, 0x1, &(0x7f0000000040)=0x85) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x558}}, 0x40) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a0000020000002400018014000180080001"], 0x64}, 0x1, 0x0, 0x0, 0x44}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xd24f4d5778621d46}, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xf4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xdd\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\ty\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xdb\xa9\xd3\x01\xb2\xc7\xf8%\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86P\x0f\x11\x93\xc7\x7f\x05\x00\x00\x00\x00\x00\x00\x00\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2m59.545388636s ago: executing program 8 (id=1100): socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket(0x40000000015, 0x5, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) setns(r2, 0x24020000) syz_clone(0x12000000, 0x0, 0x16, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000080)=0x4, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x4003, 0x4, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x80}, 0x0, 0x10000, 0x0, 0x1, 0x4, 0x83, 0xb, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) 2m59.202242806s ago: executing program 8 (id=1106): r0 = mq_open(&(0x7f0000000a00)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\x81W\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xeb\x84\x99\xc6\x0f\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xb4\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\v\xe5L\x19\x96s\xbc\x9e\xf4\x10$\r\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xf5#G\xce\xafUD\x9dA\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v\xb9\xdc\xd6\x87\x8f\xcd\xc1\xb05\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\x18/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f:Z\xb8\xee;\xe3;\x8aPV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x8c\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xbb\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\xca\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xad3\x91\xa5\xe6!\xcd\xa2\xa4\x14\x12\xf9\xbf\xa8b\xcec:\xd7\'\f\f\x957\xc9}\r\xa6\xaa\x0f\xca\x96\xeb\x00\x00\x00\x00\x00', 0x42, 0x1f0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x0, 0x3e}, 0x4502, 0x0, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mq_timedsend(r0, 0x0, 0x20, 0x7, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x7c}}, 0x0) keyctl$join(0x1, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6901, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x48080, 0x6d) fsetxattr$security_selinux(r7, &(0x7f00000000c0), &(0x7f0000000140)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1b459d, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x4005, 0xb, 0x0, 0x1, 0x1, 0xb, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x4008032, 0xffffffffffffffff, 0xd071000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r8) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x20368000) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f064eb", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}, 0x1, 0xfffc}, 0x4000800) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000003080)=@delchain={0x3c, 0x64, 0xf31, 0xfffffffb, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xfff3, 0xffff}, {0x0, 0x1b}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_IPV4_SRC={0x8, 0xa, @initdev={0xac, 0x1e, 0x0, 0x0}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x0) syncfs(r3) r9 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r9, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=@delchain={0x24, 0x11, 0x1, 0x1f, 0x0, {0x0, 0x0, 0x0, r5}}, 0x24}}, 0x0) 2m59.171935758s ago: executing program 36 (id=1106): r0 = mq_open(&(0x7f0000000a00)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\x81W\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xeb\x84\x99\xc6\x0f\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xb4\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\v\xe5L\x19\x96s\xbc\x9e\xf4\x10$\r\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xf5#G\xce\xafUD\x9dA\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v\xb9\xdc\xd6\x87\x8f\xcd\xc1\xb05\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\x18/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f:Z\xb8\xee;\xe3;\x8aPV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x8c\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xbb\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\xca\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xad3\x91\xa5\xe6!\xcd\xa2\xa4\x14\x12\xf9\xbf\xa8b\xcec:\xd7\'\f\f\x957\xc9}\r\xa6\xaa\x0f\xca\x96\xeb\x00\x00\x00\x00\x00', 0x42, 0x1f0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x0, 0x3e}, 0x4502, 0x0, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mq_timedsend(r0, 0x0, 0x20, 0x7, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x7c}}, 0x0) keyctl$join(0x1, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6901, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x48080, 0x6d) fsetxattr$security_selinux(r7, &(0x7f00000000c0), &(0x7f0000000140)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1b459d, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x4005, 0xb, 0x0, 0x1, 0x1, 0xb, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x4008032, 0xffffffffffffffff, 0xd071000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r8) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x20368000) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f064eb", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}, 0x1, 0xfffc}, 0x4000800) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000003080)=@delchain={0x3c, 0x64, 0xf31, 0xfffffffb, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xfff3, 0xffff}, {0x0, 0x1b}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_IPV4_SRC={0x8, 0xa, @initdev={0xac, 0x1e, 0x0, 0x0}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x0) syncfs(r3) r9 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r9, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=@delchain={0x24, 0x11, 0x1, 0x1f, 0x0, {0x0, 0x0, 0x0, r5}}, 0x24}}, 0x0) 56.940781438s ago: executing program 6 (id=2371): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8822c, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0xfffd, 0x8, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0xc02, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040010}, 0x8800) (async) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00005daeae269400c9d4edee60dabc89e1000000fe00000000002bfffffffd0000000014000d0020"], 0x3c}}, 0x0) (async) sendmsg$RDMA_NLDEV_CMD_DELLINK(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x58, 0x1404, 0x8, 0x70bd26, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0xffffffffffffffd9, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x5eaa6410081bebe7}, 0x20000000) (async) modify_ldt$write(0x1, &(0x7f0000000100)={0x2, 0x20000800}, 0x10) syz_clone(0xd104200, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 56.865298222s ago: executing program 7 (id=2373): unshare(0x62040200) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x380470a, &(0x7f0000000a00)={[{@quota}, {@bsdgroups}, {@lazytime}, {@errors_remount}, {@jqfmt_vfsv1}, {@oldalloc}, {@stripe={'stripe', 0x3d, 0x5}}]}, 0x2, 0x46b, &(0x7f0000000580)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000f80)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xac) renameat2(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x48, 0x0, 0x10, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x100}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40081c4}, 0x44000) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002800128009000100626f6e640000000018000280140008"], 0x48}}, 0x0) sendmmsg$inet(r1, &(0x7f0000005200)=[{{0x0, 0x4b, &(0x7f0000000000), 0x1}}], 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newnexthop={0x1c, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) alarm(0x38) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)=@ipv4_newroute={0x24, 0x18, 0x35f32a6dfa748ddd, 0x4, 0x25dfdbfc, {0x2, 0x10, 0x10, 0x0, 0xff, 0x4, 0x0, 0x6, 0x20000000}, [@RTA_NH_ID={0x8, 0x1e, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4a044}, 0x4010) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0xfffffffffffffda3, &(0x7f0000000180)={&(0x7f0000000200)=@delnexthop={0x20, 0x69, 0xb, 0x0, 0x0, {}, [{0x8, 0x1, 0x1}]}, 0x20}}, 0x4000000) 56.791688197s ago: executing program 6 (id=2375): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4001, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x20000000}, 0x1c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000)={0xffffffff, 0x6}, 0x8) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e1f, @local}, 0x10) r2 = io_uring_setup(0xf08, &(0x7f00000003c0)={0x0, 0xfb6e, 0x800, 0x44, 0x246}) writev(0xffffffffffffffff, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x24, &(0x7f0000000000), 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) close(r1) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000001680)=ANY=[@ANYBLOB="1800000000030000000000000000000095"], &(0x7f0000001700)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)=@generic={0x0, r3}, 0x18) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) 55.994557873s ago: executing program 7 (id=2382): syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x10000, &(0x7f0000000640), 0x1, 0x5c5, &(0x7f0000001a00)="$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") (async, rerun: 64) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0xa0) (rerun: 64) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000600)={0x23e3, 0x0, 0xd, 0x2}) renameat2(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x2, &(0x7f0000000240)=[{0x1d, 0x0, 0x0, 0x10000000}, {0x16}]}) 55.970229355s ago: executing program 9 (id=2384): r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@ieee802154={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x80, &(0x7f0000000480)=[{&(0x7f00000007c0)="27031c0016001400020000000000000006e1f0000000890900000002ee1680ca82973d2bd4b836954268e611", 0x2c}, {&(0x7f0000001980)="7d586d16062b1e1b9685b88189e0093982f6994b8df2fe56386ed999f1b34b06f2f69618bf033adc88f5", 0x2a}], 0x2}, 0x24000008) open_tree(0xffffffffffffff9c, &(0x7f0000000540)='.\x00', 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000980}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x24, 0x0, 0x50a, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x20000804) 55.377418289s ago: executing program 6 (id=2385): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000008c80)=ANY=[@ANYBLOB="2c00000026000506"], 0x2c}}, 0x800) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r2) sendmsg$SMC_PNETID_DEL(r2, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYRES32=r2, @ANYRES16=r3, @ANYBLOB="000329bd7000fedbdf25030000000900010073797a31000000000000000573797a31000000000900030073797a30000000001400020076657468315f746f5f747bf16d0000000900010073797a3100000000"], 0x58}, 0x1, 0x0, 0x0, 0x801}, 0x20008020) sendmsg$nl_xfrm(r2, 0x0, 0x14048c40) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="c4000000190001000000000000000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000af8f7d91bbee15990a000000870000002b0cb895814cf13ef99d063fde0e70ba393fd25798915d91f1c201fec0e82375eb52b6221a6f2c607751a93df623f6", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fbffffffffffffff000000000000000000000000000000000000000000000002000000000000000000000000ba6b6e0000000000000000000c000f000500000000000000"], 0xc4}}, 0x2c000010) syz_io_uring_setup(0x5e48, &(0x7f0000000180)={0x0, 0x0, 0x10100, 0x20, 0xfffffffc}, &(0x7f0000000100), &(0x7f0000000140)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r5) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc08b64d400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x400c090) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) sendmsg$NFT_BATCH(r5, &(0x7f0000009b40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r6, &(0x7f0000009b40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x8004) 55.377101099s ago: executing program 9 (id=2386): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000140)="5500000018007f5f00fe01b2a4a2809302060000fd41fd01020400002a00120002002800000019002d007fffffff0022de1330d544002c1e255076f4f8871dda009b84136ef75afb83de066a5900e1baac96830000", 0x55}], 0x1, 0x0, 0x0, 0x7a000000}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000040)={r2, r4, 0x25, 0x2, @void}, 0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r6 = fsopen(&(0x7f0000000000)='nfs4\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r6, 0x4, &(0x7f0000000040)='syzkaller\x00', &(0x7f0000000a00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r5) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r7, 0x29, 0x19, &(0x7f0000000000)=0x94b, 0x4) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @tproxy={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x7c}, 0x1, 0x0, 0x0, 0x4008891}, 0x24000008) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3f}, @void, {@ipv6={0x86dd, @icmpv6={0x1, 0x6, '\x00\'$', 0x38, 0x3a, 0xff, @remote, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x500, {0x6, 0x6, ':yE', 0x2, 0x3a, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], "8029335287b7a081"}}}}}}}, 0x0) recvmmsg(r7, &(0x7f0000000040), 0x400021a, 0x12180, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000001100010025bd7000f7dbdf2500000000", @ANYRES32=r4], 0x20}}, 0x14) 55.096305765s ago: executing program 7 (id=2388): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) (async) r0 = socket$netlink(0x10, 0x3, 0x0) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x8000, 0x700, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x1, 0x14, 0x67, 0x0, 0x0, 0x29, 0x0, @multicast1, @empty}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f3, &(0x7f0000000940)={'syztnl0\x00', &(0x7f0000000140)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x2, {{0x5, 0x4, 0x0, 0x24, 0x14, 0x0, 0x0, 0x30, 0x0, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty}}}}) (async) ioctl(r1, 0x80000000, &(0x7f0000000080)="27db31c56dd55119e15e33fc9f720077822adb7e2f0fef706974483bc680464683d3f8375b71b8294aae912d4e1c13eb947616b59cea") ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x3, 0xfffffffffffffffc, 0x1}) (async) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[], 0x14}}, 0x44014) (async) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x140, &(0x7f00000002c0)=[{&(0x7f00000004c0)=""/4091, 0xe5c}, {&(0x7f0000001580)=""/238, 0xf0}], 0x4, 0x0, 0x353}}], 0x40000000000002e, 0x2, 0x0) 45.201270673s ago: executing program 2 (id=2393): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x1, 0x12) write$cgroup_pid(r0, &(0x7f0000000140), 0x12) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0xe0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x8f, &(0x7f0000000980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x0, 0x0, &(0x7f0000000a00), 0x8, 0x8f, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500), 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/306], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'/19, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r4, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 45.200318383s ago: executing program 4 (id=2394): r0 = socket$can_j1939(0x1d, 0x2, 0x7) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x6, 0x6, 0x2, 0x87, 0xffffffff, 0x80}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xc, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000000)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000000)={r4, 0x2}, 0x8) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x1, @remote}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000180)={0x1d, r5, 0x0, {0x0, 0x0, 0x1}, 0x2}, 0x18) r6 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r6, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@local, @local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x8}}}}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000340)={@local, @random="fad1e048716e", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x8}}}}}, 0x0) r7 = perf_event_open(&(0x7f0000000c80)={0x5, 0x80, 0x5, 0x5, 0x1, 0x5, 0x0, 0x1, 0x1524, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x8, 0x4}, 0x6020, 0xc, 0x2, 0x4, 0x5da3, 0x10001, 0x3, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone3(&(0x7f0000000600)={0x100000000, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendmsg$can_j1939(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x1d, 0x0, 0x80010080, {0x0, 0x1ee}}, 0x18, &(0x7f00000004c0)={0x0}}, 0x0) r8 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r8) ptrace$setregs(0x19, r8, 0xc, &(0x7f0000000500)) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002a80)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a010200000000000000000100fffd0900010073797a30000000000900030073797a300000000074000000060a010400000000000000000100000008000b400000000038000480340001800a0001006d617463680000002400028008000300e4edf27b08000240000000000e000100636f6e6e6c6162656c0000000900010073797a300000000014000580080001"], 0xe8}}, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1, 0x8, 0xd, 0xbe, 0x0, 0x1, 0x100, 0x5, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x31eaa6c9, 0x6}, 0x8008, 0x9, 0xfffffff7, 0x9, 0x3, 0xca1d, 0x9, 0x0, 0x548, 0x0, 0xfffffffffffffffb}, r8, 0x3, r7, 0x3) 45.135512216s ago: executing program 4 (id=2395): r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f00000000c0)={0x1d, r1}, 0x10) sendmmsg$inet(r0, &(0x7f0000001b00)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="050000007402b8f4191db62b", 0xc}, {&(0x7f0000000440)="9f336d70bf41f19e47e98b4015e3b0384d86a1ceb4e530554ebc8154bf392bcf9ce0b09f879bd7aaf9d086e3", 0x2c}], 0x2}}], 0x1, 0x0) 45.095386279s ago: executing program 2 (id=2396): r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f00000000c0)={0x1d, r1}, 0x10) sendmmsg$inet(r0, &(0x7f0000001b00)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="050000007402b8f4191db62b", 0xc}, {&(0x7f0000000440)="9f336d70bf41f19e47e98b4015e3b0384d86a1ceb4e530554ebc8154bf392bcf9ce0b09f879bd7aaf9d086e3", 0x2c}], 0x2}}], 0x1, 0x0) (fail_nth: 1) 45.08867391s ago: executing program 4 (id=2397): r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f00000000c0)={0x1d, r1}, 0x10) sendmmsg$inet(r0, &(0x7f0000001b00)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="050000007402b8f4191db62b", 0xc}, {&(0x7f0000000440)="9f336d70bf41f19e47e98b4015e3b0384d86a1ceb4e530554ebc8154bf392bcf9ce0b09f879bd7aaf9d086e3", 