last executing test programs: 20m20.668362832s ago: executing program 4 (id=4394): ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl2\x00', 0x0, 0x2f, 0x44, 0x4, 0x2, 0x22, @private1, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0x700, 0x700, 0x9f, 0x6}}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff1000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x353, 0x6, 0xc8d, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0xe}, 0x50) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x4, 0x880) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f000015d000/0x4000)=nil, &(0x7f0000016000/0x3000)=nil, &(0x7f0000765000/0x4000)=nil, &(0x7f0000cbc000/0x3000)=nil, &(0x7f0000aca000/0x4000)=nil, &(0x7f000015d000/0x4000)=nil, &(0x7f00005b8000/0x800000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f00001dc000/0x11000)=nil, &(0x7f0000718000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000280)="5a39c03bf0894dba2c5b93e5756532c58756162e675940b0528636f3f7dfbf07bbb528c56d2f84956baa69a48ba3f5671b6b4cccd3e0257fec8e58cbaf02f8d3c6c70e9e0b82fb31ae84e0be88374de7d45178151a0d674073c66699e67bf9b7e857472bae472a0d7e5df00d3acf421aa89e9316e2bf9b6e61af38ef5ace5ced8d7f2938aa1d4269a543be16ee5b1ceffd1ddddbdcdb77f2a7d6f32620f55b2054d9e46affaacb340ce749fbaa40bdbd78d91040b6", 0xb5, r0}, 0x68) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000240)=""/57) r1 = io_uring_setup(0x524, &(0x7f0000000040)={0x0, 0x3cb1, 0x1c080, 0xa, 0x20002f7}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'wlan1\x00', 0x0}) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x1, 0x4) syz_clone(0xe0800000, 0x0, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1, 0x0, 0x0, 0x2) 20m20.373095844s ago: executing program 4 (id=4400): r0 = socket$rxrpc(0x21, 0x2, 0x2) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000002c0)='./file1\x00', 0x2808001, &(0x7f00000001c0)=ANY=[], 0x1, 0x2ba, &(0x7f00000005c0)="$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") r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r1, &(0x7f0000001d40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x18, 0xe000}, 0x5}], 0x1, 0x8080) bind$rxrpc(r0, &(0x7f0000000340)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) 20m18.215300146s ago: executing program 4 (id=4405): r0 = syz_usb_connect$cdc_ncm(0x6, 0x79, &(0x7f0000000000)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x67, 0x2, 0x1, 0x40, 0xf0, 0x5, "", {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x8, 0x24, 0x6, 0x0, 0x1, "1632fc"}, {0x5, 0x24, 0x0, 0x6}, {0xd, 0x24, 0xf, 0x1, 0x3, 0x6, 0x2916, 0x1}, {0x6, 0x24, 0x1a, 0xfffa, 0x1c}, [@mbim_extended={0x8, 0x24, 0x1c, 0x7, 0xe4, 0x91}]}, {{0x9, 0x5, 0x81, 0x3, 0x20, 0xe, 0xb5, 0xd1}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x6, 0x0, 0xff}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x9d, 0x64, 0x34}}}}}}}]}}, &(0x7f0000000400)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x310, 0x6, 0xc, 0x80, 0x10, 0x40}, 0x56, &(0x7f00000000c0)={0x5, 0xf, 0x56, 0x4, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x1, 0x2, 0xe8}, @wireless={0xb, 0x10, 0x1, 0x8, 0x42, 0xa, 0x2, 0x310, 0x9}, @ssp_cap={0x24, 0x10, 0xa, 0xf, 0x6, 0x1, 0x0, 0x8000, [0xff3fc0, 0xc0c0, 0xc0, 0x0, 0xff0038, 0xee3ec6ffb99a7f8c]}, @ssp_cap={0x18, 0x10, 0xa, 0x1, 0x3, 0x4, 0x1e00, 0x76e0, [0x3f, 0x3f60, 0xff0000]}]}, 0x8, [{0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x449}}, {0x4, &(0x7f0000000180)=@lang_id={0x4, 0x3, 0x437}}, {0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x2009}}, {0x84, &(0x7f0000000200)=@string={0x84, 0x3, "cca7dd056eaa714ef6a6f2ca8ee26fd87e6a9c19ed89c23ad93751915313a3cb75dc2d1312faae43b101f078638028fc97b6313269a8f4ad433ea119842199fc8dc083b18f84a51a98183069e43ea522b45f80109a2a37acbd99b2f9e6501d434e26362b7cc1129dc550cb6accce87e57a6d21a550c68c2b296a784d09bae8aa4cbf"}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x4001}}, {0x6a, &(0x7f0000000300)=@string={0x6a, 0x3, "b7de4dadb153c8538594836cf44cbaac06b1e62b3f0041bc149afcaf593f0b2bcb9ed6423cd8006e406e73838b0b917c8b298d0582ec1f0d99e1b1ae783d0ee1513a192d5e69e407be327f5a4043a14f919fa6079946036285fce4608cddec4a90cbf974393b86de"}}, {0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x44f}}, {0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0x100a}}]}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000580)={0x14, &(0x7f0000000480)={0x40, 0x30, 0x8b, {0x8b, 0x8, "5737d8e2cc7564f331e4bf0f3eeed7b51e0dacf0d892c98da5838b0c0df93a66ec1700d49a94c8a97b0e16f4930226b1a8c8bd3a6220bdfe6215a46e2dacab33953d6e6b6b99e726172d0bec494357b5fd3b29c7f32b061ce0a47e01c772a86245ff24c9d492a8213272d80cead3e5a55aa1abbf225accece695ac570673c36870c80fb1a74a881e0d"}}, &(0x7f0000000540)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000800)={0x44, &(0x7f00000005c0)={0x0, 0x0, 0x60, "265bc0d352b2914c5b18c526f1b84b96be1fb6b24c1704dfaffd41e611dd82373d5081f23f937bcc7b1fd262eb07f56e455ff71c046fe8b970fb8bdc6c21cb79feb0c821456daa5e050e781c9c5b7ab1592ee0d7d7f6f527de8c4fbbbade4674"}, &(0x7f0000000640)={0x0, 0xa, 0x1, 0x5}, &(0x7f0000000680)={0x0, 0x8, 0x1, 0x6}, &(0x7f00000006c0)={0x20, 0x80, 0x1c, {0x101, 0xe58c, 0xa, 0x7, 0x7f, 0x411, 0x0, 0x9, 0x9, 0x1, 0x3, 0xfffa}}, &(0x7f0000000700)={0x20, 0x85, 0x4, 0x5}, &(0x7f0000000740)={0x20, 0x83, 0x2, 0x1}, &(0x7f0000000780)={0x20, 0x87, 0x2, 0x9}, &(0x7f00000007c0)={0x20, 0x89, 0x2, 0x1}}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_CHANNEL(r2, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x50, 0x0, 0x10, 0x70bd25, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x8, 0x5e}}}}, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xfffffbff}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1000}]}, 0x50}, 0x1, 0x0, 0x0, 0x44}, 0x20000000) r3 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r3, &(0x7f00000009c0)={0xa, 0x0, 0x6, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x8}, 0x20) r4 = openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) write$binfmt_misc(r4, &(0x7f0000000a00)="7901b25e80d893bef31a7a69e5432569e93a1176440d028dc2e1c62edaada0e4ab76697b44c1d7d8222eb589e89a37d81fe7e83d0a3c1bddcd5ec452e1d13cdf57b0d67d0993c48124030a9042038bd8f6c8cba478bcfbe928f653961ca3aafa4a35fe", 0x63) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000a80)) syz_usb_connect(0x1, 0x9b, &(0x7f0000000ac0)={{0x12, 0x1, 0x110, 0x5f, 0x2, 0x75, 0xff, 0x33f8, 0x115, 0x372, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x89, 0x2, 0x8, 0xff, 0x40, 0x35, "", [{{0x9, 0x4, 0x70, 0x7e, 0x6, 0xff, 0xcc, 0x5, 0x0, [], [{{0x9, 0x5, 0x3, 0xc, 0x10, 0x4, 0x6, 0x6}}, {{0x9, 0x5, 0x1, 0x0, 0x20, 0x5, 0x4, 0x1}}, {{0x9, 0x5, 0xa, 0x10, 0x400, 0x80, 0x7, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x8, 0x2, 0x2}]}}, {{0x9, 0x5, 0xb, 0x1, 0x3ff, 0x0, 0x3, 0x2}}, {{0x9, 0x5, 0x9, 0x1, 0x10, 0x3, 0x8, 0x5, [@generic={0x3, 0x0, '3'}, @uac_iso={0x7, 0x25, 0x1, 0xc, 0x9, 0x31}]}}, {{0x9, 0x5, 0x4, 0x1, 0x20, 0x6, 0x80, 0x40, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x4}, @generic={0x20, 0x4c58f61c82d20dac, "e5be75734c1656563d16bd06e59f24046fc408adecd7ebdfc8f63ab45150"}]}}]}}, {{0x9, 0x4, 0x6c, 0x9, 0x0, 0xff, 0xff, 0xff, 0x9}}]}}]}}, &(0x7f0000000c00)={0xa, &(0x7f0000000b80)={0xa, 0x6, 0x200, 0x9, 0x6, 0x5, 0x0, 0x2}, 0x17, &(0x7f0000000bc0)={0x5, 0xf, 0x17, 0x2, [@wireless={0xb, 0x10, 0x1, 0x2, 0x1, 0xa, 0x40, 0x4, 0xb}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x0, 0xb, 0xc}]}}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000c80), r2) sendmsg$TIPC_NL_KEY_SET(r2, &(0x7f0000000dc0)={&(0x7f0000000c40), 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x88, r5, 0x20, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}]}, @TIPC_NLA_NET={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xf}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5e0}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfff}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x981}, 0x4000000) r6 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)={0x80000}, 0x18) statx(r6, &(0x7f0000000e80)='./file0\x00', 0x6000, 0x2, &(0x7f0000000ec0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000fc0), r2) listen(r1, 0x7) r7 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001000), 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f0000001040)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x80, 0x9, 0x2, 0x6, 0xffffffffffff0001, 0x800}, {0x7, 0x0, 0x6, 0x7, 0x1000, 0x10001}], ['\x00', '\x00', '\x00']}) pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000001240), r9) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r9, 0x89f3, &(0x7f0000001300)={'syztnl2\x00', &(0x7f0000001280)={'syztnl1\x00', 0x0, 0x2f, 0x3, 0x4, 0x7, 0x6, @private1, @empty, 0x40, 0x10, 0x3, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f00000013c0)={'ip6_vti0\x00', &(0x7f0000001340)={'ip6_vti0\x00', 0x0, 0x4, 0x10, 0xb3, 0xe, 0x40, @dev={0xfe, 0x80, '\x00', 0x3c}, @private2, 0x10, 0x7, 0x8, 0x9e}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r9, &(0x7f00000014c0)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001480)={&(0x7f0000001400)={0x48, r10, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r11}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r12}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xca8}]}, 0x48}, 0x1, 0x0, 0x0, 0xb0}, 0x80) r13 = syz_io_uring_setup(0x46db, &(0x7f0000001500)={0x0, 0x4688, 0x2, 0x0, 0x119, 0x0, r9}, &(0x7f0000001580), &(0x7f00000015c0), &(0x7f0000001600)) io_uring_register$IORING_REGISTER_FILES(r13, 0x2, &(0x7f0000001640)=[r9, r2], 0x2) socket$inet6(0xa, 0x1, 0x1fdfc3f) r14 = openat2(r6, &(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)={0x450201, 0xac, 0x8}, 0x18) ioctl$FS_IOC_SETFLAGS(r14, 0x40086602, &(0x7f0000001700)=0x20000) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001740), 0x0, 0x0) 20m16.581461396s ago: executing program 4 (id=4417): r0 = syz_open_dev$sg(0x0, 0x0, 0x802) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000140)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) ptrace$peekuser(0x3, r1, 0x9) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_int(r4, 0x0, 0x8, 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) getpgrp(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xa, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000"], 0x0, 0xffffffff, 0x0, 0x0, 0x40f00, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1fd) unshare(0x44040200) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r7 = io_uring_setup(0x524, &(0x7f0000000040)={0x0, 0x3cb1, 0x1c080, 0xa, 0x20002f7}) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x50, r5, 0xc1166000) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x600, 0x0, 0x0, 0x6}, [@IFLA_ADDRESS={0xa, 0x3, @random="08bc872f00"}, @IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x44}}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'wlan1\x00', 0x0}) io_uring_enter(r7, 0x2219, 0x7721, 0x16, 0x0, 0x0) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000080)="aefdda9d240103005a90f57f02703aeff0f64eb9ee07962c220852f426072a00"/42, 0x2a}], 