last executing test programs: 2.456778043s ago: executing program 1 (id=2): syz_io_uring_setup(0x4553, &(0x7f0000000400)={0x0, 0x59fc, 0x80, 0x3, 0xbd7f7fff}, &(0x7f0000000040)=0x0, &(0x7f00000001c0)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, &(0x7f00000002c0)=0x9, 0x0, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000000000000000000400000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000080000000000000004850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) set_mempolicy(0x3, &(0x7f0000000000)=0x4000000ffb, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r4, 0x0, 0xfffffffffffffffd}, 0x18) kexec_load(0x4, 0x0, 0x0, 0x2) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000"], &(0x7f00000001c0)='GPL\x00', 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_io_uring_setup(0x5ec5, &(0x7f0000000340)={0x0, 0x8a7e, 0x200, 0x4}, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000500), &(0x7f0000000000)='./file0\x00', 0x2800002, &(0x7f0000000200)=ANY=[@ANYBLOB='overriderockperm,check=relaxed,session=0x000000000000004b,check=strict,nocompress,uid=', @ANYRESDEC=0x0, @ANYBLOB='8\x00'], 0x0, 0x519, &(0x7f00000005c0)="$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") r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) writev(r6, &(0x7f00000025c0)=[{0x0}], 0x1) r7 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000c00)=ANY=[@ANYBLOB="38000000031401002dbd7000fbdbdf250900020073797a3000000000080041007369770014003300626f6e645f736c6176655f30000000008241856249d46e56e13bd2e1e96b6d57d2a1d5ed"], 0x38}, 0x1, 0x0, 0x0, 0x24000811}, 0xe000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000500000ac4010000060a0b040000000000000000020000004c000480340001800b000100746172676574000024000280090001004d41524b000000000c00030002b51112d439c5920800024000000002140001800b0001006c6f6f6b75700000040002800900010073797a30000000000900020073797a32"], 0x1ec}}, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000300)={'gretap0\x00', &(0x7f0000000280)={'erspan0\x00', 0x0, 0x8000, 0x80, 0x0, 0x9, {{0x8, 0x4, 0x1, 0x0, 0x20, 0x64, 0x0, 0x8, 0x2f, 0x0, @broadcast, @loopback, {[@generic={0x83, 0xb, "47ff26f3e30ca9f547"}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@bloom_filter={0x1e, 0x1, 0x9, 0x90, 0x20, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x4, 0xb}, 0x50) 2.442365492s ago: executing program 2 (id=3): socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0x2}, 0x8200, 0x10000, 0x0, 0x2, 0x8, 0x20025, 0xb, 0x0, 0xff, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, 0x0, &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', r3, 0x0, 0xfffffffffffffffe}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) sendfile(r5, r5, 0x0, 0x1) close(r5) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000001640)=0xc, 0x45) sendmmsg$inet(r2, &(0x7f0000001540)=[{{0x0, 0xfffffffffffffda1, 0x0}}], 0x40001b6, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x18) syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') r7 = socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000001cc0), 0x80000) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000002000095"], &(0x7f00000001c0)='syzkaller\x00'}, 0x94) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r8, r10, 0x25, 0x0, @val=@netfilter}, 0x40) sendmsg$nl_route_sched(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0xffffffff, 0x0, {0x0, 0x0, 0x74, r10, {0x0, 0x7}, {0xfff2, 0x4}, {0xc}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) 2.080141485s ago: executing program 4 (id=5): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xfffffffffffff001}, 0x18) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) unshare(0x40000) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) write$selinux_load(r2, &(0x7f0000000000)={0xf97cff8c, 0x8}, 0x10) 2.034544145s ago: executing program 1 (id=6): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup(r1) fsetxattr$security_selinux(r2, &(0x7f0000000240), &(0x7f0000000380)='system_u:object_r:system_cron_spool_t:s0\x00', 0x29, 0x2) 2.013153015s ago: executing program 4 (id=7): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0xb, 0x0, &(0x7f0000000400)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x3b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0xfffffffffffffffb}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r4, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r7}, 0x10) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x200}, 0x1c) listen(r6, 0x0) r8 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) 1.997455666s ago: executing program 1 (id=8): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000c00000000000000008500000007000000040000000000000095"], &(0x7f0000000080)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b000000000000000000bbfe24c97174d777bc206c0c0000536ce195f47c6a7f32792700000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = open(&(0x7f0000000740)='./bus\x00', 0x143c62, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./cgroup.net/devices.allow\x00', 0x0, 0x2000040, 0x0) r10 = io_uring_setup(0x4d3f, &(0x7f0000000200)={0x0, 0x297a, 0x40, 0x80003, 0x6}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r10, 0xb, &(0x7f0000000480), 0x66) sendmmsg$unix(r9, &(0x7f0000000e40)=[{{&(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000440)="d7bae2be4b2411b380c9f5c3f6f647a4b285422668b8c5cc5a57565517fcbe2da0e94b65c8cbf72ee6a8e2e17ad84f1a3a31b8fdcede03b53f594252f12139bc1c325ccfbfe08159efa2b1f747fd4f098c51eae1915462c1af27bc65a560fb6930822200948f0d656614bdd031de", 0x6e}], 0x1, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x20}}, {{&(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000780)="fe5d960df152852b13994557daf54a7f1f89175d8446dade3d9f95cffdde8648323aa86ef8f8879366dc5160e83317b0ea138fe3f9eb255583b0828798514e8cbde54b7ca3a3b8c5bc6693833fd21f8515b20bca9657f83e4fbea3323b4b6481a0550c04c7c6ab1ce33a0dd3c4fad585f251eed662d4dc58d203e00f64150a0f59cb", 