last executing test programs: 3.01388155s ago: executing program 0 (id=1): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xd, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0x8, 0xfff8, 0x110}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x7, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r3}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002100)={&(0x7f0000000180), 0x6e, &(0x7f0000002080)=[{0x0}], 0x1}, 0x2000) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r6, 0x40505330, &(0x7f00000001c0)={0x800100, 0xffffffff, 0x22, 0xe1d9, 0x1101, 0xff}) close_range(r5, 0xffffffffffffffff, 0x0) 2.802958517s ago: executing program 3 (id=4): openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @random="d09a80b38518", @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}, {0x0, 0x0, 0x0, @multicast2}}}}}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file1\x00', 0x0, &(0x7f0000000980), 0xfe, 0x250, &(0x7f0000000300)="$eJzs3T9oJFUcB/DvzO565m7RUxtB/AMiooFwdoLN2SgcyHGICCqciNgod8J5h11iZWOhtUoqmyB2RktJE2wUwSpqitgIGiwMFlqs7M4G8mc1ZnfdkcznA5OZybyZ3xt2vm+3ebsBGutskvNJWknmk3SSFHsb3FctZ4e7y3Prl5Ne7+lfi0G7ar+ye96ZJEtJHk2yVhZ5tZ3cWH1+6/eNJx9853rngY9Wn5ub6U0ObW9tPrXz4cW3P73wyI2vv/35YpHz6e67r+krRvyvXSS3/xfF/ieKdt094N+49OYn3/Vzf0eS+wf576RM9eK9e+2mtU4e/uDvzn3vl2/ummVfgenr9Tr998ClHtA4ZZJuinIhSbVdlgsL1Wf471uny9euXntj/pWr16+8XPdIBUxLN9l84vNTn505kP+fWlX+gZOrn/9nLq380N/eadXdG2Am7q5W/fzPv7j4UOQfGkf+obnkH5pL/qG55B+aS/6hueQfTrDOPx+Wf2gu+Yfmkn9orr35BwCapXdqnFnDt05/IjIwc3WPPwAAAAAAAAAAAAAAAAAAwGHLc+uXd5dxr1Ecs/2X7yfbjydpj6rfGvwecXLz4O/p34p+s3212uN2dOiFeye8wIQ+rnn29S0/1lv/q3vqrb94JVl6K8m5dvvw81cMn7/x3XbE8c5LExY4poP5fOzZ2dY/6M+Veutf2Ei+6I8/50aNP2XuHKxHjz/do79i+Uiv/zHhBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJiZvwIAAP//1rxsXQ==") creat(&(0x7f0000000e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x9) mknod$loop(&(0x7f00000009c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000, 0x1) creat(&(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) rename(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r0}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r3}, 0x38) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=ANY=[@ANYBLOB="380000005500e5022cbd70000000161307000000", @ANYRES32=0x0, @ANYBLOB="20dc45ddda403e76395169d18d1f3b9d4700e7ff", @ANYRES32=0x0, @ANYBLOB="00000ffe00"/24], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x0) r5 = syz_clone(0x800200, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) r6 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1d, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.625307002s ago: executing program 1 (id=2): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x1, @mcast1, 0x4}, 0x1c) r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_usb_connect(0x0, 0x10b, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x3c8, 0x0, 0xa, 0x148, 0x0, 0x10, 0x330, 0x2a8, 0x2a8, 0x330, 0x2a8, 0x3, 0x0, {[{{@ip={@rand_addr, @multicast1, 0x0, 0x0, 'bridge0\x00', 'rose0\x00'}, 0x0, 0x70, 0xe0, 0x0, {0x200003ae, 0x7f00}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f2f7b90ad2b60c45cb4ea6e7bf902bdc2ff8a9304d9f655c746adc0bdc773506378bc0d27efd6abb05175089830cc46186074d7de46d5af300"}}}, {{@ip={@empty, @local, 0x0, 0x0, 'ip6erspan0\x00', 'veth0_to_team\x00'}, 0x0, 0x1f0, 0x250, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'wg2\x00', {0xffffffffffffffff, 0xff, 0x0, 0x0, 0x0, 0x7fff, 0x200}}}, @inet=@rpfilter={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x2, 0x7, [0x0, 0x10, 0x1b, 0x2b, 0x37, 0x2e, 0x2b, 0x18, 0x2b, 0x34, 0xd, 0x0, 0x3d, 0x1, 0x32, 0x37], 0x1, 0x6, 0x1570000000000}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x428) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)=@base={0x12, 0x4, 0x4, 0x22}, 0x50) r3 = socket$inet(0x2, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r2, &(0x7f00000001c0), &(0x7f00000004c0)=@udp=r3}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r2, &(0x7f0000000280), &(0x7f0000000100)=@tcp=r3, 0x1}, 0x20) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000440)={'wpan4\x00'}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000000)=0x28, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0), 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000009c0)='ext4\x00', &(0x7f0000000540)='./file0\x00', 0x800718, &(0x7f0000000200)={[{@nodioread_nolock}, {@journal_dev={'journal_dev', 0x3d, 0x40000ff}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@nouid32}, {@resgid}, {@acl}, {@init_itable_val={'init_itable', 0x3d, 0x8d55}}]}, 0x0, 0x48d, &(0x7f0000000a00)="$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") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={0x1, 0xffffffffffffffff}, 0x4) r5 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffd, {0x0, 0x0, 0x0, r6, {0x0, 0xfff3}, {0xffff, 0xffff}, {0xffe0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x4c840) sendmsg$nl_route_sched(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000980)=@newtfilter={0x90, 0x2c, 0xf3f, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r6, {0xb, 0x7}, {0x0, 0xfff3}, {0xd, 0x4}}, [@filter_kind_options=@f_fw={{0x7}, {0x64, 0x2, [@TCA_FW_MASK={0x8, 0x5, 0x2980c}, @TCA_FW_ACT={0xffffffffffffff4f, 0x4, [@m_mpls={0x40, 0xb, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_MPLS_PROTO={0x6, 0x4, 0x883e}, @TCA_MPLS_PROTO={0x6, 0x4, 0x88a2}]}, {0x4}, {0xa, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}]}, @TCA_FW_INDEV={0x14, 0x3, 'veth1_to_team\x00'}]}}]}, 0x90}, 0x1, 0x0, 0x0, 0x20041090}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000004c0)={'sit0\x00', &(0x7f0000000580)={'gretap0\x00', 0x0, 0x7800, 0x700, 0x9, 0xfffff001, {{0x1c, 0x4, 0x1, 0x4, 0x70, 0x68, 0x0, 0x4, 0x2f, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x1c, 0xd, 0x1, 0x5, [{@multicast2, 0x2ec}, {@local, 0x9}, {@multicast1, 0x6}]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x39, 0x3, [{0x0, 0xf, "89e3b5e17ecd830102dda348db"}, {0x6, 0xc, "1d9c01cf5813f1a3744c"}, {0x6, 0x11, "ac04daf6da991fad3cc9bb53ab2921"}, {0x0, 0x4, "0deb"}, {0x5, 0x3, "94"}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x7ff, 0x7, 0x0, 0x20, r4, 0x7, '\x00', r7, 0xffffffffffffffff, 0x3, 0x0, 0x5, 0xc}, 0x50) 2.335169735s ago: executing program 2 (id=3): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x6, 0x0, 0x0, 0x8000000b, 0x42758, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x26d3, 0x6, 0x0, 0x0, 0x200, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r2, 0x0, {0x0, 0x0, 0x4}, 0xfe}, 0x18) renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xffffffffffffff9c, 0x0, 0x0) r3 = socket$inet(0x2, 0x3, 