0x1) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, 0x0) 20m14.390550778s ago: executing program 4 (id=4426): creat(&(0x7f0000000000)='./file0\x00', 0x1dc) socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') r0 = socket$netlink(0x10, 0x3, 0x0) epoll_create1(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000040)='GPL\x00'}, 0x94) epoll_create1(0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendmmsg$inet6(r2, &(0x7f0000000480)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x80020}, 0x1c, &(0x7f0000000300)=[{&(0x7f00000034c0)}], 0x1}}], 0x1, 0x34000811) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000009c0)=ANY=[@ANYBLOB="12e01b3989dd", @ANYRES32=r1], 0x1000f) 20m14.221449539s ago: executing program 4 (id=4428): r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmsg$unix(r0, &(0x7f00000000c0)={&(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4040801}, 0x20008840) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000080)=0x7, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040)=0x45f1, 0x4) recvmmsg(r0, &(0x7f0000000c00)=[{{0x0, 0x300, 0x0, 0x0, &(0x7f0000000280)=""/57, 0x39}, 0x8}], 0x3ffffffffffff2e, 0x1000400000de, 0x0) 19m59.190970675s ago: executing program 32 (id=4428): r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmsg$unix(r0, &(0x7f00000000c0)={&(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4040801}, 0x20008840) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000080)=0x7, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000040)=0x45f1, 0x4) recvmmsg(r0, &(0x7f0000000c00)=[{{0x0, 0x300, 0x0, 0x0, &(0x7f0000000280)=""/57, 0x39}, 0x8}], 0x3ffffffffffff2e, 0x1000400000de, 0x0) 15m24.733708577s ago: executing program 0 (id=6311): r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000003c0)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r1, 0x0, 0x1, 0x4}}, 0x20) 15m24.727717827s ago: executing program 0 (id=6312): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001040), r0) sendmsg$IEEE802154_ADD_IFACE(r0, 0x0, 0x20004800) 15m24.647380077s ago: executing program 0 (id=6313): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) r2 = memfd_create(&(0x7f00000006c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xact\xf4\x06\x9c&\xf5\xe3j\xfa\tcqM\xb8R\x86\xd9\xd2.\x9f\x12\xed\x10\f\xbd\x1a|\x8a\xbb\xda\xcfY\x98gU@\xf2M\xc0\xb5\xdf\x9a\x8d\xdb,n\xae\x0eT\x80\x8c\xfd\xd7\xb0\x94\x82t\x96\rKx\xc5\x9b\x8c\x87\x96\x8bc\xbc\xee\xcc\x9f\xfbF\x99V4\x8f\xdb\xed\x1b\x05\xec\xfc\xd1\xb5\xfd\xec@\xdeU\xdd\xa4\xc1\xe4L)\x8e\xe5\x91\x8e\xd4\x89\xef\x95T\x05G\xac\xb8\xc1: )mh\xc7\xf1?\xbb\x13;\xad\x95\xd70\xb6\x0e\x7f\x84r\x0e\xbf\xc5\xf6\xd4\xdd\t\x14\x18\xf7\xefi\x93\x03\xd2\xe8\bK\"\xd2\xb5\xaa\xb8\xc8\xe0\xac\x99\xe8su\xcd\xc3E\x12\xd7\xdd\x96!\x16Tu\xe3\xf0\x84#R\xd9\xe3~Wj\xb0r\x87\'\xea\a\xcfOeK\x9daW\xf4\x87@\x9c\xf3\xf1K\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x91\xe6\xdb\xc2\xa5h\'\xdfIn\x97\x0263~\xeb\xbe(i\n\xc2k4\x7f\x12\xa9e`\x01Os\x8c\xb4\xe7FeQ\xc6$\x92j_U\xfa\b\xea\xb0bYkW\xc0\x05\aC{\xcc\x03T\x17\xa5Sk\x87P\xc2\x97D\xb2\xfa\x1b\x9fe\xf4\x10\x1a\xad\x92\xce\x88\x1b\xbc\xe14\x19\xaa\xd3\r\xf4\xa2\xc3\x8f\x13\xda\x95\xec\"\x95\xc5B\x9dE\xe1\xd0_b\xf8\x97\x03\x15\xaa\x920\xdcrI\xd8\b\xfb\xc7\xe7xX\x00>d\xbb\xa71\xad\x9a\xfb\xe6\x13\x87\x93\\\xe5W\x06|\x1c\x80\xbc\x840xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r8, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x20, 0x0, 0x8, 0x2, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15m23.552984563s ago: executing program 0 (id=6326): r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) getpeername(r0, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000180)=0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000024c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='P'], 0x50}, 0x1, 0x0, 0x0, 0xc10}, 0x8000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x83) r2 = socket(0x2, 0x3, 0x6) bind$inet(r2, &(0x7f0000000080)={0x2, 0xfffa, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000002400)={0x2, 0x0, @multicast2}, 0x10) connect$pppl2tp(r2, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x2, 0x0, {0xa, 0x4e22, 0x1, @loopback, 0x2}}}, 0x3a) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000003c0)={0x8, 0xfffffff8, 0x8, 0x4, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0x13, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6622b52f, 0x0, 0x0, 0x0, 0x400}, [@printk={@llx, {0x3, 0x0, 0x3, 0xa, 0x0}, {0x5}, {0x6, 0x0, 0x2}, {}, {}, {0x85, 0x0, 0x0, 0x8}}, @printk={@ld, {0x5, 0x3, 0x6, 0xa, 0x1, 0xfff5}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x19}}]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 15m23.437544624s ago: executing program 0 (id=6327): syz_emit_ethernet(0x9a, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0e86dd600101000064110000000000000000000000000000000000ff02000000000000000000000000000100004e22"], 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r0, 0x24, &(0x7f0000000600)={0x2, 0x0, 0x543117df, 0x4}) (async) fcntl$lock(r0, 0x24, &(0x7f0000000600)={0x2, 0x0, 0x543117df, 0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x81, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback={0xff00000000000000, 0x777fe6a4b23f}, 0x0, 0x0, 0xff, 0x0, 0x5, 0x6, 0x5}, 0x20) 15m7.531531635s ago: executing program 33 (id=6327): syz_emit_ethernet(0x9a, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0e86dd600101000064110000000000000000000000000000000000ff02000000000000000000000000000100004e22"], 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r0, 0x24, &(0x7f0000000600)={0x2, 0x0, 0x543117df, 0x4}) (async) fcntl$lock(r0, 0x24, &(0x7f0000000600)={0x2, 0x0, 0x543117df, 0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) faccessat2(r0, &(0x7f0000000000)='./file0\x00', 0x81, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@loopback={0xff00000000000000, 0x777fe6a4b23f}, 0x0, 0x0, 0xff, 0x0, 0x5, 0x6, 0x5}, 0x20) 5.256700536s ago: executing program 3 (id=10888): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'sit0\x00', &(0x7f0000000400)={'sit0\x00', 0x0, 0x8, 0x80, 0x3, 0x7, {{0x5, 0x4, 0x1, 0x1, 0x14, 0x65, 0x0, 0x3, 0x0, 0x0, @loopback, @broadcast}}}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$inet_mptcp(0x2, 0x1, 0x106) prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) symlink(&(0x7f0000001640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000500)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x40) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0xc000, 0x20000000000000, 0xa, 0x3}, 0x0, 0xffffffffffffffff, r4, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb011018f9000000f6ff00340000003400f4ff060000000200010000"], &(0x7f0000000040)=""/2, 0x53, 0x2, 0x1}, 0x28) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000300)={0x1, 0x0, 0x0, 'queue1\x00'}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000a40)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x9}, 0x28) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000c319b2afffba969b38cf4de343a00d1d011b97d0cb91b70fcb0f374ca29506a7ba68bbd0fc635434ec92e2e725028fc0e886fd8b49765629039740b70ff58edde9d0bd920be2648b33a3a53724d7a4fd1cc896f8a7bbfe55dd39e358d4401e4a86d2661bdc5cb5ff3881ced037b6cc0f0d9b5bc650b6b03f86dfc3e3e87b94abf06de190ee6800b18be11eaa2caa8d693f4850697195a482277f4702ed368f320c72c8d29385b526efc0763aae61c145cd34289cdfddd2deddbc77de3c1372787d82a2bb00df"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r6, 0xe0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000021c0), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) r7 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) r8 = socket$rds(0x15, 0x5, 0x0) bind$rds(r8, 0x0, 0x0) sendmsg$rds(r8, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@fadd={0x58, 0x114, 0x6, {{0x83, 0x9}, &(0x7f00000003c0)=0xa0000000000000, 0x0, 0x8, 0x8000000000000001, 0x3, 0x4843, 0x74bd180309d768c, 0x5051}}], 0x58}, 0x0) fsconfig$FSCONFIG_SET_BINARY(r7, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r7, 0x5, &(0x7f0000000040)='cgroup2\x00', 0x0, 0xffffffffffffffff) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) 5.109167738s ago: executing program 1 (id=10890): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000140)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) ptrace$peekuser(0x3, r0, 0x9) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xa, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x40f00, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r5) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r6) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc080003400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r6, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a480000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a31000000001c000380180000800c0001800600010000000000080003400000000114000000110001"], 0x70}, 0x1, 0x0, 0x0, 0x4000851}, 0x40) sendmsg$NFT_BATCH(r5, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a480000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a31000000001c000380180000800c00018006000100bd0300000800034000000001"], 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 3.456518648s ago: executing program 3 (id=10894): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x1, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x3, 0x3, 0x6361, 0x5, 0xffffffff, 0x3}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40088c1}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x400}, 0x8) close_range(r4, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000006c0)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x70b926, 0x25dfdc01, {0x0, 0x0, 0x0, r3, {0x0, 0xd}, {0xffff, 0xb}, {0xffff, 0xffe0}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0xc, 0x2, [@TCA_FQ_CODEL_CE_THRESHOLD={0x8, 0x7, 0xfffffff9}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040e0}, 0x4890) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x41100, 0x7a, '\x00', r3, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x20, 0xc, &(0x7f0000000580)=ANY=[@ANYRES8=r5, @ANYRES16=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0xc40, 0x0, 0xe59}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0xf00, &(0x7f0000000280)={0x0, 0x3, 0x8000, 0xfffffffe}, &(0x7f0000000100), &(0x7f0000000140), 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x8080, &(0x7f0000000380)=ANY=[@ANYBLOB="636865636b3d7374726963742c757466383d312c757466383d302c757466383d312c6e66732c6572726f72733d72656d6f756e742d726f2c73686f72746e616d653d77696e6e742c00043518f9aad8a4f2c1cdb3e993cf0444d9d2d40bb509d4da042c2c85e3650de97db42c38cafa7a9d7503c3c985486cf7fdb62fb1fc80515e9bef7e9e56fb346de370b3eb3ecbc59d343c36bf04efc3d68033308b0014b0c677ae5ef2932cc05f566112668fa4f6844dcf823618a2993da771384e8fc12467a56b33e3b00030dbfd82ea2f8ddbeb1d04bac86815ebe0b9d084d60edf56b15e74589892dce80700000000000000b738dddfd38d20b443570197dc795020ecf541601ef9a5618869febf769dd50261849a47e170ba166b97e76a0261d0dc1fb3e2646595f1c8b49057d94f10f7b5e35ead0a38", @ANYRES8], 0x3, 