0x82}, {&(0x7f0000000700)="9098c1f0f4fb21d1321e894abb4bb4d6f5cb7754930ed59460de6b7d67a07d7f259a1f998089c813f19540328c677d1c", 0x30}, {&(0x7f0000000840)="f3427f3891a822cf606c4b5a9895d70c6814ca850e7c9b5a55f1a2677fb3c2bb9ea40a97dd9855795bd3cc18c1d7ae02c18c5c50dbc81d3621efd85b385093f5de2d51394955c37a474d7c647ac351d439b9028d47eea71e31faedf6888602a0e55a3696ddee7a3d662a39795f78fe06961113ea5bcf9d635b6c95d046aa51e1c6859e9c65a6c363babdbb662b477c5fd1a896f51b2a3d9e3fd4cc2c81a02a07664058ffcb77a0dcccf6730883c19918ac277885f1866f7634211f01c8bdbcf2c195bf50f92db29b514da9442b7ad19b8672ec2c752de1013d4074b364ab69", 0xdf}], 0x3, &(0x7f0000000d40)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [r8, r3, r5, r9]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r1}}}, @rights={{0x38, 0x1, 0x1, [r8, r4, r2, r0, r2, r10, 0xffffffffffffffff, r7, r9, r4]}}], 0xd0}}], 0x2, 0x80) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000001800090000000000010000001c140000fe00000100000000080001"], 0x24}}, 0x0) r12 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r12, 0x40345410, &(0x7f00000000c0)={{0xffffffffffffffff, 0x3, 0xaf8, 0x0, 0x7}}) 1.3832937s ago: executing program 0 (id=10): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000740)={0x0}) 1.36982603s ago: executing program 0 (id=11): r0 = memfd_create(&(0x7f0000000bc0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\xe1\xba\x1e\x97uX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06Dg\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x00\x00.\xd4`=z\xd1n\x8d\x8f\xa5hS\x8e[\xb3\t\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xc6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\x00@=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd4\xe7\xf2:u\x8a\b\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{\'\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\xb5aJ\xb0\x92\x89\xbc\x80\x1ch\x89\xe7\xdd]q,\xec\xc4\xa5\x93\xe5,\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+}5dy\xb1\xef\xf1m\xa5\x94d9\xaf\xcfq\x8b=\x026\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x98\xc3\xfc`\xa6\xba\x1f\x17\v$\x88g\xb4\xad\b\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc00xffffffffffffffff}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', r3, 0x0, 0xfffffffffffffffe}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) sendfile(r5, r5, 0x0, 0x1) close(r5) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000001640)=0xc, 0x45) sendmmsg$inet(r2, &(0x7f0000001540)=[{{0x0, 0xfffffffffffffda1, 0x0}}], 0x40001b6, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x18) syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') r7 = socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000001cc0), 0x80000) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000002000095"], &(0x7f00000001c0)='syzkaller\x00'}, 0x94) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r8, r10, 0x25, 0x0, @val=@netfilter}, 0x40) sendmsg$nl_route_sched(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0xffffffff, 0x0, {0x0, 0x0, 0x74, r10, {0x0, 0x7}, {0xfff2, 0x4}, {0xc}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) 518.842657ms ago: executing program 2 (id=22): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000740)={0x0}) 497.027957ms ago: executing program 2 (id=23): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="07000000040000008000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000007c0)=ANY=[@ANYRES8=0x0, @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='kmem_cache_free\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0xb1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3, 0x0, 0xac70}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/rt_acct\x00') readv(r4, &(0x7f00000014c0), 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000010000007ffffffe00000000018110000", @ANYRES32=r5, @ANYRESDEC=r4], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r6, 0x0, 0x3}, 0x18) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[@ANYBLOB="02030003130000002cbd7040fcdbdf2503000900800000001cdc0dca1d9f68846960e56de42944af05000600000000000a004e2300000095ff010000000000000000000000000001010000800000000002000100000000000000070c0000008005000500000000000a004e23000000fffe800000000000000000000000000096ff01000000000000020013000200000029bd70000635"], 0x98}, 0x1, 0x7}, 0x0) r8 = socket$inet6(0xa, 0x80002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x152, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x72, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r9}, 0x10) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RWRITE(r11, &(0x7f0000000040)={0xb}, 0x11000) read(r10, &(0x7f0000032440)=""/102364, 0x18fdc) setsockopt$inet6_IPV6_HOPOPTS(r8, 0x29, 0x36, &(0x7f0000001440)=ANY=[], 0xc0) setsockopt$inet6_IPV6_RTHDR(r8, 0x29, 0x39, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ff9}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) 339.461608ms ago: executing program 3 (id=24): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), r0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x1a00404, &(0x7f0000000080)={[{@grpquota}, {@nomblk_io_submit}]}, 0x1, 0xbac, &(0x7f00000017c0)="$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") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) fsetxattr(r2, &(0x7f0000000000)=@known='security.selinux\x00', &(0x7f0000000680)='@\x18\x93|\b\xc10\xaeA\x95\xd9Wi\x1b\xe4S\x89\xbe\xd1\xb1\x1a4\x8d\xc0$\x80\v\x9c\xd4Et\x10\xda\x8d\x18y\xd6gB\xb1E\xbc\x11\x06E\xc7A\x8a2z\x14L\xb3\xbb\x97p\x04{\bc|^;t\xdd\xbe\xeeHR\xd7\x9f\xe8\x87\x9f\x02\xc1\xf1g\x000\xc7GC>\x14\xa3\xbc\xd78\xdf\x99;\x15\\\x1aI\xe1\x04s\x9en\xf6\xab\xfb\xd0G\xc9p\x15I\xe0Qr\xa15\xf4\xe4\x00\xff>\xc9)\x9eK\x82a\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x87, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280), 