0x30) getsockopt$inet_mreqsrc(r3, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000080)=0x2c) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func={0x8, 0x0, 0x0, 0xc, 0x1}, @fwd={0x1}, @decl_tag={0xc, 0x0, 0x0, 0x11, 0x5, 0x4}, @float={0x10, 0x0, 0x0, 0x10, 0xc}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x9, 0x4}]}, @restrict={0xb, 0x0, 0x0, 0xb, 0x5}, @typedef={0x10, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x61, 0x5f, 0x0, 0x0, 0x61, 0x61, 0x30, 0x5f]}}, &(0x7f0000000300)=""/19, 0x82, 0x13, 0x1}, 0x28) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x7, 0x10000, 0x3, 0x2000, 0xffffffffffffffff, 0xe0, '\x00', r2, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0xb}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x4, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4816e4b8}, [@ldst={0x3, 0x2, 0x0, 0x8, 0xa, 0x0, 0x10}]}, &(0x7f0000000240)='GPL\x00', 0x3, 0x78, &(0x7f0000000280)=""/120, 0x41000, 0x22, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f00000004c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x9, 0x7ff, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r5], &(0x7f0000000600), 0x10, 0x5}, 0x94) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2={0xff, 0x3}}, 0x1c) sendmmsg$sock(r6, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}], 0x18}}], 0x1, 0x20000000) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x4048081) ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000000700)={0x1, "ef66a7e9c5c0496cef27aa576b1189c07dc6b4704b1fb3ffa35c7c45fe3ff4b1d0e5c263f8130a991fbe286c54b532370a7f5845ef44b94fac80e7cb67e01be238e722fd7a1732abd7461445a2254647a942ea998d7d67f10ec24ee3b5bd81bb0741a6d534fe2a60d20381d8f08096fa8ad1076dee8f30603123920c45b22f07"}) 1.950677289s ago: executing program 2 (id=6): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x1, @mcast1, 0x4}, 0x1c) r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_usb_connect(0x0, 0x10b, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x3c8, 0x0, 0xa, 0x148, 0x0, 0x10, 0x330, 0x2a8, 0x2a8, 0x330, 0x2a8, 0x3, 0x0, {[{{@ip={@rand_addr, @multicast1, 0x0, 0x0, 'bridge0\x00', 'rose0\x00'}, 0x0, 0x70, 0xe0, 0x0, {0x200003ae, 0x7f00}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f2f7b90ad2b60c45cb4ea6e7bf902bdc2ff8a9304d9f655c746adc0bdc773506378bc0d27efd6abb05175089830cc46186074d7de46d5af300"}}}, {{@ip={@empty, @local, 0x0, 0x0, 'ip6erspan0\x00', 'veth0_to_team\x00'}, 0x0, 0x1f0, 0x250, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'wg2\x00', {0xffffffffffffffff, 0xff, 0x0, 0x0, 0x0, 0x7fff, 0x200}}}, @inet=@rpfilter={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x2, 0x7, [0x0, 0x10, 0x1b, 0x2b, 0x37, 0x2e, 0x2b, 0x18, 0x2b, 0x34, 0xd, 0x0, 0x3d, 0x1, 0x32, 0x37], 0x1, 0x6, 0x1570000000000}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x428) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)=@base={0x12, 0x4, 0x4, 0x22}, 0x50) r3 = socket$inet(0x2, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r2, &(0x7f00000001c0), &(0x7f00000004c0)=@udp=r3}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r2, &(0x7f0000000280), &(0x7f0000000100)=@tcp=r3, 0x1}, 0x20) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000440)={'wpan4\x00'}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000000)=0x28, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0), 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000009c0)='ext4\x00', &(0x7f0000000540)='./file0\x00', 0x800718, &(0x7f0000000200)={[{@nodioread_nolock}, {@journal_dev={'journal_dev', 0x3d, 0x40000ff}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@nouid32}, {@resgid}, {@acl}, {@init_itable_val={'init_itable', 0x3d, 0x8d55}}]}, 0x0, 0x48d, &(0x7f0000000a00)="$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") bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={0x1, 0xffffffffffffffff}, 0x4) r5 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffd, {0x0, 0x0, 0x0, r6, {0x0, 0xfff3}, {0xffff, 0xffff}, {0xffe0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x4c840) sendmsg$nl_route_sched(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000980)=@newtfilter={0x90, 0x2c, 0xf3f, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r6, {0xb, 0x7}, {0x0, 0xfff3}, {0xd, 0x4}}, [@filter_kind_options=@f_fw={{0x7}, {0x64, 0x2, [@TCA_FW_MASK={0x8, 0x5, 0x2980c}, @TCA_FW_ACT={0xffffffffffffff4f, 0x4, [@m_mpls={0x40, 0xb, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_MPLS_PROTO={0x6, 0x4, 0x883e}, @TCA_MPLS_PROTO={0x6, 0x4, 0x88a2}]}, {0x4}, {0xa, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}]}, @TCA_FW_INDEV={0x14, 0x3, 'veth1_to_team\x00'}]}}]}, 0x90}, 0x1, 0x0, 0x0, 0x20041090}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000004c0)={'sit0\x00', &(0x7f0000000580)={'gretap0\x00', 0x0, 0x7800, 0x700, 0x9, 0xfffff001, {{0x1c, 0x4, 0x1, 0x4, 0x70, 0x68, 0x0, 0x4, 0x2f, 0x0, @broadcast, @broadcast, {[@timestamp_addr={0x44, 0x1c, 0xd, 0x1, 0x5, [{@multicast2, 0x2ec}, {@local, 0x9}, {@multicast1, 0x6}]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x39, 0x3, [{0x0, 0xf, "89e3b5e17ecd830102dda348db"}, {0x6, 0xc, "1d9c01cf5813f1a3744c"}, {0x6, 0x11, "ac04daf6da991fad3cc9bb53ab2921"}, {0x0, 0x4, "0deb"}, {0x5, 0x3, "94"}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x7ff, 0x7, 0x0, 0x20, r4, 0x7, '\x00', r7, 0xffffffffffffffff, 0x3, 0x0, 0x5, 0xc}, 0x50) 1.065449712s ago: executing program 0 (id=7): syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000540)='./file0\x00', 0x1204018, &(0x7f0000000240)=ANY=[@ANYBLOB="6f76657272696465726f636b7065726d2c6e6f636f6d70726573732c686964652c73657373696f6e3d3078303030303030303030303030303032312c756e686964652c696f636861727365743d63703433372c6f76657272696465726f636b7065726d2c626c6f636b3d3078303030303030303030303030303430302c005fb50aab29cf1d32d24be5ab2a6506aa524c8f1cd5781842ee1c86bee627767fee958f25bb6db8e631262ed8a59d337d730b6698271aeb8c31c1902a7e236e5dd878e6c1352c0c799d8e80d7346f8d2870acebe617c694bbb925d3ab4fb01784c564c03d88c81d2f84f58e8c6ba18548f09fa6"], 0x4, 0x56f, &(0x7f0000000b00)="$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") perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7, 0x1, 0x10, 0x0, 0x0, 0x7, 0x812a1, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x2, @perf_config_ext={0xe82, 0x722}, 0x106200, 0x10004, 0x20da, 0x9, 0x7, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x200000020000006}, 0x0, 0x6, 0xffffffffffffffff, 0xa) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000440)=""/13, 0xd, 0x40010003, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000100)=0x5, 0x4) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000020000001d"], 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0)='syz_tun\x00', 0x10) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x8000002, 