0x232, &(0x7f0000000640)="$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") mremap(&(0x7f0000a11000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ba6000/0x2000)=nil) munmap(&(0x7f0000e29000/0x1000)=nil, 0x1000) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f000040b000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00004b3000/0x4000)=nil) mremap(&(0x7f0000302000/0x1000)=nil, 0x1000, 0x3000, 0x4, &(0x7f0000373000/0x3000)=nil) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3000001, 0x11, r6, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2000, &(0x7f0000003700)={0x77359400}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000900)=[@in6={0xa, 0x4e23, 0x3f, @loopback, 0x5}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000580)={0x0, 0x3}, 0x57) socket$netlink(0x10, 0x3, 0xe) 2.820392756s ago: executing program 6 (id=10896): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000030000004c0001800d0001007564703a73797a300000000038000400140001000a0000007f000001fec000000000000020000200"], 0x60}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffdffd, 0x0, 0x0, 0x0, 0x800}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x4a, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r3 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f00000000c0)={0x1d, r4}, 0x18) connect$can_j1939(r3, &(0x7f0000000140)={0x1d, r4}, 0x18) sendto(r3, 0x0, 0xc8, 0x44084, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r5, 0x2000000, 0xd, 0x0, &(0x7f0000000200)='\x00'/13, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) unshare(0x22020400) r6 = socket(0x40000000015, 0x5, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x28, 0x3, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) connect$inet6(r6, &(0x7f0000000200)={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, '\x00', 0x1f}, 0xff}, 0x1c) getsockopt$sock_buf(r6, 0x1, 0x1c, 0x0, &(0x7f00000001c0)=0x3b) 2.743785666s ago: executing program 3 (id=10897): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[], 0x30}, 0x1, 0x0, 0x0, 0x8045}, 0x20000800) 2.597227378s ago: executing program 5 (id=10898): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x68, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) socket$nl_route(0x10, 0x3, 0x0) acct(0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sched_setscheduler(0x0, 0x1, 0x0) syz_open_dev$MSR(0x0, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000000000)=@newtaction={0x6c, 0x30, 0x53b, 0x0, 0x0, {}, [{0x58, 0x1, [@m_simple={0x54, 0x1, 0x0, 0x0, {{0xb}, {0x28, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0xb, 0x3, 'simple\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x9f}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}, 0x6c}, 0x1, 0x300000000000000, 0x0, 0x4060040}, 0x0) 2.575757828s ago: executing program 3 (id=10899): syz_emit_ethernet(0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, 0x0) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000880)={0x0, 0x1, 0x8, 0x16, 0xc5, &(0x7f0000000480)="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"}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0xc, [@var={0xa, 0x0, 0x0, 0x11, 0x4, 0xffffffff}, @const={0x0, 0x44, 0x0, 0x2}, @restrict={0x0, 0x0, 0x0, 0xb, 0x2}, @var={0x2, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x0, 0x4f, 0x5f, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x5c}, 0x1e) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x880, &(0x7f00000003c0)=ANY=[@ANYBLOB='dos1xfloppy,shor4name=lower,nonumtail=0,shortname=lower,uni_xlate=0,uni_xlate=0,rodir,nfs,rodir,shortname=winnt,uni_xlate=1,utf8=0,utf8=1,tz=UTC,rodir,utf8=1,shortname=lower,utf8=0,\x00'], 0x1, 0x316, &(0x7f0000000a00)="$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") 2.385128441s ago: executing program 3 (id=10900): ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000680)=""/144) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x6}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x96, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4054) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x1002, 0x20da, 0x0, 0x0, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0xb) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f064eb", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x2000000, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}}, 0x24}, 0x1, 0xfffc}, 0x4000800) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=@delchain={0x24, 0x11, 0x1, 0x1f, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xd}}}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0xa) r6 = socket$kcm(0x21, 0x2, 0x2) socketpair(0xa, 0xa, 0x400, &(0x7f0000000100)) sendmsg$kcm(r6, 0x0, 0xc015) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="200000006a00010629bd7000fedbdf25f0ff00000000000008000a"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x0) r8 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_PKTINFO(r8, 0x29, 0x32, &(0x7f00000000c0)={@loopback}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)={0x70, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}]}, @ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x40001}, 0x4000) socket$kcm(0x10, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) 2.298456512s ago: executing program 6 (id=10901): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x1000, 0x20da, 0x0, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_emit_ethernet(0x46, &(0x7f0000000180)={@multicast, @random="caf66222e6aa", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "430093", 0x10, 0x3a, 0xff, @private1, @mcast2, {[], @ndisc_ra}}}}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0x4d, 0xfffffffb, 0x7fffffff}}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000003480)=@newqdisc={0x838, 0x28, 0x4ee4e6a52ff56d49, 0x4001, 0xfffffdf8, {0x0, 0x0, 0x0, r3, {0x10}, {}, {0xa, 0x3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x80c, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x1, 0xfffffffe, 0x9, 0x8000, 0x3, 0x5, 0x5, 0xb762, 0x6, 0x7, 0x8, 0xf, 0x2, 0x80000001, 0x3fd, 0x7fc, 0xffff8000, 0x6, 0x401, 0x9, 0xb89, 0xffffe4f5, 0xd6, 0x4, 0xffff, 0x7, 0x0, 0x2, 0x101, 0x1, 0xfffffffc, 0x4, 0x1, 0x1, 0x9, 0xc, 0x20001000, 0x4, 0x2, 0x7, 0x4, 0x99, 0x9, 0x2, 0x6, 0x7, 0xfffffff7, 0x1, 0x2, 0x9, 0x9, 0x44, 0x8, 0x8, 0x1, 0x4, 0x7ff, 0x8, 0x7, 0x80000001, 0x400, 0x8, 0xfffffa72, 0xcd, 0x6, 0x80000000, 0xc, 0x4, 0x65, 0x91, 0x659, 0x9, 0xf, 0x9, 0xc28, 0x9, 0x7, 0x3, 0x401, 0x3, 0x2, 0xfffffffa, 0x1, 0x10001, 0x3, 0x1, 0x4, 0x8, 0x8, 0x7, 0x1, 0x1, 0x1, 0x7, 0x40, 0x7, 0x12, 0x8000, 0x4fe, 0x4dc, 0x20080, 0x3, 0x7fffffff, 0xfc, 0x9, 0xa7, 0xf, 0x2, 0x0, 0x3, 0x1000, 0x4, 0x401, 0x7, 0x80000000, 0xffff, 0x6, 0x5, 0x4, 0xffffffff, 0x80000000, 0x1966f9ab, 0x200, 0x20200, 0xed5, 0xfffffc00, 0x6, 0x4, 0x8, 0x485e, 0xa85, 0x80000040, 0x2, 0x7, 0x7, 0x102, 0x2d5421e8, 0x7, 0x10000, 0xffffffff, 0x6, 0x3ff, 0xf04, 0x0, 0x2, 0x5, 0xfffffc00, 0x5, 0x8d, 0x4, 0x401, 0x7, 0x9, 0x3, 0xfffffffb, 0x1, 0x0, 0x0, 0x2, 0x5, 0x8, 0x3, 0x0, 0x800, 0x2, 0x8, 0x7ff, 0x1, 0x80000009, 0x6, 0x5, 0x4, 0x4d15, 0x1ff, 0x9, 0x3, 0x469, 0x3, 0x0, 0x200, 0x10000005, 0x7, 0x1, 0x8, 0x42ba, 0x4, 0x9, 0x1f31, 0x8, 0x8, 0x53, 0x6, 0x4, 0x400, 0x8000, 0x0, 0x2c310b18, 0xfff, 0x0, 0x3, 0xcd34, 0x9, 0x81, 0xdf3, 0x2, 0x40007, 0x8, 0xfff, 0x1ff, 0x8000, 0x3, 0x8, 0x3, 0x9, 0x9a6, 0xe4cb, 0x402, 0x5, 0x1ff, 0x3e, 0x9b4, 0x1, 0x8, 0x0, 0x8, 0x0, 0x9, 0x0, 0x4, 0x10, 0x901, 0x5, 0x2, 0x7b, 0xfffffeff, 0x6, 0x6, 0xc, 0x1000, 0x9, 0x9, 0xe6, 0xab, 0x400, 0x7fffffff, 0xed, 0x7ff, 0xd83, 0x68, 0x80000001, 0x4, 0x1, 0x6, 0x1fd, 0x2]}, @TCA_TBF_PTAB={0x404, 0x3, [0x8, 0x200006, 0xd, 0x400, 0x0, 0x3, 0x5, 0x10000, 0xb, 0x4, 0x81, 0x0, 0x8, 0x0, 0x9, 0x5, 0xc0000, 0x8001, 0x1, 0x2000, 0x1, 0x8da5, 0x1, 0x4, 0x2, 0x6, 0x58, 0x7, 0x6f, 0x8, 0x3, 0x4, 0x9, 0x1000, 0x4, 0x6e, 0x6, 0x80000001, 0x3, 0x3, 0xd4, 0x100, 0xa, 0xfff, 0x8, 0x9, 0x7, 0x7fffffff, 0xf4b3, 0x1, 0x0, 0x8, 0x8, 0x6, 0xd815, 0xfffffff9, 0x2, 0x401, 0x9, 0x36, 0xf, 0x74, 0xbbc, 0x9, 0x0, 0x6, 0x8, 0x5, 0x6, 0xb, 0x5, 0x5, 0x4e3, 0x200, 0x0, 0x9, 0x8001, 0x2, 0x1000, 0x80000001, 0x46a3, 0x6, 0x2, 0x1dd50645, 0x401, 0x1, 0x101, 0xbf, 0x0, 0x9, 0x3, 0x65, 0xffffff13, 0x2, 0x30, 0x1a3f, 0x2, 0x389c, 0x4, 0x3, 0x3ff, 0x4, 0x4, 0x6, 0xf3bb, 0x1ff, 0x8, 0xf, 0xb, 0x401, 0x4, 0x1000, 0x1, 0x80008, 0x1, 0x7ff, 0x7fff, 0x8, 0x408, 0x3ff, 0x4, 0x1, 0xffff, 0x7fff, 0x2, 0x9, 0x1, 0xfff, 0x0, 0xfffffffe, 0x4, 0x0, 0x101, 0x78f0, 0xf, 0x9, 0x0, 0x3, 0xf1c7, 0x100, 0x3, 0x4, 0xfffffffe, 0xffffff7f, 0x3, 0x0, 0x6, 0xd, 0x2, 0xa, 0x8, 0x200, 0x0, 0x400, 0x9, 0x6, 0x132f, 0xaba3, 0x1, 0x3, 0x5, 0x5, 0x6f788000, 0xc, 0x1ff, 0x40, 0x9, 0x3, 0x2, 0x1, 0x0, 0x3, 0xb13, 0x4, 0xbc5, 0x0, 0x20007, 0xffff, 0x100, 0x7b58, 0x1, 0x807, 0x1ff, 0x3, 0x400, 0x80000000, 0x1040, 0x3, 0xfffffffa, 0x9a5, 0x8, 0x5, 0x1, 0x9, 0x3, 0x9, 0x7, 0x3, 0x1, 0x101, 0x4, 0x6, 0x598f, 0x5, 0x8e, 0x0, 0xa, 0x9, 0x1000, 0x8, 0xd00f, 0x2, 0x1, 0x6, 0x2a, 0x7, 0x100, 0x24e, 0xbd, 0x2, 0x2800000, 0x807, 0x0, 0x401, 0x6, 0x2, 0x9, 0x7039, 0x4, 0x5, 0x9, 0x1, 0xb18, 0x2, 0xfffffffe, 0x26e, 0x6, 0x5c, 0x8, 0x100, 0x3ff, 0x1, 0x0, 0xb, 0x10000, 0x8, 0x6, 0x2, 0x6, 0x7, 0x2, 0x7ff, 0x1, 0x4, 0x8001, 0x3]}]}}]}, 0x838}, 0x1, 0x0, 0x0, 0x40098}, 0x0) 2.294734212s ago: executing program 1 (id=10902): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) close(0xffffffffffffffff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x106}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x6c}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x48, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, '\x00\x00'}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c000180060001000000000014000000110001"], 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[], 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000001040), r2) sendmsg$IEEE802154_ADD_IFACE(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002cbd7000fddbdf252100000009001f0070687931fd00000005002000002000000c0005"], 0x34}, 0x1, 0x0, 0x0, 0x20044000}, 0x20004800) 2.197340353s ago: executing program 5 (id=10904): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000200)=0x439a, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0xffffffff, @loopback={0x80fe}, 0xbf}, 0x1c) 2.195244613s ago: executing program 1 (id=10905): r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x1c104, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x2076) ppoll(&(0x7f0000001040)=[{r1, 0xfae83c30bf5f62f}, {r1, 0x4}], 0x2, 0x0, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="09000000040000000c000000"], 0x50) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x4d}, 0x28) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='\x00'/12], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x101}, 0x94) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a40000000160a03020000000000000000020000000900020073797a32000000000900010073797a3000000000140003800800024000000000080001400000000014000000110001", @ANYRES16=r2, @ANYRESHEX=r3], 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x40440d0) sendmsg$NFT_BATCH(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000160a01080000000000000000020000000900020073797a30000000000900010073797a30000000002c00038008000240000000000800014000000000180003801400010069705f7674693000000000000000000014000000110001"], 