0x82, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x5400, 0x0) 313.504138ms ago: executing program 2 (id=25): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90224fc602f0000000a0c0100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 241.532069ms ago: executing program 2 (id=26): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0xb, 0x0, &(0x7f0000000400)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x3b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0xfffffffffffffffb}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r4, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r7}, 0x10) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x200}, 0x1c) listen(r6, 0x0) r8 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r8, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) 218.485259ms ago: executing program 3 (id=27): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x4, 0x28}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x0, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41002, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000580)={0x0, 0x0, 0x0, 'queue0\x00'}) 174.596109ms ago: executing program 3 (id=28): r0 = msgget(0x3, 0x8) msgrcv(r0, &(0x7f0000000000)={0x0, ""/10}, 0x12, 0x1, 0x1000) msgrcv(r0, &(0x7f0000000040)={0x0, ""/196}, 0xcc, 0x0, 0x2800) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xb) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00'}, 0x18) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast1, @empty}, &(0x7f0000000200)=0xc) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @volatile={0x8, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x5f, 0x30, 0x2e, 0x2e]}}, &(0x7f00000002c0)=""/161, 0x36, 0xa1, 0x1, 0x5, 0x10000}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1a, 0xfffffffb, 0xd1, 0x0, 0x200, r1, 0x1, '\x00', r2, r3, 0x1}, 0x50) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000440), 0x2000, 0x0) open_by_handle_at(r4, &(0x7f0000000480)=@FILEID_NILFS_WITHOUT_PARENT={0x20, 0x61, {0x3c, 0xffffffff, 0x955, 0x0, 0x1}}, 0x2000) writev(r1, &(0x7f0000000840)=[{&(0x7f00000004c0)="a76666e948f6d050a48d22eb1696537476e19a9ca078d68134ea5e7205f0e1914f73b09bb23d7908288bbaf9c5dbb908a23efbe2ddc0fc54b3cdb9c60ae4ddd0c8db75c7be45edc58c3fdfb9a598679b3503a0e8ea26e9cfe1d24332a9aaec3b944aa518e9c32032fd45a2be367ca2055e8f08ee811a219453b777d7ee32f54eda47a3f7d47a20a104896001bf9a8ec3fae1b4c37d661048c76f98452a4f0c1f81b874860acaa00f76faffbcf3c6af61497906936cd8b08daeef8a2edfc18051263df36fe465af949fd57b725ad6", 0xce}, {&(0x7f00000005c0)="ce03ed0aef4e4d7c3ab757a8d475b95e34a326ed3c92b1b56c9751fa78421be7ef2f64fdd78db5362def5eeb560132bab5cd1f7db035a22f5ab40beb228a54b2a752d93c829609db6ddeb0f59dbfc14798eba0ba52f5b05182bf0b345b59936eeae0c561287af47334b89fd03bc7e8cc3b460e6a088bce7e516ce6c650e5394d", 0x80}, {&(0x7f0000000640)="67a468b78d260bd8c82ad2571ebcf1f1b6787c1ccf66223c7e5c5bc0720ce89a775949f354f6cdaa8ddde49f183fc9b6a439b85323bae454e40874850d3a6973e3e1ef76dfe517f0aeef304557ed324469ad33317d4bc3cc7f157cf1a14cfd806955c1cb52ae7c3e4ae8e7b4a1ebe38bcb5e4a78b649d93a6f2580182f0e01737bbbeecda919a27073e691d3638cc49f68b390f80e9a881f364a6e3328acb20f59321cd5d643f7af4052ad0e59afeb74ddbf0b5730ae8b9afd0a37569870defe46c6ab1be17a855f9210e97ef5155e3f37511d1449", 0xd5}, {&(0x7f0000000740)="a31f0c0ba43e0ca7cd7e3a542c4d684782338c47eb9a1ccd382d8f50368e1de7f0fb01ad718499d618ba55ab59329ba1c9011f8da0b40847cc37f50d45af11216e1b9f4938b959926a8c", 0x4a}, {&(0x7f00000007c0)="2ed8282c60ed", 0x6}, {&(0x7f0000000800)="a79bd7f161727e0ef0938646e587de1322a677a18e6c21dd80ef39c2d93c61820227", 0x22}], 0x6) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x4, &(0x7f00000008c0)=0x4, 0x4) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000900), 0x48801, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000c00)={&(0x7f0000000940)="64a6edf29d302e20c76d64735b60d206d6ed9c5df357091a610b01aa8cb5174f420579fc5867a6e0b36e426af0eb9d32bcd9fa4292d0d500ea75efb3f6876042574c8d4dba47bbdc6a5c7e5b5d948bdfc263f65b4bf15dece036eae06a4df802682e869e994e0161d01e18d86b404865fae45f30efc1c39e63c0c44e74371aff1aa4c5e3c67d26ed093df12dbc633fa416864e5c84060d3e87c35355d134f28d45c96241d17a246006bf2ddde6e2245913e45f3d4b32c6390d8486f35b9514e809c451e5d5a637aec0ce4d2fb2c224218cae026f0dbd8dc4463f", &(0x7f0000000a40)=""/39, &(0x7f0000000a80)="69cc218934a2c19767e75b6ea9223be98c95e76f4c7a26fcfcc9d22cc31e24e0dc3f8c7cdcb5dea0fa909f8c06850d607f9e5f401658158205cfe1ea8095c945e9b7dd123cd96ff9c9513b470179e75bb9f038aa79a32b", &(0x7f0000000b00)="eb340b3ce81e9b129bc695414c144ad35ca355e26bec0eb59706040420f54c90dc978b6c95ff5b7e52c4046493cd60c7c8bd44f611976b1cbf7eac34d720971a8c4b0117f357bf2d00350633b873deb56ed2a823228fdcdab01d137409c0eb137448c62c413debdd32693eff8c6dd097add14be69232c596e6778bdca26e0426cc398225efcc26921eb469989b0ebb4011cedff6b1e2203753a21c64c41f9ebbd0fba0375bfa394703aec840592e8d485fab9cdb65a723a1c22ecee3b4e3058387a4a6627ccd53198f", 0x5, r6, 0x4}, 0x38) msgrcv(r0, &(0x7f0000000c40)={0x0, ""/216}, 0xe0, 0x1, 0x800) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000dc0)=0x0) perf_event_open(&(0x7f0000000d40)={0x5, 0x80, 0x6, 0x40, 0xe1, 0x4, 0x0, 0x2, 0x8200, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x70a, 0x2, @perf_config_ext={0x0, 0x9a}, 0xc80, 0x1000, 0x1, 0x4, 0x80000000, 0x1, 0x0, 0x0, 0x7}, r7, 0x4, r6, 0x1) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000e00)=""/84) fstat(r1, &(0x7f0000000e80)) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000f40), r6) sendmsg$TIPC_CMD_SHOW_PORTS(r6, &(0x7f0000001000)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x1c, r8, 0x1, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4001}, 0x40046) r9 = msgget$private(0x0, 0x10) msgctl$MSG_INFO(r9, 0xc, &(0x7f0000001040)=""/88) ioctl$int_in(r1, 