0x0, @mcast1}, 0x1c) syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaabb86dd6100272400033afffc000000000000000000000000000003ff020000000000000000000000000001"], 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000740)={r1}) bind$packet(r1, 0x0, 0x0) sendmmsg$sock(r1, 0x0, 0x0, 0x40500f0) socket$kcm(0x10, 0x2, 0x0) r3 = inotify_init1(0x80800) inotify_add_watch(r3, 0x0, 0x10000a0) r4 = dup(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x52, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="c3f83efb"], 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r5, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)=[0x2], 0x0, 0x0, 0x2f, 0x1}}, 0x40) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x14, &(0x7f00000008c0)=ANY=[@ANYBLOB="18000000080000000000000000000000ac9200000800000074298000f0ffffff180000000500000000000000d90a000093a1f0ff08000000182b0000", @ANYRES32=r4, @ANYBLOB="000000000e00000097614000f0ffff0000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000009424f8fffcffffff9500000000000000"], &(0x7f0000000780)='syzkaller\x00', 0x3, 0x60, &(0x7f00000004c0)=""/96, 0x41100, 0x45, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x0, 0x4, 0xa}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000600), &(0x7f0000000640)=[{0x1, 0x4, 0x5}, {0x5, 0x1, 0x2, 0x4}, {0x3, 0x5, 0x9}], 0x10, 0xf}, 0x94) 883.381756ms ago: executing program 0 (id=8): r0 = socket$rxrpc(0x21, 0x2, 0xa) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_WRITEV={0x2, 0x2a, 0x4004, @fd=r0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x10042, &(0x7f00000000c0)={[{@nouid32}, {@delalloc}]}, 0xfe, 0x26f, &(0x7f0000001c80)="$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") prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x17440000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000004000000000000000000850000007500000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) socket$packet(0x11, 0x2, 0x300) timerfd_create(0x0, 0x0) pipe(&(0x7f0000000140)) socket$nl_route(0x10, 0x3, 0x0) socket$igmp6(0xa, 0x3, 0x2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x5, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x8006, 0x6}, 0x0, 0x10001, 0xda, 0x5, 0xc31bc7e, 0x20005, 0xa, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x181243, 0x1bd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) r2 = socket(0x10, 0x803, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="3c34000000000000040100c910fc02000000000000000000000000000107", @ANYRES32=r2], 0x1b0) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x36, 0x0, 0x0) 712.683242ms ago: executing program 4 (id=5): r0 = gettid() timer_create(0x1, 0x0, &(0x7f0000000000)) migrate_pages(r0, 0xffffffff, 0x0, &(0x7f0000019200)=0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x8, 0x5}, 0x4, 0x0, 0x10000, 0x3, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x9}, r0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) socket$tipc(0x1e, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x5, 0x5, 0x2, 0x7, 0x1, 0x1, 0xe92}, 0x50) memfd_secret(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socket$nl_netfilter(0x10, 0x3, 0xc) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x9]}, 0x8, 0x80000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00'}) syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) r3 = socket$igmp(0x2, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x17, 0x7, &(0x7f0000000240)=ANY=[@ANYRESHEX=r1, @ANYRES32=0x0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x3e, 0x0, 0x0) setsockopt$MRT_FLUSH(r3, 0x0, 0xd1, 0x0, 0x0) getsockopt$MRT(r3, 0x0, 0xcf, 0x0, &(0x7f0000000380)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000007c0)=ANY=[@ANYBLOB="5800000002060108000000bca3000000000000400500010006000000050005000200000005000400000000000900020073797a31000000000c000780080012400000000211000300686173683a69702c6d61726b"], 0x58}}, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f00000001c0)='w\xde\xa3\x05\xff\a\x00\x00\x00\x00\x00\x00\x8f\xc0\x9b\x86\xef\\\xc0\x89\av\x9f\xd6\xd1\x98,\xc8\x18E/\x8c\x1a\xe3\xbd') r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000000906010200000000000000000200ffff200007800c00018008000140a2fd4ebc08000a400000000205000300020000000900020073797a310000000005000100"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x40c0080) 656.60489ms ago: executing program 3 (id=9): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x2014, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb0100180000000000000048000000480000000c000000030000000000000800000000ffffffff04000004ff0f00000500000003000000ff0000000c00000003000000a58dfa810000000002000000010100000300000004000000070000000055002e2e"], 0x0, 0x6c, 0x0, 0x1, 0x3}, 0x28) socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080600000c"], 0x48) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000003c0)=0x40000004) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x80890a, &(0x7f0000000100)={[{@orlov}, {@nodioread_nolock}, {}, {@oldalloc}, {@nojournal_checksum}, {@min_batch_time={'min_batch_time', 0x3d, 0xc619}}, {@noload}]}, 0x7, 0x7bf, &(0x7f0000000d00)="$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") mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) io_setup(0x81, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r1, 0xf507, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000004380), 0x1814800, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="2c7766646e6f3d20babc9f2ff064b5cbcbcada7c93471d07e22a4213e327e4ced96809a092b0171f6b389ee3c9f2c8e33fae168d52f9b9ee0d0cd471929b2219e8a8fad66f7632feb00225b54d883b9551f86cd6710fe291cfdc8267f9f18ca99230622c791ea3087036d56fab4bc69df3e378f2103aaa3ae96de0975cff8d7b7d13072c83b227e5c15856e07aa2c5b3", @ANYRESHEX, @ANYBLOB=',k']) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d459d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x8, 0x1, 0x3000, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r4 = syz_io_uring_setup(0x10d, &(0x7f00000006c0)={0x0, 0x1885, 0x80, 0x2}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x5, r3, 0x0, 0x0, 0x0, 0x80800}) io_uring_enter(r4, 0xb516, 0xc2de, 0x8, 0x0, 0x0) 336.620507ms ago: executing program 0 (id=10): socket$inet_icmp(0x2, 0x2, 0x1) creat(&(0x7f0000000000)='./file1\x00', 0x14c) lchown(&(0x7f0000000080)='./file1\x00', 0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_io_uring_setup(0x22f, &(0x7f0000019140)={0x0, 0x8ffc, 0x10000, 0x0, 0x371}, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) pselect6(0x40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x7e6b, 0x0, 0x100000}, 0x0, &(0x7f0000000240)={0x1f, 0x0, 0x800, 0x0, 0x0, 0x0, 0x6a9}, &(0x7f0000000280)={0x0, 