0x80}}, 0x0) close_range(r4, 0xffffffffffffffff, 0x0) r9 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$PTP_ENABLE_PPS(r9, 0x40043d04, 0x0) 2.160928404s ago: executing program 5 (id=10906): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x400, &(0x7f0000000040)={[{@resgid}, {@stripe={'stripe', 0x3d, 0x40}}]}, 0x1, 0x4a6, &(0x7f0000000a40)="$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") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0xbb6, @loopback, 0x5}, 0x28) connect$inet6(r0, &(0x7f0000000480)={0xa, 0x4e20, 0x9, @loopback, 0x8}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="090000000b000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000deffffff00000000000000"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1, 0xffffffffffffffff}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000a40)={r2, &(0x7f0000000a00)}, 0x20) r3 = fcntl$dupfd(r0, 0x406, r0) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001c00), 0x400000000000159, 0x40840) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYBLOB="30000000d5e1ed698f67b34919a24e18d656e39aaabf76ac3c666dbe096de3222371bd5ecee447bb46597a4d7d8791edd1419ebc4a8f00148b10a78eb5548c13ba81", @ANYRES16=0x0, @ANYBLOB="01032cbd7000fedbdf25000000001400020077673100"/34], 0x28}, 0x1, 0x0, 0x0, 0xc0}, 0x20040000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) write$binfmt_elf64(r3, &(0x7f00000004c0)=ANY=[], 0xfffffdcf) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x105042, 0xd) 2.022295005s ago: executing program 6 (id=10907): r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401f, 0x68180, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6f, 0x1, @perf_bp={0x0, 0x1}, 0x10c0e8, 0x1, 0x0, 0x3, 0x6, 0x8001, 0x7fff}, 0x0, 0xff6fbfffffffffff, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip_tables_matches\x00') preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000280)=""/215, 0xd7}], 0x1, 0x1006c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x2, 0x1fffffffffffff35, &(0x7f0000000240)=ANY=[@ANYRES8=r0, @ANYRES16, @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x5a, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x4c881, &(0x7f0000000540)={0xa, 0x4e24, 0x10, @mcast2}, 0x1c) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r3, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x63) r5 = socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000ac0)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0xffffffffffffff8c, &(0x7f0000000100)={[{@stripe}, {@nobh}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x8}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@nogrpid}, {@sysvgroups}, {@orlov}, {@grpquota}, {@noauto_da_alloc}]}, 0x1, 0x47f, &(0x7f0000000b00)="$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") fchmodat(0xffffffffffffff9c, &(0x7f0000000300)='.\x00', 0xffffffd3) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000680)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x380407b, 0x0, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_MCAST_JOIN_GROUP(r5, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000000000002000002e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000100000002004e21000000000000000000000000000000000000000000000000000000000000000000000000004000581e830b00"/247], 0x110) write$P9_RLERRORu(r4, &(0x7f0000000300)=ANY=[@ANYRESHEX], 0x10) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, 0x0, &(0x7f0000000140)) 1.913119346s ago: executing program 2 (id=10910): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv4_newaddr={0x18, 0x14, 0x509, 0x70bd2c, 0x0, {0x2, 0x40}}, 0x18}}, 0x4000) (async, rerun: 32) r2 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder-control\x00', 0x800, 0x0) (rerun: 32) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vxcan0\x00', 0x0}) (async, rerun: 32) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bind$tipc(r4, 0x0, 0x0) (async, rerun: 64) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400840}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@getnexthop={0x40, 0x6a, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@NHA_MASTER={0x8, 0xa, 0x1}, @NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}, @NHA_OIF={0x8, 0x5, r3}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_GROUPS={0x4}, @NHA_GROUPS={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x4041}, 0x4000000) (async, rerun: 64) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000900)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWSET={0x3c8, 0x9, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x2}, [@NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_POLICY={0x8}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x7}, @NFTA_SET_EXPRESSIONS={0x378, 0x12, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @exthdr={{0xb}, @void}}, {0x5c, 0x1, 0x0, 0x1, @limit={{0xa}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_LIMIT_RATE={0xc, 0x1, 0x1, 0x0, 0x7fff}, @NFTA_LIMIT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_LIMIT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_LIMIT_TYPE={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_LIMIT_UNIT={0xc, 0x2, 0x1, 0x0, 0xffffffffffffffff}, @NFTA_LIMIT_TYPE={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_LIMIT_BURST={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_LIMIT_TYPE={0x8, 0x4, 0x1, 0x0, 0x1}]}}}, {0x38, 0x1, 0x0, 0x1, @last={{0x9}, @val={0x28, 0x2, 0x0, 0x1, [@NFTA_LAST_MSECS={0xc, 0x2, 0x1, 0x0, 0x40000000000000}, @NFTA_LAST_MSECS={0xc, 0x2, 0x1, 0x0, 0x2}, @NFTA_LAST_MSECS={0xc, 0x2, 0x1, 0x0, 0x8}]}}}, {0x10, 0x1, 0x0, 0x1, @masq={{0x9}, @void}}, {0x2c0, 0x1, 0x0, 0x1, @inner={{0xa}, @val={0x2b0, 0x2, 0x0, 0x1, [@NFTA_INNER_NUM={0x8}, @NFTA_INNER_FLAGS={0x8}, @NFTA_INNER_HDRSIZE={0x8, 0x4, 0x1, 0x0, 0x17}, @NFTA_INNER_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_INNER_HDRSIZE={0x8, 0x4, 0x1, 0x0, 0x1f}, @NFTA_INNER_FLAGS={0x8, 0x3, 0x1, 0x0, 0xbd78c4410af3b387}, @NFTA_INNER_EXPR={0x26c, 0x5, 0x0, 0x1, @immediate={{0xe}, @val={0x258, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_IMMEDIATE_DATA={0xa4, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x30, 0x1, "03975ad5d184e9c3737aef8db83167164599e9f501ab39c9883482902bcc4a73d58ff9d97c0b70b597226f6d"}, @NFTA_DATA_VALUE={0x16, 0x1, "81c953fbe2b17ab2e0d3e5302a01c07df28a"}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_IMMEDIATE_DATA={0x94, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x75, 0x1, "9b29e345d753b28ae3e159c23e8367152d139c0e49022956037e01f3cc4105d9acd762ff65538e7fd7291396a14358ba6fd3062fe2d2c804ad48b5fabf37b191a91710511ff480a9710e87637ec4c5bda25c2268e96682b8c4bc9230571589975253184f2f6fe356ad97b95bbc7154bbb6"}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0xf}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_IMMEDIATE_DATA={0xec, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x2e, 0x1, "bc3df21a0b09dc6a08c1ba2a80f42224446794c695fe80d011945410a9510dadc3845140a0edf5101414"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffff9}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}]}]}]}}}, @NFTA_INNER_TYPE={0x8, 0x2, 0x1, 0x0, 0xfd}, @NFTA_INNER_FLAGS={0x8}]}}}]}, @NFTA_SET_EXPR={0xc, 0x11, 0x0, 0x1, @nat={{0x8}, @void}}]}, @NFT_MSG_NEWSET={0x50, 0x9, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x101}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x6}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x3}, @NFTA_SET_EXPR={0xc, 0x11, 0x0, 0x1, @rt={{0x7}, @void}}]}, @NFT_MSG_NEWFLOWTABLE={0x14, 0x16, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x9}}, @NFT_MSG_DELTABLE={0x28, 0x2, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x3}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0xa}}}, 0x47c}, 0x1, 0x0, 0x0, 0x4081}, 0x8800) (async, rerun: 32) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r2, 0x40047211, &(0x7f0000000080)=0x1) (rerun: 32) 1.894490496s ago: executing program 6 (id=10911): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000030000004c0001800d0001007564703a73797a300000000038000400140001000a0000007f000001fec000000000000020000200"], 0x60}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffdffd, 0x0, 0x0, 0x0, 0x800}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x4a, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r3 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f00000000c0)={0x1d, r4}, 0x18) connect$can_j1939(r3, &(0x7f0000000140)={0x1d, r4}, 0x18) sendto(r3, 0x0, 0xc8, 0x44084, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000200)='\x00'/14, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4d) unshare(0x22020400) r6 = socket(0x40000000015, 0x5, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r7, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000200)={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, '\x00', 0x1f}, 0xff}, 0x1c) getsockopt$sock_buf(r6, 0x1, 0x1c, 0x0, &(0x7f00000001c0)=0x3b) 1.854489097s ago: executing program 3 (id=10912): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000140)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) ptrace$peekuser(0x3, r0, 0x9) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xa, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x40f00, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r5) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r6) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc080003400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r6, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a480000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a31000000001c000380180000800c0001800600010000000000080003400000000114000000110001"], 0x70}, 0x1, 0x0, 0x0, 0x4000851}, 0x40) sendmsg$NFT_BATCH(r5, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a480000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a31000000001c000380180000800c00018006000100bd0300000800034000000001"], 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 1.705182819s ago: executing program 6 (id=10913): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000006c0)=@gettaction={0x14, 0x32, 0x8, 0x70bd2d, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040098}, 0x4084) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x40000) syz_open_dev$MSR(&(0x7f0000000080), 0x200, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x3d3e2000) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa420, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000d80)={0x2, &(0x7f0000000000)=[{0xac, 0x1, 0x9, 0x6}, {0x6, 0xe, 0x7f, 0x7}]}) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x80000, 0x7, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newtaction={0x14, 0x30, 0x1, 0x4000000, 0x0, {0x0, 0x0, 0x6a00}}, 0x14}}, 0x0) 1.693083329s ago: executing program 2 (id=10914): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ffe, 0x0, 0x0, 0x0, 0x9}, [@call={0x85, 0x0, 0x0, 