0x2c}], 0x2}}], 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='uid_map\x00') read$msr(r2, &(0x7f0000000280)=""/208, 0xd0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={@rand_addr=0x64010100, 0x1, 0x0, 0x10, 0x0, [{@multicast1}]}}) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000080)={0x2, 0x38, "10b60291255482be4b752e4dab81a30416d79a44c88ffe717e6afc231cbf849c4f919a7f1a90e9fd62029678239a58219365318025ad4729"}) 45.007023314s ago: executing program 2 (id=2398): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e20, 0x8, @private2, 0x2}], 0x1c) (async) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), 0x4) (async) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r1, &(0x7f0000003580)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xff}}, 0x10) (async) setsockopt(r0, 0x84, 0x7f, &(0x7f0000000040)="020000000980ffff", 0x8) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000100)=0x7, 0x4) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) (async) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) (async) chown(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) 45.005398905s ago: executing program 2 (id=2399): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x18, &(0x7f00000000c0), 0xf9, 0x58b, &(0x7f0000000840)="$eJzs3c9rHOUbAPBnNkmb/vh+k0Ip6kECPVip3TSJPyp4qCcRLRb0XpdkG0o23ZLdlCYWbA/24kWKIGJB9O7dY/Ef8K8oaKFICSp4icxmNlmT2SS7TZq0+/nAtO87M5v3fXbmffeZnV02gJ41kv5TiHgxIr5KIoZatvVHtnFkZb+lxzcn0yWJ5eWP/0giydY190+y/49klRci4pcvIk4XNrZbW1icKVUq5bmsPlqfvTZaW1g8c2W2NF2eLl8dn5g498bE+Ntvvbljsb568a9vP7r//rkvTy5989PDY3eTOB9HV4Ndi2MrB9tvutVaGYmR7DkZiPPrdhzroN/PgmSvO0BX+rJxPhDpHDAUfdmoz7U89DS7Buyyz9NhDfSoxPiHHtXMA5rX9q3X873g0bsrF0Ab4+9feW8kBhvXRoeXkv9cGaXXu8M70H7axs+/37ubLrHu/ZQ0NUvzs83ecADo1q3bEXG2v3/j/Jdk81/3zm5jn/Vt9NrrD+yl+2n+81pe/lNYzX8iJ/85kjN2u7H1+C883IFm2krzv3dy89/Vm1bDfVntf42cbyC5fKVSTue2/0fEqRg4mNbHIuK9/JsgnxaWHiy3a781/0uXtP1mLpj142H/uvxvqlQvPXnkKx7djngpN/9NVo9/knP80+fj4jbbOFG+93K7bVvHv7uWf4h4Jff4rx3MZPP7k6ON82G0eVZs9OedE7+2a3+v40+P/+HV+P/Oi384ab1fW+u8je8H/ym329bt+X8g+aRRPpCtu1Gq1+fGIg4kH25cP7722Ga9uX8a/6mTm89/eef/oXRgbzP+O8fvtO462Fn8uyuNf2rz83/d8e+88OCDz75r1/72jv/rjdKpbM125r/tdvBJnjsAAAAAAADYbwoRcTSSQnG1XCgUiyuf7zgehwuVaq1++nJ1/upUNL4rOxwDhead7qGWz0OMZZ+HbdbH19UnIuJYRHzdd6hRL05WK1N7HTwAAAAAAAAAAAAAAAAAAADsE0ciBvO+/5/6rS//MW1WA8+iTX7yG3jOtR//2Zad+KUnYF/q5PVf8g/PF/k/9C7jH3qX8Q+9y/iH3mX8Q+8y/qF3dTL+f7ywix0BAAAAAAAAAAAAAAAAAAAAAAAAAACA58PFCxfSZXnp8c3JtD51fWF+pnr9zFS5NlOcnZ8sTlbnrhWnq9XpSrk4WZ3d6u9VqtVrY+Mxf2O0Xq7VR2sLi5dmq/NX65euzJamy5fKA08lKgAAAAAAAAAAAAAAAAAAAHi21BYWZ0qVSnlOQaGrQv+W+xyKfdLVp1wo7I9udFnY65kJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANb8GwAA//9aVDoa") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.time\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x4, 0x32, 0x10, 0x7, 0x1, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8000, 0x7, 0x80, 0xd}}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) r3 = openat$selinux_policy(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r3, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[], 0x190da) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000080)={'wg1\x00', &(0x7f00000003c0)=@ethtool_rxnfc={0x31, 0xa, 0x6, {0x7, @usr_ip4_spec={@private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x6, 0xbf, 0x1, 0x3}, {0x0, @link_local, 0x214, 0x2, [0x1, 0x2570]}, @udp_ip4_spec={@local, @local, 0x4e23, 0x4e24, 0x3}, {0x0, @remote, 0xcc, 0x7, [0x7f, 0x5f]}, 0x2, 0x7}, 0x2, [0x4, 0x4]}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000200)={'syztnl2\x00', r1, 0x40, 0x8000, 0x40, 0xd, {{0x1b, 0x4, 0x2, 0x6, 0x6c, 0x66, 0x0, 0x6, 0x2f, 0x0, @rand_addr=0x64010102, @empty, {[@timestamp_prespec={0x44, 0x3c, 0x4c, 0x3, 0x3, [{@broadcast, 0x19}, {@rand_addr=0x64010101, 0x6}, {@multicast1, 0x6}, {@dev={0xac, 0x14, 0x14, 0x43}, 0x80000001}, {@broadcast, 0x9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, {@local, 0x8}]}, @noop, @rr={0x7, 0x1b, 0xc3, [@private=0xa010100, @rand_addr=0x64010101, @loopback, @broadcast, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) 44.972047246s ago: executing program 4 (id=2400): perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1bee, 0x2422, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x80000005}, 0x200, 0x1, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000100)={0x2209d, 0x3, 0x0, 0xfffffffc}, 0x10) write(r1, &(0x7f00000000c0)="1800000016005f0214fffffffffffff80700000023000000", 0x18) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x7, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x440}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x1, 0xe7030000}, {0x16, 0x0, 0x0, 0x6}}, [@printk={@p, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x1, 0x6, 0x0, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x56}}], {{0x4, 0x1, 0x2, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000000040)=[{0xffffffffffffffff}], 0x1, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x823, 0x0, 0x11000, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0x9, 0xffffffffffffffff, 0xb) unshare(0x6a040000) mmap(&(0x7f00002ad000/0xc00000)=nil, 0xc00000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r4, &(0x7f0000002c80)={&(0x7f0000000180)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000002bc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x41}, @remote}}}], 0x20}, 0x20000004) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0xc5}, 0x24040810) sendmsg$inet(r4, &(0x7f00000006c0)={&(0x7f00000000c0)={0x2, 0x4e22, @local}, 0x10, &(0x7f00000005c0)=[{&(0x7f00000001c0)="2e43f9aa2b6c8a9602d39da65bf1b37a18f7dc0e6536bdebb99536881d3437a5cfe47be3eac4defa9d05b7172398e1cac2f31d03f246eaebaff497cd2385c82abdae50ba8d510404473e977036a8d3b5926f0f3381f329310a19a6a2143cbfcae0ae5dbf43105e66ee591eb0f4c125be83d4658449a082e88fbce79a41445d09a1878301ef7732186ff99c964e009ff9b1f02ef4b87296f782738f711394ead1d6b8fafd1d0f587001caeab7c925608327e6bef27ecbfac818039499cce557b8c0fee2c0842fe1543bab93f817c45786023b05c53d5ff2c6d28ce5bcc065d167e91beb9a", 0xe4}, {&(0x7f00000002c0)="2579b679fed4a3e0736dd8a70a72786200b80b69fa97c0d86f6dd55be96b32db439bfe25df697ee5e6442bf8ee989410d9bffdd58b6148098773d17ce71bda5c5555e36db5cf6a06b3f27e3601572fbb64f63eb6cd2a6611228f39e41be1c8cd19a9f220af299dd6143892fedde78617beca5b2aecb44f9e075b6568ba59d6201d2d15457fd88395ac6a3511c77e20becc34bf2fd1b66b6c862c", 0x9a}, {&(0x7f0000000100)="b9686a3bf84e58a200827d84745a36133b250d3e57c915aa3f8985661a3423f04551e2c7eb8054b5a1562781cb12ae74fb676231b193c8f3086159142608fbc307f10d51b35a992b39b80ab477cdcdfeb49413b0321348034d1624cb845c", 0x5e}, {&(0x7f0000000380)="8c7e6691dcaab77292af38c2ae52f11ab0492c01f47ea8fa97af301e2787e254f6180a5a91eb5434a6627f2063e3593bc58cb9f4ae3d9665d202ba1d8fdd2895eb27302081e8467140a13ecfa6557921acad98c5d4d2986ecec1cff03535b837a5cc46e30af3c0214043053f68aff5711f3ecb235c4faa80ba820557323d2a49711d1a92670185de68c9b7ff3773cdf117c2dab3639d63b310286491e618fc8b5c1b5bd2ebd7526a97", 0xa9}, {&(0x7f0000000440)="4afc22a4a454192f8f1b7c28c9ad3a32c414c3654029557dee3a4c53123e17d62a67a5e36e82ece1922369f26121083029d1f18459cd518acf43bcb42e1fdde88b8d45638ada9c0e9bf4da6f96c1ac3bfacebc75e7ad82a9cfaa9703ec0fd5bbb350f5da3f8301d9214ebe4b5c6485f1bdab700173204bf6eb", 0x79}, {&(0x7f00000004c0)="5b1ad617dd1a05ae4ebe300eee2bb83a8c5f227e022368891d19c86487a7545bbc5805f623551b8888b2f9bc063ea8ab43a88a59bb407224bbd2274e3ed2a73b4f412ea8983fa73199a684524c048b81f9b0b0db9a511a284d63daca493cb82965a1c6304f21d6bf5a4bdd1768f363cee8ef3d887c1f8fa74d6c17be20196dcdb9c41be3c7e7702b47c1119988b901b87cbac5675d66deeb72befd0b4f3f441affdde6cd31a2fb4a7cfef3b1a7dbee9bf11a9a7d3ee4c17c048caf022611fcec870e8b3d41f14f1242260210b9", 0xcd}], 0x6, &(0x7f0000000640)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@end, @lsrr={0x83, 0x13, 0x4c, [@multicast1, @dev={0xac, 0x14, 0x14, 0x38}, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ra={0x94, 0x4}, @end]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @broadcast, @private=0xa010100}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x68}, 0x20048050) 44.613509407s ago: executing program 9 (id=2401): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000001d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r2 = gettid() r3 = socket$tipc(0x1e, 0x2, 0x0) ppoll(&(0x7f0000000000)=[{r3, 0x104}, {0xffffffffffffffff, 0x6008}], 0x2, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) io_setup(0x6, &(0x7f0000000300)=0x0) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x80000000}]) io_getevents(r5, 0x2, 0x2, &(0x7f0000001340)=[{}, {}], 0x0) 44.557261531s ago: executing program 7 (id=2402): io_setup(0x4082, &(0x7f0000000380)=0x0) syz_io_uring_setup(0x100293f, &(0x7f0000001400)={0x0, 0x2000004, 0x10, 0xfffffffc, 0x13b}, &(0x7f0000000080), &(0x7f00000014c0)) io_cancel(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x3}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="800000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="35e2000000000000600012800b000100697036746e6c00005000028008000100", @ANYRES32, @ANYBLOB="0800140000000000080008000a0000000500090089000000060010000d000000080008000c000000050009"], 0x80}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000005c0)={0x60, r3, 0x1, 0x70bd25, 0x25dfdbfe, {0x39}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x73}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0x60}, 0x1, 0x0, 0x0, 0x80}, 0x4004810) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c00)=ANY=[@ANYBLOB="14000000100001000000ddffffff00000000000a3c000000120a09000000000000000000020000000900020073797a310000000008000440000000d50900010073797a3000000000080003400000000114000000110001"], 0x64}}, 0x0) ftruncate(0xffffffffffffffff, 0xc17a) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="5000000020000103feffffff0000000002"], 0x50}}, 0x4000850) sendmsg$NFT_MSG_GETOBJ(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c000000150a"], 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) readv(r4, &(0x7f0000000080)=[{&(0x7f0000000000)=""/40, 0x28}], 0x1) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f0000000400)={0x18, 0x0, {0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}, 'lo\x00'}}, 0x1e) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='fd/4\x00') readlinkat(r6, &(0x7f0000000100)='./mnt\x00', &(0x7f0000000840)=""/66, 0x42) ioctl$PPPIOCNEWUNIT(r6, 0xc004743e, &(0x7f0000000480)) syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x0, 0x0, 0xe0, 0x0, 0xe000, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty=0xac1414aa}, "17c1b7df60c70000"}}}}}, 0x0) setsockopt$packet_int(r6, 0x107, 0x6, &(0x7f0000000100)=0xf, 0x4) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f0000001f00)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0x4, 0x4, 0x400, 0xffffffff, 0x0, 0x1e0, 0x0, 0xfeffffff, 0xffffffff, 0x330, 0x330, 0x330, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x2f2, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x1, 0x35, {0x3}}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x1, 0x41, {0x6}}}}, {{@ipv6={@private0, @loopback, [0xff, 0x0, 0xff000000, 0xffffffff], [0x0, 0xff, 0xff000000, 0xffffff00], 'team0\x00', 'batadv_slave_0\x00', {0xff}, {}, 0xff, 0xe7, 0x4, 0x44}, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@dst={{0x48}, {0x4, 0x9, 0x1, [0x3, 0x8575, 0x9, 0xfff, 0x8, 0x101, 0x1, 0x101, 0x8, 0x5, 0x800, 0xb9e, 0x6, 0x8, 0x7, 0x4], 0xf}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@private=0xa010100, [0xffffff00, 0x0, 0xffffffff, 0xffffff00], 0x4e24, 0x4e21, 0x4e21, 0x4e23, 0x8a, 0xffff, 0x5, 0x2, 0x3fd}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) readv(r5, &(0x7f0000000200)=[{&(0x7f0000000300)=""/163, 0xa3}, {&(0x7f0000000180)=""/39, 0x27}], 0x2) 44.55575079s ago: executing program 6 (id=2403): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f00000002c0)={0x1, 0x4, 0x0, 0x0, @vifc_lcl_ifindex, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) getpeername(r0, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x80) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$NFT_MSG_GETOBJ(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="68000000130a030000000000000000000100000a53000800cf8fdda68930f71efe8b64318fd70812b6261e08be8f3cb5cf3e736e9e43df47e3711b5969675907343d2fe898c1c9d929c741940c4208a1e98df63382a25cb6c3565c96a8bc08bc90f374cd2718d7ec"], 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x80) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x74, 0x29, 0xff, 0x1a, 0x0, 0x100000001, 0xc000, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x800, 0x2, @perf_bp={&(0x7f00000003c0)}, 0xc, 0x2, 0x2, 0x1, 0x7, 0xffffffff, 0x5, 0x0, 0x8000, 0x0, 0x7}, r5, 0xc, 0xffffffffffffffff, 0x3) sendmsg$NFT_MSG_GETOBJ(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c000000150a01"], 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000280)={@broadcast, @empty, 0x0, "ffff01e03d64a831683fdc3fd440829c82cfc400"}, 0x3c) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) socket$igmp(0x2, 0x3, 0x2) (async) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f00000002c0)={0x1, 0x4, 0x0, 0x0, @vifc_lcl_ifindex, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) (async) getpeername(r0, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x80) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) ioctl$FIDEDUPERANGE(r1, 0xc0189436, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) pipe2$watch_queue(&(0x7f0000000100), 0x80) (async) sendmsg$NFT_MSG_GETOBJ(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="68000000130a030000000000000000000100000a53000800cf8fdda68930f71efe8b64318fd70812b6261e08be8f3cb5cf3e736e9e43df47e3711b5969675907343d2fe898c1c9d929c741940c4208a1e98df63382a25cb6c3565c96a8bc08bc90f374cd2718d7ec"], 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x80) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) getpgrp(0xffffffffffffffff) (async) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x74, 0x29, 0xff, 0x1a, 0x0, 0x100000001, 0xc000, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x800, 0x2, @perf_bp={&(0x7f00000003c0)}, 0xc, 0x2, 0x2, 0x1, 0x7, 0xffffffff, 0x5, 0x0, 0x8000, 0x0, 0x7}, r5, 0xc, 0xffffffffffffffff, 0x3) (async) sendmsg$NFT_MSG_GETOBJ(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c000000150a01"], 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) (async) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000280)={@broadcast, @empty, 0x0, "ffff01e03d64a831683fdc3fd440829c82cfc400"}, 0x3c) (async) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) (async) 44.55409928s ago: executing program 2 (id=2404): r0 = socket(0xa, 0x3, 0x3a) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x6, 0x4, &(0x7f0000000900)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002300000095"], &(0x7f0000000040)='GPL\x00', 0x5}, 0x94) fcntl$notify(r0, 0x402, 0x8) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000100)={0x14, 0x15, 0x1, 0x70bd2b, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0x1b, 0x0, &(0x7f0000000380)="f6f4e9a1d78ad62ceef1884386dd78bb3fb7dbfc8180ca8395ccfd", 0x0, 0xa1b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'veth1_to_batadv\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r2, r5, 0x25, 0x0, @val=@iter={0x0}}, 0x40) (async) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 43.947580906s ago: executing program 6 (id=2405): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="d70a000010000000620a00000000000007000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x3, &(0x7f000000cf3d)=""/195}, 0x23) (async) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) (async) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r1, 0x0, r0, 0x0, 0x6, 0x0) (async) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x1, 0x9, 0x101}, 0x14}}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0xe, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000024080000000000f6180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007600000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) sendmsg$NL80211_CMD_DEAUTHENTICATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x7, 0x78}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x80}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x4cb}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac}, @NL80211_ATTR_MAC={0xa}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20008801}, 0x44000) 43.872932031s ago: executing program 9 (id=2406): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x1, 0x12) write$cgroup_pid(r0, &(0x7f0000000140), 0x12) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0xe0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x8f, &(0x7f0000000980)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x0, 0x0, &(0x7f0000000a00), 0x8, 0x8f, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500), 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/306], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'/19, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r4, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 43.809813034s ago: executing program 2 (id=2407): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000640)={0x28, 0x0, 0x2710}, 0x10) r2 = accept(r0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000080)=0x6) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x12, 0x4, 0x4, 0xa4}, 0x50) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000080), &(0x7f00000002c0)=@tcp=r2}, 0x20) recvmsg$can_bcm(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x2000) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x200000, &(0x7f0000000040)={[{@grpquota}]}, 0x1, 0xbac, &(0x7f00000017c0)="$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") sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0x4000000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d08000b000000e8fe55a1180015000600142603600e1209000d0000000401a80016000a00014006000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x10, &(0x7f0000000080)={[{@acl}, {@nodiscard}, {@oldalloc}]}, 0x1, 0x3f7, &(0x7f0000003080)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) pwrite64(r7, &(0x7f0000000140)='2', 0x1, 0x8000c61) write$binfmt_aout(r7, &(0x7f0000000180)=ANY=[], 0xff2e) setsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000280)=0x30, 0x2) ioctl$EXT4_IOC_MOVE_EXT(r8, 0x40305829, &(0x7f0000000240)={0x17c04, r8, 0x6, 0x100000204, 0x0, 0x1b}) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r9}, 0x94) open(&(0x7f0000000140)='./file0/file0\x00', 0x64942, 