0x0, &(0x7f00000010c0)=0x9) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140), r6) sendmsg$NL80211_CMD_GET_INTERFACE(r10, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20102002}, 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x28, r11, 0x400, 0x70bd2d, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x7c}}}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000805}, 0x44080) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000001240)={0x3, 0x9f, 0x4, 0xfffffffb, 0x1b, "304b7d73aee60af0b6d12d006f217875d8c3f9"}) 147.609419ms ago: executing program 3 (id=29): r0 = socket$kcm(0x10, 0x2, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x118) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000004100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x0, 0xe, 0x0, &(0x7f00000003c0)="131c8701feaa16bca4ac74ab821d", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={r1}, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90224fc602f0000000a0c0100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 121.48094ms ago: executing program 3 (id=30): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000740)={r0, 0x0, &(0x7f0000001700)=""/47}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e00dadc9fbef0d69200feff0000450000"], 0x48) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000040)=@assoc_value, &(0x7f0000000000)=0x8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = getpid() syz_pidfd_open(r1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0xc0100, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='kfree\x00'}, 0x18) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x114}], 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0xf) r4 = syz_clone(0x8d002240, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$pokeuser(0x6, r4, 0x358, 0xffff888237c16e50) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x121202, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x42000, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r5, 0x400454cd, 0x7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @multicast}) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000f2ff000000000000000000004000"/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x1, 0x0, r7, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x2}, 0x50) capget(&(0x7f00000003c0)={0x20071026, r4}, &(0x7f0000000400)={0xe, 0x200, 0x7fff, 0xfff, 0x3, 0x4}) 0s ago: executing program 3 (id=31): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="07000000040000008000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000007c0)=ANY=[@ANYRES8=0x0, @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='kmem_cache_free\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0xb1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3, 0x0, 0xac70}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/rt_acct\x00') readv(r4, &(0x7f00000014c0), 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000010000007ffffffe00000000018110000", @ANYRES32=r5, @ANYRESDEC=r4], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r6, 0x0, 0x3}, 0x18) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[@ANYBLOB="02030003130000002cbd7040fcdbdf2503000900800000001cdc0dca1d9f68846960e56de42944af05000600000000000a004e2300000095ff010000000000000000000000000001010000800000000002000100000000000000070c0000008005000500000000000a004e23000000fffe800000000000000000000000000096ff01000000000000020013000200000029bd7000063500005a3294cb538e78"], 0x98}, 0x1, 0x7}, 0x0) r8 = socket$inet6(0xa, 0x80002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x152, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x72, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r9}, 0x10) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RWRITE(r11, &(0x7f0000000040)={0xb}, 0x11000) read(r10, &(0x7f0000032440)=""/102364, 0x18fdc) setsockopt$inet6_IPV6_HOPOPTS(r8, 0x29, 0x36, &(0x7f0000001440)=ANY=[], 0xc0) setsockopt$inet6_IPV6_RTHDR(r8, 0x29, 0x39, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ff9}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.246' (ED25519) to the list of known hosts. [ 22.773511][ T29] audit: type=1400 audit(1762269714.439:62): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.796451][ T29] audit: type=1400 audit(1762269714.459:63): avc: denied { mount } for pid=3300 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.797177][ T3300] cgroup: Unknown subsys name 'net' [ 22.824091][ T29] audit: type=1400 audit(1762269714.489:64): avc: denied { unmount } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.948466][ T3300] cgroup: Unknown subsys name 'cpuset' [ 22.954554][ T3300] cgroup: Unknown subsys name 'rlimit' [ 23.143529][ T29] audit: type=1400 audit(1762269714.809:65): avc: denied { setattr } for pid=3300 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.166842][ T29] audit: type=1400 audit(1762269714.809:66): avc: denied { create } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 23.178714][ T3305] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.187260][ T29] audit: type=1400 audit(1762269714.809:67): avc: denied { write } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.216113][ T29] audit: type=1400 audit(1762269714.809:68): avc: denied { read } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.231618][ T3300] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.236529][ T29] audit: type=1400 audit(1762269714.819:69): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.269855][ T29] audit: type=1400 audit(1762269714.819:70): avc: denied { mount } for pid=3300 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.293172][ T29] audit: type=1400 audit(1762269714.869:71): avc: denied { relabelto } for pid=3305 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.420603][ T3323] chnl_net:caif_netlink_parms(): no params data found [ 24.454362][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 