0x2e}]}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0x0, &(0x7f0000000540)="00000000000000008a7e84d67aa8", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0x50) 1.415361632s ago: executing program 2 (id=10915): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x25, 0x0, 0x1}, {0x20}, {0x6, 0xfd, 0x0, 0x7ffffcb9}]}) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'vlan0\x00', 0x0}) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000000600), 0x56) sendmsg$kcm(r1, &(0x7f00000000c0)={&(0x7f0000000580)=@xdp={0x2c, 0x0, r2, 0x3e}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000180)="27030200590214000600002fb96dbcf706e105000000884700001144ee163cd4b8bf4a31accb", 0x26}], 0x1}, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x90108, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={0x0, 0x2}, 0x1302, 0x20002, 0xfffffffe, 0x1, 0x2, 0x0, 0x873f, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x11, 0x2, 0x300) perf_event_open(&(0x7f00000003c0)={0x5, 0xfffffffffffffe0c, 0x0, 0x80, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x10001}, 0x100600, 0x2, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_audit(0x10, 0x3, 0x9) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x0, 0x0}) lsm_set_self_attr(0x0, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000010900010073797a310000000040000000030a01020000000000000000010000000900030073797a32000000000900010073797a3102000000140004800800014000000003080002400ce0556234000000140a0101000000000000000002000004110008006db80a3b45c9defef7a7dedb970000000900010073797a3100000000140000001100010000000000000000000000000a"], 0xbc}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f0000000000)="240000001a005f0314f9f407000904000200000001000000000000", 0x1b) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040)=0x1000600, 0x4) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0xec}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r6, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="640000000109030000000000000000000000000a080005400000000540000200060003400004000006000340000000002c00018014000300000000000000000000000000000000011400040000000000000000000000ff0ce10000010800064000000001"], 0x64}, 0x1, 0x0, 0x0, 0x2000c000}, 0x4000800) sendmsg$nl_route(r4, 0x0, 0x24000000) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="70000000490001002dbd70ebfddbdf250a001e00", @ANYRES32=r2, @ANYBLOB="0400000014000100fc0200000000000000000000000000010800020000000000080002000400000014000100fe8800000000000000000000000001011400010000000000000000000000ffffe00000010800020003000000"], 0x70}, 0x1, 0x0, 0x0, 0x800}, 0x0) r7 = socket$inet(0x2, 0x5, 0x0) getpeername$l2tp(r7, &(0x7f0000000100)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r7}, 0x8) io_setup(0xbf3, &(0x7f0000000000)=0x0) io_pgetevents(r8, 0x8000023, 0x800000000000087, &(0x7f00000001c0), &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000100)={&(0x7f00000002c0), 0x8}) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40500000000eaff061014000000000062010c00000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 1.205246995s ago: executing program 1 (id=10916): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003240)=[{{&(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000016c0)}}], 0x1, 0x4000800) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2101, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401f, 0x68180, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6f, 0x1, @perf_bp={0x0, 0x1}, 0x400, 0x0, 0x7, 0x4, 0x6, 0x8001, 0x8002}, 0x0, 0xff6fbfffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000080)='.\x00', 0x480, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@deltclass={0x24, 0x29, 0x20, 0x70bd2b, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x8, 0x2}, {0xfff2, 0xffe0}, {0x9}}}, 0x24}}, 0x40018) shmget(0x2, 0x4000, 0x54000000, &(0x7f0000c2e000/0x4000)=nil) socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket(0x1, 0x80005, 0x0) write(r1, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1f, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x2, 0x5, 0x40, 0x7ff}]}) 903.381219ms ago: executing program 2 (id=10917): syz_emit_ethernet(0x46, &(0x7f0000000180)={@multicast, @random="caf66222e6aa", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "430093", 0x10, 0x3a, 0xff, @private1, @mcast2, {[], @ndisc_ra}}}}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0x4d, 0xfffffffb, 0x7fffffff}}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000003480)=@newqdisc={0x838, 0x28, 0x4ee4e6a52ff56d49, 0x4001, 0xfffffdf8, {0x0, 0x0, 0x0, r3, {0x10}, {}, {0xa, 0x3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x80c, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x1, 0xfffffffe, 0x9, 0x8000, 0x3, 0x5, 0x5, 0xb762, 0x6, 0x7, 0x8, 0xf, 0x2, 0x80000001, 0x3fd, 0x7fc, 0xffff8000, 0x6, 0x401, 0x9, 0xb89, 0xffffe4f5, 0xd6, 0x4, 0xffff, 0x7, 0x0, 0x2, 0x101, 0x1, 0xfffffffc, 0x4, 0x1, 0x1, 0x9, 0xc, 0x20001000, 0x4, 0x2, 0x7, 0x4, 0x99, 0x9, 0x2, 0x6, 0x7, 0xfffffff7, 0x1, 0x2, 0x9, 0x9, 0x44, 0x8, 0x8, 0x1, 0x4, 0x7ff, 0x8, 0x7, 0x80000001, 0x400, 0x8, 0xfffffa72, 0xcd, 0x6, 0x80000000, 0xc, 0x4, 0x65, 0x91, 0x659, 0x9, 0xf, 0x9, 0xc28, 0x9, 0x7, 0x3, 0x401, 0x3, 0x2, 0xfffffffa, 0x1, 0x10001, 0x3, 0x1, 0x4, 0x8, 0x8, 0x7, 0x1, 0x1, 0x1, 0x7, 0x40, 0x7, 0x12, 0x8000, 0x4fe, 0x4dc, 0x20080, 0x3, 0x7fffffff, 0xfc, 0x9, 0xa7, 0xf, 0x2, 0x0, 0x3, 0x1000, 0x4, 0x401, 0x7, 0x80000000, 0xffff, 0x6, 0x5, 0x4, 0xffffffff, 0x80000000, 0x1966f9ab, 0x200, 0x20200, 0xed5, 0xfffffc00, 0x6, 0x4, 0x8, 0x485e, 0xa85, 0x80000040, 0x2, 0x7, 0x7, 0x102, 0x2d5421e8, 0x7, 0x10000, 0xffffffff, 0x6, 0x3ff, 0xf04, 0x0, 0x2, 0x5, 0xfffffc00, 0x5, 0x8d, 0x4, 0x401, 0x7, 0x9, 0x3, 0xfffffffb, 0x1, 0x0, 0x0, 0x2, 0x5, 0x8, 0x3, 0x0, 0x800, 0x2, 0x8, 0x7ff, 0x1, 0x80000009, 0x6, 0x5, 0x4, 0x4d15, 0x1ff, 0x9, 0x3, 0x469, 0x3, 0x0, 0x200, 0x10000005, 0x7, 0x1, 0x8, 0x42ba, 0x4, 0x9, 0x1f31, 0x8, 0x8, 0x53, 0x6, 0x4, 0x400, 0x8000, 0x0, 0x2c310b18, 0xfff, 0x0, 0x3, 0xcd34, 0x9, 0x81, 0xdf3, 0x2, 0x40007, 0x8, 0xfff, 0x1ff, 0x8000, 0x3, 0x8, 0x3, 0x9, 0x9a6, 0xe4cb, 0x402, 0x5, 0x1ff, 0x3e, 0x9b4, 0x1, 0x8, 0x0, 0x8, 0x0, 0x9, 0x0, 0x4, 0x10, 0x901, 0x5, 0x2, 0x7b, 0xfffffeff, 0x6, 0x6, 0xc, 0x1000, 0x9, 0x9, 0xe6, 0xab, 0x400, 0x7fffffff, 0xed, 0x7ff, 0xd83, 0x68, 0x80000001, 0x4, 0x1, 0x6, 0x1fd, 0x2]}, @TCA_TBF_PTAB={0x404, 0x3, [0x8, 0x200006, 0xd, 0x400, 0x0, 0x3, 0x5, 0x10000, 0xb, 0x4, 0x81, 0x0, 0x8, 0x0, 0x9, 0x5, 0xc0000, 0x8001, 0x1, 0x2000, 0x1, 0x8da5, 0x1, 0x4, 0x2, 0x6, 0x58, 0x7, 0x6f, 0x8, 0x3, 0x4, 0x9, 0x1000, 0x4, 0x6e, 0x6, 0x80000001, 0x3, 0x3, 0xd4, 0x100, 0xa, 0xfff, 0x8, 0x9, 0x7, 0x7fffffff, 0xf4b3, 0x1, 0x0, 0x8, 0x8, 0x6, 0xd815, 0xfffffff9, 0x2, 0x401, 0x9, 0x36, 0xf, 0x74, 0xbbc, 0x9, 0x0, 0x6, 0x8, 0x5, 0x6, 0xb, 0x5, 0x5, 0x4e3, 0x200, 0x0, 0x9, 0x8001, 0x2, 0x1000, 0x80000001, 0x46a3, 0x6, 0x2, 0x1dd50645, 0x401, 0x1, 0x101, 0xbf, 0x0, 0x9, 0x3, 0x65, 0xffffff13, 0x2, 0x30, 0x1a3f, 0x2, 0x389c, 0x4, 0x3, 0x3ff, 0x4, 0x4, 0x6, 0xf3bb, 0x1ff, 0x8, 0xf, 0xb, 0x401, 0x4, 0x1000, 0x1, 0x80008, 0x1, 0x7ff, 0x7fff, 0x8, 0x408, 0x3ff, 0x4, 0x1, 0xffff, 0x7fff, 0x2, 0x9, 0x1, 0xfff, 0x0, 0xfffffffe, 0x4, 0x0, 0x101, 0x78f0, 0xf, 0x9, 0x0, 0x3, 0xf1c7, 0x100, 0x3, 0x4, 0xfffffffe, 0xffffff7f, 0x3, 0x0, 0x6, 0xd, 0x2, 0xa, 0x8, 0x200, 0x0, 0x400, 0x9, 0x6, 0x132f, 0xaba3, 0x1, 0x3, 0x5, 0x5, 0x6f788000, 0xc, 0x1ff, 0x40, 0x9, 0x3, 0x2, 0x1, 0x0, 0x3, 0xb13, 0x4, 0xbc5, 0x0, 0x20007, 0xffff, 0x100, 0x7b58, 0x1, 0x807, 0x1ff, 0x3, 0x400, 0x80000000, 0x1040, 0x3, 0xfffffffa, 0x9a5, 0x8, 0x5, 0x1, 0x9, 0x3, 0x9, 0x7, 0x3, 0x1, 0x101, 0x4, 0x6, 0x598f, 0x5, 0x8e, 0x0, 0xa, 0x9, 0x1000, 0x8, 0xd00f, 0x2, 0x1, 0x6, 0x2a, 0x7, 0x100, 0x24e, 0xbd, 0x2, 0x2800000, 0x807, 0x0, 0x401, 0x6, 0x2, 0x9, 0x7039, 0x4, 0x5, 0x9, 0x1, 0xb18, 0x2, 0xfffffffe, 0x26e, 0x6, 0x5c, 0x8, 0x100, 0x3ff, 0x1, 0x0, 0xb, 0x10000, 0x8, 0x6, 0x2, 0x6, 0x7, 0x2, 0x7ff, 0x1, 0x4, 0x8001, 0x3]}]}}]}, 0x838}, 0x1, 0x0, 0x0, 0x40098}, 0x0) 902.632649ms ago: executing program 5 (id=10918): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0xaa}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='.\x00', 0x0, 0x121) fcntl$notify(r0, 0x402, 0x30) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x4) write$P9_RVERSION(r1, &(0x7f0000000a80)=ANY=[], 0x15) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f00000000c0)={0x1d, r3}, 0x10) sendmsg$can_bcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x1, 0x1, 0x10, {}, {}, {}, 0x1, @can={{0x2, 0x0, 0x1, 0x1}, 0x5, 0x2, 0x0, 0x0, "001bd300058edb7c"}}, 0x48}, 0x1, 0x0, 0x0, 0x881}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x20000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) vmsplice(r4, &(0x7f00000009c0)=[{&(0x7f0000000140)="d0", 0x1}], 0x1, 0x7) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x18, 0x2, 0x2, 0x5, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000884}, 0x44040) 717.285891ms ago: executing program 5 (id=10919): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x8, 0x3, 0x498, 0x368, 0xa, 0x148, 0x368, 0x60, 0x400, 0x2a8, 0x2a8, 0x400, 0x2a8, 0x7fffffe, 0x0, {[{{@ip={@multicast2, @multicast2, 0x0, 0x0, 'bridge0\x00', 'rose0\x00', {}, {0xff}, 0x6}, 0x0, 0x2f8, 0x368, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x8601, 0x6, './file0\x00'}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f2f7b9f28413d9d8ad470ad2b60c45cb4ea6e7bf902bdc2ff8a9304d9f655c746adc0bdc773506378bc2d27efd6abb05175089830cc46186074d7de46d5af300"}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'team0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4f8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1010, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000140)=0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="5800000002060101005c00000005000400030800000900020073797a32000000000500010007000000050005000a0000000c00686173689a552f3a7a3a6e65742c696661636500000000", @ANYRES8], 0x58}}, 0x80000) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x4}, 0x4, 0x0, 0x10010, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffff7fffffff, r2, 0x1) socket(0x10, 0x2, 0xffffffff) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x6d207ee5}, 0x8) bind$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)=ANY=[], 0x14) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x2) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x37, 0x4, @tid=r4}, &(0x7f0000bbdffc)=0x0) keyctl$reject(0x13, 0x0, 0x0, 0x9, 0x0) timer_settime(r5, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) recvfrom(r1, &(0x7f0000000880)=""/203, 0xcb, 0x2000, &(0x7f0000000980)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x5, @mcast2, 0x401}}, 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0xc369d000) 717.021411ms ago: executing program 1 (id=10920): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x8045}, 0x20000800) 713.059861ms ago: executing program 2 (id=10921): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x8, 0x3, 0x498, 0x368, 0xa, 0x148, 0x368, 0x60, 0x400, 0x2a8, 0x2a8, 0x400, 0x2a8, 0x7fffffe, 0x0, {[{{@ip={@multicast2, @multicast2, 0x0, 0x0, 'bridge0\x00', 