0x86) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xd, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000c40)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x15, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180200001e00000000000000000000007a02500003ffffff95"], &(0x7f0000000080)='GPL\x00', 0x4, 0x98, &(0x7f00000001c0)=""/152, 0x40f00}, 0x94) 43.739753648s ago: executing program 7 (id=2408): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x2, &(0x7f0000000240)=[{0x1d, 0x0, 0x4, 0x10000000}, {0x16}]}) open(&(0x7f0000000200)='./file0\x00', 0x8000, 0x31) (async) r0 = open(&(0x7f0000000200)='./file0\x00', 0x8000, 0x31) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x8004587d, &(0x7f0000000080)={@desc={0x1, 0x0, @auto="62ed992ee70e419c"}}) bind$qrtr(r0, &(0x7f0000000000)={0x2a, 0xfffffffffffffffc, 0xfffffffe}, 0xc) 43.733274658s ago: executing program 9 (id=2409): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffd}, [@call={0x85, 0x0, 0x0, 0x28}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x28, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x232}, 0x94) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="a141570605333dc3", 0x8}, {&(0x7f0000000100)="dc26c75fe4dda31aa0fea747940a6066528cd6d83755eea7e9c629fb211ca1abda9f8c59f43eb9e932973fc04971f586ee9de1f588dc4f87afd37e1323b98b8a83bcde2b08778da3bbd296a65b652f7be77719634274100cb6af01487cc022dddfb0b67d58c0fb4a01abee578e49da5f77c5bd2104031db9c965f86e580ff5c7d251bff66b51eb410d3cab35179db0cac100d30eb14e4554eb1aeff6395fd904df24d714808771aa755bfe47702b055a04c3e98d0864cf4082d4ba18dbeffefb7134823fe855c9c6452baa9c80da09ac2cfd54", 0xd3}], 0x2, 0x1, 0x0) 43.69848344s ago: executing program 6 (id=2410): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0xb, 0x1514, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x1000000010000, 0x9, 0x5, 0x8, 0x20005, 0xb, 0x0, 0x2b7babd6, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=ANY=[@ANYBLOB="540000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="15020000fe0f00001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="080004"], 0x54}, 0x1, 0xba01, 0x0, 0x4010}, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1) 43.587586417s ago: executing program 9 (id=2411): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x2014, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x400000000000d07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000380)="3900000013000318680907070000000f0000ff3f04000000170a001700000000040037000f0003002e2e2564aaee7b1d58b9a64411f6bbf44d", 0x39}], 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000008c80)=ANY=[@ANYBLOB="2c00000026000506"], 0x2c}}, 0x800) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x10000, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x29}, {0x8, 0x0, 0x100000001, 0x0, 0x0, 0xffffffffffffb473, 0xffffffffffffffff}, {0x1000000000, 0x2000000000000000, 0x0, 0xffffffffffffffff}, 0xfffffffe}}, 0xb8}}, 0x4004) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x2c000010) sendmsg$nl_xfrm(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000002, @in, 0x0, 0x0, 0x1000, 0x0, 0xa, 0x20}, {}, {0x1, 0x6, 0x0, 0xfffffffffffffffe}}}, 0xb8}, 0x1, 0x0, 0x0, 0x404c830}, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000c00)=ANY=[@ANYBLOB="020000000000000002004e1fe0"], 0x110) 43.465475424s ago: executing program 4 (id=2412): dup(0xffffffffffffffff) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r2 = socket$kcm(0x2, 0x1, 0x0) sendmsg$inet(r2, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r2, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r1}) syz_mount_image$ext4(&(0x7f0000000640)='ext4\x00', &(0x7f0000000200)='./file2\x00', 0x200000, &(0x7f0000000000)={[{@dioread_lock}, {@noquota}, {@errors_remount}, {@grpquota}]}, 0xfc, 0x589, &(0x7f0000000880)="$eJzs3c1rXFUbAPDnTjJp+vG+SaGIupBAF1ZqJ03iRwUXdSlaLOi+Dsk0lEw6JTMpTSzYLuzGjRRBxILozoV7l8X/paCFIiUg4mbkTu6k02SSTpJJMu38fnDbc+65M+ecufecPDdnJhNA3xpL/8lFvBIR3yQRIy1lg5EVjq0et/L45nS6JVGvf/pXEkm2r3l8kv1/NMu8HBG/fxVxOrex3urS8lyxXC4t/FOv1yNivDZ/bby6tHzmynxxtjRbujo5NXXu7anJ9959p2t9fePi399/cv/Dc1+fXPnu14fH7yZxPo5lZe36sQO3WjNjMZY9Vz7OrztwYud19KRdvGYcoIFsnOcjnQNGYiAb9W3VR/azacAe+zId1kCfSox/6FPNOKB5b996H9wPHn2wegO0sf+Dq78bieHGvdGRleSpO6P0fne0C/Wndfz257276Rbrfg8BsJdu3Y6Is4ODG+e/JJv/du5sB8esryOrP7/LqoEO3E/jnzfbxT+5tfgn2sQ/R9uM3Z146jly7eKf3MMuVLOpNP57v238u7ZoNTqQ5f7XiPnyyeUr5VI6t/0/Ik5F/lCa32I95/PcyoP6ZoWt8V+6pfU3Y8GsHQ8HDz39mJlirbirTrd4dDvi1bbxb7J2/pM25z99PS5GtoDwDC+V7r22Wdmz+7+36j9FvN72/D9Z0Uq2Xp8cb1wP482rYqNk3bpgq4Pu/6NfskSz/2s/edf6P5q0rtdWt1/Hj8P/ljYr2+n1P5R81kgPZftuFGu1hYmIoeTjjfsnnzy2mW8en17/p05uPf+1u/4PpwO7w/7fOXGn9dDh7fV/b6X9n9n6+l93/refePDRFz9sVn9n5/+tRupUtqeT+a/TBu7mtQMAAAAAAIBek4uIY5HkCmvpXK5QWH1/x4k4kitXqrXTlyuLV2ei8VnZ0cjnmivdIy3vh5jI3g/bzE+uy09FxPGI+HbgcCNfmK6UZw668wAAAAAAAAAAAAAAAAAAANAjjkYMt/v8f+qPDv62P/Cc2+Irv4EX3ObjPyvpxjc9AT1pxz//h7vbDmD/if+hfxn/0L+Mf+hfxj/0L+Mf+pfxD/1rO+P/5wt72BAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4MVy8cCHd6iuPb06n+ZnrS4tzletnZkrVucL84nRhurJwrTBbqcyWS4Xpyvyznq9cqVybmIzFG+O1UrU2Xl1avjRfWbxau3RlvjhbulTK70uvAAAAAAAAAAAAAAAAAAAA4PlSXVqeK5bLpQUJiUYiiYjtPGqwB9rclcRQ9EQzeiVx0DMTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADzxXwAAAP//mrs30g==") statx(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4000, 0x1f842f947b598ea3, 0x0) 43.315580743s ago: executing program 7 (id=2413): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000008c80)=ANY=[@ANYBLOB="2c00000026000506"], 0x2c}}, 0x800) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r2) sendmsg$SMC_PNETID_DEL(r2, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYRES32=r2, @ANYRES16=r3, @ANYBLOB="000329bd7000fedbdf25030000000900010073797a31000000000000000573797a31000000000900030073797a30000000001400020076657468315f746f5f747bf16d0000000900010073797a3100000000"], 0x58}, 0x1, 0x0, 0x0, 0x801}, 0x20008020) sendmsg$nl_xfrm(r2, 0x0, 0x14048c40) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="c4000000190001000000000000000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000af8f7d91bbee15990a000000870000002b0cb895814cf13ef99d063fde0e70ba393fd25798915d91f1c201fec0e82375eb52b6221a6f2c607751a93df623f6", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fbffffffffffffff000000000000000000000000000000000000000000000002000000000000000000000000ba6b6e0000000000000000000c000f000500000000000000"], 0xc4}}, 0x2c000010) syz_io_uring_setup(0x5e48, &(0x7f0000000180)={0x0, 0x0, 0x10100, 0x20, 0xfffffffc}, &(0x7f0000000100), &(0x7f0000000140)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r5) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc08b64d400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x400c090) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) sendmsg$NFT_BATCH(r5, &(0x7f0000009b40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r6, &(0x7f0000009b40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x8004) 34.207628974s ago: executing program 4 (id=2414): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="18020000010000000000000000000000850000005300000085000000050000009500000000000000a94be0c51261be6a99fe3d0000a232d5e1f59f18f845f82e9a7bde9e8f4b9197701b547edf612a03f1737d95"], 0x0}, 0x94) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) r2 = socket(0x2b, 0x80801, 0x1) shutdown(r2, 0x7ffffffe) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f0000000080)={0x1d, r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="fbe6bd8dfcdda5a210b8cfefbd66f459c7261b927d25d3cf74d2f7c97735eba47f606a290d18492592230700000000000000081fdbd921ed4db0e67c9d5ab1452445a1e0da5ac68b13f4afe2712eeaad350d07", 0x53}], 0x1}, 0x10008810) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x12, &(0x7f00000008c0)=r6, 0x4) setuid(0xee01) r7 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r7, &(0x7f0000001940)={&(0x7f0000000480)={0xa, 0x4e21, 0x9, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="180000000000000029000000370000002b00000000000000180000000000000029000000370000002c0000000000000060"], 0x90}, 0x800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x5, 0x14, 0x0, &(0x7f00000000c0)="259a53f271a76d2608004c6588a80a38667d2f15", 0x0, 0xd0e, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 27.406976781s ago: executing program 37 (id=2410): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0xb, 0x1514, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x1000000010000, 0x9, 0x5, 0x8, 0x20005, 0xb, 0x0, 0x2b7babd6, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=ANY=[@ANYBLOB="540000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="15020000fe0f00001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="080004"], 0x54}, 0x1, 0xba01, 0x0, 0x4010}, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1) 22.528453606s ago: executing program 38 (id=2413): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000008c80)=ANY=[@ANYBLOB="2c00000026000506"], 0x2c}}, 0x800) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), r2) sendmsg$SMC_PNETID_DEL(r2, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYRES32=r2, @ANYRES16=r3, @ANYBLOB="000329bd7000fedbdf25030000000900010073797a31000000000000000573797a31000000000900030073797a30000000001400020076657468315f746f5f747bf16d0000000900010073797a3100000000"], 0x58}, 0x1, 0x0, 0x0, 0x801}, 0x20008020) sendmsg$nl_xfrm(r2, 0x0, 0x14048c40) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="c4000000190001000000000000000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000af8f7d91bbee15990a000000870000002b0cb895814cf13ef99d063fde0e70ba393fd25798915d91f1c201fec0e82375eb52b6221a6f2c607751a93df623f6", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fbffffffffffffff000000000000000000000000000000000000000000000002000000000000000000000000ba6b6e0000000000000000000c000f000500000000000000"], 0xc4}}, 0x2c000010) syz_io_uring_setup(0x5e48, &(0x7f0000000180)={0x0, 0x0, 0x10100, 0x20, 0xfffffffc}, &(0x7f0000000100), &(0x7f0000000140)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r5) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc08b64d400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x400c090) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) sendmsg$NFT_BATCH(r5, &(0x7f0000009b40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r6, &(0x7f0000009b40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x8004) 6.112218203s ago: executing program 39 (id=2407): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000640)={0x28, 0x0, 0x2710}, 0x10) r2 = accept(r0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000080)=0x6) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x12, 0x4, 0x4, 0xa4}, 0x50) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000080), &(0x7f00000002c0)=@tcp=r2}, 0x20) recvmsg$can_bcm(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x2000) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x200000, &(0x7f0000000040)={[{@grpquota}]}, 0x1, 0xbac, &(0x7f00000017c0)="$eJzs3M1rXOUaAPDnnEy+c5v0crn3tggGpCqK07QpFbpqXYsKunDZmExKyPTDJIIJXaR1ry5EXBSkf4Lg3m5cCS7qQutfUMQiRTdtFyNnPtKxk5nGdGaOSX8/eHPe97wn8zxPTmfOe2BOA3hqTWc/0ohDEXE2iZis708jYqjaG4nYrB13/+7l+awlUam8/VsSSUTcu3t5vvFaSX07Xh+MRMTN15L490etcVfXN5bnyuXSSn18dO38paOr6xuvLJ2fO1c6V7pwYvbVE7MnZ2e7WOvtS+998cwPbzx/9frHM29+fuC7JE7HRH2uuY5umY7prb9Js0JEzHU7WE4G6vU015kUckwIAICO0qY13H9jMgbi4eJtMr79MdfkAAAAgK6oDERUAAAAgH0ucf8PAAAA+1zjewD37l6eb7R8v5HQX3fORMRUrf7G8821mUJsVrcjMRgRY78n0fxYa1L7tSc2nUX6+vtS1qJHzyF3snklIv6/3flPqvVPVZ/ibq0/jYiZLsSffmS8l+o/3YX4edcPwNPpxpnahaz1+pdurX9im+tfYZtr127kff1rrP/ut6z/HtY/0Gb999YOYxx+8NLNdnPN6793P/l5IYufbZ+oqL/hzpWIw4Xt6k+26k/a1H92hzHG529fazeX1Z/V22j9rr9yPeJIdTXXWn9D0un/Jzq6uFQuzdR+bvP66yc7x28+/1nL4jfuBfohO/9jsbvzf2mHMab+9+uhdnOPrz/9ZSh5p9obqu/5cG5tbeVYxFDyeuv+451zaRzTeI2s/hef6/z+367+7DNhs/53yP71XKlvs/HVR2KOHzn+1e7r762s/oVdnv9Pdxjjy2+uvd9uLu/6AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANgb0oiYiCQtbvXTtFiMGI+I/8RYWr64uvby4sUPLixkcxFTMZguLpVLMxExWRsn2fhYtf9wfPyR8WxEHIyIzyZHq+Pi/MXyQt7FAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAsGU8IiYiSYsRkUbEH5NpWizmnRUAAADQdVN5JwAAAAD0nPt/AAAA2P9a7v8LfxmN9DMXAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA9qWDz964lUTE5qnRassM1ecGc80M6LV0Z4eN9ToPoP8G8k4AyE2hqV+pVCo5pgL0mXt8IHnM/EjbmeGu5wIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAP9cLh27cSiJi89RotWWG6nODuWYG9FqadwJAbgY6TSaP3QHsYYW8EwBy4x4fqK3sH1RqWudH2v7m8BNHBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGDvmKi2JC1GRFrtp2mxGPGviJiKwWRxqVyaiYgDEfHT5OBwNj6Wd9IAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB03er6xvJcuVxa0dHR6WJnNPoWa7T+Zm5zzHD7qQ6dnD+YAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIxer6xvJcuVxaWc07EwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACBvq+sby3Plcmmlh528awQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAID9/BgAA///GyAmy") sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0}, 0x4000000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d08000b000000e8fe55a1180015000600142603600e1209000d0000000401a80016000a00014006000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x10, &(0x7f0000000080)={[{@acl}, {@nodiscard}, {@oldalloc}]}, 0x1, 0x3f7, &(0x7f0000003080)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) pwrite64(r7, &(0x7f0000000140)='2', 0x1, 0x8000c61) write$binfmt_aout(r7, &(0x7f0000000180)=ANY=[], 0xff2e) setsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000280)=0x30, 0x2) ioctl$EXT4_IOC_MOVE_EXT(r8, 0x40305829, &(0x7f0000000240)={0x17c04, r8, 0x6, 0x100000204, 0x0, 0x1b}) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r9}, 0x94) open(&(0x7f0000000140)='./file0/file0\x00', 0x64942, 0x86) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xd, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000c40)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x15, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180200001e00000000000000000000007a02500003ffffff95"], &(0x7f0000000080)='GPL\x00', 0x4, 0x98, &(0x7f00000001c0)=""/152, 0x40f00}, 0x94) 3.94671416s ago: executing program 40 (id=2411): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x2014, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x400000000000d07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000380)="3900000013000318680907070000000f0000ff3f04000000170a001700000000040037000f0003002e2e2564aaee7b1d58b9a64411f6bbf44d", 0x39}], 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000008c80)=ANY=[@ANYBLOB="2c00000026000506"], 0x2c}}, 0x800) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x10000, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x29}, {0x8, 0x0, 0x100000001, 0x0, 0x0, 0xffffffffffffb473, 0xffffffffffffffff}, {0x1000000000, 0x2000000000000000, 0x0, 0xffffffffffffffff}, 0xfffffffe}}, 0xb8}}, 0x4004) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x2c000010) sendmsg$nl_xfrm(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000002, @in, 0x0, 0x0, 0x1000, 0x0, 0xa, 0x20}, {}, {0x1, 0x6, 0x0, 0xfffffffffffffffe}}}, 0xb8}, 0x1, 0x0, 0x0, 0x404c830}, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000c00)=ANY=[@ANYBLOB="020000000000000002004e1fe0"], 0x110) 0s ago: executing program 41 (id=2414): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="18020000010000000000000000000000850000005300000085000000050000009500000000000000a94be0c51261be6a99fe3d0000a232d5e1f59f18f845f82e9a7bde9e8f4b9197701b547edf612a03f1737d95"], 0x0}, 0x94) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) r2 = socket(0x2b, 0x80801, 0x1) shutdown(r2, 0x7ffffffe) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f0000000080)={0x1d, r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="fbe6bd8dfcdda5a210b8cfefbd66f459c7261b927d25d3cf74d2f7c97735eba47f606a290d18492592230700000000000000081fdbd921ed4db0e67c9d5ab1452445a1e0da5ac68b13f4afe2712eeaad350d07", 0x53}], 0x1}, 0x10008810) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x12, &(0x7f00000008c0)=r6, 0x4) setuid(0xee01) r7 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r7, &(0x7f0000001940)={&(0x7f0000000480)={0xa, 0x4e21, 0x9, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="180000000000000029000000370000002b00000000000000180000000000000029000000370000002c0000000000000060"], 0x90}, 0x800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x5, 0x14, 0x0, &(0x7f00000000c0)="259a53f271a76d2608004c6588a80a38667d2f15", 0x0, 0xd0e, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) kernel console output (not intermixed with test programs): tap2 [ 180.018671][T10914] GPT:first_usable_lbas don't match. [ 180.024045][T10914] GPT:34 != 290 [ 180.027692][T10914] GPT: Use GNU Parted to correct GPT errors. [ 180.033819][T10914] loop7: p1 p2 p3 [ 180.052662][T11130] workqueue: Failed to create a rescuer kthread for wq "bond6": -EINTR [ 180.066766][T11135] bridge2: entered promiscuous mode [ 180.080432][T11135] bridge2: entered allmulticast mode [ 180.109393][T11126] GPT:first_usable_lbas don't match. [ 180.114767][T11126] GPT:34 != 290 [ 180.118353][T11126] GPT: Use GNU Parted to correct GPT errors. [ 180.124492][T11126] loop7: p1 p2 p3 [ 180.181647][T11135] team0: Port device bridge2 added [ 180.220691][T11140] can: request_module (can-proto-0) failed. [ 180.284941][T11142] bridge0: port 3(team0) entered blocking state [ 180.291269][T11142] bridge0: port 3(team0) entered disabled state [ 180.296950][T11138] 9p: Bad value for 'wfdno' [ 180.382846][T11142] team0: entered allmulticast mode [ 180.388108][T11142] team_slave_0: entered allmulticast mode [ 180.393967][T11142] team_slave_1: entered allmulticast mode [ 180.408995][T11142] team0: entered promiscuous mode [ 180.414150][T11142] team_slave_0: entered promiscuous mode [ 180.420340][T11142] team_slave_1: entered promiscuous mode [ 180.477400][T11126] wireguard0: entered promiscuous mode [ 180.483506][T11126] wireguard0: entered allmulticast mode [ 180.556620][T11151] netlink: 4 bytes leftover after parsing attributes in process `syz.9.2055'. [ 180.565897][T11152] netlink: 4 bytes leftover after parsing attributes in process `syz.9.2055'. [ 180.774802][T11156] xfrm0 speed is unknown, defaulting to 1000 [ 181.120815][T11156] netlink: 16 bytes leftover after parsing attributes in process `syz.6.2057'. [ 181.157089][T11186] netlink: 596 bytes leftover after parsing attributes in process `syz.2.2063'. [ 181.184804][T11188] netlink: 32 bytes leftover after parsing attributes in process `syz.7.2064'. [ 181.362080][T11192] loop7: detected capacity change from 0 to 2048 [ 181.429035][T11193] loop6: detected capacity change from 0 to 128 [ 181.436597][T11193] FAT-fs (loop6): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 181.479692][T11193] FAT-fs (loop6): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 182.140245][T11200] loop9: detected capacity change from 0 to 2048 [ 182.159873][T11200] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 