last executing test programs: 1.621699247s ago: executing program 3 (id=197): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc}, 0x94) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000004c0)={'filter\x00', 0x6002, 0x4, 0x410, 0x218, 0x0, 0x218, 0x328, 0x328, 0x328, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0xa, 0x1, 0x2, 0x0, 0x0, "13b911e5284250ec81c17349113a3cfb44cacec1b17c5169103aa911ccde13af46942ffe283747525f02c26cacacf4224636c02166494a749e5e3abbd96793dd"}}}, {{@arp={@multicast1, @private=0xa010101, 0xffffff00, 0xff, 0x1, 0x5, {@mac=@multicast, {[0xff, 0xff, 0x0, 0xff, 0xff, 0xff]}}, {@empty, {[0x0, 0xff, 0xff, 0xff]}}, 0x54, 0x9, 0xf9cf, 0x2, 0x6ef4, 0x8, 'gre0\x00', 'team_slave_1\x00', {0xff}, {}, 0x0, 0x10}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @mac=@link_local, @empty, @private=0xa010102, 0xf, 0x5fa0832aa5fc72f3}}}], {{'\x00', 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffd}}}}, 0x460) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r1, 0x5000940e, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000004a80)="eb8c", 0x2}], 0x1) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000940)=ANY=[], 0x20) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000000c0)=0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a20000000000a01080000000000000000020000090900010073797a31000000007c000000030a01040000000000000000020000060900010073797a31000000000900030073797a3000000000140004800800014000000003080002400000006408000a40000000020b"], 0xc4}, 0x1, 0x0, 0x0, 0x24004900}, 0x2000) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000850}, 0x24000000) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) unlink(&(0x7f0000000000)='./file1\x00') 1.587149221s ago: executing program 3 (id=198): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f00000002c0)={0x3}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) process_vm_writev(r2, &(0x7f0000000700)=[{&(0x7f0000000140)=""/165, 0xa5}, {&(0x7f0000000200)=""/208, 0xd0}, {&(0x7f0000000300)=""/254, 0xfe}, {&(0x7f0000000400)=""/177, 0xb1}, {&(0x7f00000004c0)=""/43, 0x2b}, {&(0x7f0000000500)=""/76, 0x4c}, {&(0x7f0000000580)=""/201, 0xc9}, {&(0x7f0000000680)=""/84, 0x54}], 0x8, &(0x7f0000000880)=[{&(0x7f0000000b40)=""/136, 0x88}, {&(0x7f0000000800)=""/33, 0x21}, {&(0x7f0000000840)=""/47, 0x2f}], 0x3, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r4 = open$dir(&(0x7f00000008c0)='./file0\x00', 0x200801, 0x80) r5 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x453, 0x4, 0x70bd2a, 0x25dfdbfe, "0795"}, 0x14}, 0x1, 0x0, 0x0, 0x4044000}, 0x8000) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket$unix(0x1, 0x5, 0x0) r8 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setresgid(r9, 0x0, r10) fchownat(r4, &(0x7f0000000900)='./file0\x00', r6, r10, 0x1500) r11 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_GET(r11, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x4c, r3, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x38, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x32}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x54, r3, 0x1, 0x0, 0x25dfdbfb, {0x3}, [@TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x54}}, 0x0) 1.569596842s ago: executing program 2 (id=199): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb801b, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0xb093, 0x800000, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001100)=@newsa={0x138, 0x10, 0x1, 0x20, 0x0, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in=@private, 0x0, 0xecdf}, {@in=@broadcast, 0x0, 0x32}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, {0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffc}, {0x0, 0x800}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}]}, 0x138}}, 0x4050) 1.494121409s ago: executing program 3 (id=200): write$binfmt_format(0xffffffffffffffff, 0x0, 0x0) 1.463728071s ago: executing program 3 (id=202): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone3(&(0x7f0000000240)={0x200a00000, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000080)='./cgroup/../file0\x00') ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x7, 0x40, 0x6, 0x1000, {{0x20, 0x4, 0x1, 0x38, 0x80, 0x64, 0x0, 0xf8, 0x0, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x19}, {[@timestamp={0x44, 0x20, 0xa2, 0x0, 0x3, [0x101, 0x7, 0x9, 0x1, 0x7f, 0x400, 0x0]}, @cipso={0x86, 0x4b, 0x1, [{0x2, 0xc, "35904d6f3fc317ee28f8"}, {0x5, 0xb, "9364468917bb3926ae"}, {0xa, 0xb, "8b74580eeef01f3af9"}, {0x0, 0xb, "c175bd65b174f8dcbb"}, {0x2, 0x3, '*'}, {0x2, 0x6, "898cb951"}, {0x7, 0xf, "843b75a7a5e84c53e718ce0a98"}]}]}}}}}) sendmmsg$inet(r0, &(0x7f0000004980)=[{{&(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000040)}}], 0x1, 0x20008000) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000480)) 1.120620222s ago: executing program 2 (id=208): fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000240)={0x0, 0x2, 0xffffffffffffffff, 0xfffffffffffffbff}) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x1, 0x0, 0x7, 0x2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x30e600, 0x1000, 0x20da, 0x0, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x81010000000000, 0x0, 0x0, 0x2) 1.120002132s ago: executing program 4 (id=210): r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x40, @empty}, 0x1c) 1.119355832s ago: executing program 4 (id=211): r0 = socket(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe64, 0xff, @empty, 0x8e1726d}, 0x1c) r1 = socket(0x1f, 0x1, 0x6) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000040)=0xb40, 0xfffffffffffffc85) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300000200000000fbdbdf250000ab000000fe8000080000000000000000000000aa000000040200000000006bc300000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000400000000000000000000000000000000000000000000004000000000000000fdffffffffff"], 0xb8}, 0x1, 0x0, 0x0, 0x80}, 0x50) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000540)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x9}]}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000080)={r4, 0x3}, &(0x7f0000000100)=0x8) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[], 0x74}}, 0x0) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$setregs(0xd, r5, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x7000004) ptrace$getregset(0x4205, r5, 0x2, &(0x7f0000000080)={&(0x7f0000000000)=""/120, 0x78}) ptrace$getregset(0x4204, r5, 0x2, &(0x7f0000000740)={0x0}) bind$inet6(r1, &(0x7f0000000000)={0xa, 0xe64, 0x4, @empty, 0x82}, 0x1c) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x3}, 0x1c) r6 = socket(0x10, 0x80003, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0xf, "0000000001000000000000000e0000f0"}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) prctl$PR_MCE_KILL(0x4e, 0x1, 0x2) 1.119212972s ago: executing program 2 (id=212): write$binfmt_format(0xffffffffffffffff, 0x0, 0x0) 1.118765482s ago: executing program 1 (id=213): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x45, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xff, 0x4}, 0x12122, 0x10000, 0xfffffffe, 0x5, 0x8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) socket$qrtr(0x2a, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000600), 0x1, 0x56e, &(0x7f0000000640)="$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") madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) setresgid(0xee00, 0xee01, 0x0) quotactl$Q_GETQUOTA(0xffffffff80000701, &(0x7f00000001c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000001040)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r0 = io_uring_setup(0x1b7b, &(0x7f0000000040)={0x0, 0xc89f, 0xc000, 0x7, 0x20002f9}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000580), 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{0x0, 0x10}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000300)=0x8) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0, 0x0, 0x2c}, 0x4000845) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x47, 0x1, 0x0, 0x0, 0x0, 0x8000, 0x30040, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x182, 0x6}, 0x6025, 0x4005, 0x4, 0x0, 0x80000000, 0x1, 0xa, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000, 0x0, 0x1}, 0x20) 1.116556092s ago: executing program 2 (id=214): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x7, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x34, 0x3, 0xffffffffffffffff, 0x0, &(0x7f00000010c0)={0x0, 0x0, 0x0}, 0x0, 0x40000000}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a6c000000060a0104000000000000000002000000400004803c0001800a0001006d617463680000002c00028014000300f4f03b0200000000001108116b61979e090001006c3274700000000008000240000000000900010073797a30000000000900020073797a32"], 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r3 = syz_io_uring_setup(0x64d, &(0x7f00000006c0)={0x0, 0x11f8, 0x100, 0x0, 0x3b7}, &(0x7f0000000500)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_UNLINKAT={0x24, 0xa, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x200}) io_uring_enter(r3, 0xd12, 0xd9bd, 0x9, 0x0, 0x0) 1.054019088s ago: executing program 1 (id=215): socket$inet(0x2, 0x4000000000000001, 0x0) (async) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$XFS_IOC_GETPARENTS_BY_HANDLE(r0, 0xc040583f, &(0x7f0000000040)={{@_ha_fsid={[0x5, 0xa75]}, {0x7, 0x4, 0x8000, 0x2}}, {{[0x4, 0x3, 0x1118, 0x9]}, 0x0, 0x1, 0x2, 0x0, &(0x7f00000002c0)=[{{@align=0x6, {0x7, 0xfff, 0x2, 0x5f4c0000000000}}, 0x401, 0x0, '\x00'}, {{@_ha_fsid={[0x6, 0x3]}, {0x5, 0x0, 0x4, 0x4}}, 0x8, 0x0, '\xff\xff\xff\xff\xff\xff'}, {{@_ha_fsid={[0xffff, 