'rose0\x00', {}, {0xff}, 0x6}, 0x0, 0x2f8, 0x368, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x8601, 0x6, './file0\x00'}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f2f7b9f28413d9d8ad470ad2b60c45cb4ea6e7bf902bdc2ff8a9304d9f655c746adc0bdc773506378bc2d27efd6abb05175089830cc46186074d7de46d5af300"}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'team0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4f8) (fail_nth: 1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x80020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1010, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000140)=0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="5800000002060101005c00000005000400030800000900020073797a32000000000500010007000000050005000a0000000c00686173689a552f3a7a3a6e65742c696661636500000000", @ANYRES8], 0x58}}, 0x80000) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x4}, 0x4, 0x0, 0x10010, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffff7fffffff, r2, 0x1) socket(0x10, 0x2, 0xffffffff) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x6d207ee5}, 0x8) bind$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)=ANY=[], 0x14) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x2) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x37, 0x4, @tid=r4}, &(0x7f0000bbdffc)=0x0) keyctl$reject(0x13, 0x0, 0x0, 0x9, 0x0) timer_settime(r5, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) recvfrom(r1, &(0x7f0000000880)=""/203, 0xcb, 0x2000, &(0x7f0000000980)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x5, @mcast2, 0x401}}, 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0xc369d000) 709.079301ms ago: executing program 6 (id=10922): ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000680)=""/144) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x6}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x96, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4054) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x1002, 0x20da, 0x0, 0x0, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0xb) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f064eb", @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x2000000, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}}, 0x24}, 0x1, 0xfffc}, 0x4000800) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=@delchain={0x24, 0x11, 0x1, 0x1f, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xd}}}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0xa) r6 = socket$kcm(0x21, 0x2, 0x2) socketpair(0xa, 0xa, 0x400, &(0x7f0000000100)) sendmsg$kcm(r6, 0x0, 0xc015) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="200000006a00010629bd7000fedbdf25f0ff00000000000008000a"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x0) r8 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_PKTINFO(r8, 0x29, 0x32, &(0x7f00000000c0)={@loopback}, 0x14) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)={0x70, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}]}, @ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x40001}, 0x4000) socket$kcm(0x10, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) 645.669402ms ago: executing program 1 (id=10923): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000030000004c0001800d0001007564703a73797a300000000038000400140001000a0000007f000001fec000000000000020000200"], 0x60}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffdffd, 0x0, 0x0, 0x0, 0x800}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x4a, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r3 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f00000000c0)={0x1d, r4}, 0x18) connect$can_j1939(r3, &(0x7f0000000140)={0x1d, r4}, 0x18) sendto(r3, 0x0, 0xc8, 0x44084, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000200)='\x00'/14, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4d) unshare(0x22020400) r6 = socket(0x40000000015, 0x5, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r7, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000200)={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, '\x00', 0x1f}, 0xff}, 0x1c) getsockopt$sock_buf(r6, 0x1, 0x1c, 0x0, &(0x7f00000001c0)=0x3b) 15.28607ms ago: executing program 2 (id=10924): ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x9, 0xfc, 0x0, 0x0, 0x0, 0x200, 0x230, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc0, 0x5}, 0x10c113, 0x400000, 0x0, 0x6, 0x10, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffdfff, r0, 0x0) timerfd_create(0x1, 0x80000) socket$kcm(0x29, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x17440000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, 0x0, 0x0, 0x2, 0x0) ioprio_get$pid(0x3, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x6}]}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 0s ago: executing program 5 (id=10925): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x20, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_STA_EXT_CAPABILITY={0xb, 0xac, "5bfc4b664844bf"}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7fff}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000800}, 0x40) r2 = syz_open_dev$usbfs(&(0x7f0000000140), 0x5, 0x28000) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000240)=@usbdevfs_driver={0xe07, 0x8000, &(0x7f0000000180)="34bec084dcddb1e615916e1711634f916a90e596601064d39782c104e9d43e89366f9fcf063119bc958082a2808c0ee8b8271ff9a3864b71f786ffd3f7b77519b3ba51574a8ed6f60f00fe4ffedd43699c1f1a43658e397b6bb93e931b92794ef152f11d47d0ab6ce034e6ec57311fa6153863e02ee39219070144962522a38db3e233db9191907474b5042a1e7871122c12c774934910e406c5ba661b74c2f32b2f1f5fc04010ac4a9d3fb358119e70a7d1f7f4058e"}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000480)={r3, &(0x7f0000000340)="62a594e7f51495fb446065b527444b34043206b846029671f260cc4283c2b55e19cdf0d1d296180a2c43b22bd6703bbd5cc78f8c1dfffaa7dac289c8005bd30d1af6ad0a247b92527efad6cf10004fd3992b8c7a2f07fba4b9a48319eae62535c497b61802eecd501494b6cbd2350e7218ea0b8cbfa5b610beb60c385d3791129b2b31909558788e38f748d5ed43d06a0e98d4819d82c56654d2b0c9958a6ae9bd225ba8b91080205fa1c277ed4b0752cea8a1bdb94247018c26b0edc6ceae4144", &(0x7f0000000440)=@tcp6, 0x1}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2200, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000500), 0x3) bind$802154_dgram(r4, &(0x7f0000000540)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0202}}}, 0x14) fcntl$getownex(r4, 0x10, &(0x7f0000000580)={0x0, 0x0}) sched_setscheduler(r5, 0x1, &(0x7f00000005c0)=0x6) close_range(r3, r2, 0x2) r6 = add_key(&(0x7f0000000600)='dns_resolver\x00', &(0x7f0000000640)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000680)={r6, 0x28, 0x25}, &(0x7f00000006c0)={'enc=', 'oaep', ' hash=', {'blake2s-224\x00'}}, &(0x7f0000000740)="64c1a1bd572f33206df1fc8d1a3c917203abddedf7f86436c46f0d146b4fd220070f417b6d09fd4f", &(0x7f0000000780)=""/37) getsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000007c0), 0x10) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000800)=""/1, &(0x7f0000000840)=0x1) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$WPAN_WANTLQI(r4, 0x0, 0x3, &(0x7f0000000880), &(0x7f00000008c0)=0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r4) r7 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000900)={0x0, @loopback, @remote}, &(0x7f0000000940)=0xc) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000a00)={'ip6gre0\x00', &(0x7f0000000980)={'ip6tnl0\x00', r8, 0x29, 0xc1, 0x43, 0x0, 0x40, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, 0x80, 0x10, 0x1, 0x4}}) fcntl$lock(r4, 0x25, &(0x7f0000000a40)={0x1, 0x1, 0xffff, 0x2, r5}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000ac0)={0x5, &(0x7f0000000a80)=[{0xc7d, 0x7, 0x6, 0xb}, {0x2, 0xf, 0x9, 0x8}, {0x6, 0x6, 0x5, 0xf2}, {0x9, 0xff, 0xd, 0x3}, {0x5727, 0x2, 0x2, 0x9}]}) perf_event_open(&(0x7f0000000b00)={0x1, 0x80, 0x1b, 0x3, 0xd, 0x10, 0x0, 0xb4ca58, 0x10, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xe95c, 0x1, @perf_config_ext={0x3b3, 0x40000000000}, 0xc011, 0xffffffffffffffff, 0x8, 0x6, 0x0, 0x46, 0xaf, 0x0, 0x1, 0x0, 0xff}, r5, 0xd, r4, 0x9) keyctl$setperm(0x5, r6, 0x100c082a) socket$nl_route(0x10, 0x3, 0x0) kernel console output (not intermixed with test programs): om 0 to 512 [ 1615.963805][ T5906] netlink: 68 bytes leftover after parsing attributes in process `syz.2.10235'. [ 1615.984029][ T5910] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1616.002383][ T28] kauditd_printk_skb: 625 callbacks suppressed [ 1616.002404][ T28] audit: type=1400 audit(2000000995.119:87194): avc: denied { read write } for pid=5912 comm="syz.3.10239" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1616.155332][ T5910] ext4 filesystem being mounted at /116/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 1616.226685][ T28] audit: type=1400 audit(2000000995.119:87195): avc: denied { open } for pid=5912 comm="syz.3.10239" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1616.251768][ T28] audit: type=1400 audit(2000000995.159:87196): avc: denied { create } for pid=5903 comm="syz.2.10235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1616.275441][ T28] audit: type=1400 audit(2000000995.159:87197): avc: denied { prog_load } for pid=5903 comm="syz.2.10235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1616.300040][ T28] audit: type=1400 audit(2000000995.159:87198): avc: denied { bpf } for pid=5903 comm="syz.2.10235" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1616.323443][ T28] audit: type=1400 audit(2000000995.159:87199): avc: denied { open } for pid=5903 comm="syz.2.10235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1616.363311][ T5918] netlink: 'syz.3.10239': attribute type 27 has an invalid length. [ 1616.371956][ T28] audit: type=1400 audit(2000000995.159:87200): avc: denied { perfmon } for pid=5903 comm="syz.2.10235" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1616.393217][ T5918] netlink: 164 bytes leftover after parsing attributes in process `syz.3.10239'. [ 1616.402472][ T28] audit: type=1400 audit(2000000995.159:87201): avc: denied { kernel } for pid=5903 comm="syz.2.10235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1616.428483][ T28] audit: type=1400 audit(2000000995.159:87202): avc: denied { execmem } for pid=5912 comm="syz.3.10239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1616.448551][ T28] audit: type=1400 audit(2000000995.269:87203): avc: denied { mount } for pid=5908 comm="syz.6.10238" name="/" dev="loop6" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1618.061689][ T2040] IPVS: starting estimator thread 0... [ 1618.072705][ T5933] IPVS: ip_vs_add_dest(): lower threshold is higher than upper threshold [ 1618.166995][ T5935] IPVS: using max 2256 ests per chain, 112800 per kthread [ 1618.313421][ T3188] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1618.400509][ T5939] netlink: 104 bytes leftover after parsing attributes in process `syz.3.10247'. [ 1619.187771][ T5956] netlink: 'syz.2.10251': attribute type 10 has an invalid length. [ 1619.197122][ T5955] netlink: 24 bytes leftover after parsing attributes in process `syz.6.10249'. [ 