182.374550][ C0] net_ratelimit: 16280 callbacks suppressed [ 182.374601][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 182.392979][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 182.405172][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 182.417423][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 182.429650][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 182.442168][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 182.454307][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 182.466584][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 182.478828][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 182.491272][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 182.725804][T11207] 9p: Bad value for 'rfdno' [ 187.384455][ C0] net_ratelimit: 26316 callbacks suppressed [ 187.384477][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 187.402761][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 187.414888][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 187.427287][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 187.439398][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 187.451582][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 187.463915][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 187.476341][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 187.488486][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 187.500690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 189.782581][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 189.782601][ T29] audit: type=1400 audit(1770659688.173:4392): avc: denied { unmount } for pid=7756 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 189.829852][ T7756] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 189.877902][ T29] audit: type=1400 audit(1770659688.213:4393): avc: denied { map_create } for pid=11213 comm="syz.4.2074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 189.897353][ T29] audit: type=1400 audit(1770659688.213:4394): avc: denied { perfmon } for pid=11213 comm="syz.4.2074" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 189.918453][ T29] audit: type=1400 audit(1770659688.213:4395): avc: denied { map_read map_write } for pid=11213 comm="syz.4.2074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 189.938618][ T29] audit: type=1400 audit(1770659688.213:4396): avc: denied { open } for pid=11214 comm="syz.2.2075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 189.958069][ T29] audit: type=1400 audit(1770659688.213:4397): avc: denied { kernel } for pid=11214 comm="syz.2.2075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 189.977627][ T29] audit: type=1400 audit(1770659688.213:4398): avc: denied { prog_load } for pid=11213 comm="syz.4.2074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 189.996852][ T29] audit: type=1400 audit(1770659688.213:4399): avc: denied { bpf } for pid=11213 comm="syz.4.2074" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 190.017558][ T29] audit: type=1400 audit(1770659688.213:4400): avc: denied { prog_run } for pid=11214 comm="syz.2.2075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 190.036769][ T29] audit: type=1400 audit(1770659688.223:4401): avc: denied { write } for pid=11214 comm="syz.2.2075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 190.233457][T11215] can: request_module (can-proto-0) failed. [ 190.464594][ T5081] tipc: Subscription rejected, illegal request [ 191.500109][T11215] wireguard0: entered promiscuous mode [ 191.505830][T11215] wireguard0: entered allmulticast mode [ 191.525234][ T9004] FAT-fs (loop6): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 191.672176][T11255] loop6: detected capacity change from 0 to 764 [ 191.978684][T11269] loop6: detected capacity change from 0 to 512 [ 191.988531][T11271] loop9: detected capacity change from 0 to 512 [ 192.002380][T11271] EXT4-fs: Ignoring removed nobh option [ 192.060268][T11269] ------------[ cut here ]------------ [ 192.065862][T11269] EA inode 11 i_nlink=2 [ 192.065889][T11269] WARNING: fs/ext4/xattr.c:1059 at ext4_xattr_inode_update_ref+0x313/0x350, CPU#1: syz.6.2091/11269 [ 192.081001][T11269] Modules linked in: [ 192.084966][T11269] CPU: 1 UID: 0 PID: 11269 Comm: syz.6.2091 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 192.096496][T11269] Tainted: [W]=WARN [ 192.100325][T11269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 192.110423][T11269] RIP: 0010:ext4_xattr_inode_update_ref+0x332/0x350 [ 192.117133][T11269] Code: 64 e4 9a ff 4c 8d 2d bd 1f 3e 05 49 8d 7e 40 e8 74 ce b6 ff 49 8b 6e 40 4c 89 e7 e8 a8 c9 b6 ff 41 8b 56 48 4c 89 ef 48 89 ee <67> 48 0f b9 3a e9 02 ff ff ff e8 4f de d0 03 66 66 66 66 66 66 2e [ 192.136845][T11269] RSP: 0018:ffffc90004ee3778 EFLAGS: 00010246 [ 192.142987][T11269] RAX: ffff8881109c3c10 RBX: ffff88811ad2b688 RCX: ffffffff81be1d78 [ 192.151053][T11269] RDX: 0000000000000002 RSI: 000000000000000b RDI: ffffffff86fc3d20 [ 192.159106][T11269] RBP: 000000000000000b R08: 000188811ad2b63b R09: 0000000000000000 [ 192.167211][T11269] R10: ffffc90004ee36a8 R11: 0001c90004ee36a8 R12: ffff88811ad2b638 [ 192.175244][T11269] R13: ffffffff86fc3d20 R14: ffff88811ad2b5f0 R15: 0000000000000001 [ 192.183311][T11269] FS: 00007f6e4a4c76c0(0000) GS:ffff8882aec57000(0000) knlGS:0000000000000000 [ 192.192311][T11269] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 192.198956][T11269] CR2: 00007f2559802000 CR3: 000000014a8de000 CR4: 00000000003506f0 [ 192.206999][T11269] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000200000000300 [ 192.215080][T11269] DR3: 00000000000003ff DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 192.223172][T11269] Call Trace: [ 192.226506][T11269] [ 192.229469][T11269] ext4_xattr_inode_dec_ref_all+0x57c/0x880 [ 192.235523][T11269] ? errseq_check+0x2c/0x50 [ 192.240067][T11269] ext4_xattr_delete_inode+0x6c1/0x7a0 [ 192.245614][T11269] ? ext4_truncate+0x92b/0xad0 [ 192.250492][T11269] ext4_evict_inode+0xa1f/0xd40 [ 192.255441][T11269] ? __pfx_ext4_evict_inode+0x10/0x10 [ 192.260923][T11269] evict+0x2af/0x510 [ 192.264915][T11269] ? __dquot_initialize+0x146/0x7c0 [ 192.270169][T11269] iput+0x4b9/0x650 [ 192.274013][T11269] ext4_process_orphan+0x1a9/0x1c0 [ 192.279227][T11269] ext4_orphan_cleanup+0x6a8/0xa00 [ 192.284419][T11269] ext4_fill_super+0x3476/0x3800 [ 192.289407][T11269] ? set_blocksize+0x1a3/0x310 [ 192.294222][T11269] ? setup_bdev_super+0x30e/0x370 [ 192.299388][T11269] ? __pfx_ext4_fill_super+0x10/0x10 [ 192.304742][T11269] get_tree_bdev_flags+0x291/0x300 [ 192.309889][T11269] ? __pfx_ext4_fill_super+0x10/0x10 [ 192.315240][T11269] get_tree_bdev+0x1f/0x30 [ 192.319719][T11269] ext4_get_tree+0x1c/0x30 [ 192.324173][T11269] vfs_get_tree+0x57/0x1d0 [ 192.328779][T11269] do_new_mount+0x288/0x700 [ 192.333323][T11269] path_mount+0x4d0/0xbc0 [ 192.337720][T11269] ? user_path_at+0xbf/0x130 [ 192.342455][T11269] __se_sys_mount+0x28c/0x2e0 [ 192.347261][T11269] __x64_sys_mount+0x67/0x80 [ 192.351935][T11269] x64_sys_call+0x2cca/0x3000 [ 192.356701][T11269] do_syscall_64+0xc0/0x2a0 [ 192.361312][T11269] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 192.367303][T11269] RIP: 0033:0x7f6e4ba6c20a [ 192.371754][T11269] Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 192.391478][T11269] RSP: 002b:00007f6e4a4c6e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 192.395166][ C0] net_ratelimit: 22709 callbacks suppressed [ 192.395209][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.400055][T11269] RAX: ffffffffffffffda RBX: 00007f6e4a4c6ee0 RCX: 00007f6e4ba6c20a [ 192.406365][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.417978][T11269] RDX: 00002000000009c0 RSI: 0000200000000540 RDI: 00007f6e4a4c6ea0 [ 192.426303][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 192.437857][T11269] RBP: 00002000000009c0 R08: 00007f6e4a4c6ee0 R09: 0000000000800718 [ 192.446319][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 192.457885][T11269] R10: 0000000000800718 R11: 0000000000000246 R12: 0000200000000540 [ 192.467013][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.477819][T11269] R13: 00007f6e4a4c6ea0 R14: 000000000000048d R15: 0000200000000200 [ 192.486347][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.497807][T11269] [ 192.506184][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 192.517748][T11269] ---[ end trace 0000000000000000 ]--- [ 192.538455][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 192.542951][T11272] ipvlan2: entered allmulticast mode [ 192.551713][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.567938][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 192.570037][T11272] dummy0: entered allmulticast mode [ 192.586584][T11269] EXT4-fs (loop6): 1 orphan inode deleted [ 192.592872][T11269] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 192.655145][T11271] EXT4-fs (loop9): encrypted files will use data=ordered instead of data journaling mode [ 192.684562][T11266] netlink: 5 bytes leftover after parsing attributes in process `syz.2.2090'. [ 192.693680][T11266] ..0ªî{X¹¦: renamed from ..1ªî{X¹¦ (while UP) [ 192.701414][ T6751] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 192.713103][T11266] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11266 comm=syz.2.2090 [ 192.754558][T11266] netlink: 104 bytes leftover after parsing attributes in process `syz.2.2090'. [ 192.815928][T11271] EXT4-fs (loop9): 1 truncate cleaned up [ 192.824700][T11271] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 192.837380][T11280] loop7: detected capacity change from 0 to 512 [ 192.933612][T11280] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 193.021593][T11280] EXT4-fs (loop7): 1 truncate cleaned up [ 193.027944][T11280] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 193.306283][ T7756] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 193.307018][ T6990] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 193.436590][T11299] loop6: detected capacity change from 0 to 512 [ 193.463482][T11299] EXT4-fs (loop6): couldn't mount as ext3 due to feature incompatibilities [ 193.491197][T11300] loop9: detected capacity change from 0 to 764 [ 193.790302][T11314] loop7: detected capacity change from 0 to 2048 [ 193.840627][T11314] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 193.874084][T11316] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=768 sclass=netlink_route_socket pid=11316 comm=syz.9.2106 [ 193.957449][T11323] netlink: 5 bytes leftover after parsing attributes in process `syz.4.2108'. [ 194.007910][T11323] ..1ªî{X¹¦: renamed from ..0ªî{X¹¦ (while UP) [ 194.024982][T11326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11326 comm=syz.4.2108 [ 194.061904][T11326] netlink: 104 bytes leftover after parsing attributes in process `syz.4.2108'. [ 194.162850][ T6990] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 194.205632][T11330] netlink: 6 bytes leftover after parsing attributes in process `syz.6.2110'. [ 194.283585][T11333] xt_hashlimit: size too large, truncated to 1048576 [ 194.381129][T11336] netlink: 8 bytes leftover after parsing attributes in process `syz.9.2112'. [ 194.390082][T11336] netlink: 'syz.9.2112': attribute type 30 has an invalid length. [ 194.423059][ T3425] hid-generic 0000:FFFFFFFE:0007.0001: unknown main item tag 0x0 [ 194.430992][ T3425] hid-generic 0000:FFFFFFFE:0007.0001: unknown main item tag 0x0 [ 194.438788][ T3425] hid-generic 0000:FFFFFFFE:0007.0001: unknown main item tag 0x0 [ 194.446609][ T3425] hid-generic 0000:FFFFFFFE:0007.0001: unknown main item tag 0x0 [ 194.454375][ T3425] hid-generic 0000:FFFFFFFE:0007.0001: unknown main item tag 0x0 [ 194.462215][ T3425] hid-generic 0000:FFFFFFFE:0007.0001: unknown main item tag 0x0 [ 194.470066][ T3425] hid-generic 0000:FFFFFFFE:0007.0001: unknown main item tag 0x0 [ 194.477892][ T3425] hid-generic 0000:FFFFFFFE:0007.0001: unknown main item tag 0x0 [ 194.485792][ T3425] hid-generic 0000:FFFFFFFE:0007.0001: unknown main item tag 0x0 [ 194.493614][ T3425] hid-generic 0000:FFFFFFFE:0007.0001: unknown main item tag 0x0 [ 194.537643][ T3425] hid-generic 0000:FFFFFFFE:0007.0001: hidraw0: HID v0.00 Device [syz0] on syz1 [ 194.563979][T11344] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2115'. [ 194.572976][ T5081] netdevsim netdevsim9 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 194.598466][ T5081] netdevsim netdevsim9 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 194.665430][T11341] netlink: 28 bytes leftover after parsing attributes in process `syz.6.2114'. [ 194.706656][ T5081] netdevsim netdevsim9 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 194.732411][ T5081] netdevsim netdevsim9 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 194.786291][ T29] kauditd_printk_skb: 111 callbacks suppressed [ 194.786309][ T29] audit: type=1400 audit(1770659693.173:4513): avc: denied { write } for pid=11351 comm="syz.6.2118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 194.914981][ T29] audit: type=1400 audit(1770659693.233:4514): avc: denied { execmem } for pid=11356 comm="syz.4.2120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 194.949942][T11355] fido_id[11355]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 194.992662][T11367] netlink: 'syz.6.2121': attribute type 1 has an invalid length. [ 195.000773][ T29] audit: type=1400 audit(1770659693.373:4515): avc: denied { create } for pid=11356 comm="syz.4.2120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 195.020583][ T29] audit: type=1400 audit(1770659693.383:4516): avc: denied { ioctl } for pid=11356 comm="syz.4.2120" path="socket:[31757]" dev="sockfs" ino=31757 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 195.072359][T11367] 8021q: adding VLAN 0 to HW filter on device bond2 [ 195.124440][ T29] audit: type=1400 audit(1770659693.513:4517): avc: denied { map_create } for pid=11365 comm="syz.9.2122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 195.143868][ T29] audit: type=1400 audit(1770659693.513:4518): avc: denied { perfmon } for pid=11365 comm="syz.9.2122" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 195.164905][ T29] audit: type=1400 audit(1770659693.513:4519): avc: denied { map_read map_write } for pid=11365 comm="syz.9.2122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 195.196713][T11366] loop9: detected capacity change from 0 to 2048 [ 195.203941][ T29] audit: type=1400 audit(1770659693.583:4520): avc: denied { mounton } for pid=11361 comm="syz.6.2121" path="/211/file0" dev="tmpfs" ino=1140 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 195.226973][ T29] audit: type=1400 audit(1770659693.583:4521): avc: denied { module_request } for pid=11361 comm="syz.6.2121" kmod="bpf_preload" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 195.248839][ T29] audit: type=1400 audit(1770659693.593:4522): avc: denied { read write } for pid=11365 comm="syz.9.2122" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 195.363443][T11366] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 195.489116][ T7756] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 195.571703][T11380] netlink: 5 bytes leftover after parsing attributes in process `syz.6.2125'. [ 195.580869][T11380] ..1ªî{X¹¦: renamed from ..0ªî{X¹¦ [ 195.594132][T11380] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11380 comm=syz.6.2125 [ 195.636782][T11380] netlink: 104 bytes leftover after parsing attributes in process `syz.6.2125'. [ 195.842122][T11389] loop6: detected capacity change from 0 to 512 [ 195.850509][T11399] ipt_ECN: cannot use operation on non-tcp rule [ 196.085369][T11389] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 196.123661][T11389] ext4 filesystem being mounted at /213/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 196.362687][T11432] netlink: 'syz.2.2143': attribute type 1 has an invalid length. [ 196.400589][T11431] netlink: 'syz.2.2143': attribute type 1 has an invalid length. [ 196.420059][T11435] netlink: 'syz.4.2142': attribute type 6 has an invalid length. [ 196.435270][ T6751] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 196.522778][T11431] 8021q: adding VLAN 0 to HW filter on device bond6 [ 196.533379][T11436] xt_hashlimit: size too large, truncated to 1048576 [ 196.899027][T11443] xfrm0 speed is unknown, defaulting to 1000 [ 197.404447][ C0] net_ratelimit: 17445 callbacks suppressed [ 197.404469][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 197.422918][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.435155][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.447366][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 197.459596][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 197.472088][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.484262][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.496524][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 197.508709][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 197.521224][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 197.576134][T11466] loop6: detected capacity change from 0 to 2048 [ 197.642395][T11466] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 197.934596][ T6751] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 197.971999][T11487] netlink: 5 bytes leftover after parsing attributes in process `syz.7.2154'. [ 197.996493][T11487] ..0ªî{X¹¦: renamed from ..1ªî{X¹¦ (while UP) [ 198.076663][T11485] netlink: 104 bytes leftover after parsing attributes in process `syz.7.2154'. [ 198.319357][T11501] loop6: detected capacity change from 0 to 128 [ 198.349117][T11501] msdos: Unknown parameter '00000000000000000003' [ 198.402960][T11501] 9pnet_fd: p9_fd_create_unix (11501): problem connecting socket: ./file1: -1 [ 198.446856][T11502] netlink: 36 bytes leftover after parsing attributes in process `syz.4.2159'. [ 198.859537][T11529] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2166'. [ 199.014334][T11536] netlink: 5 bytes leftover after parsing attributes in process `syz.4.2170'. [ 199.033437][T11536] ..0ªî{X¹¦: renamed from ..1ªî{X¹¦ (while UP) [ 199.056032][T11536] netlink: 104 bytes leftover after parsing attributes in process `syz.4.2170'. [ 199.449771][T11535] 8021q: adding VLAN 0 to HW filter on device ipvlan3 [ 199.526483][T11535] bond0: (slave ipvlan3): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 199.922442][ T29] kauditd_printk_skb: 184 callbacks suppressed [ 199.922461][ T29] audit: type=1400 audit(1770659698.313:4707): avc: denied { map_read map_write } for pid=11539 comm="syz.6.2171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 202.403059][T11544] netlink: 8 bytes