24.485385][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 24.515398][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 24.536004][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 24.575543][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.582634][ T3323] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.589864][ T3323] bridge_slave_0: entered allmulticast mode [ 24.596125][ T3323] bridge_slave_0: entered promiscuous mode [ 24.615493][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.622562][ T3323] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.629652][ T3323] bridge_slave_1: entered allmulticast mode [ 24.636082][ T3323] bridge_slave_1: entered promiscuous mode [ 24.662913][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.670066][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.677243][ T3313] bridge_slave_0: entered allmulticast mode [ 24.683639][ T3313] bridge_slave_0: entered promiscuous mode [ 24.704686][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.711738][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.718944][ T3313] bridge_slave_1: entered allmulticast mode [ 24.725197][ T3313] bridge_slave_1: entered promiscuous mode [ 24.733229][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.740285][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.747320][ T3315] bridge_slave_0: entered allmulticast mode [ 24.753736][ T3315] bridge_slave_0: entered promiscuous mode [ 24.761289][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.770443][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.777468][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.784578][ T3315] bridge_slave_1: entered allmulticast mode [ 24.791061][ T3315] bridge_slave_1: entered promiscuous mode [ 24.797187][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.804244][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.811351][ T3312] bridge_slave_0: entered allmulticast mode [ 24.817683][ T3312] bridge_slave_0: entered promiscuous mode [ 24.834202][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.850695][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.857730][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.864963][ T3312] bridge_slave_1: entered allmulticast mode [ 24.871370][ T3312] bridge_slave_1: entered promiscuous mode [ 24.887388][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.910374][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.924037][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.933196][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.940286][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.947408][ T3319] bridge_slave_0: entered allmulticast mode [ 24.953806][ T3319] bridge_slave_0: entered promiscuous mode [ 24.960912][ T3323] team0: Port device team_slave_0 added [ 24.966587][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.973676][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.980750][ T3319] bridge_slave_1: entered allmulticast mode [ 24.987159][ T3319] bridge_slave_1: entered promiscuous mode [ 24.994040][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 25.004040][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 25.018491][ T3323] team0: Port device team_slave_1 added [ 25.033871][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 25.069725][ T3315] team0: Port device team_slave_0 added [ 25.076166][ T3313] team0: Port device team_slave_0 added [ 25.086711][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 25.096354][ T3312] team0: Port device team_slave_0 added [ 25.102706][ T3315] team0: Port device team_slave_1 added [ 25.113610][ T3313] team0: Port device team_slave_1 added [ 25.119448][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.126416][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.152364][ T3323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.164284][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 25.173713][ T3312] team0: Port device team_slave_1 added [ 25.188554][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.195472][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.221345][ T3323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.240372][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.247304][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.273278][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.290273][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.297294][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.323237][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.343443][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.350446][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.376348][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.390837][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.397763][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.423706][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.434905][ T3319] team0: Port device team_slave_0 added [ 25.440973][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.447942][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.473827][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.485435][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.492395][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.518303][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.540989][ T3319] team0: Port device team_slave_1 added [ 25.582833][ T3315] hsr_slave_0: entered promiscuous mode [ 25.588785][ T3315] hsr_slave_1: entered promiscuous mode [ 25.596545][ T3312] hsr_slave_0: entered promiscuous mode [ 25.602749][ T3312] hsr_slave_1: entered promiscuous mode [ 25.608610][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 25.614309][ T3312] Cannot create hsr debugfs directory [ 25.625910][ T3323] hsr_slave_0: entered promiscuous