1619.212367][ T5956] team0: Port device wg2 added [ 1619.286198][ T5955] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10249'. [ 1619.378436][ T5958] netlink: 'syz.3.10252': attribute type 1 has an invalid length. [ 1619.639379][ T5961] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5961 comm=syz.6.10249 [ 1619.677837][ T5971] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10256'. [ 1619.791910][ T5980] A link change request failed with some changes committed already. Interface veth1 may have been left with an inconsistent configuration, please check. [ 1620.900205][ T5998] netlink: 12 bytes leftover after parsing attributes in process `syz.5.10263'. [ 1621.018087][ T28] kauditd_printk_skb: 454 callbacks suppressed [ 1621.018105][ T28] audit: type=1400 audit(2000001000.139:87658): avc: denied { write } for pid=5999 comm="syz.6.10264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1621.064085][ T28] audit: type=1400 audit(2000001000.169:87659): avc: denied { write } for pid=5999 comm="syz.6.10264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1621.116638][ T28] audit: type=1400 audit(2000001000.179:87660): avc: denied { write } for pid=5999 comm="syz.6.10264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1621.161320][ T28] audit: type=1400 audit(2000001000.209:87661): avc: denied { read } for pid=5999 comm="syz.6.10264" name="ptp0" dev="devtmpfs" ino=247 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1621.332217][ T28] audit: type=1400 audit(2000001000.209:87662): avc: denied { read open } for pid=5999 comm="syz.6.10264" path="/dev/ptp0" dev="devtmpfs" ino=247 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1621.359488][ T28] audit: type=1400 audit(2000001000.219:87663): avc: denied { create } for pid=5991 comm="syz.3.10261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1621.381246][ T28] audit: type=1400 audit(2000001000.219:87664): avc: denied { ioctl } for pid=5999 comm="syz.6.10264" path="/dev/ptp0" dev="devtmpfs" ino=247 ioctlcmd=0x3d04 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1621.425551][ T28] audit: type=1400 audit(2000001000.219:87665): avc: denied { write } for pid=5991 comm="syz.3.10261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1621.495102][ T28] audit: type=1400 audit(2000001000.229:87666): avc: denied { recv } for pid=5991 comm="syz.3.10261" saddr=172.20.20.0 daddr=172.20.20.10 dest=39244 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1621.583888][ T28] audit: type=1400 audit(2000001000.309:87667): avc: denied { recv } for pid=28 comm="kauditd" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1621.799776][ T6011] netdevsim netdevsim6 netdevsim0: entered allmulticast mode [ 1621.830226][ T6011] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 1622.133947][ T6017] netlink: 'syz.1.10270': attribute type 63 has an invalid length. [ 1622.158630][ T6017] lo: entered promiscuous mode [ 1622.173594][ T6017] lo: entered allmulticast mode [ 1622.226080][ T6017] netlink: 44 bytes leftover after parsing attributes in process `syz.1.10270'. [ 1623.035969][ T6029] netlink: 68 bytes leftover after parsing attributes in process `syz.6.10275'. [ 1623.860564][ T6043] netlink: 32 bytes leftover after parsing attributes in process `syz.3.10273'. [ 1623.914291][ T6024] xfrm0 speed is unknown, defaulting to 1000 [ 1624.333518][ T6024] gre0 speed is unknown, defaulting to 1000 [ 1624.891388][ T6053] FAULT_INJECTION: forcing a failure. [ 1624.891388][ T6053] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1624.937079][ T6053] CPU: 1 UID: 0 PID: 6053 Comm: syz.6.10280 Tainted: G W syzkaller #0 PREEMPT(full) [ 1624.937119][ T6053] Tainted: [W]=WARN [ 1624.937127][ T6053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1624.937168][ T6053] Call Trace: [ 1624.937176][ T6053] [ 1624.937186][ T6053] __dump_stack+0x1d/0x30 [ 1624.937215][ T6053] dump_stack_lvl+0x95/0xd0 [ 1624.937239][ T6053] dump_stack+0x15/0x1b [ 1624.937275][ T6053] should_fail_ex+0x263/0x280 [ 1624.937378][ T6053] should_fail+0xb/0x20 [ 1624.937407][ T6053] should_fail_usercopy+0x1a/0x20 [ 1624.937441][ T6053] strncpy_from_user+0x27/0x250 [ 1624.937508][ T6053] ? kmem_cache_alloc_noprof+0x18c/0x3f0 [ 1624.937549][ T6053] do_getname+0x59/0x1c0 [ 1624.937571][ T6053] user_path_at+0x28/0x100 [ 1624.937674][ T6053] __se_sys_mount+0x25b/0x2e0 [ 1624.937710][ T6053] ? fput+0x8f/0xc0 [ 1624.937734][ T6053] __x64_sys_mount+0x67/0x80 [ 1624.937768][ T6053] x64_sys_call+0x2d61/0x3020 [ 1624.937819][ T6053] do_syscall_64+0x12c/0x3b0 [ 1624.937849][ T6053] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1624.937936][ T6053] RIP: 0033:0x7f48a6fbcdd9 [ 1624.938022][ T6053] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1624.938044][ T6053] RSP: 002b:00007f48a5a17028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1624.938069][ T6053] RAX: ffffffffffffffda RBX: 00007f48a7235fa0 RCX: 00007f48a6fbcdd9 [ 1624.938085][ T6053] RDX: 00002000000002c0 RSI: 0000200000000300 RDI: 0000000000000000 [ 1624.938112][ T6053] RBP: 00007f48a5a17090 R08: 00002000000005c0 R09: 0000000000000000 [ 1624.938127][ T6053] R10: 0000000000200480 R11: 0000000000000246 R12: 0000000000000001 [ 1624.938142][ T6053] R13: 00007f48a7236038 R14: 00007f48a7235fa0 R15: 00007fff03966bd8 [ 1624.938166][ T6053] [ 1625.331296][ T6058] netlink: 12 bytes leftover after parsing attributes in process `syz.6.10281'. [ 1626.086391][ T28] kauditd_printk_skb: 435 callbacks suppressed [ 1626.086424][ T28] audit: type=1400 audit(2000001005.199:88103): avc: denied { recv } for pid=32089 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1626.126997][ T28] audit: type=1400 audit(2000001005.199:88104): avc: denied { recv } for pid=28 comm="kauditd" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1626.183790][ T28] audit: type=1400 audit(2000001005.299:88105): avc: denied { create } for pid=6069 comm="syz.2.10285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1626.199948][ T6070] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10285'. [ 1626.222653][ T28] audit: type=1400 audit(2000001005.309:88106): avc: denied { create } for pid=6069 comm="syz.2.10285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1626.267365][ T28] audit: type=1400 audit(2000001005.309:88107): avc: denied { write } for pid=6069 comm="syz.2.10285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1626.274348][ T6070] tc_dump_action: action bad kind [ 1626.313858][ T28] audit: type=1400 audit(2000001005.319:88108): avc: denied { write } for pid=6069 comm="syz.2.10285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1626.343130][ T6070] 9pnet_fd: Insufficient options for proto=fd [ 1626.360413][ T28] audit: type=1400 audit(2000001005.339:88109): avc: denied { recv } for pid=6049 comm="syz.5.10279" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1626.408507][ T6075] program syz.1.10287 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1626.427123][ T28] audit: type=1400 audit(2000001005.339:88110): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1626.474752][ T28] audit: type=1400 audit(2000001005.419:88111): avc: denied { create } for pid=6071 comm="syz.1.10286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1626.496007][ T28] audit: type=1400 audit(2000001005.459:88112): avc: denied { create } for pid=6069 comm="syz.2.10285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1626.550261][ T6075] sctp: [Deprecated]: syz.1.10287 (pid 6075) Use of int in max_burst socket option deprecated. [ 1626.550261][ T6075] Use struct sctp_assoc_value instead [ 1628.024097][ T6102] tipc: Enabling of bearer rejected, failed to enable media [ 1628.078354][ T6102] netlink: 'syz.3.10294': attribute type 1 has an invalid length. [ 1628.291869][ T6102] netlink: 'syz.3.10294': attribute type 298 has an invalid length. [ 1629.138880][ T6111] block device autoloading is deprecated and will be removed. [ 1629.342900][ T6123] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 1629.370367][ T6124] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10299'. [ 1629.442120][ T6120] netlink: 132 bytes leftover after parsing attributes in process `syz.2.10300'. [ 1629.589141][ T6120] SELinux: Context u:r:untrusted_app:s0:c512,c768 is not valid (left unmapped). [ 1629.731624][ T6128] netlink: 3 bytes leftover after parsing attributes in process `syz.1.10303'. [ 1629.849738][ T6131] netlink: 24 bytes leftover after parsing attributes in process `syz.2.10304'. [ 1629.912899][ T6128] syzkaller0: create flow: hash 2828516827 index 1 [ 1629.926617][ T6128] syzkaller0: delete flow: hash 2828516827 index 1 [ 1630.151390][ T6133] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6133 comm=syz.2.10304 [ 1630.191965][ T6130] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10304'. [ 1631.450188][ T28] kauditd_printk_skb: 352 callbacks suppressed [ 1631.450208][ T28] audit: type=1400 audit(2000001010.569:88465): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1631.588169][ T28] audit: type=1400 audit(2000001010.609:88466): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1631.715848][ T28] audit: type=1400 audit(2000001010.659:88467): avc: denied { create } for pid=6147 comm="syz.5.10310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1631.786737][ T28] audit: type=1400 audit(2000001010.679:88468): avc: denied { module_request } for pid=6147 comm="syz.5.10310" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1631.853825][ T28] audit: type=1400 audit(2000001010.689:88469): avc: denied { sys_module } for pid=6147 comm="syz.5.10310" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1631.919437][ T28] audit: type=1400 audit(2000001010.689:88470): avc: denied { module_request } for pid=6147 comm="syz.5.10310" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1632.091102][ T28] audit: type=1400 audit(2000001010.749:88471): avc: denied { recv } for pid=6104 comm="syz.6.10295" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1632.148178][ T28] audit: type=1400 audit(2000001010.759:88472): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1632.208043][ T28] audit: type=1400 audit(2000001010.799:88473): avc: denied { create } for pid=6154 comm="syz.3.10311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1632.245655][ T28] audit: type=1400 audit(2000001010.799:88474): avc: denied { connect } for pid=6154 comm="syz.3.10311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1632.368554][ T6155] block device autoloading is deprecated and will be removed. [ 1632.465229][ T6164] tipc: Enabling of bearer rejected, failed to enable media [ 1632.521344][ T6166] netlink: 'syz.5.10315': attribute type 1 has an invalid length. [ 1632.873171][ T6183] bond0: Error: Cannot enslave bond to itself. [ 1632.981764][ T6188] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10321'. [ 1633.293424][ T6199] netlink: 'syz.5.10325': attribute type 63 has an invalid length. [ 1633.320619][ T6199] lo: entered promiscuous mode [ 1633.332086][ T6199] lo: entered allmulticast mode [ 1633.767760][ T6214] netlink: 20 bytes leftover after parsing attributes in