0x3]}, {0xa, 0x1, 0xba4, 0x5}}, 0xff, 0x0, '\xaa\xaa\xaa\xaa\xaa'}]}}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000140)="91f8a9849519def28691bbc4173c3d6f357d0272b7319130feaab952ac4703cad04be68907e50e997fc26e4c91ea4feb931647fc5393de25000000000000000000", 0x41}, {&(0x7f0000000e80)="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", 0x121}, {&(0x7f00000001c0)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c", 0x54}], 0x3}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000b80)="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", 0x15d}, {&(0x7f0000000d00)="31cef842d9c50636f60fc0cfdac56c75f1687f0c56287423f5eed69f117e766bdbad0c2171ad6227e1173ab6efa2fcb1c420a51a0917861009000000f049c606ccab7cda1f0e3490fbe385ea", 0x4c}], 0x2}}], 0x2, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f00000004c0)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00)', 0x18, 0x6, 0xfe, @private1={0xfc, 0x1, '\x00', 0xbf}, @local, {[], {{0x1, 0x4001, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x2, 0x0, 0x0, {[@fastopen={0x22, 0x2}, @generic={0x2, 0x2}]}}}}}}}}, 0x0) 1.053716517s ago: executing program 4 (id=216): syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000001c0)={[{@noload}, {@stripe={'stripe', 0x3d, 0xdc}}, {@data_err_abort}, {@noload}, {@data_err_ignore}, {@auto_da_alloc}]}, 0xff, 0x451, &(0x7f0000000940)="$eJzs3MtvG8UfAPDvrp30/Ut+UB4tLQQKouKRNOnzwKUIJA4gIcGhiFNI0qrUbaAJEq0qKBzKEVXijjgi8RdwggsCTkhc4Y4qVaiXFiQko13vpq5rp3Hj1KX+fKRNZrzj7Hw9O/bsjDcBDKyx7EcSsTkifouIkUb2xgJjjV/Xrpyb+evKuZkk6vU3/kzyclevnJspi5bP29TI1OtFfl2b4154O2K6Vps7XeQnFk++N7Fw5uzzx09OH5s7Nndq6tChfXt3Dh+Y2t+TOLO4rm7/aH7HtlfeuvjazJGL7/z0TVbfzcX+5jh6ZMNY49Vt66keH6zftjSlk2ofK0JXKhGRNddQ3v9HohIblvaNxMuf9rVywJqq1+v1dp/PhfN14B6WRL9rAPRH+UGfXf+W2x0aetwVLh+OeP9gI/5rxdbYU420KDPUcn3bS2MRceT8319mW6zNPAQAwA2+OxwRz7Ub/6XxYFO5/xVrKKMR8f+IuC8i7o+IrRHxQERe9qGIeLjL47eukNw8/kkv3VZgK5SN/14o1raWxn//1PP4C6OVIrclj38oOXq8NreneE12x9C6LD+5zDG+f+nXzzvtax7/ZVt2/HIs2JBeqrZM0M1OL06vMuwllz+J2F5tiT+XRLmMk0TEtojY3tVfvn6FcfyZr3d0KnXr+JfRg3Wm+lcRTzfa/3y0xF9KOq5PTh48MLV/Yn3U5vZMlGfFzX7+5cLrnY6/qvh7IGv/ja3nf24p/tFkfcTCmbMn8vXahWhdIb6lC79/1vGa5nbP/+HkzTw9XDz24fTi4unJiOHk1Zsfn7r+3CJfbY5/96528af5e1wZ7SMRkZ3EOyPi0Yh4rKj74xHxRETsWib+H1988t3u419mVr6Hsvhnb9X+0dz+3ScqJ374tvv4S1n778tTu4tHVvL+t9IKrua1AwAAgP+KNP8OfJKOL6XTdHy88R3+rbExrc0vLD57dP6DU7ON78qPxlBaznSNNM2HThZzw2V+qiW/t5g3/qKyIc+Pz8zXZvsdPAy4TR36f+aPSr9rB6w592vB4NL/YXDp/zC49H8YXPo/DK52/f/jPtQDuPN8/sPg0v9hcOn/MLj0fxhIHe+NT1d1y7/EPZ+ItPtnVaOvdU66+McQd0+iutZ1Xtd2V7/fmQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHrj3wAAAP//TonqKA==") r0 = socket$unix(0x1, 0x5, 0x0) getpid() sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x7c}, 0x1, 0x0, 0x0, 0x800}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000800)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e20, @multicast1}, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$netlink(0x10, 0x3, 0x14) getsockopt$netlink(r2, 0x10e, 0x6, 0x0, &(0x7f0000000100)) sendmmsg(r1, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r1, 0x0, 0x8, 0x0, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, './file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}, 0x6e) 1.048384868s ago: executing program 2 (id=217): unshare(0x6a040000) (async, rerun: 64) r0 = socket$nl_route(0x10, 0x3, 0x0) (rerun: 64) sendmsg$nl_route(r0, 0x0, 0x0) (async) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) (async) pwritev2(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x1000, 0x0, 0x0) (async, rerun: 32) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) (rerun: 32) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='(\x00\x00\x00\b \x00\x00\x00\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="212d34364a4620809fcceb6f2446a5b6e548ffe17e76eb0680000000000000ab2984751a84791a67710cf4fc082bc2657c3d653ed5187b0000d809cec9a9465093bb74680e16ffe8e9fce3952e4872dc", @ANYRES64=0x0], 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)=ANY=[@ANYRES32=r5, @ANYRES32=r2, @ANYBLOB="1b8000000420000000000000d689ba7b32c672c100ad29c1d5abb1be171a5974e382fb8b12809e61a811091ceb6e2418ea3ee6c6a503299750b1c46a3d59daf53be840d56a5a0481bdae33e12811a25d0d0405dd982358fb7d4555e2da5768ad700cf42a495871dc38f6ebe3ec3908cae2a9b3d29cba187aa55edbb2fb836d6f9df1f65080df03bf0fc1c9cece233ea379ce0aa89d4f9167ef73f46bd5678946b66b1f1929e248afb7b58a2356e6c27a4a23a02b7d09f442925f1c70aa806276b3265f34c841776eb8211158115cce0525b974b102ddfe8aad74f901c0d3cd987970d3061a40e13a18dbc24e965771d4f12e2150f3be59da30799045a328c17812134432235d5d4211bd37214c67b36fd8dd9b0c31552b874c5367ad1db0fd4a808e1ede782c102bcdc1601d496d8546a3d609eb416f", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x20) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r6, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffe3b, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r7}, 0x4) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r7}, 0x4) (async) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x31, 0xffffffffffffffff, 0x0) (async) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x17) r8 = socket$tipc(0x1e, 0x5, 0x0) connect$tipc(r8, &(0x7f0000000080)=@id={0x1e, 0x3, 0x2, {0x4e22}}, 0x10) (async, rerun: 32) bind$tipc(r8, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x4000000}}, 0x10) (async, rerun: 32) r9 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r9, 0x10f, 0x81, &(0x7f0000000040)=0x7ff, 0x4) (async) sendmsg$tipc(r9, &(0x7f0000000240)={&(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x41}}}, 0x10, 0x0}, 0x20001) (async) close(r9) (async, rerun: 64) ptrace$cont(0x21, r1, 0x80000001, 0x4) (async, rerun: 64) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, 0x0, 0x4000) 923.561769ms ago: executing program 4 (id=218): r0 = socket(0x10, 0x803, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd27, 0xffffffff, {0x0, 0x0, 0x0, r2, {0x0, 0x4}, {0xffff, 0xffff}, {0xb, 0xfff3}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_USC={0x10, 0x3, {0xf, 0x5, 0xfffffff9}}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000002580)=@newtfilter={0x304, 0x2c, 0xd2b, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r2, {0x3}, {}, {0x4, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0x2d8, 0x2, [@TCA_U32_SEL={0x2d4, 0x5, {0xb, 0x8, 0x9, 0x7, 0x0, 0xefdf, 0x2, 0x84c, [{0xc000000, 0x9, 0x2, 0x3}, {0x0, 0x8000, 0x7ffffffe, 0x32ec}, {0x9, 0x8, 0x7, 0x4}, {0x4, 0x2, 0xc5f5, 0x7fffffff}, {0x9, 0x8001, 0x7, 0x1c00}, {0xfcb5, 0x0, 0x0, 0xc551}, {0x9, 0xffffffe1, 0xd, 0x6}, {0x9, 0x0, 0x80000001, 0x4}, {0x8, 0xa48e, 0x7d39876a, 0x7}, {0x2, 0x100, 0x6, 0x8}, {0xffff, 0x7, 0x2, 0x9}, {0x3, 0x8, 0x5c, 0x4}, {0xfffffffa, 0x3, 0x4, 0x3}, {0xffffffff, 0x6, 0x80, 0x4}, {0x4, 0x2, 0x4, 0xa}, {0x2, 0x0, 0xf53, 0x8}, {0x8, 0xe, 0x7, 0xc793}, {0x4, 0x7, 0xe0ed, 0x3}, {0xe, 0x9, 0xbb, 0x8}, {0x80, 0xa0, 0x1b09, 0x5}, {0x6, 0x7, 0x7ff, 0x9}, {0x8, 0xb38, 0x1, 0x8}, {0x400, 0x5b, 0x8}, {0x2, 0x7, 0x0, 0x4}, {0xc8f, 0x7}, {0xfffffff0, 0x80000001, 0x1, 0x6}, {0x2, 0x2, 0x10, 0x880}, {0x20, 0xf0, 0x3134, 0x8}, {0x6422, 0x6, 0x0, 0x4}, {0x8, 0xb56, 0x1003}, {0xfe8c, 0xea81aae, 0xff, 0x2}, {0x6, 0x4, 0x4d, 0x653}, {0x1, 0xe7, 0x401, 0xd}, {0x0, 0xffffff50, 0xfffffff9, 0x2}, {0x8, 0x9, 0x5, 0x9}, {0x3, 0x3, 0xfffffff8, 0x1}, {0x0, 0x1, 0x464, 0x7fffffff}, {0x1ff, 0x0, 0x5, 0x5}, {0x3ca7, 0x3, 0x2, 0x4}, {0x4, 0x8c, 0xfffffffd, 0x2}, {0x1, 0x350f, 0x4, 0x5}, {0x1431, 0x10000, 0x52d, 0xfff}, {0x7, 0x3, 0xe, 0x6}, {0x100, 0x5, 0x401, 0x1779}]}}]}}]}, 0x304}}, 0x24040084) 840.159407ms ago: executing program 4 (id=221): r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x40, @empty}, 0x1c) 771.616153ms ago: executing program 4 (id=223): r0 = socket$inet6_sctp(0xa, 0x801, 0x84) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1ff) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000008a6223090000000000002a971e100001"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x43044) sendmsg$NFQNL_MSG_CONFIG(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000019c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000020301040000000000000001080001000200001d"], 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20010) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30080, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}, 0x102260, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x8080) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000240)={0x2, &(0x7f0000000340)=[{0x6, 0x85, 0x7, 0x7ffc0001}, {0x101, 0x6, 0x9, 0x6}]}) r7 = syz_open_procfs(0x0, &(0x7f0000000280)='ns\x00') readlinkat(r7, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000002780)=""/4112, 0x1010) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x5f21df7aec8d40fb, 0x0, 0x0, 0x5}, 0x0, 0x0, r6, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x6000800) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)=0x10) mount$9p_unix(&(0x7f0000000180)='./file1\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x10002, &(0x7f00000002c0)=ANY=[@ANYBLOB='tians=unix,\x00']) r8 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0xc00) sendto$inet6(r8, &(0x7f00000000c0)="dc6e4ee4b758631efb26d4f3441acc46bcff6e6af400b7971e4e885f05df60012eb1241b4ed0809c4367406d873b30faa2470aac93d0ede7eadea202f08a72e99840b1411ddca6ef26ce69d5c867d817c317e353b3e862804abe94dec659cb96bd15fee1459119f74a29e8a534d3856d5f45c457efbb86ccdf5138828aeb4d53bb5bad635a22d9f57e86b2f80eb55ee98c53e98135a3cd61db492b35bae9c0aba0aa05c7cf49c0bc", 0xa8, 0x800, &(0x7f0000000180)={0xa, 0x4e20, 0xa, @mcast2, 0xfffffff7}, 0x1c) syz_clone3(&(0x7f0000000740)={0x8180080, 0x0, 0x0, 