leftover after parsing attributes in process `syz.6.2173'. [ 202.414574][ C0] net_ratelimit: 22529 callbacks suppressed [ 202.414592][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.432722][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.444978][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 202.445864][ T29] audit: type=1400 audit(1770659700.843:4708): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 202.457416][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 202.490671][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.502873][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.515125][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 202.527374][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 202.539947][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.552213][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 202.614056][T11561] netlink: 4280 bytes leftover after parsing attributes in process `syz.9.2177'. [ 202.664026][ T29] audit: type=1400 audit(1770659701.033:4709): avc: denied { write } for pid=11555 comm="syz.4.2176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 202.698030][T11561] netlink: 4280 bytes leftover after parsing attributes in process `syz.9.2177'. [ 202.708670][T11565] netlink: 24 bytes leftover after parsing attributes in process `syz.7.2179'. [ 202.771540][T11569] loop6: detected capacity change from 0 to 512 [ 202.869812][T11561] loop9: detected capacity change from 0 to 512 [ 202.887066][ T29] audit: type=1400 audit(1770659701.283:4710): avc: denied { mounton } for pid=11560 comm="syz.9.2177" path="/183/file0" dev="tmpfs" ino=995 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 202.960697][T11561] EXT4-fs (loop9): feature flags set on rev 0 fs, running e2fsck is recommended [ 202.969816][T11561] EXT4-fs (loop9): filesystem is read-only [ 202.975742][T11561] EXT4-fs (loop9): invalid inodes per group: 5 [ 202.975742][T11561] [ 202.996379][T11572] loop7: detected capacity change from 0 to 2048 [ 203.034058][ T29] audit: type=1400 audit(1770659701.303:4711): avc: denied { read write } for pid=11568 comm="syz.6.2181" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 203.058472][ T29] audit: type=1400 audit(1770659701.303:4712): avc: denied { open } for pid=11568 comm="syz.6.2181" path="/dev/loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 203.082598][ T29] audit: type=1400 audit(1770659701.303:4713): avc: denied { ioctl } for pid=11568 comm="syz.6.2181" path="/dev/loop6" dev="devtmpfs" ino=106 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 203.108180][ T29] audit: type=1400 audit(1770659701.303:4714): avc: denied { open } for pid=11568 comm="syz.6.2181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 203.127522][ T29] audit: type=1400 audit(1770659701.303:4715): avc: denied { perfmon } for pid=11568 comm="syz.6.2181" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 203.148968][ T29] audit: type=1400 audit(1770659701.303:4716): avc: denied { kernel } for pid=11568 comm="syz.6.2181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 203.192484][T11573] loop6: detected capacity change from 0 to 2048 [ 203.279024][T11573] EXT4-fs (loop6): unsupported descriptor size 0 [ 203.497833][T11572] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 203.816646][ T6990] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 204.380823][T11594] netlink: 'syz.7.2187': attribute type 12 has an invalid length. [ 204.927850][ T29] kauditd_printk_skb: 164 callbacks suppressed [ 204.927870][ T29] audit: type=1400 audit(1770659703.323:4881): avc: denied { cpu } for pid=11604 comm="syz.9.2188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 204.990401][ T29] audit: type=1400 audit(1770659703.353:4882): avc: denied { write } for pid=11604 comm="syz.9.2188" name="sg0" dev="devtmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 205.014207][ T29] audit: type=1400 audit(1770659703.363:4883): avc: denied { open } for pid=11604 comm="syz.9.2188" path="/dev/sg0" dev="devtmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 205.094569][T11606] program syz.9.2188 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 205.107237][T11606] SELinux: failed to load policy [ 205.112826][ T29] audit: type=1400 audit(1770659703.503:4884): avc: denied { load_policy } for pid=11604 comm="syz.9.2188" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 205.251408][T11610] loop9: detected capacity change from 0 to 736 [ 205.305052][ T29] audit: type=1400 audit(1770659703.673:4885): avc: denied { allowed } for pid=11614 comm="syz.4.2194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 205.324541][ T29] audit: type=1400 audit(1770659703.683:4886): avc: denied { create } for pid=11614 comm="syz.4.2194" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 205.345879][ T29] audit: type=1400 audit(1770659703.703:4887): avc: denied { create } for pid=11614 comm="syz.4.2194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 205.369741][T11615] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2194'. [ 205.382270][T11613] loop7: detected capacity change from 0 to 2048 [ 205.583289][T11613] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 205.604620][ T29] audit: type=1400 audit(1770659703.863:4888): avc: denied { module_request } for pid=11618 comm="syz.2.2195" kmod="netdev-syz_tun" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 205.626896][ T29] audit: type=1400 audit(1770659703.943:4889): avc: denied { sys_module } for pid=11618 comm="syz.2.2195" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 205.688543][T11615] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2194'. [ 205.841676][T11630] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2194'. [ 205.864900][ T29] audit: type=1400 audit(1770659704.253:4890): avc: denied { create } for pid=11628 comm="syz.2.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 206.040379][ T6990] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 206.833380][T11673] loop9: detected capacity change from 0 to 512 [ 206.876519][T11673] FAT-fs (loop9): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 207.129253][T11678] loop6: detected capacity change from 0 to 764 [ 207.316221][T11683] netlink: 5 bytes leftover after parsing attributes in process `syz.9.2209'. [ 207.327460][T11683] ..0ªî{X¹¦: renamed from ..1ªî{X¹¦ (while UP) [ 207.347319][T11683] netlink: 8 bytes leftover after parsing attributes in process `syz.9.2209'. [ 207.379492][T11683] netlink: 104 bytes leftover after parsing attributes in process `syz.9.2209'. [ 207.424620][ C0] net_ratelimit: 18035 callbacks suppressed [ 207.424644][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.442820][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.455090][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 207.467378][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 207.479914][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.492086][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.504492][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 207.516826][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 207.529381][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.541617][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 207.599320][T11696] netlink: 65039 bytes leftover after parsing attributes in process `syz.7.2217'. [ 207.807539][T11704] loop6: detected capacity change from 0 to 512 [ 207.837087][T11704] EXT4-fs (loop6): first meta block group too large: 2 (group descriptor block count 1) [ 208.498746][T11720] xfrm0 speed is unknown, defaulting to 1000 [ 208.936479][T11730] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2224'. [ 208.991774][T11723] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2224'. [ 209.011383][T11726] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2224'. [ 209.048626][T11732] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2580 sclass=netlink_route_socket pid=11732 comm=syz.2.2224 [ 209.061616][T11732] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2582 sclass=netlink_route_socket pid=11732 comm=syz.2.2224 [ 209.309756][T11742] loop7: detected capacity change from 0 to 2048 [ 209.325769][T11743] IPv6: NLM_F_REPLACE set, but no existing node found! [ 209.576024][T11737] uprobe: syz.6.2227:11737 failed to unregister, leaking uprobe [ 209.605436][T11742] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 209.676951][ T6990] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 209.752327][T11754] netlink: 'syz.2.2232': attribute type 1 has an invalid length. [ 209.760292][T11754] netlink: 'syz.2.2232': attribute type 2 has an invalid length. [ 209.986317][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 209.986343][ T29] audit: type=1400 audit(1770659708.383:4934): avc: denied { connect } for pid=11753 comm="syz.2.2232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 210.054345][ T29] audit: type=1400 audit(1770659708.413:4935): avc: denied { checkpoint_restore } for pid=11753 comm="syz.2.2232" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 210.155689][ T29] audit: type=1400 audit(1770659708.543:4936): avc: denied { listen } for pid=11759 comm="syz.4.2233" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 210.177357][ T29] audit: type=1400 audit(1770659708.543:4937): avc: denied { create } for pid=11759 comm="syz.4.2233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 210.275790][ T29] audit: type=1400 audit(1770659708.603:4938): avc: denied { write } for pid=11759 comm="syz.4.2233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 210.295470][ T29] audit: type=1400 audit(1770659708.603:4939): avc: denied { connect } for pid=11759 comm="syz.4.2233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 210.315219][ T29] audit: type=1400 audit(1770659708.603:4940): avc: denied { name_connect } for pid=11759 comm="syz.4.2233" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 210.383440][ T29] audit: type=1400 audit(1770659708.773:4941): avc: denied { ioctl } for pid=11759 comm="syz.4.2233" path="socket:[33013]" dev="sockfs" ino=33013 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 210.439341][T11765] __nla_validate_parse: 4 callbacks suppressed [ 210.439360][T11765] netlink: 16 bytes leftover after parsing attributes in process `syz.4.2235'. [ 210.458909][ T29] audit: type=1400 audit(1770659708.853:4942): avc: denied { create } for pid=11764 comm="syz.4.2235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 210.480596][ T29] audit: type=1400 audit(1770659708.873:4943): avc: denied { setopt } for pid=11764 comm="syz.4.2235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 210.850702][T11779] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2238'. [ 210.859761][T11779] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2238'. [ 210.895251][T11766] program syz.6.2234 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 210.936712][T11766] delete_channel: no stack [ 210.955945][T11766] delete_channel: no stack [ 211.062566][T11786] netlink: 72 bytes leftover after parsing attributes in process `syz.4.2239'. [ 211.126709][T11786] netlink: 32 bytes leftover after parsing attributes in process `syz.4.2239'. [ 211.178664][T11785] 9pnet_fd: Insufficient options for proto=fd [ 211.190997][T11792] loop9: detected capacity change from 0 to 2048 [ 211.200658][T11785] netlink: 20 bytes leftover after parsing attributes in process `syz.2.2240'. [ 211.215256][T11795] netlink: 8 bytes leftover after parsing attributes in process `syz.7.2242'. [ 211.245574][T11795] netlink: 4 bytes leftover after parsing attributes in process `syz.7.2242'. [ 211.282764][T11795] netlink: 8 bytes leftover after parsing attributes in process `syz.7.2242'. [ 211.310493][T11800] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2242'. [ 211.332062][T11792] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 211.359326][T11795] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2580 sclass=netlink_route_socket pid=11795 comm=syz.7.2242 [ 211.372288][T11795] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2582 sclass=netlink_route_socket pid=11795 comm=syz.7.2242 [ 211.428561][ T7756] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 212.075426][T11825] lo speed is unknown, defaulting to 1000 [ 212.104096][T11825] lo speed is unknown, defaulting to 1000 [ 212.118262][T11825] lo speed is unknown, defaulting to 1000 [ 212.139181][T11825] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 212.168355][T11825] lo speed is unknown, defaulting to 1000 [ 212.188714][T11825] lo speed is unknown, defaulting to 1000 [ 212.215021][T11825] lo speed is unknown, defaulting to 1000 [ 212.228513][T11825] lo speed is unknown, defaulting to 1000 [ 212.241768][T11825] lo speed is unknown, defaulting to 1000 [ 212.434518][ C0] net_ratelimit: 18571 callbacks suppressed [ 212.434561][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.452778][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.465045][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 212.477305][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 212.489926][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.502198][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.514490][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 212.526721][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 212.539292][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.551508][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 212.846013][T11847] sctp: [Deprecated]: syz.7.2255 (pid 11847) Use of int in maxseg socket option. [ 212.846013][T11847] Use struct sctp_assoc_value instead [ 214.228802][T11891] syzkaller1: entered promiscuous mode [ 214.234406][T11891] syzkaller1: entered allmulticast mode [ 214.366069][T11905] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2580 sclass=netlink_route_socket pid=11905 comm=syz.4.2271 [ 214.378863][T11905] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2582 sclass=netlink_route_socket pid=11905 comm=syz.4.2271 [ 214.897527][T11930] batadv1: entered promiscuous mode [ 214.902817][T11930] batadv1: entered allmulticast mode [ 214.932656][T11930] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 215.140575][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 215.140623][ T29] audit: type=1400 audit(1770659713.533:4981): avc: denied { ioctl } for pid=11932 comm="syz.6.2279" path="socket:[33472]" dev="sockfs" ino=33472 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 215.146473][T11933] loop6: detected capacity change from 0 to 1024 [ 215.215254][T11933] EXT4-fs: Ignoring removed nomblk_io_submit option [ 215.305315][T11933] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 215.329510][ T29] audit: type=1400 audit(1770659713.723:4982): avc: denied { create } for pid=11939 comm="syz.2.2283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 215.393149][ T29] audit: type=1400 audit(1770659713.723:4983): avc: denied { setopt } for pid=11939 comm="syz.2.2283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 215.418625][ T29] audit: type=1400 audit(1770659713.723:4984): avc: denied { read write } for pid=11932 comm="syz.6.2279" name="file1" dev="loop6" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 215.447213][ T29] audit: type=1400 audit(1770659713.723:4985): avc: denied { open } for pid=11932 comm="syz.6.2279" path="/238/file1/file1" dev="loop6" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 215.482655][ T29] audit: type=1326 audit(1770659713.753:4986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11936 comm="syz.9.2281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f7253af79 code=0x7ffc0000 [ 215.496982][T11953] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11953 comm=syz.7.2280 [ 215.519801][ T29] audit: type=1326 audit(1770659713.753:4987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11936 comm="syz.9.2281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f3f7253af79 code=0x7ffc0000 [ 215.549004][ T29] audit: type=1326 audit(1770659713.753:4988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11936 comm="syz.9.2281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f7253af79 code=0x7ffc0000 [ 215.584068][ T29] audit: type=1326 audit(1770659713.753:4989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11936 comm="syz.9.2281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f3f7253af79 code=0x7ffc0000 [ 215.612975][ T29] audit: type=1326 audit(1770659713.753:4990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11936 comm="syz.9.2281" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f7253af79 code=0x7ffc0000 [ 215.626074][T11946] __nla_validate_parse: 13 callbacks suppressed [ 215.626132][T11946] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2284'. [ 215.710457][ T6751] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 215.721698][T11942] netlink: 8 bytes leftover after parsing attributes in process `syz.7.2280'. [ 215.893830][T11974] loop7: detected capacity change from 0 to 512 [ 215.920484][T11974] EXT4-fs: Ignoring removed bh option [ 215.959315][T11974] EXT4-fs error (device loop7): ext4_get_branch:178: inode #11: block 4294967295: comm syz.7.2288: invalid block [ 216.008348][T11978] loop9: detected capacity change from 0 to 2048 [ 216.022418][T11974] EXT4-fs (loop7): Remounting filesystem read-only [ 216.047186][T11978] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 216.063017][T11974] EXT4-fs (loop7): 2 truncates cleaned up [ 216.116668][T11974] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 216.475573][ T7756] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 216.727266][T12003] loop9: detected capacity change from 0 to 512 [ 216.790740][T12003] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 216.904930][T12003] ext4 filesystem being mounted at /201/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 217.200159][ T6990] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 217.215190][T12008] netlink: 12 bytes leftover after parsing attributes in process `syz.9.2296'. [ 217.367110][T12015] netlink: 'syz.2.2299': attribute type 1 has an invalid length. [ 217.430710][T12016] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2299'. [ 217.444723][ C0] net_ratelimit: 16415 callbacks suppressed [ 217.444744][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.462921][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.475192][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 217.487442][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 