0x3938700}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000b00)={0xdc, 0x0, 0x2, 0x201, 0x0, 0x0, {0x7, 0x0, 0x2}, [@CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x34e6}, @CTA_EXPECT_NAT={0xb8, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x50, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_TUPLE={0x1c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x3}]}, 0xdc}, 0x1, 0x0, 0x0, 0x40010}, 0x4008000) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x321}, {&(0x7f0000000280)=""/85, 0x21}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000580)=""/106, 0x659}, {&(0x7f0000000980)=""/73, 0xd}, {&(0x7f0000000200)=""/77, 0x69}, {&(0x7f00000007c0)=""/141, 0xc4}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}, 0x5}], 0x4000000000003b4, 0x2000, &(0x7f0000003700)={0x77359400}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r6, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000780)="80005b020eaa4da2", 0xfdef}], 0x1, 0x0, 0x0, 0x900}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000009c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xffffffffffffff31}) io_uring_enter(r0, 0x7a98, 0x0, 0x0, 0x0, 0x0) 133.683477ms ago: executing program 0 (id=11): r0 = open(&(0x7f0000000240)='./file1\x00', 0x105342, 0x20) ftruncate(r0, 0x2007ffc) sendfile(r0, r0, 0x0, 0x800000009) 128.609356ms ago: executing program 1 (id=12): syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x2004000, &(0x7f0000000180)=ANY=[@ANYRES64=0x0], 0xfe, 0x122e, &(0x7f0000001280)="$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") r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'macvtap0\x00', 0x2}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x105342, 0x20) ftruncate(r1, 0x2007ffc) sendfile(r1, r1, 0x0, 0x800000009) 0s ago: executing program 2 (id=13): r0 = gettid() timer_create(0x1, 0x0, 0x0) migrate_pages(r0, 0xffffffff, 0x0, &(0x7f0000019200)=0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x8, 0x5}, 0x4, 0x0, 0x10000, 0x3, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x9}, r0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) socket$tipc(0x1e, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x5, 0x5, 0x2, 0x7, 0x1, 0x1, 0xe92}, 0x50) memfd_secret(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socket$nl_netfilter(0x10, 0x3, 0xc) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x9]}, 0x8, 0x80000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00'}) syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) r3 = socket$igmp(0x2, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x17, 0x7, &(0x7f0000000240)=ANY=[@ANYRESHEX=r1, @ANYRES32=0x0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x3e, 0x0, 0x0) setsockopt$MRT_FLUSH(r3, 0x0, 0xd1, 0x0, 0x0) getsockopt$MRT(r3, 0x0, 0xcf, 0x0, &(0x7f0000000380)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000007c0)=ANY=[@ANYBLOB="5800000002060108000000bca3000000000000400500010006000000050005000200000005000400000000000900020073797a31000000000c000780080012400000000211000300686173683a69702c6d61726b"], 0x58}}, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f00000001c0)='w\xde\xa3\x05\xff\a\x00\x00\x00\x00\x00\x00\x8f\xc0\x9b\x86\xef\\\xc0\x89\av\x9f\xd6\xd1\x98,\xc8\x18E/\x8c\x1a\xe3\xbd') r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000000906010200000000000000000200ffff200007800c00018008000140a2fd4ebc08000a400000000205000300020000000900020073797a310000000005000100"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x40c0080) kernel console output (not intermixed with test programs): [ 19.452766][ T28] audit: type=1400 audit(1772171118.346:62): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.474843][ T28] audit: type=1400 audit(1772171118.346:63): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.497559][ T28] audit: type=1400 audit(1772171118.346:64): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.520465][ T28] audit: type=1400 audit(1772171118.346:65): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.543550][ T28] audit: type=1400 audit(1772171118.346:66): avc: denied { read open } for pid=3193 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.1.46' (ED25519) to the list of known hosts. [ 25.024734][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 25.024751][ T28] audit: type=1400 audit(1772171123.916:70): avc: denied { mounton } for pid=3298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.053896][ T28] audit: type=1400 audit(1772171123.946:71): avc: denied { mount } for pid=3298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.054620][ T3298] cgroup: Unknown subsys name 'net' [ 25.081622][ T28] audit: type=1400 audit(1772171123.976:72): avc: denied { unmount } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.229831][ T3298] cgroup: Unknown subsys name 'cpuset' [ 25.236026][ T3298] cgroup: Unknown subsys name 'rlimit' [ 25.345702][ T28] audit: type=1400 audit(1772171124.236:73): avc: denied { setattr } for pid=3298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.381874][ T28] audit: type=1400 audit(1772171124.236:74): avc: denied { create } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.402618][ T28] audit: type=1400 audit(1772171124.236:75): avc: denied { write } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.423408][ T28] audit: type=1400 audit(1772171124.236:76): avc: denied { read } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 25.429742][ T3301] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.444179][ T28] audit: type=1400 audit(1772171124.266:77): avc: denied { read } for pid=3038 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 25.473641][ T28] audit: type=1400 audit(1772171124.266:78): avc: denied { mounton } for pid=3298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.477766][ T3298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.498683][ T28] audit: type=1400 audit(1772171124.266:79): avc: denied { mount } for pid=3298 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.722043][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 26.734443][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 26.750176][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 26.768180][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 26.787045][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 26.868555][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.875665][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.882907][ T3312] bridge_slave_0: entered allmulticast mode [ 26.889475][ T3312] bridge_slave_0: entered promiscuous mode [ 26.906373][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.913454][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.920565][ T3310] bridge_slave_0: entered allmulticast mode [ 26.927006][ T3310] bridge_slave_0: entered promiscuous mode [ 26.938835][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.946038][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.953291][ T3312] bridge_slave_1: entered allmulticast mode [ 26.959837][ T3312] bridge_slave_1: entered promiscuous mode [ 26.974717][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.981942][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.989387][ T3310] bridge_slave_1: entered allmulticast mode [ 26.995937][ T3310] bridge_slave_1: entered promiscuous mode [ 27.015672][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.032924][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.040122][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.047339][ T3319] bridge_slave_0: entered allmulticast mode [ 27.053821][ T3319] bridge_slave_0: entered promiscuous mode [ 27.064252][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.071415][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.078694][ T3319] bridge_slave_1: entered allmulticast mode [ 27.085411][ T3319] bridge_slave_1: entered promiscuous mode [ 27.092722][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.105774][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.113013][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.120245][ T3315] bridge_slave_0: entered allmulticast mode [ 27.126588][ T3315] bridge_slave_0: entered promiscuous mode [ 27.133094][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.140323][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.147399][ T3311] bridge_slave_0: entered allmulticast mode [ 27.153850][ T3311] bridge_slave_0: entered promiscuous mode [ 27.164211][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.171307][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.178386][ T3311] bridge_slave_1: entered allmulticast mode [ 27.185126][ T3311] bridge_slave_1: entered promiscuous mode [ 27.201015][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.210213][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.217276][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.224654][ T3315] bridge_slave_1: entered allmulticast mode [ 27.231095][ T3315] bridge_slave_1: entered promiscuous mode [ 27.247216][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.261488][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.275460][ T3310] team0: Port device team_slave_0 added [ 27.282164][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.300163][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.310246][ T3319] team0: Port device team_slave_0 added [ 27.316739][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.338774][ T3310] team0: Port device team_slave_1 added [ 27.353282][ T3319] team0: Port device team_slave_1 added [ 27.364228][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.374120][ T3312] team0: Port device team_slave_0 added [ 27.387781][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.394883][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.421198][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.433045][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.450713][ T3312] team0: Port device team_slave_1 added [ 27.456925][ T3311] team0: Port device team_slave_0 added [ 27.466779][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.473971][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.500454][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.511978][ T3315] team0: Port device team_slave_0 added [ 27.522519][ T3311] team0: Port device team_slave_1 added [ 27.532676][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.539666][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.565753][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.579713][ T3315] team0: Port device team_slave_1 added [ 27.589294][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.596235][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.622227][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.633237][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.640292][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.666262][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.702501][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.709668][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.736080][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.753300][ T3319] hsr_slave_0: entered promiscuous mode [ 27.759491][ T3319] hsr_slave_1: entered promiscuous mode [ 27.770063][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.777091][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.803136][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.824701][ T3310] hsr_slave_0: entered promiscuous mode [ 27.830739][ T3310] hsr_slave_1: entered promiscuous mode [ 27.836615][ T3310] debugfs: 'hsr0' already exists in 'hsr' [ 27.842400][ T3310] Cannot create hsr debugfs directory [ 27.848475][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.855545][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.881526][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.892599][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.899798][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.925847][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.942613][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.949629][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.975570][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.017602][ T3315] hsr_slave_0: entered promiscuous mode [ 28.023579][ T3315] hsr_slave_1: entered promiscuous mode [ 28.029473][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 28.035302][ T3315] Cannot create hsr debugfs directory [ 28.049249][ T3312] hsr_slave_0: entered promiscuous mode [ 28.055677][ T3312] hsr_slave_1: entered promiscuous mode [ 28.061697][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 28.067767][ T3312] Cannot create hsr debugfs directory [ 28.114667][ T3311] hsr_slave_0: entered promiscuous mode [ 28.121201][ T3311] hsr_slave_1: entered promiscuous mode [ 28.127086][ T3311] debugfs: 'hsr0' already exists in 'hsr' [ 28.132978][ T3311] Cannot create hsr debugfs directory [ 28.275001][ T3319] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 28.290943][ T3319] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 28.301915][ T3319] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 28.319515][ T3319] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 28.341314][ T3310] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 28.361324][ T3310] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 28.370531][ T3310] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 28.379660][ T3312] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 