0x0, {0x19}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 642.135664ms ago: executing program 2 (id=224): set_mempolicy(0x4005, &(0x7f0000000300)=0x4, 0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000b, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYRES16=r2, @ANYRES16=r2, @ANYBLOB="010000000800000000000474090600000000"], 0x28}, 0x1, 0xffffffff00000003}, 0x0) io_submit(0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_MCE_KILL(0x4e, 0x1, 0x1000000) 641.869834ms ago: executing program 0 (id=225): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000440)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd00000010000100050808004149014006040800", 0x58}], 0x1) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) bind$unix(r3, &(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) openat$dir(0xffffffffffffff9c, 0x0, 0x2e2182, 0x0) sendmmsg$unix(r4, &(0x7f0000004640)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4040095}}], 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x800) sendmsg$NFT_MSG_GETFLOWTABLE(r0, 0x0, 0x800) 597.320328ms ago: executing program 3 (id=226): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x1, 0x4) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x1fc}, 0x1022d9, 0x1003, 0x20da, 0x0, 0xa, 0x80020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f1, 0x0) r1 = open$dir(&(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x10000, 0x101) unshare(0x20000400) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x1, 0x0) splice(r2, 0xfffffffffffffffc, r3, 0x0, 0x81, 0x2) mkdirat(r1, &(0x7f0000000180)='./file1\x00', 0x2) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000740)='./file1\x00', 0xc000, &(0x7f00000006c0), 0x2, 0x246, &(0x7f0000000ac0)="$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") creat(&(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) creat(&(0x7f0000000e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r4 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_DEL_MIF(r4, 0x29, 0xc8, 0x0, 0xc000000) setsockopt$MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) r5 = socket(0xa, 0x3, 0x3a) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800", @ANYBLOB="39b857"], 0x48) setsockopt$MRT6_FLUSH(r5, 0x29, 0xd4, &(0x7f0000000240)=0x2, 0x4) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) rename(&(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000f40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x101000, 0x108) getdents64(r6, &(0x7f0000000f80)=""/4096, 0x1000) 495.853186ms ago: executing program 3 (id=227): socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SET_KEEPCAPS(0x8, 0x2) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = fsopen(&(0x7f00000004c0)='nfs4\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000280)='./file0\x00', 0x201840, &(0x7f0000000580)=ANY=[@ANYRESHEX=r2, @ANYRES32, @ANYBLOB="53960530f140b974aecc2b5f951e412d3faac79a4867c509ccb420313d51f8ea53445ba06b95792a72b5c7b994dbf6695f66362afb5b5b89fda234ae9fdd522302ca24800d39e4adc2a81fce64cad075d8dacd24414348daa996489cc8cc4cc6800a78f695e9779c718ee6921b3c62652878562cc1a6a21aa38c598969dc94be40ac0fbbb75737c1fe603e0ed2202fa12a58598150fb2bdaa4944f752b45ddefe868d85715e1c77a18c722fecc77d402f8ad22e78f20c4c6ddb1c7f6ee1c37a0757c"], 0x1, 0x266, &(0x7f0000000700)="$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") sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xe723, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000400100004112200a4e2000001"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1, r4}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000340)={r5}, 0xc) close(0x3) r6 = socket$unix(0x1, 0x2, 0x0) bind$unix(r6, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$unix(0x1, 0x2, 0x0) r7 = socket$unix(0x1, 0x2, 0x0) connect$unix(r7, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 425.875313ms ago: executing program 0 (id=228): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000020303000000000000000000000100000800010001"], 0x1c}}, 0x0) (async) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x1, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) (rerun: 32) r1 = getuid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000a80)=@delpolicy={0x254, 0x14, 0x1, 0x70bd28, 0x25dfdbfd, {{@in6=@mcast2, @in6=@empty, 0x4e23, 0x0, 0x4e21, 0x0, 0xa, 0x0, 0x60, 0x3c}, 0x6e6bb9}, [@migrate={0xe8, 0x11, [{@in=@dev={0xac, 0x14, 0x14, 0x23}, @in=@local, @in=@broadcast, @in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x3c, 0x0, 0x0, 0x3500, 0xa}, {@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@empty, @in=@rand_addr=0x64010100, @in6=@private2, 0x3c, 0x0, 0x0, 0x3501, 0x2, 0x2}, {@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@multicast1, @in=@broadcast, @in=@local, 0xff, 0x4, 0x0, 0x3506, 0xa, 0x2}]}, @replay_esn_val={0x20, 0x17, {0x1, 0x70bd2b, 0x70bd2d, 0x70bd2d, 0x70bd29, 0x6, [0x9]}}, @policy={0xac, 0x7, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21, 0x8, 0x4e23, 0xacbc, 0xa, 0x20, 0x40, 0x3a, 0x0, r1}, {0x6, 0x81a2, 0x6, 0xfe0000000000000, 0x5, 0x1, 0xed, 0x2b}, {0x4, 0x6, 0x7}, 0x10001, 0x6e6bb8, 0x0, 0x1, 0x1, 0x2}}, @replay_esn_val={0x40, 0x17, {0x9, 0x70bd29, 0x70bd2d, 0x70bc26, 0x70bd25, 0x1, [0xffffffc0, 0xffff, 0x1, 0x10001, 0x7, 0x200, 0x401, 0x8, 0x1ff]}}, @replay_val={0x10, 0xa, {0x70bd25, 0x70bd2d, 0x2c}}]}, 0x254}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) (async, rerun: 64) sendmsg$inet(r2, &(0x7f0000000480)={&(0x7f0000000000)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f00000001c0)="91cfdfefdb", 0x1a000}], 0x1}, 0x0) (async, rerun: 64) sendmsg$rds(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x801}, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000d80)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000500)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) unshare(0x400) (async) bpf$MAP_CREATE_TAIL_CALL(0x9, &(0x7f0000000380), 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, 0x2, 0x3, 0x3, 0x0, 0x0, {0x0, 0x0, 0x10}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x1c}}, 0x0) (async) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r4, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x2, 0x4}}, 0x10) (async) r5 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000140)={0x10000042, 0x0, 0x2}, 0x10) r6 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r6, &(0x7f0000000380)={&(0x7f0000000140)=@name={0x1e, 0x2, 0x0, {{0x42, 0x4}}}, 0x10, 0x0}, 0x0) (async) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000058000000030a0102000000000000000001000000090003803d2175fbe782c2002c00048008000240172af2e40800014000000003080002401c791e7108000240423930ce08000140000000030900010073797a3000"], 0x122}}, 0x0) (async, rerun: 32) r7 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r7) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) rt_sigqueueinfo(0xffffffffffffffff, 0x37, &(0x7f0000000640)={0x33, 0x8, 0x738}) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@restrict={0x7}, @const={0x4, 0x0, 0x0, 0xa, 0x3}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x32, 0x0, 0x76, 0x1}]}, {0x0, [0x30, 0x0]}}, &(0x7f00000001c0)=""/2, 0x44, 0x2, 0x1, 0x39a3}, 0x28) (rerun: 32) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000080)='lp', 0x2) 370.306247ms ago: executing program 0 (id=229): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = epoll_create1(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)={0x30000004}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000000)={0xa0000001}) epoll_pwait(r3, &(0x7f0000000600)=[{}], 0x1, 0x7c0e, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 220.911131ms ago: executing program 1 (id=230): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_setup(0x237, &(0x7f0000000480)={0x0, 0x8901, 0x400, 0x0, 0x2cf}, &(0x7f0000000040), &(0x7f0000000600)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='3'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000000)=0xdcd5, 0x4) setsockopt$inet6_int(r1, 0x29, 0x8, &(0x7f0000000080)=0xf2b, 0x4) r2 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10, 0x0}, 0x300060c1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000000540)={0x28, r4, 0x1, 0x21, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x11a, 0x20016}}}}, [@NL80211_ATTR_IE_ASSOC_RESP={0x7, 0xe, [@erp={0x2a, 0x1, {0x0, 0x1, 0x1}}]}]}, 0x28}}, 0x4014080) setsockopt$sock_int(r2, 0x1, 0x9, &(0x7f00000001c0)=0x4, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) setsockopt$sock_int(r2, 0x1, 0x9, &(0x7f0000000300)=0xa, 0x4) getsockopt$inet6_buf(r1, 0x29, 0x6, &(0x7f0000001500)=""/17, &(0x7f00000000c0)=0x11) 163.147866ms ago: executing program 1 (id=231): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xf, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x8010) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x27}, 0x94) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000200)={0x7, 0x80d, 0xfffffbff}) syz_open_dev$tty20(0xc, 0x4, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5432, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, 0x0, 0x4000850) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xff00, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) r4 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r4, &(0x7f00000001c0)=@name={0x1e, 0x2, 0x3, {{0x2, 0x2}}}, 0x10) ioctl$XFS_IOC_ATTRLIST_BY_HANDLE(0xffffffffffffffff, 0x4058587a, &(0x7f0000000400)={{r4, &(0x7f0000000100)='devlink\x00', 0x2400, &(0x7f0000000180)={@align=0x9, {0x3ff, 0x3, 0x1, 0xe9}}, 0xffff, &(0x7f0000000280)={@_ha_fsid}, &(0x7f00000002c0)=0x1}, {[0x0, 0xf3c, 