217.500059][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.512299][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.524593][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 217.536910][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 217.549478][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.561831][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 217.576411][T12016] bond7: (slave bridge3): making interface the new active one [ 217.664984][T12016] bond7: (slave bridge3): Enslaving as an active interface with an up link [ 217.673814][T12012] netlink: 60 bytes leftover after parsing attributes in process `syz.7.2297'. [ 217.731803][ T7756] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 217.876504][T12025] loop9: detected capacity change from 0 to 2048 [ 217.953772][T12025] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 217.985528][T12025] FAULT_INJECTION: forcing a failure. [ 217.985528][T12025] name failslab, interval 1, probability 0, space 0, times 0 [ 217.998258][T12025] CPU: 1 UID: 0 PID: 12025 Comm: syz.9.2301 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 217.998334][T12025] Tainted: [W]=WARN [ 217.998343][T12025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 217.998394][T12025] Call Trace: [ 217.998404][T12025] [ 217.998415][T12025] __dump_stack+0x1d/0x30 [ 217.998448][T12025] dump_stack_lvl+0x95/0xd0 [ 217.998475][T12025] dump_stack+0x15/0x1b [ 217.998502][T12025] should_fail_ex+0x263/0x280 [ 217.998552][T12025] should_failslab+0x8c/0xb0 [ 217.998644][T12025] __kmalloc_noprof+0xb8/0x580 [ 217.998679][T12025] ? ext4_find_extent+0x16b/0x7a0 [ 217.998722][T12025] ext4_find_extent+0x16b/0x7a0 [ 217.998753][T12025] ? __rcu_read_unlock+0x4e/0x70 [ 217.998796][T12025] ext4_ext_map_blocks+0x128/0x38a0 [ 217.998837][T12025] ? blk_mq_flush_plug_list+0x2f2/0x320 [ 217.998910][T12025] ? __blk_flush_plug+0x26b/0x2b0 [ 217.998959][T12025] ? invalidate_inode_pages2_range+0x3e3/0x420 [ 217.999006][T12025] ? __rcu_read_unlock+0x4e/0x70 [ 217.999119][T12025] ext4_map_query_blocks+0xae/0x550 [ 217.999171][T12025] ? ext4_es_lookup_extent+0x3ac/0x540 [ 217.999212][T12025] ? __perf_event_task_sched_out+0x192/0x710 [ 217.999249][T12025] ext4_map_blocks+0x398/0xd70 [ 217.999293][T12025] ? __ext4_journal_start_sb+0x130/0x2f0 [ 217.999446][T12025] ext4_iomap_begin+0xa20/0x1000 [ 217.999497][T12025] ? __pfx_ext4_iomap_begin+0x10/0x10 [ 217.999553][T12025] iomap_iter+0x3f7/0x800 [ 217.999600][T12025] __iomap_dio_rw+0x858/0x14c0 [ 217.999706][T12025] iomap_dio_rw+0x40/0x90 [ 217.999738][T12025] ext4_file_write_iter+0xae5/0xf70 [ 217.999793][T12025] do_iter_readv_writev+0x4fd/0x5a0 [ 217.999879][T12025] vfs_writev+0x2e1/0x900 [ 217.999927][T12025] do_writev+0xe9/0x210 [ 217.999978][T12025] __x64_sys_writev+0x45/0x50 [ 218.000008][T12025] x64_sys_call+0x1ba5/0x3000 [ 218.000036][T12025] do_syscall_64+0xc0/0x2a0 [ 218.000149][T12025] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 218.000177][T12025] RIP: 0033:0x7f3f7253af79 [ 218.000243][T12025] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 218.000267][T12025] RSP: 002b:00007f3f70f97028 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 218.000293][T12025] RAX: ffffffffffffffda RBX: 00007f3f727b5fa0 RCX: 00007f3f7253af79 [ 218.000379][T12025] RDX: 0000000000000001 RSI: 0000200000000140 RDI: 0000000000000004 [ 218.000397][T12025] RBP: 00007f3f70f97090 R08: 0000000000000000 R09: 0000000000000000 [ 218.000414][T12025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.000431][T12025] R13: 00007f3f727b6038 R14: 00007f3f727b5fa0 R15: 00007ffcee19f6a8 [ 218.000457][T12025] [ 218.452041][T12041] loop7: detected capacity change from 0 to 512 [ 218.589579][T12041] EXT4-fs (loop7): feature flags set on rev 0 fs, running e2fsck is recommended [ 218.598782][T12041] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 218.661099][T12041] EXT4-fs (loop7): warning: checktime reached, running e2fsck is recommended [ 218.693836][ T7756] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 218.713522][T12041] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 218.753886][T12041] System zones: 0-2, 18-18, 34-34 [ 218.775132][T12041] EXT4-fs error (device loop7): ext4_orphan_get:1391: inode #15: comm syz.7.2305: iget: bad i_size value: -4294967296 [ 218.827237][T12029] loop6: detected capacity change from 0 to 512 [ 218.864240][T12041] EXT4-fs error (device loop7): ext4_orphan_get:1396: comm syz.7.2305: couldn't read orphan inode 15 (err -117) [ 218.904742][T12055] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2309'. [ 218.913672][T12055] netlink: 36 bytes leftover after parsing attributes in process `syz.2.2309'. [ 218.922734][T12055] netlink: 264 bytes leftover after parsing attributes in process `syz.2.2309'. [ 218.931846][T12055] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2309'. [ 218.940868][T12055] netlink: 36 bytes leftover after parsing attributes in process `syz.2.2309'. [ 218.977341][T12041] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 219.045680][T12029] EXT4-fs: EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 [ 219.061812][ T6990] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 219.262283][T12058] bond3 (unregistering): Released all slaves [ 219.326369][T12062] loop7: detected capacity change from 0 to 2048 [ 219.368079][T12062] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 219.506975][ T6990] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 219.546455][T12069] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2580 sclass=netlink_route_socket pid=12069 comm=syz.6.2313 [ 219.559367][T12069] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2582 sclass=netlink_route_socket pid=12069 comm=syz.6.2313 [ 219.622994][T12074] loop7: detected capacity change from 0 to 512 [ 219.671870][T12081] loop6: detected capacity change from 0 to 2048 [ 219.761428][T12074] FAT-fs (loop7): bogus sectors per cluster 0 [ 219.767625][T12074] FAT-fs (loop7): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 219.776829][T12074] FAT-fs (loop7): Can't find a valid FAT filesystem [ 219.788816][T12081] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 219.815324][T12081] FAULT_INJECTION: forcing a failure. [ 219.815324][T12081] name failslab, interval 1, probability 0, space 0, times 0 [ 219.828196][T12081] CPU: 1 UID: 0 PID: 12081 Comm: syz.6.2318 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 219.828236][T12081] Tainted: [W]=WARN [ 219.828245][T12081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 219.828322][T12081] Call Trace: [ 219.828331][T12081] [ 219.828342][T12081] __dump_stack+0x1d/0x30 [ 219.828372][T12081] dump_stack_lvl+0x95/0xd0 [ 219.828398][T12081] dump_stack+0x15/0x1b [ 219.828423][T12081] should_fail_ex+0x263/0x280 [ 219.828463][T12081] should_failslab+0x8c/0xb0 [ 219.828562][T12081] kmem_cache_alloc_noprof+0x68/0x490 [ 219.828593][T12081] ? __es_insert_extent+0x508/0xee0 [ 219.828703][T12081] __es_insert_extent+0x508/0xee0 [ 219.828743][T12081] ? _raw_spin_unlock_irq+0x9/0x30 [ 219.828787][T12081] ? loop_queue_rq+0x5ed/0x690 [ 219.828834][T12081] ext4_es_insert_extent+0x467/0x1c70 [ 219.828880][T12081] ext4_ext_map_blocks+0x179f/0x38a0 [ 219.828921][T12081] ? __blk_flush_plug+0x26b/0x2b0 [ 219.828978][T12081] ext4_map_query_blocks+0xae/0x550 [ 219.829053][T12081] ? ext4_es_lookup_extent+0x3ac/0x540 [ 219.829159][T12081] ? __perf_event_task_sched_out+0x192/0x710 [ 219.829244][T12081] ext4_map_blocks+0x398/0xd70 [ 219.829279][T12081] ? __ext4_journal_start_sb+0x130/0x2f0 [ 219.829305][T12081] ext4_iomap_begin+0xa20/0x1000 [ 219.829417][T12081] ? __pfx_ext4_iomap_begin+0x10/0x10 [ 219.829459][T12081] iomap_iter+0x3f7/0x800 [ 219.829536][T12081] __iomap_dio_rw+0x858/0x14c0 [ 219.829631][T12081] iomap_dio_rw+0x40/0x90 [ 219.829662][T12081] ext4_file_write_iter+0xae5/0xf70 [ 219.829789][T12081] do_iter_readv_writev+0x4fd/0x5a0 [ 219.829824][T12081] vfs_writev+0x2e1/0x900 [ 219.829878][T12081] do_writev+0xe9/0x210 [ 219.829916][T12081] __x64_sys_writev+0x45/0x50 [ 219.830013][T12081] x64_sys_call+0x1ba5/0x3000 [ 219.830097][T12081] do_syscall_64+0xc0/0x2a0 [ 219.830263][T12081] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 219.830291][T12081] RIP: 0033:0x7f6e4ba6af79 [ 219.830313][T12081] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 219.830337][T12081] RSP: 002b:00007f6e4a4c7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 219.830361][T12081] RAX: ffffffffffffffda RBX: 00007f6e4bce5fa0 RCX: 00007f6e4ba6af79 [ 219.830377][T12081] RDX: 0000000000000001 RSI: 0000200000000140 RDI: 0000000000000004 [ 219.830450][T12081] RBP: 00007f6e4a4c7090 R08: 0000000000000000 R09: 0000000000000000 [ 219.830464][T12081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.830479][T12081] R13: 00007f6e4bce6038 R14: 00007f6e4bce5fa0 R15: 00007ffde43a1748 [ 219.830547][T12081] [ 220.220335][T12099] netlink: 'syz.9.2322': attribute type 1 has an invalid length. [ 220.253127][T12099] bond6: entered promiscuous mode [ 220.258279][T12099] bond6: entered allmulticast mode [ 220.386959][T12105] bond6: left promiscuous mode [ 220.391851][T12105] bond6: left allmulticast mode [ 220.397544][T12105] 8021q: adding VLAN 0 to HW filter on device bond6 [ 220.411412][T12102] 9p: Bad value for 'rfdno' [ 220.481012][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 220.481030][ T29] audit: type=1400 audit(1770659718.873:5031): avc: denied { accept } for pid=12106 comm="syz.9.2325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 220.521941][T12107] loop9: detected capacity change from 0 to 128 [ 220.572290][ T29] audit: type=1400 audit(1770659718.963:5032): avc: denied { write } for pid=12101 comm="syz.2.2324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 220.712511][ T6751] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 220.737164][T12117] __nla_validate_parse: 10 callbacks suppressed [ 220.737183][T12117] netlink: 8 bytes leftover after parsing attributes in process `syz.9.2329'. [ 220.784663][T12117] netlink: 4 bytes leftover after parsing attributes in process `syz.9.2329'. [ 220.836550][T12128] netlink: 12 bytes leftover after parsing attributes in process `syz.9.2329'. [ 220.849505][T12128] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2580 sclass=netlink_route_socket pid=12128 comm=syz.9.2329 [ 220.862277][T12128] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2582 sclass=netlink_route_socket pid=12128 comm=syz.9.2329 [ 220.939705][T12128] netlink: 16 bytes leftover after parsing attributes in process `syz.9.2329'. [ 220.949272][T12128] netlink: 16 bytes leftover after parsing attributes in process `syz.9.2329'. [ 221.077117][T12139] netlink: 9 bytes leftover after parsing attributes in process `syz.6.2334'. [ 221.246821][T12142] loop6: detected capacity change from 0 to 128 [ 221.253831][T12142] FAT-fs (loop6): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 221.283705][T12142] FAT-fs (loop6): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 221.300670][ T29] audit: type=1400 audit(1770659719.693:5033): avc: denied { create } for pid=12135 comm="syz.6.2334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 221.322235][ T29] audit: type=1400 audit(1770659719.713:5034): avc: denied { write } for pid=12135 comm="syz.6.2334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 221.342780][ T29] audit: type=1400 audit(1770659719.713:5035): avc: denied { read } for pid=12135 comm="syz.6.2334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 221.375302][T12143] ieee802154 phy1 wpan1: encryption failed: -22 [ 221.434993][T12144] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2334'. [ 222.454807][ C0] net_ratelimit: 15930 callbacks suppressed [ 222.454823][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 222.473042][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 222.485277][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 222.497539][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 222.510099][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 222.522309][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 222.534619][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 222.546815][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 222.559398][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 222.571561][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 227.464805][ C0] net_ratelimit: 22990 callbacks suppressed [ 227.464821][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 227.482932][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 227.495150][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 227.507302][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 227.519681][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 227.531864][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 227.544013][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 227.556233][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 227.568648][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 227.580819][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.534241][ T29] audit: type=1400 audit(1770659728.923:5036): avc: denied { bind } for pid=12145 comm="syz.2.2335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 230.553820][ T29] audit: type=1400 audit(1770659728.923:5037): avc: denied { node_bind } for pid=12145 comm="syz.2.2335" saddr=255.255.255.255 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 230.643800][ T29] audit: type=1400 audit(1770659728.973:5038): avc: denied { name_bind } for pid=12145 comm="syz.2.2335" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 230.977826][T12162] loop6: detected capacity change from 0 to 2048 [ 231.006322][ T29] audit: type=1400 audit(1770659729.393:5039): avc: denied { create } for pid=12168 comm="syz.4.2342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 231.036887][T12170] vlan0: entered promiscuous mode [ 231.068996][T12170] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2343'. [ 231.087290][T12174] xt_hashlimit: size too large, truncated to 1048576 [ 231.211602][T12162] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 231.227503][T12180] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2343'. [ 231.236588][ T29] audit: type=1400 audit(1770659729.433:5040): avc: denied { create } for pid=12167 comm="syz.2.2343" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 231.257441][ T29] audit: type=1400 audit(1770659729.443:5041): avc: denied { sys_admin } for pid=12168 comm="syz.4.2342" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 231.278581][ T29] audit: type=1400 audit(1770659729.463:5042): avc: denied { write } for pid=12167 comm="syz.2.2343" name="file0" dev="tmpfs" ino=2981 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 231.301359][ T29] audit: type=1400 audit(1770659729.463:5043): avc: denied { open } for pid=12167 comm="syz.2.2343" path="/562/file0" dev="tmpfs" ino=2981 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 231.335509][T12180] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2343'. [ 231.365168][T12162] FAULT_INJECTION: forcing a failure. [ 231.365168][T12162] name failslab, interval 1, probability 0, space 0, times 0 [ 231.377930][T12162] CPU: 1 UID: 0 PID: 12162 Comm: syz.6.2340 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 231.377970][T12162] Tainted: [W]=WARN [ 231.377980][T12162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 231.377997][T12162] Call Trace: [ 231.378007][T12162] [ 231.378016][T12162] __dump_stack+0x1d/0x30 [ 231.378046][T12162] dump_stack_lvl+0x95/0xd0 [ 231.378100][T12162] dump_stack+0x15/0x1b [ 231.378127][T12162] should_fail_ex+0x263/0x280 [ 231.378202][T12162] should_failslab+0x8c/0xb0 [ 231.378234][T12162] __kmalloc_noprof+0xb8/0x580 [ 231.378269][T12162] ? ext4_find_extent+0x16b/0x7a0 [ 231.378306][T12162] ext4_find_extent+0x16b/0x7a0 [ 231.378340][T12162] ext4_ext_map_blocks+0x128/0x38a0 [ 231.378375][T12162] ? __rcu_read_unlock+0x4e/0x70 [ 231.378492][T12162] ? __perf_event_task_sched_in+0xa65/0xad0 [ 231.378620][T12162] ext4_map_blocks+0x65e/0xd70 [ 231.378673][T12162] ext4_iomap_begin+0xa20/0x1000 [ 231.378724][T12162] ? __pfx_ext4_iomap_begin+0x10/0x10 [ 231.378762][T12162] iomap_iter+0x3f7/0x800 [ 231.378858][T12162] __iomap_dio_rw+0x858/0x14c0 [ 231.378911][T12162] iomap_dio_rw+0x40/0x90 [ 231.378940][T12162] ext4_file_write_iter+0xae5/0xf70 [ 231.378994][T12162] do_iter_readv_writev+0x4fd/0x5a0 [ 231.379051][T12162] vfs_writev+0x2e1/0x900 [ 231.379102][T12162] do_writev+0xe9/0x210 [ 231.379140][T12162] __x64_sys_writev+0x45/0x50 [ 231.379243][T12162] x64_sys_call+0x1ba5/0x3000 [ 231.379273][T12162] do_syscall_64+0xc0/0x2a0 [ 231.379317][T12162] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 231.379393][T12162] RIP: 0033:0x7f6e4ba6af79 [ 231.379415][T12162] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 231.379440][T12162] RSP: 002b:00007f6e4a4c7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 231.379487][T12162] RAX: ffffffffffffffda RBX: 00007f6e4bce5fa0 RCX: 00007f6e4ba6af79 [ 231.379550][T12162] RDX: 0000000000000001 RSI: 0000200000000140 RDI: 0000000000000004 [ 231.379568][T12162] RBP: 00007f6e4a4c7090 R08: 0000000000000000 R09: 0000000000000000 [ 231.379594][T12162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 231.379607][T12162] R13: 00007f6e4bce6038 R14: 00007f6e4bce5fa0 R15: 00007ffde43a1748 [ 231.379636][T12162] [ 231.704426][ T29] audit: type=1400 audit(1770659730.073:5044): avc: denied { unlink } for pid=3319 comm="syz-executor" name="file0" dev="tmpfs" ino=2981 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 231.746295][T12185] x_tables: ip6_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING [ 231.824891][ T6751] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 231.835148][T12185] sch_tbf: burst 6 is lower than device ip6gre0 mtu (1448) ! [ 232.005918][ T29] audit: type=1400 audit(1770659730.403:5045): avc: denied { bind } for pid=12192 comm="syz.6.2347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 232.031297][T12193] loop6: detected capacity change from 0 to 1024 [ 232.059176][T12193] EXT4-fs: Ignoring removed orlov option [ 232.090233][T12193] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 232.406080][T12210] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2352'. [ 232.436460][T12210] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2560 sclass=netlink_route_socket pid=12210 comm=syz.2.2352 [ 232.449340][T12210] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2580 sclass=netlink_route_socket pid=12210 comm=syz.2.2352 [ 232.474822][ C0] net_ratelimit: 19642 callbacks suppressed [ 