28.388911][ T3312] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 28.400560][ T3310] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 28.409687][ T3312] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 28.424111][ T3312] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 28.451299][ T3311] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 28.461423][ T3311] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 28.470223][ T3311] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 28.480154][ T3311] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 28.534636][ T3315] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 28.543691][ T3315] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 28.557183][ T3315] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 28.567934][ T3315] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 28.591954][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.614905][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.630615][ T120] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.637787][ T120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.648196][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.658898][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.668145][ T120] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.675241][ T120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.698157][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.716202][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.727616][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.735609][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.743619][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.750772][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.762582][ T70] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.769846][ T70] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.787627][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.794777][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.804688][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.811740][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.821384][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.828417][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.846742][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.853923][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.874814][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.897243][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.924622][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.931721][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.948511][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.955611][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.986621][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.014328][ T3315] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.025829][ T3315] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.095702][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.137345][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.178092][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.201004][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.251573][ T3310] veth0_vlan: entered promiscuous mode [ 29.271620][ T3310] veth1_vlan: entered promiscuous mode [ 29.308423][ T3310] veth0_macvtap: entered promiscuous mode [ 29.326756][ T3312] veth0_vlan: entered promiscuous mode [ 29.341538][ T3310] veth1_macvtap: entered promiscuous mode [ 29.351469][ T3312] veth1_vlan: entered promiscuous mode [ 29.370013][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.389889][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.403476][ T3311] veth0_vlan: entered promiscuous mode [ 29.414390][ T3315] veth0_vlan: entered promiscuous mode [ 29.426892][ T3312] veth0_macvtap: entered promiscuous mode [ 29.435199][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.444700][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.460164][ T3312] veth1_macvtap: entered promiscuous mode [ 29.468296][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.477327][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.487515][ T3311] veth1_vlan: entered promiscuous mode [ 29.493862][ T3315] veth1_vlan: entered promiscuous mode [ 29.513182][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.534299][ T3315] veth0_macvtap: entered promiscuous mode [ 29.547965][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.562903][ T3310] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 29.577938][ T3319] veth0_vlan: entered promiscuous mode [ 29.587604][ T3311] veth0_macvtap: entered promiscuous mode [ 29.597190][ T3315] veth1_macvtap: entered promiscuous mode [ 29.607226][ T3319] veth1_vlan: entered promiscuous mode [ 29.620024][ T50] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.634294][ T3311] veth1_macvtap: entered promiscuous mode [ 29.645733][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.655758][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.708172][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.717273][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.762491][ T50] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.774940][ T50] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.783979][ T50] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.804128][ T50] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.842376][ T50] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.996444][ T50] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.063254][ T50] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.090218][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 30.090245][ T28] audit: type=1400 audit(1772171128.986:110): avc: denied { create } for pid=3490 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 30.130485][ C1] hrtimer: interrupt took 46318 ns [ 30.160497][ T50] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.232693][ T50] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.255709][ T3489] xt_hashlimit: overflow, try lower: 18446744073709551615/255 [ 30.274524][ T3491] loop3: detected capacity change from 0 to 128 [ 30.297669][ T28] audit: type=1400 audit(1772171129.026:111): avc: denied { write } for pid=3490 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.323195][ T50] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.397374][ T50] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.434283][ T3494] loop1: detected capacity change from 0 to 512 [ 30.665780][ T28] audit: type=1400 audit(1772171129.246:112): avc: denied { create } for pid=3492 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 30.720758][ T3494] EXT4-fs