mode [ 25.631881][ T3323] hsr_slave_1: entered promiscuous mode [ 25.637638][ T3323] debugfs: 'hsr0' already exists in 'hsr' [ 25.643374][ T3323] Cannot create hsr debugfs directory [ 25.658979][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.665916][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.691852][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.711308][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.718263][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.744234][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.763215][ T3313] hsr_slave_0: entered promiscuous mode [ 25.769133][ T3313] hsr_slave_1: entered promiscuous mode [ 25.775020][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 25.780779][ T3313] Cannot create hsr debugfs directory [ 25.843819][ T3319] hsr_slave_0: entered promiscuous mode [ 25.849740][ T3319] hsr_slave_1: entered promiscuous mode [ 25.855509][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 25.861244][ T3319] Cannot create hsr debugfs directory [ 25.991886][ T3312] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 26.000407][ T3312] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 26.008906][ T3312] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 26.019250][ T3312] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 26.040780][ T3323] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 26.049399][ T3323] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 26.057735][ T3323] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 26.066393][ T3323] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 26.109180][ T3313] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 26.118397][ T3313] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 26.128669][ T3313] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 26.140394][ T3313] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 26.163623][ T3319] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 26.178174][ T3319] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 26.191310][ T3319] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 26.201596][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.212959][ T3319] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 26.232781][ T3315] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 26.246991][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.254094][ T3315] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 26.262955][ T3315] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 26.273245][ T3323] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.280521][ T3315] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 26.298491][ T2491] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.305572][ T2491] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.325501][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.339264][ T787] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.346400][ T787] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.355932][ T787] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.362980][ T787] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.390925][ T787] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.398118][ T787] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.446351][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.469978][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.484510][ T787] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.491624][ T787] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.504496][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.513279][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.530150][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.540858][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.547913][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.563186][ T2491] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.570280][ T2491] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.584931][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.595575][ T2491] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.602639][ T2491] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.617741][ T3323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.627479][ T787] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.634525][ T787] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.660739][ T3313] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 26.671250][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 26.684919][ T787] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.691960][ T787] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.705759][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.739849][ T3315] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 26.799861][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.839726][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.850060][ T3323] veth0_vlan: entered promiscuous mode [ 26.864453][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.886834][ T3312] veth0_vlan: entered promiscuous mode [ 26.896462][ T3323] veth1_vlan: entered promiscuous mode [ 26.919042][ T3312] veth1_vlan: entered promiscuous mode [ 26.945631][ T3323] veth0_macvtap: entered promiscuous mode [ 26.965566][ T3323] veth1_macvtap: entered promiscuous mode [ 26.988617][ T3312] veth0_macvtap: entered promiscuous mode [ 26.996141][ T3313] veth0_vlan: entered promiscuous mode [ 27.002836][ T3312] veth1_macvtap: entered promiscuous mode [ 27.012088][ T3313] veth1_vlan: entered promiscuous mode [ 27.026338][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.042062][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.049951][ T3315] veth0_vlan: entered promiscuous mode [ 27.061520][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.075130][ T3313] veth0_macvtap: entered