232.474843][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.492991][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.505292][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 232.517572][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 232.530165][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.542557][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.554892][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 232.567186][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 232.579795][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.592046][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 232.868011][ T6751] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 233.498098][T12231] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=12231 comm=syz.7.2358 [ 233.530727][T12233] loop6: detected capacity change from 0 to 2048 [ 233.635870][T12233] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 233.651560][T12244] loop9: detected capacity change from 0 to 128 [ 233.726060][ T6751] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 233.904987][T12252] loop6: detected capacity change from 0 to 512 [ 233.937162][T12252] EXT4-fs: Invalid want_extra_isize 64870 [ 234.236286][T12262] xfrm0 speed is unknown, defaulting to 1000 [ 234.289050][T12261] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2368'. [ 234.390037][T12269] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2368'. [ 234.470701][T12262] lo speed is unknown, defaulting to 1000 [ 234.730689][T12281] xfrm0 speed is unknown, defaulting to 1000 [ 234.760174][T12286] loop7: detected capacity change from 0 to 512 [ 234.785779][T12286] EXT4-fs: Ignoring removed oldalloc option [ 234.868968][T12286] EXT4-fs (loop7): 1 truncate cleaned up [ 234.892884][T12286] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 234.987191][T12286] EXT4-fs error (device loop7): ext4_find_dest_de:2050: inode #2: block 13: comm syz.7.2373: bad entry in directory: directory entry overrun - offset=76, inode=0, rec_len=1024, size=1024 fake=0 [ 235.006414][T12281] lo speed is unknown, defaulting to 1000 [ 235.007045][T12286] EXT4-fs (loop7): Remounting filesystem read-only [ 235.061341][T12286] bond2: ARP target 9.0.0.0 is already present [ 235.067748][T12286] bond2: option arp_ip_target: invalid value (9) [ 235.111825][T12286] bond2 (unregistering): Released all slaves [ 235.228961][T12303] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2379'. [ 235.238031][T12303] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2379'. [ 235.331350][ T6990] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 235.589189][ T29] kauditd_printk_skb: 211 callbacks suppressed [ 235.589208][ T29] audit: type=1326 audit(1770659733.983:5257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12321 comm="syz.2.2383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f803964af79 code=0x7ffc0000 [ 235.638639][T12323] loop7: detected capacity change from 0 to 512 [ 235.703166][ T29] audit: type=1326 audit(1770659734.013:5258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12321 comm="syz.2.2383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f803964af79 code=0x7ffc0000 [ 235.728187][ T29] audit: type=1326 audit(1770659734.013:5259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12321 comm="syz.2.2383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f803964af79 code=0x7ffc0000 [ 235.751812][ T29] audit: type=1326 audit(1770659734.023:5260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12321 comm="syz.2.2383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=210 compat=0 ip=0x7f803964af79 code=0x7ffc0000 [ 235.777029][ T29] audit: type=1326 audit(1770659734.023:5261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12321 comm="syz.2.2383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f803964af79 code=0x7ffc0000 [ 235.802096][ T29] audit: type=1326 audit(1770659734.023:5262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12321 comm="syz.2.2383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f803964af79 code=0x7ffc0000 [ 235.827531][ T29] audit: type=1326 audit(1770659734.023:5263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12321 comm="syz.2.2383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f803964af79 code=0x7ffc0000 [ 235.853093][ T29] audit: type=1326 audit(1770659734.023:5264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12321 comm="syz.2.2383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=72 compat=0 ip=0x7f803964af79 code=0x7ffc0000 [ 235.878079][ T29] audit: type=1326 audit(1770659734.023:5265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12321 comm="syz.2.2383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f803964af79 code=0x7ffc0000 [ 235.903238][ T29] audit: type=1326 audit(1770659734.023:5266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12321 comm="syz.2.2383" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f803964af79 code=0x7ffc0000 [ 236.180068][T12323] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 236.323134][T12339] 9pnet_fd: Insufficient options for proto=fd [ 236.410726][T12342] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2385'. [ 236.464006][T12343] netlink: 12 bytes leftover after parsing attributes in process `syz.6.2385'. [ 236.480528][T12343] netlink: 16 bytes leftover after parsing attributes in process `syz.6.2385'. [ 236.494226][T12343] netlink: 16 bytes leftover after parsing attributes in process `syz.6.2385'. [ 236.975986][T12239] EXT4-fs error (device loop7): ext4_validate_block_bitmap:423: comm ext4lazyinit: bg 0: bad block bitmap checksum [ 237.484441][ C0] net_ratelimit: 17199 callbacks suppressed [ 237.484462][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 237.502714][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 237.514941][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.527664][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 237.540137][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 237.552599][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 237.564760][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 237.577293][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 237.589494][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 237.601789][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 242.494443][ C0] net_ratelimit: 22251 callbacks suppressed [ 242.494465][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 242.512717][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.525201][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.537419][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.549655][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 242.561925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 242.574625][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.586886][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 242.599146][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 242.611295][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 245.856251][ T6990] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 245.875939][T12340] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 246.166418][ T29] kauditd_printk_skb: 47 callbacks suppressed [ 246.166480][ T29] audit: type=1400 audit(1770659744.563:5314): avc: denied { create } for pid=12356 comm="syz.4.2391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 246.222672][ T29] audit: type=1400 audit(1770659744.593:5315): avc: denied { write } for pid=12356 comm="syz.4.2391" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 246.801871][T12340] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 246.822338][T12341] netlink: 8 bytes leftover after parsing attributes in process `syz.6.2385'. [ 246.970098][ T29] audit: type=1326 audit(1770659745.363:5316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12385 comm="syz.9.2401" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f7253af79 code=0x7ffc0000 [ 247.069591][ T29] audit: type=1326 audit(1770659745.403:5317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12385 comm="syz.9.2401" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f7253af79 code=0x7ffc0000 [ 247.094787][ T29] audit: type=1326 audit(1770659745.403:5318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12385 comm="syz.9.2401" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f3f7253af79 code=0x7ffc0000 [ 247.119889][ T29] audit: type=1326 audit(1770659745.403:5319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12385 comm="syz.9.2401" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f7253af79 code=0x7ffc0000 [ 247.145054][ T29] audit: type=1326 audit(1770659745.403:5320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12385 comm="syz.9.2401" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f7253af79 code=0x7ffc0000 [ 247.170121][ T29] audit: type=1326 audit(1770659745.403:5321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12385 comm="syz.9.2401" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f3f7253af79 code=0x7ffc0000 [ 247.195114][ T29] audit: type=1326 audit(1770659745.403:5322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12385 comm="syz.9.2401" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f7253af79 code=0x7ffc0000 [ 247.220136][ T29] audit: type=1326 audit(1770659745.403:5323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12385 comm="syz.9.2401" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f7253af79 code=0x7ffc0000 [ 247.250138][T12383] xfrm0 speed is unknown, defaulting to 1000 [ 247.267371][T12390] pimreg: entered allmulticast mode [ 247.306482][T12390] netlink: 24 bytes leftover after parsing attributes in process `syz.6.2403'. [ 247.321231][T12383] lo speed is unknown, defaulting to 1000 [ 247.396319][T12388] netlink: 20 bytes leftover after parsing attributes in process `syz.7.2402'. [ 247.422940][T12388] ip6tnl3: entered allmulticast mode [ 247.447539][T12388] netlink: 4 bytes leftover after parsing attributes in process `syz.7.2402'. [ 247.476476][T12388] netlink: 24 bytes leftover after parsing attributes in process `syz.7.2402'. [ 247.504597][ C0] net_ratelimit: 20321 callbacks suppressed [ 247.504620][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.522845][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 247.535139][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.547787][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.560161][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.572473][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 247.584735][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 247.597271][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.609644][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 247.621908][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 247.869480][T12420] vlan0: entered allmulticast mode [ 247.891761][T12420] bridge0: port 4(vlan0) entered blocking state [ 247.899677][T12420] bridge0: port 4(vlan0) entered disabled state [ 247.912689][T12414] netlink: 'syz.2.2407': attribute type 13 has an invalid length. [ 247.922110][T12414] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2407'. [ 247.942153][T12422] netlink: 5 bytes leftover after parsing attributes in process `syz.9.2411'. [ 247.977352][T12420] vlan0: entered promiscuous mode [ 248.047237][T12425] netlink: 104 bytes leftover after parsing attributes in process `syz.9.2411'. [ 248.390941][T12430] netlink: 4 bytes leftover after parsing attributes in process `syz.7.2413'. [ 249.950332][T12434] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2413'. [ 252.514400][ C1] net_ratelimit: 49679 callbacks suppressed [ 252.514423][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.515631][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.520744][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.532884][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.544478][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.556724][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 252.568709][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.580712][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 252.592473][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 252.605771][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.524407][ C0] net_ratelimit: 57460 callbacks suppressed [ 257.524456][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.524500][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.531073][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 257.542856][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.555101][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 257.566901][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.580290][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.590791][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.603000][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 257.614700][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.534408][ C1] net_ratelimit: 45950 callbacks suppressed [ 262.534431][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.535511][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.540674][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.552959][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.564503][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.576873][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 262.588667][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.600716][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 262.612530][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 262.625702][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.544411][ C1] net_ratelimit: 52628 callbacks suppressed [ 267.544432][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.544455][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 267.550694][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.562849][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 267.574705][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.587980][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.599148][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.611394][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.622961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 267.635529][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 270.851430][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 270.851448][ T29] audit: type=1400 audit(1770659769.243:5392): avc: denied { connect } for pid=12439 comm="syz.4.2414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 271.586828][ T29] audit: type=1400 audit(1770659769.483:5393): avc: denied { mounton } for pid=12445 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 272.554404][ C1] net_ratelimit: 54518 callbacks suppressed [ 272.554425][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.554741][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 272.560628][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.572849][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 272.585146][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.598257][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.609038][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.621347][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.632903][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 272.645302][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 277.564396][ C1] net_ratelimit: 53235 callbacks suppressed [ 277.564418][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.564868][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.570637][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.583128][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.594793][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.606812][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 277.618730][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.630997][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 277.642789][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 277.656336][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.574937][ C0] net_ratelimit: 38562 callbacks suppressed [ 282.574965][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.578411][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.581549][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.593247][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.605433][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 282.617186][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.629182][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 282.641063][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.654402][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 282.665047][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.584424][ C0] net_ratelimit: 53227 callbacks suppressed [ 287.584445][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.584453][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.592598][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.602643][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.615092][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.626655][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.638807][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 287.650572][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 287.662761][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 287.674482][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.594422][ C1] net_ratelimit: 55919 callbacks suppressed [ 292.594444][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.594869][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 292.600620][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.613864][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.624909][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.637318][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.648873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.660972][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 292.672933][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 292.685139][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 297.604714][ C0] net_ratelimit: 50178 callbacks suppressed [ 297.604735][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.608609][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.611344][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.622988][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.635276][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 