warning (device loop1): ext4_expand_extra_isize_ea:2858: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 30.741961][ T3498] xt_hashlimit: overflow, try lower: 18446744073709551615/255 [ 30.754795][ T3491] EXT4-fs (loop3): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 30.770512][ T28] audit: type=1400 audit(1772171129.256:113): avc: denied { bind } for pid=3492 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 30.774641][ T3319] veth0_macvtap: entered promiscuous mode [ 30.801403][ T3319] veth1_macvtap: entered promiscuous mode [ 30.811818][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.821076][ T3494] ------------[ cut here ]------------ [ 30.826560][ T3494] EA inode 11 i_nlink=2 [ 30.826607][ T3494] WARNING: fs/ext4/xattr.c:1059 at ext4_xattr_inode_update_ref+0x313/0x350, CPU#1: syz.1.2/3494 [ 30.841445][ T3494] Modules linked in: [ 30.845431][ T3494] CPU: 1 UID: 0 PID: 3494 Comm: syz.1.2 Not tainted syzkaller #0 PREEMPT(full) [ 30.854519][ T3494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 30.864635][ T3494] RIP: 0010:ext4_xattr_inode_update_ref+0x332/0x350 [ 30.871444][ T3494] Code: b4 5f 99 ff 4c 8d 2d ad ee 5d 05 49 8d 7e 40 e8 34 f1 b5 ff 49 8b 6e 40 4c 89 e7 e8 68 ec b5 ff 41 8b 56 48 4c 89 ef 48 89 ee <67> 48 0f b9 3a e9 02 ff ff ff e8 ff 49 dd 03 66 66 66 66 66 66 2e [ 30.891176][ T3494] RSP: 0018:ffffc90001933778 EFLAGS: 00010246 [ 30.897301][ T3494] RAX: ffff888101cdbbf8 RBX: ffff888107a04a68 RCX: ffffffff81bff598 [ 30.905337][ T3494] RDX: 0000000000000002 RSI: 000000000000000b RDI: ffffffff871de430 [ 30.913461][ T3494] RBP: 000000000000000b R08: 0001888107a04a1b R09: 0000000000000000 [ 30.921500][ T3494] R10: 0001c9000187fc80 R11: 0001c900019336a8 R12: ffff888107a04a18 [ 30.929512][ T3494] R13: ffffffff871de430 R14: ffff888107a049d0 R15: 0000000000000001 [ 30.937508][ T3494] FS: 00007f925b77e6c0(0000) GS:ffff8882ae9dc000(0000) knlGS:0000000000000000 [ 30.946473][ T3494] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.953227][ T3494] CR2: 00007f34dc10f000 CR3: 000000011b350000 CR4: 00000000003506f0 [ 30.961262][ T3494] Call Trace: [ 30.964551][ T3494] [ 30.967537][ T3494] ext4_xattr_inode_dec_ref_all+0x57c/0x880 [ 30.973515][ T3494] ? errseq_check+0x2c/0x50 [ 30.978046][ T3494] ext4_xattr_delete_inode+0x6c1/0x7a0 [ 30.983786][ T3494] ? ext4_truncate+0x92b/0xb00 [ 30.988684][ T3494] ext4_evict_inode+0xa1f/0xd60 [ 30.993619][ T3494] ? __pfx_ext4_evict_inode+0x10/0x10 [ 30.999020][ T3494] evict+0x2af/0x510 [ 31.002977][ T3494] iput+0x41a/0x580 [ 31.006852][ T3494] ext4_process_orphan+0x1a9/0x1c0 [ 31.012117][ T3494] ext4_orphan_cleanup+0x6a8/0xa00 [ 31.017252][ T3494] ext4_fill_super+0x3408/0x37c0 [ 31.022273][ T3494] ? set_blocksize+0x14c/0x270 [ 31.027150][ T3494] ? setup_bdev_super+0x30e/0x370 [ 31.032391][ T3494] ? __pfx_ext4_fill_super+0x10/0x10 [ 31.037738][ T3494] get_tree_bdev_flags+0x291/0x300 [ 31.043018][ T3494] ? __pfx_ext4_fill_super+0x10/0x10 [ 31.048371][ T3494] get_tree_bdev+0x1f/0x30 [ 31.052840][ T3494] ext4_get_tree+0x1c/0x30 [ 31.057348][ T3494] vfs_get_tree+0x57/0x1d0 [ 31.061886][ T3494] do_new_mount+0x288/0x8d0 [ 31.066412][ T3494] path_mount+0x4d0/0xbc0 [ 31.070784][ T3494] __se_sys_mount+0x28c/0x2e0 [ 31.075540][ T3494] __x64_sys_mount+0x67/0x80 [ 31.080257][ T3494] x64_sys_call+0x2d61/0x3020 [ 31.084958][ T3494] do_syscall_64+0x12c/0x370 [ 31.089639][ T3494] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 31.095551][ T3494] RIP: 0033:0x7f925cd4da0a [ 31.100018][ T3494] Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 31.120255][ T3494] RSP: 002b:00007f925b77de58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 31.128757][ T3494] RAX: ffffffffffffffda RBX: 00007f925b77dee0 RCX: 00007f925cd4da0a [ 31.136870][ T3494] RDX: 00002000000009c0 RSI: 0000200000000540 RDI: 00007f925b77dea0 [ 31.144980][ T3494] RBP: 00002000000009c0 R08: 00007f925b77dee0 R09: 0000000000800718 [ 31.153052][ T3494] R10: 0000000000800718 R11: 0000000000000246 R12: 0000200000000540 [ 31.161069][ T3494] R13: 00007f925b77dea0 R14: 000000000000048d R15: 0000200000000200 [ 31.169161][ T3494] [ 31.172193][ T3494] ---[ end trace 0000000000000000 ]--- [ 31.185559][ T28] audit: type=1400 audit(1772171129.256:114): avc: denied { create } for pid=3492 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 31.205083][ T28] audit: type=1400 audit(1772171129.266:115): avc: denied { ioctl } for pid=3488 comm="syz.1.2" path="socket:[4603]" dev="sockfs" ino=4603 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.234249][ T28] audit: type=1400 audit(1772171129.266:116): avc: denied { getopt } for pid=3492 comm="syz.2.3" lport=48 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 31.261778][ T28] audit: type=1400 audit(1772171129.266:117): avc: denied { setopt } for pid=3492 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 31.291954][ T28] audit: type=1400 audit(1772171129.276:118): avc: denied { connect } for pid=3492 comm="syz.2.3" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 31.315569][ T3491] ext4 filesystem being mounted at /0/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 31.341542][ T28] audit: type=1400 audit(1772171129.276:119): avc: denied { write } for pid=3492 comm="syz.2.3" laddr=fe80::aa lport=58 faddr=ff03::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 31.459675][ T3498] loop2: detected capacity change from 0 to 512 [ 31.516136][ T3494] EXT4-fs (loop1): 1 orphan inode deleted [ 31.542172][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.560137][ T3505] netlink: 32 bytes leftover after parsing attributes in process `syz.3.4'. [ 31.573789][ T3508] loop0: detected capacity change from 0 to 164 [ 31.586263][ T3494] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 31.616625][ T3508] ISOFS: unable to read i-node block [ 31.630103][ T12] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.658416][ T3508] ISOFS: root inode is unusable. Disabling Rock Ridge and switching to Joliet. [ 31.684589][ T12] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.693697][ T3508] ISOFS: unable to read i-node block [ 31.740884][ T12] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.752867][ T12] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.792827][ T3511] loop0: detected capacity change from 0 to 128 [ 31.799756][ T3498] EXT4-fs (loop2): 1 orphan inode deleted [ 31.804751][ T3489] netlink: 88 bytes leftover after parsing attributes in process `syz.1.2'. [ 31.807447][ T3511] ======================================================= [ 31.807447][ T3511] WARNING: The mand mount option has been deprecated and [ 31.807447][ T3511] and is ignored by this kernel. Remove the mand [ 31.807447][ T3511] option from the mount to silence this