0x2, 0x1]}, 0x5, 0x2, &(0x7f00000003c0)=""/2}) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0x100b, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) unshare(0x20000680) r5 = socket$qrtr(0x2a, 0x2, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000080)=ANY=[@ANYBLOB="fffffffffff5aa6de9053a41321e3e6c04e5b6ee23e122aaaaaaaa000800451b005c00000000002f90785f00000000c30000e310000800000086dd0001007f080088be0000000010008000010000c3692ace70e7ce14eb000000012000c0000200000001000000000000"], 0x0) bind$qrtr(r5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$tipc(0x1e, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x99, 0x0, 0x0, 0x0, 0x0, 0x80000000000003, 0x86a2, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x8001, 0x0, 0x0, 0x0, 0x98}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) getsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x89, 0x0, &(0x7f00000000c0)=0xfffffffffffffde1) 162.652766ms ago: executing program 0 (id=232): r0 = socket(0x10, 0x803, 0x0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000000)='./file2\x00', 0x101c08a, &(0x7f0000000180)=ANY=[@ANYBLOB="7379735f696d6d757461626c652c757466383d312c696f636861727365743d61736369692c73686f72746e616d653d77696e39352c73686f77657865632c6e66732c636865636b3d7374726963742c756e695f786c6174653d302c757466383d312c73686f72746e616d653d6c6f7765722c73686f72746e616d653d6c6f7765722c726f6469722c726f6469722c64656275672c757466383d302c726f6469722c71756965742c6572726f72733d72656d6f756e742d726f2c009c8a8fc4f74784ad79ec08fb556262ebc972ef94821f3565ef5f75f11e30ef1f72a065c510b17cae352940538b7b2c5d72f4627c25306b2479725add28f511a68f5f6f47f9facdd0cc574286d00ab52d4e9f3570a58eac694336ebe971f41860d01084c1a0fa6b51d80fa9f9d2c5a2e7a5284f93296217ef8f28e0a36e573296a0bfb38b94191f4b82873563f3759b5e193ecfab6ed7892542364757e47d656ad6a0fbb6e8bf138bddae620a3602991821d4844f628e6bdd8b62cca73744332f0185a54b", @ANYRES32], 0x0, 0x2ce, &(0x7f0000000340)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x119) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r1, 0x40047211, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) r2 = socket$key(0xf, 0x3, 0x2) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r2) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00', 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @private2, 0x2}, 0x1c) bind$xdp(r4, &(0x7f00000002c0)={0x2c, 0x2, 0x0, 0x33, r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'\x00', 0x5}) r6 = syz_io_uring_setup(0x8d6, &(0x7f00000000c0)={0x0, 0x0, 0x400, 0xfffffffe, 0x378}, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f0000000240)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r6, 0x47ba, 0x3e82, 0x60, 0x0, 0x0) 38.183107ms ago: executing program 1 (id=233): r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x40, @empty}, 0x1c) 37.375557ms ago: executing program 0 (id=234): newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) setresuid(r0, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000007910a800000000405500ffff000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 7.061299ms ago: executing program 1 (id=235): r0 = socket(0x10, 0x2, 0x0) r1 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRESDEC=r1, @ANYRES32=r3, @ANYBLOB="0006000000000000240012800b00010067656e657665000014000280060005004e24000008000b"], 0x94}, 0x1, 0x2}, 0x814) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x5, 0x4, 0x8, 0xf}, 0x50) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000500)={r5}, 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x100, 0x100, 0x4, [@type_tag={0x3, 0x0, 0x0, 0x12, 0x4}, @fwd={0xb}, @func={0xa, 0x0, 0x0, 0xc, 0x4}, @union={0x0, 0x8, 0x0, 0x5, 0x0, 0x7fff, [{0xb, 0x4, 0xd}, {0x10, 0x0, 0xf}, {0x4, 0x5, 0x4}, {0xe, 0x0, 0x2}, {0xf, 0x2, 0x10001}, {0x3, 0x3}, {0x1, 0x0, 0xe}, {0xb, 0x4, 0x8}]}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x2, 0x4}, {0x5}, {0x8}, {0xa}, {0xf, 0x5}, {0x10, 0x5}, {0x1, 0x1}, {0xc, 0x3}, {0x7}]}, @float={0x4, 0x0, 0x0, 0x10, 0x2}, @decl_tag={0x7, 0x0, 0x0, 0x11, 0x5, 0xa}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000340)=""/146, 0x11c, 0x92, 0x1, 0x1ff8000}, 0x28) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0x12, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x100}, [@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0x22, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r7, r4}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) fstat(r8, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r9) quotactl_fd$Q_GETFMT(r0, 0xffffffff80000400, r9, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000140)=ANY=[@ANYBLOB="44000000100005ff00000002ffdbdf250000004a", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800900010076657468000000000400028008001300", @ANYRES32=r1], 0x44}}, 0x8000000) 0s ago: executing program 0 (id=236): fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000240)={0x0, 0x2, 0x74c0, 0xfffffffffffffbff, r0}) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x1, 0x0, 0x7, 0x2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0xb, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x30e600, 0x1002, 0x20da, 0x0, 0xa, 0x20008, 0xb, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$igmp(0x2, 0x3, 0x2) timerfd_create(0x5, 0x81000) keyctl$set_reqkey_keyring(0xe, 0x5) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.53' (ED25519) to the list of known hosts. [ 36.310188][ T28] audit: type=1400 audit(1771910860.911:62): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 36.333237][ T28] audit: type=1400 audit(1771910860.931:63): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 36.335458][ T3303] cgroup: Unknown subsys name 'net' [ 36.361011][ T28] audit: type=1400 audit(1771910860.971:64): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 36.436994][ T3303] cgroup: Unknown subsys name 'cpuset' [ 36.443203][ T3303] cgroup: Unknown subsys name 'rlimit' [ 36.554804][ T28] audit: type=1400 audit(1771910861.151:65): avc: denied { setattr } for pid=3303 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 36.586822][ T28] audit: type=1400 audit(1771910861.151:66): avc: denied { create } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.607747][ T28] audit: type=1400 audit(1771910861.151:67): avc: denied { write } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.628276][ T28] audit: type=1400 audit(1771910861.151:68): avc: denied { read } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.635288][ T3306] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 36.649048][ T28] audit: type=1400 audit(1771910861.151:69): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 36.682810][ T28] audit: type=1400 audit(1771910861.151:70): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 36.706331][ T28] audit: type=1400 audit(1771910861.191:71): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 36.743070][ T3303] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 38.662098][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 38.699829][ T3325] chnl_net:caif_netlink_parms(): no params data found [ 38.724689][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 38.764270][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.771533][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.778995][ T3316] bridge_slave_0: entered allmulticast mode [ 38.785531][ T3316] bridge_slave_0: entered promiscuous mode [ 38.810772][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.818101][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.825270][ T3316] bridge_slave_1: entered allmulticast mode [ 38.832064][ T3316] bridge_slave_1: entered promiscuous mode [ 38.840858][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 38.902382][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.921407][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.928638][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.935753][ T3315] bridge_slave_0: entered allmulticast mode [ 38.942230][ T3315] bridge_slave_0: entered promiscuous mode [ 38.954133][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.968661][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 38.982539][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.989775][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.997168][ T3315] bridge_slave_1: entered allmulticast mode [ 39.003602][ T3315] bridge_slave_1: entered promiscuous mode [ 39.031659][ T3325] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.038889][ T3325] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.046118][ T3325] bridge_slave_0: entered allmulticast mode [ 39.052674][ T3325] bridge_slave_0: entered promiscuous mode [ 39.063419][ T3325] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.070635][ T3325] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.077868][ T3325] bridge_slave_1: entered allmulticast mode [ 39.084462][ T3325] bridge_slave_1: entered promiscuous mode [ 39.091813][ T3316] team0: Port device team_slave_0 added [ 39.103497][ T3316] team0: Port device team_slave_1 added [ 39.115208][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 39.126623][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.155171][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.162354][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.169603][ T3319] bridge_slave_0: entered allmulticast mode [ 39.176058][ T3319] bridge_slave_0: entered promiscuous mode [ 39.198389][ T3325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 39.210224][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.217446][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.224668][ T3319] bridge_slave_1: entered allmulticast mode [ 39.231275][ T3319] bridge_slave_1: entered promiscuous mode [ 39.237943][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.244914][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 39.270934][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.282773][ T3315] team0: Port device team_slave_0 added [ 39.289668][ T3325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.306517][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.313493][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 39.340162][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.351716][ T3315] team0: Port device team_slave_1 added [ 39.392882][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 39.403766][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.413759][ T3325] team0: Port device team_slave_0 added [ 39.419684][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.426826][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 39.453104][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.469218][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.476461][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.483602][ T3320] bridge_slave_0: entered allmulticast mode [ 39.490134][ T3320] bridge_slave_0: entered promiscuous mode [ 39.501060][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.508387][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.515541][ T3320] bridge_slave_1: entered allmulticast mode [ 39.522069][ T3320] bridge_slave_1: entered promiscuous mode [ 39.529329][ T3325] team0: Port device team_slave_1 added [ 39.539529][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.546526][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 39.572594][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.604364][ T3316] hsr_slave_0: entered promiscuous mode [ 39.610468][ T3316] hsr_slave_1: entered promiscuous mode [ 39.626124][ T3319] team0: Port device team_slave_0 added [ 39.636602][ T3325] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.643600][ T3325] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 39.669629][ T3325] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.681535][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 39.692118][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.702856][ T3319] team0: Port device team_slave_1 added [ 39.727622][ T3325] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.734607][ T3325] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 39.760663][ T3325] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.797957][ T3320] team0: Port device team_slave_0 added [ 39.808389][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.815350][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 39.841575][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.853655][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.860767][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 39.886946][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.899901][ T3315] hsr_slave_0: entered promiscuous mode [ 39.905903][ T3315] hsr_slave_1: entered promiscuous mode [ 39.911755][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 39.917649][ T3315] Cannot create hsr debugfs directory [ 39.923903][ T3320] team0: Port device team_slave_1 added [ 39.962679][ T3325] hsr_slave_0: entered promiscuous mode [ 39.968748][ T3325] hsr_slave_1: entered promiscuous mode [ 39.974714][ T3325] debugfs: 'hsr0' already exists in 'hsr' [ 39.980484][ T3325] Cannot create hsr debugfs directory [ 39.996899][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.003937][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 40.030141][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 40.041417][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 40.048596][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 40.074980][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 40.102560][ T3319] hsr_slave_0: entered promiscuous mode [ 40.108835][ T3319] hsr_slave_1: entered promiscuous mode [ 40.114689][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 40.120503][ T3319] Cannot create hsr debugfs directory [ 40.183020][ T3320] hsr_slave_0: entered promiscuous mode [ 40.189261][ T3320] hsr_slave_1: entered promiscuous mode [ 40.195282][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 40.201396][ T3320] Cannot create hsr debugfs directory [ 40.349668][ T3316] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 40.361104][ T3316] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 40.372279][ T3316] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 40.381155][ T3316] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 40.399806][ T3325] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 40.409829][ T3325] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 40.420737][ T3325] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 40.431887][ T3325] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 40.457935][ T3315] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 40.467201][ T3315] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 40.482838][ T3315] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 40.495348][ T3315] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 40.530635][ T3320] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 40.540661][ T3320] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 40.550104][ T3320] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 40.559049][ T3320] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 40.607062][ T3319] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 40.616825][ T3319] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 40.638230][ T3319] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 40.648168][ T3319] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 40.671519][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.691669][ T3325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.710785][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.720337][ T3325] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.741715][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.748788][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.758374][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.765435][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.777379][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.784469][ T405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.793562][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.800667][ T405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.810669][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.821907][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.849920][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.863456][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.870609][ T405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.893143][ T3325] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.905689][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.916877][ T405] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.923940][ T405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.940450][ T405] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.947617][ T405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.959888][ T3316] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.987420][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 41.005712][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.012897][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.050863][ T3320] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 41.076273][ T3325] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.111042][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 41.127686][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.138226][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.145303][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.160757][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.167912][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.213104][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.235860][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.324800][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.348319][ T3325] veth0_vlan: entered promiscuous mode [ 41.370711][ T3315] veth0_vlan: entered promiscuous mode [ 41.396632][ T3315] veth1_vlan: entered promiscuous mode [ 41.407525][ T3325] veth1_vlan: entered promiscuous mode [ 41.432243][ T3316] veth0_vlan: entered promiscuous mode [ 41.445647][ T3315] veth0_macvtap: entered promiscuous mode [ 41.457526][ T3316] veth1_vlan: entered promiscuous mode [ 41.467795][ T3315] veth1_macvtap: entered promiscuous mode [ 41.478391][ T3325] veth0_macvtap: entered promiscuous mode [ 41.492849][ T3325] veth1_macvtap: entered promiscuous mode [ 41.502601][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.535954][ T3325] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.555381][ T3325] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.568229][ T3316] veth0_macvtap: entered promiscuous mode [ 41.580000][ T405] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.589370][ T405] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.601327][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.614031][ T3320] veth0_vlan: entered promiscuous mode [ 41.620099][ T405] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.628988][ T405] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.638651][ T3316] veth1_macvtap: entered promiscuous mode [ 41.647098][ T405] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.670358][ T3319] veth0_vlan: entered promiscuous mode [ 41.676960][ T405] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.694455][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 41.694469][ T28] audit: type=1400 audit(1771910866.291:85): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/root/syzkaller.KzTAVC/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 41.699676][ T3320] veth1_vlan: entered promiscuous mode [ 41.724716][ T28] audit: type=1400 audit(1771910866.301:86): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 41.730224][ T405] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.736004][ T28] audit: type=1400 audit(1771910866.301:87): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/root/syzkaller.KzTAVC/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 41.755433][ T405] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.764734][ T28] audit: type=1400 audit(1771910866.301:88): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 41.789963][ T3319] veth1_vlan: entered promiscuous mode [ 41.816016][ T28] audit: type=1400 audit(1771910866.301:89): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/root/syzkaller.KzTAVC/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 41.863972][ T3325] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 41.883982][ T28] audit: type=1400 audit(1771910866.301:90): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/root/syzkaller.KzTAVC/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3685 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 41.892188][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.920571][ T28] audit: type=1400 audit(1771910866.301:91): avc: denied { unmount } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 41.935726][ T3319] veth0_macvtap: entered promiscuous mode [ 41.946218][ T28] audit: type=1400 audit(1771910866.331:92): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 41.986328][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.012079][ T28] audit: type=1400 audit(1771910866.331:93): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="gadgetfs" ino=3686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 42.034497][ T30] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.044424][ T30] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.053445][ T28] audit: type=1400 audit(1771910866.571:94): avc: denied { read write } for pid=3325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 42.083775][ T3320] veth0_macvtap: entered promiscuous mode [ 42.105564][ T3491] random: crng reseeded on system resumption [ 42.108949][ T3319] veth1_macvtap: entered promiscuous mode [ 42.139826][ T30] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.152770][ T3320] veth1_macvtap: entered promiscuous mode [ 42.167859][ T3491] netlink: 40 bytes leftover after parsing attributes in process `syz.2.3'. [ 42.192379][ T30] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.210699][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.275784][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.292558][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.305361][ T405] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.315196][ T405] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.420370][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.465102][ T2313] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.484566][ C1] hrtimer: interrupt took 16745 ns [ 42.491273][ T2313] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.569570][ T2313] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.666490][ T2313] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.741767][ T2313] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.821579][ T2313] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 43.054866][ T3523] random: crng reseeded on system resumption [ 43.065352][ T3523] netlink: 40 bytes leftover after parsing attributes in process `syz.0.12'. [ 43.155979][ T3531] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 43.201409][ T3536] IPVS: sync thread started: state = MASTER, mcast_ifn = bridge_slave_1, syncid = 4, id = 0 [ 43.213945][ T3535] ======================================================= [ 43.213945][ T3535] WARNING: The mand mount option has been deprecated and [ 43.213945][ T3535] and is ignored by this kernel. Remove the mand [ 43.213945][ T3535] option from the mount to silence this warning. [ 43.213945][ T3535] ======================================================= [ 43.258889][ T3535] 9p: Invalid gid '0x00000000ffffffff' [ 43.275858][ T3535] loop2: detected capacity change from 0 to 512 [ 43.285884][ T3535] EXT4-fs: Ignoring removed mblk_io_submit option [ 43.306915][ T3535] EXT4-fs (loop2): 1 truncate cleaned up [ 43.323399][ T3535] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 43.380735][ T3542] loop0: detected capacity change from 0 to 2048 [ 43.392649][ T3315] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.402624][ T3542] EXT4-fs: Mount option(s) incompatible with ext2 [ 43.609913][ T3551] loop2: detected capacity change from 0 to 512 [ 43.651218][ T3551] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 43.673339][ T3551] EXT4-fs (loop2): orphan cleanup on readonly fs [ 43.683825][ T3530] loop4: detected capacity change from 0 to 1024 [ 43.691293][ T3551] EXT4-fs warning (device loop2): ext4_enable_quotas:7236: Failed to enable quota tracking (type=2, err=-22, ino=15). Please run e2fsck to fix. [ 43.708218][ T3557] tap0: tun_chr_ioctl cmd 1074025673 [ 43.713870][ T3551] EXT4-fs (loop2): Cannot turn on quotas: error -22 [ 43.723097][ T3530] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 43.755237][ T3551] EXT4-fs error (device loop2): ext4_ext_check_inode:521: inode #13: comm syz.2.20: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 43.780195][ T3551] loop2: lost file I/O error report for ino 13 type 5 pos 0x0 len 0x0 error -117 [ 43.780452][ T3551] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.20: couldn't read orphan inode 13 (err -117) [ 43.789693][ C1] EXT4-fs (loop2): error count since last fsck: 1 [ 43.789720][ C1] EXT4-fs (loop2): last error at time 1771910868: ext4_ext_check_inode:521: inode 13 [ 43.830093][ T3551] loop2: lost filesystem error report for type 5 error -117 [ 43.830780][ T3551] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 43.877839][ T3551] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 43.907547][ T3551] EXT4-fs (loop2): warning: mounting fs with errors, running e2fsck is recommended [ 43.956563][ T3551] EXT4-fs warning (device loop2): ext4_enable_quotas:7236: Failed to enable quota tracking (type=2, err=-22, ino=15). Please run e2fsck to fix. [ 43.984600][ T3320] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.042842][ T3315] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.089705][ T3568] loop1: detected capacity change from 0 to 512 [ 44.152483][ T3568] EXT4-fs: Ignoring removed nobh option [ 44.198722][ T3568] EXT4-fs (loop1): orphan cleanup on readonly fs [ 44.233845][ T3568] EXT4-fs warning (device loop1): ext4_xattr_inode_get:560: inode #11: comm syz.1.25: EA inode hash validation failed [ 44.269948][ T3568] EXT4-fs warning (device loop1): ext4_expand_extra_isize_ea:2858: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 44.332614][ T3568] EXT4-fs error (device loop1): ext4_do_update_inode:5569: inode #15: comm syz.1.25: corrupted inode contents [ 44.345438][ T3568] loop1: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 44.346247][ C0] EXT4-fs (loop1): error count since last fsck: 1 [ 44.362739][ C0] EXT4-fs (loop1): initial error at time 1771910868: ext4_do_update_inode:5569: inode 15 [ 44.374439][ C0] EXT4-fs (loop1): last error at time 1771910868: ext4_do_update_inode:5569: inode 15 [ 44.392250][ T3568] EXT4-fs error (device loop1): ext4_dirty_inode:6450: inode #15: comm syz.1.25: mark_inode_dirty error [ 44.414778][ T3568] loop1: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 44.419096][ T3568] EXT4-fs error (device loop1): ext4_do_update_inode:5569: inode #15: comm syz.1.25: corrupted inode contents [ 44.434282][ T3592] 8021q: VLANs not supported on gre0 [ 44.449811][ T3568] loop1: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 44.452605][ T3568] EXT4-fs error (device loop1): ext4_xattr_delete_inode:2999: inode #15: comm syz.1.25: mark_inode_dirty error [ 44.479141][ T3568] loop1: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 44.484692][ T3568] EXT4-fs error (device loop1): ext4_xattr_delete_inode:3002: inode #15: comm syz.1.25: mark inode dirty (error -117) [ 44.516512][ T3568] loop1: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 44.517814][ T3568] EXT4-fs warning (device loop1): ext4_evict_inode:275: xattr delete (err -117) [ 44.540200][ T3568] EXT4-fs (loop1): 1 orphan inode deleted [ 44.551882][ T3568] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: none. [ 44.574849][ T3568] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.702673][ T3568] syz.1.25 (3568) used greatest stack depth: 10312 bytes left [ 45.050259][ T3642] netlink: 156 bytes leftover after parsing attributes in process `syz.3.53'. [ 45.106016][ T3648] netlink: 'syz.3.55': attribute type 1 has an invalid length. [ 45.113787][ T3648] netlink: 'syz.3.55': attribute type 2 has an invalid length. [ 45.343253][ T3673] syz.0.67 uses obsolete (PF_INET,SOCK_PACKET) [ 45.402757][ T3677] netlink: 156 bytes leftover after parsing attributes in process `syz.3.69'. [ 45.516851][ T3688] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.524145][ T3688] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.639000][ T3702] netlink: 4 bytes leftover after parsing attributes in process `syz.4.79'. [ 45.651259][ T3688] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 45.669178][ T3688] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 45.680827][ T3703] netlink: 8 bytes leftover after parsing attributes in process `syz.2.77'. [ 45.691913][ T3705] netlink: 8 bytes leftover after parsing attributes in process `syz.1.80'. [ 45.809742][ T405] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 45.827541][ T405] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 45.863164][ T405] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 45.888136][ T3707] debugfs: 'ttyS3' already exists in 'caif_serial' [ 45.914605][ T405] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 46.282469][ T3739] Zero length message leads to an empty skb [ 46.436331][ T3751] A link change request failed with some changes committed already. Interface batadv_slave_0 may have been left with an inconsistent configuration, please check. [ 46.541891][ T3764] netlink: 'syz.4.107': attribute type 1 has an invalid length. [ 46.621087][ T3773] FAULT_INJECTION: forcing a failure. [ 46.621087][ T3773] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 46.661646][ T3773] CPU: 1 UID: 0 PID: 3773 Comm: syz.2.110 Not tainted syzkaller #0 PREEMPT(full) [ 46.661685][ T3773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 46.661724][ T3773] Call Trace: [ 46.661731][ T3773] [ 46.661738][ T3773] __dump_stack+0x1d/0x30 [ 46.661777][ T3773] dump_stack_lvl+0x95/0xd0 [ 46.661809][ T3773] dump_stack+0x15/0x1b [ 46.661838][ T3773] should_fail_ex+0x263/0x280 [ 46.661947][ T3773] should_fail+0xb/0x20 [ 46.661972][ T3773] should_fail_usercopy+0x1a/0x20 [ 46.662003][ T3773] _copy_to_user+0x20/0xa0 [ 46.662038][ T3773] simple_read_from_buffer+0xb5/0x130 [ 46.662062][ T3773] proc_fail_nth_read+0x10e/0x150 [ 46.662122][ T3773] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 46.662159][ T3773] vfs_read+0x1ab/0x7f0 [ 46.662242][ T3773] ? __rcu_read_unlock+0x4e/0x70 [ 46.662265][ T3773] ? __fget_files+0x184/0x1c0 [ 46.662292][ T3773] ? mutex_lock+0x57/0x90 [ 46.662327][ T3773] ksys_read+0xdc/0x1a0 [ 46.662375][ T3773] __x64_sys_read+0x40/0x50 [ 46.662461][ T3773] x64_sys_call+0x2886/0x3020 [ 46.662521][ T3773] do_syscall_64+0x12c/0x370 [ 46.662566][ T3773] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 46.662601][ T3773] RIP: 0033:0x7f8c0dfecece [ 46.662621][ T3773] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 46.662643][ T3773] RSP: 002b:00007f8c0ca7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 46.662668][ T3773] RAX: ffffffffffffffda RBX: 00007f8c0ca7f6c0 RCX: 00007f8c0dfecece [ 46.662698][ T3773] RDX: 000000000000000f RSI: 00007f8c0ca7f0a0 RDI: 0000000000000004 [ 46.662711][ T3773] RBP: 00007f8c0ca7f090 R08: 0000000000000000 R09: 0000000000000000 [ 46.662722][ T3773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 46.662734][ T3773] R13: 00007f8c0e2a6038 R14: 00007f8c0e2a5fa0 R15: 00007ffcc05f1b48 [ 46.662752][ T3773] [ 46.696210][ T28] kauditd_printk_skb: 3419 callbacks suppressed [ 46.696340][ T28] audit: type=1400 audit(1771910871.309:3514): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 46.740254][ T3778] netlink: 8 bytes leftover after parsing attributes in process `syz.0.113'. [ 46.763494][ T28] audit: type=1400 audit(1771910871.319:3515): avc: denied { open } for pid=3763 comm="syz.4.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 46.813305][ T3778] bridge1: entered allmulticast mode [ 46.824740][ T28] audit: type=1400 audit(1771910871.319:3516): avc: denied { prog_load } for pid=3763 comm="syz.4.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 46.944086][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 46.950899][ T3040] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 46.958777][ T3040] audit: backlog limit exceeded [ 46.963917][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 46.970542][ T3040] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 46.986016][ T3040] audit: backlog limit exceeded [ 46.991243][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 47.054799][ T3789] batadv0: entered allmulticast mode [ 47.075092][ T3789] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 47.217731][ T3802] netlink: 16186 bytes leftover after parsing attributes in process `syz.2.121'. [ 47.229710][ T3804] netlink: 'syz.1.122': attribute type 3 has an invalid length. [ 47.240969][ T3804] netlink: 'syz.1.122': attribute type 4 has an invalid length. [ 47.261145][ T3804] netlink: 9067 bytes leftover after parsing attributes in process `syz.1.122'. [ 47.371674][ T3821] netlink: 'syz.0.130': attribute type 2 has an invalid length. [ 47.414687][ T3821] netlink: 132 bytes leftover after parsing attributes in process `syz.0.130'. [ 47.483511][ T3833] netlink: 80 bytes leftover after parsing attributes in process `syz.0.133'. [ 47.505890][ T3833] netlink: 16 bytes leftover after parsing attributes in process `syz.0.133'. [ 47.559524][ T3833] geneve0: entered allmulticast mode [ 47.580668][ T3833] netlink: 8 bytes leftover after parsing attributes in process `syz.0.133'. [ 47.596286][ T3839] FAULT_INJECTION: forcing a failure. [ 47.596286][ T3839] name failslab, interval 1, probability 0, space 0, times 1 [ 47.611210][ T3845] capability: warning: `syz.3.139' uses deprecated v2 capabilities in a way that may be insecure [ 47.624768][ T3833] bond1: Unable to set down delay as MII monitoring is disabled [ 47.634301][ T3833] bond1 (unregistering): Released all slaves [ 47.666945][ T3839] CPU: 1 UID: 0 PID: 3839 Comm: syz.1.134 Not tainted syzkaller #0 PREEMPT(full) [ 47.667001][ T3839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 47.667061][ T3839] Call Trace: [ 47.667069][ T3839] [ 47.667078][ T3839] __dump_stack+0x1d/0x30 [ 47.667121][ T3839] dump_stack_lvl+0x95/0xd0 [ 47.667151][ T3839] dump_stack+0x15/0x1b [ 47.667179][ T3839] should_fail_ex+0x263/0x280 [ 47.667206][ T3839] should_failslab+0x8c/0xb0 [ 47.667244][ T3839] kmem_cache_alloc_noprof+0x66/0x400 [ 47.667278][ T3839] ? security_inode_alloc+0x37/0x100 [ 47.667313][ T3839] security_inode_alloc+0x37/0x100 [ 47.667414][ T3839] inode_init_always_gfp+0x4b7/0x500 [ 47.667444][ T3839] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 47.667473][ T3839] alloc_inode+0x58/0x170 [ 47.667540][ T3839] new_inode+0x1d/0xe0 [ 47.667570][ T3839] shmem_get_inode+0x246/0x750 [ 47.667645][ T3839] __shmem_file_setup+0x112/0x210 [ 47.667671][ T3839] shmem_file_setup+0x3b/0x50 [ 47.667701][ T3839] memfd_alloc_file+0x4e/0x300 [ 47.667820][ T3839] __se_sys_memfd_create+0x2e1/0x3b0 [ 47.667865][ T3839] __x64_sys_memfd_create+0x31/0x40 [ 47.667907][ T3839] x64_sys_call+0x1f22/0x3020 [ 47.667966][ T3839] do_syscall_64+0x12c/0x370 [ 47.668013][ T3839] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 47.668044][ T3839] RIP: 0033:0x7fdab977c629 [ 47.668095][ T3839] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 47.668169][ T3839] RSP: 002b:00007fdab81ade08 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 47.668194][ T3839] RAX: ffffffffffffffda RBX: 0000000000000783 RCX: 00007fdab977c629 [ 47.668212][ T3839] RDX: 00007fdab81adee0 RSI: 0000000000000000 RDI: 00007fdab9812d19 [ 47.668287][ T3839] RBP: 0000200000001340 R08: 00000000ffffffff R09: 0000000000000000 [ 47.668303][ T3839] R10: 0000000000000001 R11: 0000000000000202 R12: 00002000000007c0 [ 47.668317][ T3839] R13: 00007fdab81adee0 R14: 00007fdab81adea0 R15: 0000200000000a00 [ 47.668336][ T3839] [ 48.142095][ T3866] netlink: 28 bytes leftover after parsing attributes in process `syz.4.149'. [ 48.177112][ T3866] netlink: 28 bytes leftover after parsing attributes in process `syz.4.149'. [ 48.510444][ T3888] netlink: 'syz.4.156': attribute type 21 has an invalid length. [ 48.776048][ T3888] netlink: 132 bytes leftover after parsing attributes in process `syz.4.156'. [ 49.335990][ T3914] netlink: 'syz.1.166': attribute type 13 has an invalid length. [ 49.387259][ T3915] netlink: 'syz.1.166': attribute type 1 has an invalid length. [ 49.465192][ T3914] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.472488][ T3914] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.498750][ T3921] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3921 comm=syz.1.166 [ 49.527987][ T3922] FAULT_INJECTION: forcing a failure. [ 49.527987][ T3922] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 49.569485][ T3922] CPU: 0 UID: 0 PID: 3922 Comm: syz.2.168 Not tainted syzkaller #0 PREEMPT(full) [ 49.569552][ T3922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 49.569569][ T3922] Call Trace: [ 49.569577][ T3922] [ 49.569587][ T3922] __dump_stack+0x1d/0x30 [ 49.569622][ T3922] dump_stack_lvl+0x95/0xd0 [ 49.569653][ T3922] dump_stack+0x15/0x1b [ 49.569728][ T3922] should_fail_ex+0x263/0x280 [ 49.569801][ T3922] should_fail+0xb/0x20 [ 49.569825][ T3922] should_fail_usercopy+0x1a/0x20 [ 49.569855][ T3922] _copy_from_iter+0xcf/0xea0 [ 49.569883][ T3922] ? alloc_pages_mpol+0x217/0x260 [ 49.569956][ T3922] copy_page_from_iter+0x178/0x2a0 [ 49.569984][ T3922] tun_get_user+0xbbd/0x27c0 [ 49.570013][ T3922] ? ref_tracker_alloc+0x1eb/0x2f0 [ 49.570054][ T3922] tun_chr_write_iter+0x15e/0x210 [ 49.570093][ T3922] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 49.570197][ T3922] vfs_write+0x5a6/0x9f0 [ 49.570294][ T3922] ksys_write+0xdc/0x1a0 [ 49.570330][ T3922] __x64_sys_write+0x40/0x50 [ 49.570372][ T3922] x64_sys_call+0x27e1/0x3020 [ 49.570503][ T3922] do_syscall_64+0x12c/0x370 [ 49.570542][ T3922] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 49.570577][ T3922] RIP: 0033:0x7f8c0dfecece [ 49.570668][ T3922] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 49.570688][ T3922] RSP: 002b:00007f8c0ca7efb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 49.570751][ T3922] RAX: ffffffffffffffda RBX: 00007f8c0ca7f6c0 RCX: 00007f8c0dfecece [ 49.570767][ T3922] RDX: 000000000000005a RSI: 00002000000004c0 RDI: 00000000000000c8 [ 49.570782][ T3922] RBP: 00007f8c0ca7f090 R08: 0000000000000000 R09: 0000000000000000 [ 49.570796][ T3922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 49.570838][ T3922] R13: 00007f8c0e2a6038 R14: 00007f8c0e2a5fa0 R15: 00007ffcc05f1b48 [ 49.570859][ T3922] [ 49.813248][ T3914] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 49.868981][ T3914] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 49.890031][ T3925] x_tables: duplicate underflow at hook 1 [ 50.099510][ T405] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 50.118374][ T405] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 50.138754][ T405] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 50.198277][ T405] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 50.304533][ T3947] FAULT_INJECTION: forcing a failure. [ 50.304533][ T3947] name failslab, interval 1, probability 0, space 0, times 0 [ 50.335995][ T3947] CPU: 1 UID: 0 PID: 3947 Comm: syz.2.177 Not tainted syzkaller #0 PREEMPT(full) [ 50.336027][ T3947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 50.336082][ T3947] Call Trace: [ 50.336090][ T3947] [ 50.336098][ T3947] __dump_stack+0x1d/0x30 [ 50.336124][ T3947] dump_stack_lvl+0x95/0xd0 [ 50.336149][ T3947] dump_stack+0x15/0x1b [ 50.336192][ T3947] should_fail_ex+0x263/0x280 [ 50.336213][ T3947] ? getname_long+0x32/0x100 [ 50.336323][ T3947] should_failslab+0x8c/0xb0 [ 50.336394][ T3947] __kmalloc_cache_noprof+0x5f/0x410 [ 50.336422][ T3947] ? should_fail_usercopy+0x1a/0x20 [ 50.336495][ T3947] getname_long+0x32/0x100 [ 50.336519][ T3947] do_getname+0x12e/0x1c0 [ 50.336540][ T3947] __se_sys_symlink+0x2f/0x1b0 [ 50.336565][ T3947] __x64_sys_symlink+0x31/0x40 [ 50.336658][ T3947] x64_sys_call+0x2465/0x3020 [ 50.336691][ T3947] do_syscall_64+0x12c/0x370 [ 50.336735][ T3947] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 50.336770][ T3947] RIP: 0033:0x7f8c0e02c629 [ 50.336829][ T3947] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 50.336846][ T3947] RSP: 002b:00007f8c0ca7f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 50.336918][ T3947] RAX: ffffffffffffffda RBX: 00007f8c0e2a5fa0 RCX: 00007f8c0e02c629 [ 50.336999][ T3947] RDX: 0000000000000000 RSI: 0000200000000940 RDI: 0000200000000b00 [ 50.337017][ T3947] RBP: 00007f8c0ca7f090 R08: 0000000000000000 R09: 0000000000000000 [ 50.337033][ T3947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 50.337094][ T3947] R13: 00007f8c0e2a6038 R14: 00007f8c0e2a5fa0 R15: 00007ffcc05f1b48 [ 50.337174][ T3947] [ 50.689354][ T3976] bond1: option miimon: invalid value (18446744073709551615) [ 50.703869][ T3976] bond1: option miimon: allowed values 0 - 2147483647 [ 50.717260][ T3976] bond1 (unregistering): Released all slaves [ 51.263271][ T4018] netlink: 'syz.4.206': attribute type 10 has an invalid length. [ 51.288313][ T4018] macsec0: entered promiscuous mode [ 51.294423][ T4018] macsec0: entered allmulticast mode [ 51.308456][ T4018] veth1_macvtap: entered allmulticast mode [ 51.706254][ T28] kauditd_printk_skb: 18418 callbacks suppressed [ 51.706272][ T28] audit: type=1400 audit(1771910876.319:17814): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 51.752787][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 51.759486][ T28] audit: type=1400 audit(1771910876.339:17815): avc: denied { node_bind } for pid=4057 comm="syz.4.221" saddr=::ffff:224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=0 [ 51.781490][ T3040] audit: audit_lost=1377 audit_rate_limit=0 audit_backlog_limit=64 [ 51.789924][ T3040] audit: backlog limit exceeded [ 51.794923][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 51.802769][ T28] audit: type=1400 audit(1771910876.339:17816): avc: denied { read write } for pid=4055 comm="syz.0.220" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.818967][ T4061] audit: audit_backlog=65 > audit_backlog_limit=64 [ 51.828269][ T3040] audit: audit_lost=1378 audit_rate_limit=0 audit_backlog_limit=64 [ 51.841551][ T4062] audit: audit_backlog=65 > audit_backlog_limit=64 [ 52.555730][ T4065] ================================================================== [ 52.563888][ T4065] BUG: KCSAN: data-race in __filemap_remove_folio / folio_mapping [ 52.571740][ T4065] [ 52.574096][ T4065] write to 0xffffea000487f218 of 8 bytes by task 3908 on cpu 0: [ 52.581776][ T4065] __filemap_remove_folio+0x201/0x310 [ 52.587316][ T4065] filemap_remove_folio+0x6d/0x1d0 [ 52.592482][ T4065] truncate_inode_folio+0x42/0x50 [ 52.597558][ T4065] shmem_undo_range+0x26d/0xb10 [ 52.602446][ T4065] shmem_evict_inode+0x12e/0x510 [ 52.607523][ T4065] evict+0x2af/0x510 [ 52.611465][ T4065] iput+0x41a/0x580 [ 52.615295][ T4065] dentry_unlink_inode+0x24f/0x260 [ 52.620437][ T4065] __dentry_kill+0x13f/0x460 [ 52.625065][ T4065] finish_dput+0x2b/0x200 [ 52.629421][ T4065] dput+0x52/0x60 [ 52.633078][ T4065] __fput+0x444/0x650 [ 52.637090][ T4065] ____fput+0x1c/0x30 [ 52.641105][ T4065] task_work_run+0x130/0x1a0 [ 52.645717][ T4065] do_exit+0x466/0x15a0 [ 52.649910][ T4065] do_group_exit+0xfe/0x140 [ 52.654439][ T4065] get_signal+0xe54/0xf60 [ 52.658848][ T4065] arch_do_signal_or_restart+0x96/0x450 [ 52.664426][ T4065] irqentry_exit+0xf7/0x520 [ 52.668958][ T4065] asm_exc_page_fault+0x26/0x30 [ 52.673840][ T4065] [ 52.676180][ T4065] read to 0xffffea000487f218 of 8 bytes by task 4065 on cpu 1: [ 52.683737][ T4065] folio_mapping+0xa1/0xe0 [ 52.688187][ T4065] evict_folios+0x2b79/0x35c0 [ 52.693183][ T4065] try_to_shrink_lruvec+0x81b/0xbf0 [ 52.698418][ T4065] shrink_lruvec+0x255/0x1c60 [ 52.703135][ T4065] shrink_node+0x67a/0x2130 [ 52.707657][ T4065] do_try_to_free_pages+0x408/0xc80 [ 52.712886][ T4065] try_to_free_mem_cgroup_pages+0x1f5/0x470 [ 52.718825][ T4065] try_charge_memcg+0x37e/0xa10 [ 52.723709][ T4065] obj_cgroup_charge_pages+0x23/0xc0 [ 52.729017][ T4065] __memcg_kmem_charge_page+0x9e/0x170 [ 52.734500][ T4065] __alloc_frozen_pages_noprof+0x18a/0x360 [ 52.740338][ T4065] alloc_pages_mpol+0x1f6/0x260 [ 52.745212][ T4065] alloc_pages_noprof+0x8f/0x130 [ 52.750180][ T4065] __vmalloc_node_range_noprof+0xa46/0x12b0 [ 52.756101][ T4065] __kvmalloc_node_noprof+0x3d4/0x650 [ 52.761497][ T4065] futex_hash_allocate+0x190/0x9d0 [ 52.766722][ T4065] futex_hash_prctl+0xd8/0xf0 [ 52.771421][ T4065] __se_sys_prctl+0xa3d/0x13f0 [ 52.776207][ T4065] __x64_sys_prctl+0x67/0x80 [ 52.780831][ T4065] x64_sys_call+0x2533/0x3020 [ 52.785533][ T4065] do_syscall_64+0x12c/0x370 [ 52.790166][ T4065] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 52.796241][ T4065] [ 52.798584][ T4065] value changed: 0xffff88811ccd64d0 -> 0x0000000000000000 [ 52.805706][ T4065] [ 52.808043][ T4065] Reported by Kernel Concurrency Sanitizer on: [ 52.814206][ T4065] CPU: 1 UID: 0 PID: 4065 Comm: syz.2.224 Not tainted syzkaller #0 PREEMPT(full) [ 52.823437][ T4065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 52.833519][ T4065] ================================================================== [ 53.219879][ T4065] syz.2.224 (4065) used greatest stack depth: 8064 bytes left [ 56.715945][ T28] kauditd_printk_skb: 34982 callbacks suppressed [ 56.715963][ T28] audit: type=1400 audit(1771910881.319:51321): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 56.732646][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 56.746220][ T28] audit: type=1400 audit(1771910881.329:51322): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 56.750463][ T3040] audit: audit_lost=1872 audit_rate_limit=0 audit_backlog_limit=64 [ 56.771823][ T28] audit: type=1400 audit(1771910881.329:51323): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 56.779325][ T3040] audit: backlog limit exceeded [ 56.800657][ T28] audit: type=1400 audit(1771910881.329:51324): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 56.806431][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 56.827020][ T28] audit: type=1400 audit(1771910881.329:51325): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 56.833187][ T3040] audit: audit_lost=1873 audit_rate_limit=0 audit_backlog_limit=64 [ 61.726065][ T28] kauditd_printk_skb: 46145 callbacks suppressed [ 61.726103][ T28] audit: type=1400 audit(1771910886.339:97470): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 61.747120][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 61.754980][ T28] audit: type=1400 audit(1771910886.339:97471): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 61.760266][ T3040] audit: audit_lost=1874 audit_rate_limit=0 audit_backlog_limit=64 [ 61.783241][ T28] audit: type=1400 audit(1771910886.339:97472): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 61.789252][ T3040] audit: backlog limit exceeded [ 61.810748][ T28] audit: type=1400 audit(1771910886.339:97473): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 61.816771][ T3040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 61.836594][ T28] audit: type=1400 audit(1771910886.339:97474): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 61.843381][ T3040] audit: audit_lost=1875 audit_rate_limit=0 audit_backlog_limit=64