297.647044][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.659143][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 297.670996][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.683170][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 297.694842][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.614442][ C0] net_ratelimit: 42561 callbacks suppressed [ 302.614463][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.614492][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.614714][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.621004][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.632652][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.645197][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 302.656737][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.670111][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 302.681347][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 302.694245][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.624404][ C1] net_ratelimit: 61981 callbacks suppressed [ 307.624426][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.624669][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 307.630691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.643565][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 307.654786][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.668285][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.678873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.691066][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.702519][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 307.714945][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 312.634510][ C0] net_ratelimit: 66824 callbacks suppressed [ 312.634532][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 312.638478][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.641516][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 312.652751][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.665965][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.676766][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.688969][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.700632][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 312.713823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 312.725301][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.644437][ C1] net_ratelimit: 49401 callbacks suppressed [ 317.644455][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.645436][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.650673][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.663090][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.674584][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.686911][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 317.698648][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.710722][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 317.722640][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 317.734953][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.654394][ C1] net_ratelimit: 62802 callbacks suppressed [ 322.654424][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.655011][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.660713][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.672931][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.684568][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.696763][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 322.708494][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.720710][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.732606][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.744702][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.664381][ C1] net_ratelimit: 66329 callbacks suppressed [ 327.664381][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 327.664400][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.664884][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.670768][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.683132][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.694790][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.707261][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 327.718639][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.731561][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 327.742687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.674461][ C1] net_ratelimit: 49690 callbacks suppressed [ 332.674484][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.674571][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 332.680694][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.693816][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.704762][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.717124][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.728645][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.741048][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 332.752839][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.765075][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 333.139629][ T29] audit: type=1400 audit(1770659831.203:5394): avc: denied { recv } for pid=9017 comm="kworker/u8:38" saddr=10.128.0.163 src=33032 daddr=10.128.1.171 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 336.464842][T12422] ..1ªî{X¹¦: renamed from ..0ªî{X¹¦ (while UP) [ 337.684381][ C0] net_ratelimit: 55425 callbacks suppressed [ 337.684403][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.687992][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.690958][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.702622][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.714755][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 337.726543][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.738487][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.750257][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.762610][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.774308][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.087588][T12424] netlink: 8 bytes leftover after parsing attributes in process `syz.9.2411'. [ 338.495515][ T29] audit: type=1400 audit(1770659835.853:5395): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 339.529430][T12427] netlink: 8 bytes leftover after parsing attributes in process `syz.7.2413'. [ 342.694746][ C0] net_ratelimit: 55154 callbacks suppressed [ 342.694768][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.698860][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.701331][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.712968][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.725236][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 342.736928][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.749117][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.760843][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.773093][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 342.784678][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.704391][ C0] net_ratelimit: 60555 callbacks suppressed [ 347.704412][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.704422][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.704642][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.711062][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.722865][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.735537][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 347.746730][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.759599][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.770497][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.783012][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.714460][ C0] net_ratelimit: 54064 callbacks suppressed [ 352.714481][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 352.718567][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.720807][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.732767][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.744947][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.756780][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.769278][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.780964][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.793449][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.805050][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.724353][ C0] net_ratelimit: 59555 callbacks suppressed [ 357.724371][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.724373][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.730601][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.742955][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.754451][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.766921][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.778436][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.791152][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 357.802167][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.815220][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.929348][ T8872] bond0: (slave syz_tun): Releasing backup interface [ 362.734435][ C0] net_ratelimit: 65182 callbacks suppressed [ 362.734458][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 362.734495][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.740805][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.752558][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.764868][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.776491][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.788868][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 362.800268][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.813159][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 362.824506][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.744373][ C1] net_ratelimit: 65442 callbacks suppressed [ 367.744395][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.744434][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 367.750577][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.762858][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.774638][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.786766][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.798253][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.811056][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 367.825069][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.837805][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 372.754401][ C0] net_ratelimit: 47528 callbacks suppressed [ 372.754424][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 372.758759][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.761596][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.772798][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.785151][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.796669][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.809015][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 372.820714][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.832916][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 372.844730][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.764363][ C0] net_ratelimit: 59457 callbacks suppressed [ 377.764368][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.764385][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.770542][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.782876][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 377.794720][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.806809][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.822041][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.830887][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.842419][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.854802][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.774359][ C1] net_ratelimit: 50733 callbacks suppressed [ 382.774380][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.774851][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.780651][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.793028][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.804568][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.816680][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 382.828542][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.840543][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.852403][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.864858][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.784357][ C1] net_ratelimit: 59322 callbacks suppressed [ 387.784383][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.784962][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.790501][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.802915][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.814600][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.826731][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 387.838485][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.850871][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.862633][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.874976][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 389.294396][ C1] ================================================================== [ 389.302562][ C1] BUG: KCSAN: data-race in wq_worker_tick / wq_worker_tick [ 389.309833][ C1] [ 389.312187][ C1] read-write to 0xffff8881000738b8 of 8 bytes by interrupt on cpu 0: [ 389.320284][ C1] wq_worker_tick+0x60/0x230 [ 389.324917][ C1] sched_tick+0xd7/0x210 [ 389.329216][ C1] update_process_times+0x15e/0x190 [ 389.334467][ C1] tick_nohz_handler+0x275/0x3d0 [ 389.339449][ C1] __hrtimer_run_queues+0x20f/0x590 [ 389.344711][ C1] hrtimer_interrupt+0x269/0x810 [ 389.349810][ C1] __sysvec_apic_timer_interrupt+0x5f/0x1d0 [ 389.355796][ C1] sysvec_apic_timer_interrupt+0x32/0x80 [ 389.361476][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 389.367514][ C1] __sanitizer_cov_trace_const_cmp1+0x2e/0x90 [ 389.373647][ C1] br_nf_pre_routing_ipv6+0xe0/0x2e0 [ 389.379085][ C1] br_nf_pre_routing+0x52b/0xbd0 [ 389.384083][ C1] br_handle_frame+0x85f/0xa60 [ 389.388979][ C1] __netif_receive_skb_core+0x5b1/0x1950 [ 389.394658][ C1] process_backlog+0x25b/0x670 [ 389.399470][ C1] __napi_poll+0x5f/0x310 [ 389.403834][ C1] net_rx_action+0x452/0x930 [ 389.408472][ C1] handle_softirqs+0xb9/0x280 [ 389.413195][ C1] do_softirq+0x45/0x60 [ 389.417403][ C1] __local_bh_enable_ip+0x70/0x80 [ 389.422478][ C1] __alloc_skb+0x477/0x4b0 [ 389.426957][ C1] nsim_dev_trap_report_work+0x18a/0x630 [ 389.432626][ C1] process_scheduled_works+0x4cd/0x9d0 [ 389.438124][ C1] worker_thread+0x6bc/0x8b0 [ 389.442761][ C1] kthread+0x488/0x510 [ 389.446883][ C1] ret_from_fork+0x148/0x280 [ 389.451520][ C1] ret_from_fork_asm+0x1a/0x30 [ 389.456331][ C1] [ 389.458688][ C1] read-write to 0xffff8881000738b8 of 8 bytes by interrupt on cpu 1: [ 389.466872][ C1] wq_worker_tick+0x60/0x230 [ 389.471516][ C1] sched_tick+0xd7/0x210 [ 389.475807][ C1] update_process_times+0x15e/0x190 [ 389.481053][ C1] tick_nohz_handler+0x275/0x3d0 [ 389.486037][ C1] __hrtimer_run_queues+0x20f/0x590 [ 389.491294][ C1] hrtimer_interrupt+0x269/0x810 [ 389.496374][ C1] __sysvec_apic_timer_interrupt+0x5f/0x1d0 [ 389.502329][ C1] sysvec_apic_timer_interrupt+0x32/0x80 [ 389.508035][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 389.514049][ C1] __sanitizer_cov_trace_const_cmp4+0x8/0x90 [ 389.520095][ C1] ip_route_input_rcu+0x604/0x1c10 [ 389.525249][ C1] ip_route_input_noref+0x5f/0x90 [ 389.530320][ C1] arp_process+0x65f/0xf40 [ 389.534770][ C1] NF_HOOK+0x128/0x160 [ 389.538869][ C1] arp_rcv+0x218/0x2c0 [ 389.542996][ C1] process_backlog+0x363/0x670 [ 389.547809][ C1] __napi_poll+0x5f/0x310 [ 389.552187][ C1] net_rx_action+0x452/0x930 [ 389.556817][ C1] handle_softirqs+0xb9/0x280 [ 389.561548][ C1] do_softirq+0x45/0x60 [ 389.565932][ C1] __local_bh_enable_ip+0x70/0x80 [ 389.571013][ C1] _raw_spin_unlock_bh+0x18/0x20 [ 389.575982][ C1] nsim_dev_trap_report_work+0x52b/0x630 [ 389.581714][ C1] process_scheduled_works+0x4cd/0x9d0 [ 389.587219][ C1] worker_thread+0x6bc/0x8b0 [ 389.591944][ C1] kthread+0x488/0x510 [ 389.596074][ C1] ret_from_fork+0x148/0x280 [ 389.600707][ C1] ret_from_fork_asm+0x1a/0x30 [ 389.605527][ C1] [ 389.607982][ C1] value changed: 0x00000000014af690 -> 0x00000000014b1da0 [ 389.615130][ C1] [ 389.617480][ C1] Reported by Kernel Concurrency Sanitizer on: [ 389.623680][ C1] CPU: 1 UID: 0 PID: 5093 Comm: kworker/u8:26 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 389.635264][ C1] Tainted: [W]=WARN [ 389.639091][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 389.649277][ C1] Workqueue: events_unbound nsim_dev_trap_report_work [ 389.656089][ C1] ================================================================== SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 390.959484][ T29] audit: type=1400 audit(1770659888.713:5396): avc: denied { write } for pid=3299 comm="syz-executor" path="pipe:[735]" dev="pipefs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 392.794387][ C1] net_ratelimit: 56617 callbacks suppressed [ 392.794446][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.794811][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 392.800737][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.813741][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.824822][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.837259][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.849061][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.861308][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 392.873038][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.885258][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.804333][ C1] net_ratelimit: 66401 callbacks suppressed [ 397.804356][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.804718][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 397.810560][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.823707][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.834848][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.847130][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.858553][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.870965][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:ed:cf:83:76:13, vlan:0) [ 397.882777][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.894920][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)