warning. [ 31.807447][ T3511] ======================================================= [ 31.860903][ T3511] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 31.906569][ T3511] ext4 filesystem being mounted at /2/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 31.959723][ T3311] EXT4-fs error (device loop3): ext4_readdir:225: inode #11: comm syz-executor: path /0/file1/lost+found: directory fails checksum at offset 1024 [ 31.969883][ T3498] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 31.990325][ T3311] EXT4-fs error (device loop3): ext4_readdir:225: inode #11: comm syz-executor: path /0/file1/lost+found: directory fails checksum at offset 8192 [ 31.990761][ T3311] EXT4-fs error (device loop3): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 31.995765][ T3311] EXT4-fs error (device loop3): ext4_readdir:225: inode #11: comm syz-executor: path /0/file1/lost+found: directory fails checksum at offset 1024 [ 32.035284][ T3311] EXT4-fs error (device loop3): ext4_readdir:225: inode #11: comm syz-executor: path /0/file1/lost+found: directory fails checksum at offset 8192 [ 32.051309][ T3498] netlink: 88 bytes leftover after parsing attributes in process `syz.2.6'. [ 32.064583][ T3311] EXT4-fs error (device loop3): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 32.082728][ T3311] EXT4-fs error (device loop3): ext4_readdir:225: inode #11: comm syz-executor: path /0/file1/lost+found: directory fails checksum at offset 1024 [ 32.127907][ T3311] EXT4-fs error (device loop3): ext4_readdir:225: inode #11: comm syz-executor: path /0/file1/lost+found: directory fails checksum at offset 8192 [ 32.200685][ T3311] EXT4-fs error (device loop3): ext4_empty_dir:3107: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 32.216709][ T3311] EXT4-fs error (device loop3): ext4_readdir:225: inode #11: comm syz-executor: path /0/file1/lost+found: directory fails checksum at offset 1024 [ 32.281307][ T3310] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 32.488647][ T3312] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.538076][ T3516] Set syz1 is full, maxelem 65536 reached [ 32.558828][ T3524] loop1: detected capacity change from 0 to 8192 [ 32.607679][ T3498] syz.2.6 (3498) used greatest stack depth: 10312 bytes left [ 32.619126][ C0] ================================================================== [ 32.627254][ C0] BUG: KCSAN: data-race in wq_worker_tick / wq_worker_tick [ 32.634577][ C0] [ 32.636914][ C0] read-write to 0xffff8881000c5cd8 of 8 bytes by interrupt on cpu 1: [ 32.644991][ C0] wq_worker_tick+0x60/0x230 [ 32.649624][ C0] sched_tick+0xda/0x210 [ 32.650081][ T3315] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.653898][ C0] update_process_times+0x15e/0x190 [ 32.668121][ C0] tick_nohz_handler+0x275/0x3d0 [ 32.673093][ C0] __hrtimer_run_queues+0x218/0x4f0 [ 32.678393][ C0] hrtimer_interrupt+0x269/0x810 [ 32.683336][ C0] __sysvec_apic_timer_interrupt+0x5f/0x1f0 [ 32.689241][ C0] sysvec_apic_timer_interrupt+0x6f/0x80 [ 32.694903][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 32.700932][ C0] __tsan_memset+0xde/0x1f0 [ 32.705448][ C0] nsim_dev_trap_report_work+0x467/0x630 [ 32.711092][ C0] process_scheduled_works+0x4de/0x9e0 [ 32.716567][ C0] worker_thread+0x581/0x770 [ 32.721168][ C0] kthread+0x22a/0x280 [ 32.725248][ C0] ret_from_fork+0x150/0x360 [ 32.729851][ C0] ret_from_fork_asm+0x1a/0x30 [ 32.734710][ C0] [ 32.737034][ C0] read-write to 0xffff8881000c5cd8 of 8 bytes by interrupt on cpu 0: [ 32.745273][ C0] wq_worker_tick+0x60/0x230 [ 32.749965][ C0] sched_tick+0xda/0x210 [ 32.754215][ C0] update_process_times+0x15e/0x190 [ 32.759424][ C0] tick_nohz_handler+0x275/0x3d0 [ 32.764374][ C0] __hrtimer_run_queues+0x218/0x4f0 [ 32.769581][ C0] hrtimer_interrupt+0x269/0x810 [ 32.774523][ C0] __sysvec_apic_timer_interrupt+0x5f/0x1f0 [ 32.780435][ C0] sysvec_apic_timer_interrupt+0x6f/0x80 [ 32.786165][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 32.792207][ C0] memset_orig+0x3e/0xb0 [ 32.796456][ C0] __kmalloc_node_track_caller_noprof+0x2f7/0x560 [ 32.802970][ C0] __alloc_skb+0x3a4/0x690 [ 32.807401][ C0] nsim_dev_trap_report_work+0x18a/0x630 [ 32.813050][ C0] process_scheduled_works+0x4de/0x9e0 [ 32.818610][ C0] worker_thread+0x581/0x770 [ 32.823219][ C0] kthread+0x22a/0x280 [ 32.827377][ C0] ret_from_fork+0x150/0x360 [ 32.831988][ C0] ret_from_fork_asm+0x1a/0x30 [ 32.836756][ C0] [ 32.839079][ C0] value changed: 0x0000000000030d40 -> 0x0000000000033450 [ 32.846185][ C0] [ 32.848511][ C0] Reported by Kernel Concurrency Sanitizer on: [ 32.854668][ C0] CPU: 0 UID: 0 PID: 120 Comm: kworker/u8:5 Tainted: G W syzkaller #0 PREEMPT(full) [ 32.865625][ C0] Tainted: [W]=WARN [ 32.869431][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 32.879494][ C0] Workqueue: events_unbound nsim_dev_trap_report_work [ 32.886276][ C0] ================================================================== [ 32.987377][ T3516] wÞ£ÿ (3516) used greatest stack depth: 10016 bytes left [ 33.241335][ T3509] EXT4-fs (loop3): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 33.290587][ T50] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 33.355776][ T3527] Set syz1 is full, maxelem 65536 reached [ 34.071594][ T50] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 34.271912][ T50] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 34.331845][ T50] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 34.409488][ T50] bridge_slave_1: left allmulticast mode [ 34.419085][ T50] bridge_slave_1: left promiscuous mode [ 34.424844][ T50] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.432989][ T50] bridge_slave_0: left allmulticast mode [ 34.438644][ T50] bridge_slave_0: left promiscuous mode [ 34.444714][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.541682][ T50] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 34.551590][ T50] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 34.561178][ T50] bond0 (unregistering): Released all slaves [ 34.588033][ T50] hsr_slave_0: left promiscuous mode [ 34.593909][ T50] hsr_slave_1: left promiscuous mode [ 34.599596][ T50] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 34.607003][ T50] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 34.616001][ T50] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 34.623654][ T50] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 34.634811][ T50] veth1_macvtap: left promiscuous mode [ 34.640577][ T50] veth0_macvtap: left promiscuous mode [ 34.646149][ T50] veth1_vlan: left promiscuous mode [ 34.651698][ T50] veth0_vlan: left promiscuous mode [ 34.720634][ T50] team0 (unregistering): Port device team_slave_1 removed [ 34.730655][ T50] team0 (unregistering): Port device team_slave_0 removed