promiscuous mode [ 27.083182][ T3315] veth1_vlan: entered promiscuous mode [ 27.090730][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.105888][ T31] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.114843][ T3313] veth1_macvtap: entered promiscuous mode [ 27.126627][ T31] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.135671][ T31] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.146120][ T3319] veth0_vlan: entered promiscuous mode [ 27.153147][ T31] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.168316][ T31] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.177445][ T31] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.189852][ T31] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.198782][ T31] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.208781][ T3319] veth1_vlan: entered promiscuous mode [ 27.218743][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.243417][ T3319] veth0_macvtap: entered promiscuous mode [ 27.258471][ T3315] veth0_macvtap: entered promiscuous mode [ 27.265614][ T3315] veth1_macvtap: entered promiscuous mode [ 27.273404][ T3312] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 27.276540][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.300415][ T3319] veth1_macvtap: entered promiscuous mode [ 27.313468][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.331645][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.358006][ T2491] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.376655][ T2491] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.395277][ T31] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.407423][ T3483] loop1: detected capacity change from 0 to 164 [ 27.415006][ T3483] iso9660: Bad value for 'uid' [ 27.420292][ T3483] iso9660: Bad value for 'uid' [ 27.429013][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.439081][ T31] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.448918][ T3483] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 27.450307][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.474898][ T31] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.483903][ T3489] netlink: 332 bytes leftover after parsing attributes in process `syz.1.2'. [ 27.513581][ T31] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.524134][ T3483] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 27.545143][ T3485] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3'. [ 27.563692][ T31] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.577483][ T3485] hsr_slave_1 (unregistering): left promiscuous mode [ 27.588280][ T31] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.608295][ T2491] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.616649][ T3493] loop3: detected capacity change from 0 to 4096 [ 27.633626][ T3493] EXT4-fs: Ignoring removed nomblk_io_submit option [ 27.641215][ T2491] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.653172][ T2491] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.662667][ T3493] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 27.663374][ T3495] netlink: 32 bytes leftover after parsing attributes in process `syz.0.1'. [ 27.692613][ T2491] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.704367][ T3493] SELinux: Context @|0AWiSѱ4$ EtڍygBEEA2zLp{c|^;tݾHRן臟g is not valid (left unmapped). [ 27.709922][ T3502] SELinux: failed to load policy [ 27.742083][ T3504] SELinux: Context system_u:object_r:system_cron_spool_t:s0 is not valid (left unmapped). [ 27.776119][ T3313] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 27.786323][ T29] kauditd_printk_skb: 67 callbacks suppressed [ 27.786335][ T29] audit: type=1400 audit(1762269719.449:139): avc: denied { bind } for pid=3508 comm="syz.4.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.812435][ T29] audit: type=1400 audit(1762269719.449:140): avc: denied { setopt } for pid=3508 comm="syz.4.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.835824][ T3509] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 27.885084][ T29] audit: type=1400 audit(1762269719.549:141): avc: denied { name_bind } for pid=3508 comm="syz.4.7" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 27.906445][ T29] audit: type=1400 audit(1762269719.549:142): avc: denied { node_bind } for pid=3508 comm="syz.4.7" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 27.963124][ T3509] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 27.977601][ T3513] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9'. [ 27.990951][ T3513] hsr_slave_1 (unregistering): left promiscuous mode [ 28.031607][ T3509] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 28.128146][ T3519] ======================================================= [ 28.128146][ T3519] WARNING: The mand mount option has been deprecated and [ 28.128146][ T3519] and is ignored by this kernel. Remove the mand [ 28.128146][ T3519] option from the mount to silence this warning. [ 28.128146][ T3519] ======================================================= [ 28.174470][ T29] audit: type=1400 audit(1762269719.799:143): avc: denied { mounton } for pid=3510 comm="syz.1.8" path="/syzcgroup/net/syz1/devices.allow" dev="cgroup" ino=37 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=file permissive=1 [ 28.227646][ T3509] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 28.528898][ T29] audit: type=1326 audit(1762269720.199:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3523 comm="syz.0.11" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb4668af6c9 code=0x7ffc0000 [ 28.552361][ T29] audit: type=1326 audit(1762269720.199:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3523 comm="syz.0.11" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb4668af6c9 code=0x7ffc0000 [ 28.554751][ T3524] loop0: detected capacity change from 0 to 164 [ 28.575633][ T29] audit: type=1326 audit(1762269720.199:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3523 comm="syz.0.11" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fb4668af6c9 code=0x7ffc0000 [ 28.605112][ T29] audit: type=1326 audit(1762269720.199:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3523 comm="syz.0.11" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fb4668af703 code=0x7ffc0000 [ 28.614541][ T3524] process 'syz.0.11' launched '/dev/fd/3' with NULL argv: empty string added [ 28.628077][ T29] audit: type=1326 audit(1762269720.199:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3523 comm="syz.0.11" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fb4668ae17f code=0x7ffc0000 [ 28.688570][ T3524] syz.0.11: attempt to access beyond end of device [ 28.688570][ T3524] loop0: rw=524288, sector=263328, nr_sectors = 4 limit=164 [ 28.702594][ T3524] syz.0.11: attempt to access beyond end of device [ 28.702594][ T3524] loop0: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 28.775182][ T3532] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 28.826053][ T3536] loop0: detected capacity change from 0 to 4096 [ 28.833899][ T3536] EXT4-fs: Ignoring removed nomblk_io_submit option [ 28.843243][ T3536] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 28.868676][ T3315] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 29.101040][ T3546] loop3: detected capacity change from 0 to 4096 [ 29.107627][ T3546] EXT4-fs: Ignoring removed nomblk_io_submit option [ 29.116753][ T3546] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 29.154550][ T3313] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 29.176325][ T3554] SELinux: failed to load policy [ 29.201574][ T3548] netlink: 4 bytes leftover after parsing attributes in process `syz.0.17'. [ 29.220807][ T3548] hsr_slave_1 (unregistering): left promiscuous mode [ 29.465251][ T3588] loop3: detected capacity change from 0 to 4096 [ 29.474699][ T3588] EXT4-fs: Ignoring removed nomblk_io_submit option [ 29.477244][ T3590] netlink: 131740 bytes leftover after parsing attributes in process `syz.2.25'. [ 29.490977][ T3590] netlink: zone id is out of range [ 29.496093][ T3590] netlink: zone id is out of range [ 29.501510][ T3590] netlink: del zone limit has 8 unknown bytes [ 29.511537][ T3588] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 29.549370][ T3313] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 29.554443][ T3593] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 29.628889][ T3603] Driver unsupported XDP return value 0 on prog (id 26) dev N/A, expect packet loss! [ 29.658523][ T3605] netlink: 224 bytes leftover after parsing attributes in process `syz.3.30'. [ 29.685759][ T3605] pim6reg1: entered promiscuous mode [ 29.691108][ T3605] pim6reg1: entered allmulticast mode [ 29.700716][ T3605] capability: warning: `syz.3.30' uses deprecated v2 capabilities in a way that may be insecure [ 29.788047][ T3415] ================================================================== [ 29.796116][ T3415] BUG: KCSAN: data-race in kick_pool / wq_worker_running [ 29.803126][ T3415] [ 29.805436][ T3415] read-write to 0xffff888237c29de4 of 4 bytes by task 3376 on cpu 0: [ 29.813474][ T3415] wq_worker_running+0x95/0x120 [ 29.818302][ T3415] schedule_timeout+0xb7/0x170 [ 29.823038][ T3415] msleep+0x50/0x90 [ 29.826826][ T3415] nsim_fib_event_work+0x42e6/0x4790 [ 29.832089][ T3415] process_scheduled_works+0x4ce/0x9d0 [ 29.837550][ T3415] worker_thread+0x582/0x770 [ 29.842124][ T3415] kthread+0x489/0x510 [ 29.846169][ T3415] ret_from_fork+0x122/0x1b0 [ 29.850741][ T3415] ret_from_fork_asm+0x1a/0x30 [ 29.855481][ T3415] [ 29.857780][ T3415] read to 0xffff888237c29de4 of 4 bytes by task 3415 on cpu 1: [ 29.865295][ T3415] kick_pool+0x49/0x2d0 [ 29.869426][ T3415] __queue_work+0x8cb/0xb50 [ 29.873908][ T3415] queue_work_on+0xd1/0x160 [ 29.878394][ T3415] process_srcu+0x999/0xbc0 [ 29.882890][ T3415] process_scheduled_works+0x4ce/0x9d0 [ 29.888340][ T3415] worker_thread+0x582/0x770 [ 29.892914][ T3415] kthread+0x489/0x510 [ 29.896960][ T3415] ret_from_fork+0x122/0x1b0 [ 29.901527][ T3415] ret_from_fork_asm+0x1a/0x30 [ 29.906273][ T3415] [ 29.908627][ T3415] value changed: 0x00000000 -> 0x00000001 [ 29.914320][ T3415] [ 29.916618][ T3415] Reported by Kernel Concurrency Sanitizer on: [ 29.922752][ T3415] CPU: 1 UID: 0 PID: 3415 Comm: kworker/1:3 Not tainted syzkaller #0 PREEMPT(voluntary) [ 29.932537][ T3415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 29.942580][ T3415] Workqueue: rcu_gp process_srcu [ 29.947510][ T3415] ================================================================== [ 30.360345][ T3532] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 30.393217][ T12] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.404106][ T12] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.414998][ T12] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.425972][ T31] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.450851][ T3532] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 30.510034][ T3532] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 30.562995][ T31] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.573275][ T31] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.584639][ T2491] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.595688][ T2491] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.741682][ T3593] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 30.800102][ T3593] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 30.859835][ T3593] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 30.912956][ T2491] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.923515][ T2491] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.934542][ T2491] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.944676][ T2491] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0