process `syz.6.10330'. [ 1635.539650][ T6239] netlink: 'syz.1.10338': attribute type 63 has an invalid length. [ 1636.040446][ T6195] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 1636.458585][ T28] kauditd_printk_skb: 360 callbacks suppressed [ 1636.458603][ T28] audit: type=1400 audit(2000001015.569:88835): avc: denied { create } for pid=6246 comm="syz.3.10341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1636.820518][ T28] audit: type=1400 audit(2000001015.579:88836): avc: denied { write } for pid=6246 comm="syz.3.10341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1637.252156][ T6257] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1637.265783][ T28] audit: type=1400 audit(2000001015.609:88837): avc: denied { prog_load } for pid=6249 comm="syz.1.10342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1637.286256][ T6257] audit: audit_lost=1383 audit_rate_limit=0 audit_backlog_limit=64 [ 1637.309419][ T6257] audit: backlog limit exceeded [ 1637.349695][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1637.356306][ C0] audit: audit_lost=1384 audit_rate_limit=0 audit_backlog_limit=64 [ 1637.364369][ C0] audit: backlog limit exceeded [ 1637.370946][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1638.614289][ T6273] netlink: 12 bytes leftover after parsing attributes in process `syz.5.10348'. [ 1638.942331][ T6282] netlink: 'syz.3.10349': attribute type 63 has an invalid length. [ 1638.999746][ T6289] xt_hashlimit: size too large, truncated to 1048576 [ 1639.042290][ T6282] lo: entered promiscuous mode [ 1639.055574][ T6282] lo: entered allmulticast mode [ 1639.129084][ T6296] netlink: 68 bytes leftover after parsing attributes in process `syz.6.10354'. [ 1639.285666][ T6284] xfrm0 speed is unknown, defaulting to 1000 [ 1639.377482][ T6284] gre0 speed is unknown, defaulting to 1000 [ 1639.426885][ T3442] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1639.521891][ T3442] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1639.602813][ T3442] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1639.690422][ T3442] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1639.849499][ T6312] netlink: 104 bytes leftover after parsing attributes in process `syz.3.10358'. [ 1640.314181][ T3442] bond1 (unregistering): (slave geneve2): Releasing active interface [ 1640.711497][ T3442] bond0 (unregistering): Released all slaves [ 1640.727104][ T3442] bond1 (unregistering): Released all slaves [ 1640.751530][ T3442] bond2 (unregistering): Released all slaves [ 1640.771213][ T3442] bond3 (unregistering): Released all slaves [ 1640.932652][ T6284] bridge0: port 1(bridge_slave_0) entered blocking state [ 1640.947225][ T6284] bridge0: port 1(bridge_slave_0) entered disabled state [ 1640.955015][ T6284] bridge_slave_0: entered allmulticast mode [ 1640.982546][ T6284] bridge_slave_0: entered promiscuous mode [ 1641.031373][ T6284] bridge0: port 2(bridge_slave_1) entered blocking state [ 1641.068444][ T6284] bridge0: port 2(bridge_slave_1) entered disabled state [ 1641.103199][ T6284] bridge_slave_1: entered allmulticast mode [ 1641.127393][ T6284] bridge_slave_1: entered promiscuous mode [ 1641.151946][ T3442] hsr_slave_0: left promiscuous mode [ 1641.174309][ T6341] netlink: 68 bytes leftover after parsing attributes in process `syz.3.10363'. [ 1641.194090][ T3442] veth1_macvtap: left promiscuous mode [ 1641.210461][ T3442] veth0_macvtap: left promiscuous mode [ 1641.228301][ T3442] veth1_vlan: left promiscuous mode [ 1641.246550][ T3442] veth0_vlan: left promiscuous mode [ 1641.254168][ T6349] netlink: 'syz.6.10364': attribute type 63 has an invalid length. [ 1641.497370][ T28] kauditd_printk_skb: 1537 callbacks suppressed [ 1641.497427][ T28] audit: type=1400 audit(2000001020.619:90352): avc: denied { recv } for pid=6287 comm="syz.1.10353" saddr=::1 src=20004 daddr=::1 dest=20004 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1641.568119][ T28] audit: type=1400 audit(2000001020.619:90353): avc: denied { recv } for pid=6287 comm="syz.1.10353" saddr=::1 src=20004 daddr=::1 dest=20004 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1641.634146][ T28] audit: type=1400 audit(2000001020.619:90354): avc: denied { recv } for pid=6287 comm="syz.1.10353" saddr=::1 src=20004 daddr=::1 dest=20004 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1641.683829][ T28] audit: type=1400 audit(2000001020.619:90355): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1641.712346][ T28] audit: type=1400 audit(2000001020.619:90356): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1641.766015][ T6349] lo: entered promiscuous mode [ 1641.771713][ T6349] lo: entered allmulticast mode [ 1641.790030][ T3019] 8021q: adding VLAN 0 to HW filter on device eth9 [ 1641.805355][ T28] audit: type=1400 audit(2000001020.619:90357): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1641.834631][ T6284] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1641.849010][ T6284] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1641.877452][ T28] audit: type=1400 audit(2000001020.619:90358): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1641.904981][ T28] audit: type=1400 audit(2000001020.619:90359): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1641.930979][ T28] audit: type=1400 audit(2000001020.619:90360): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1641.957649][ T28] audit: type=1400 audit(2000001020.669:90361): avc: denied { create } for pid=6358 comm="syz.1.10365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1641.995129][ T6284] team0: Port device team_slave_0 added [ 1642.028528][ T6284] team0: Port device team_slave_1 added [ 1642.121889][ T6284] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1642.153542][ T6284] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1642.218309][ T6284] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1642.262889][ T6284] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1642.281165][ T6284] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1642.379198][ T6284] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1642.527225][ T6284] hsr_slave_0: entered promiscuous mode [ 1642.549313][ T6284] hsr_slave_1: entered promiscuous mode [ 1642.555327][ T6284] debugfs: 'hsr0' already exists in 'hsr' [ 1642.561081][ T6284] Cannot create hsr debugfs directory [ 1642.620828][ T3019] 8021q: adding VLAN 0 to HW filter on device eth11 [ 1642.641669][ T6404] netlink: 68 bytes leftover after parsing attributes in process `syz.6.10376'. [ 1643.181764][ T6413] A link change request failed with some changes committed already. Interface ip_vti0 may have been left with an inconsistent configuration, please check. [ 1643.653897][ T6430] netlink: 'syz.2.10380': attribute type 63 has an invalid length. [ 1643.743979][ T6284] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1643.790792][ T6284] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 1643.800878][ T6430] lo: entered promiscuous mode [ 1643.812371][ T6430] lo: entered allmulticast mode [ 1644.009232][ T6284] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1644.056097][ T6284] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 1644.138682][ T6284] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1644.287464][ T6284] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 1644.304954][ T6284] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1644.329080][ T6284] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 1644.646657][ T6458] xfrm0 speed is unknown, defaulting to 1000 [ 1644.686514][ T6458] gre0 speed is unknown, defaulting to 1000 [ 1645.620494][ T6284] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1645.636388][ T6284] 8021q: adding VLAN 0 to HW filter on device team0 [ 1645.655002][ T6284] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1645.665950][ T6284] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1645.805963][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 1645.813105][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1645.868034][ T6458] Set syz1 is full, maxelem 65536 reached [ 1645.890002][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 1645.897230][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1646.081250][ T6486] syzkaller0: entered promiscuous mode [ 1646.111342][ T6486] syzkaller0: entered allmulticast mode [ 1646.567094][ T28] kauditd_printk_skb: 1088 callbacks suppressed [ 1646.567123][ T28] audit: type=1400 audit(2000001025.669:91450): avc: denied { recv } for pid=6494 comm="syz.2.10388" saddr=fe80::24 daddr=fe80::24 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1646.854727][ T28] audit: type=1400 audit(2000001025.669:91451): avc: denied { recv } for pid=6494 comm="syz.2.10388" saddr=fe80::a8aa:aaff:feaa:aa41 daddr=fe80::a8aa:aaff:feaa:aa41 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1647.031317][ T28] audit: type=1400 audit(2000001025.669:91452): avc: denied { recv } for pid=6494 comm="syz.2.10388" saddr=fe80::ac14:140f daddr=fe80::ac14:140f netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1647.133286][ T28] audit: type=1400 audit(2000001025.669:91453): avc: denied { recv } for pid=6494 comm="syz.2.10388" saddr=fe80::2a daddr=fe80::2a netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1647.199777][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1647.206427][ C1] audit: audit_lost=1393 audit_rate_limit=0 audit_backlog_limit=64 [ 1647.214758][ C1] audit: backlog limit exceeded [ 1647.219894][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1647.226412][ C1] audit: audit_lost=1394 audit_rate_limit=0 audit_backlog_limit=64 [ 1647.234421][ C1] audit: backlog limit exceeded [ 1647.699987][ T6284] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1648.127331][ T6535] block device autoloading is deprecated and will be removed. [ 1648.303904][ T6522] netlink: 48 bytes leftover after parsing attributes in process `syz.3.10391'. [ 1649.020360][ T6284] veth0_vlan: entered promiscuous mode [ 1649.045389][ T6284] veth1_vlan: entered promiscuous mode [ 1650.125014][ T6284] veth0_macvtap: entered promiscuous mode [ 1650.144017][ T6284] veth1_macvtap: entered promiscuous mode [ 1650.774857][ T6590] tipc: Started in network mode [ 1650.798395][ T6590] tipc: Node identity 00000000000000000040ffffe0000001, cluster identity 4711 [ 1650.832215][ T6590] tipc: Enabling of bearer rejected, failed to enable media [ 1651.138475][ T6284] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1651.180647][ T6284] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1651.211404][T19469] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1651.226819][T19469] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1651.244699][T19469] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1651.265645][T19469] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1651.580288][ T28] kauditd_printk_skb: 634 callbacks suppressed [ 1651.580307][ T28] audit: type=1400 audit(2000001030.699:92082): avc: denied { write } for pid=6594 comm="syz.1.10401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1651.687519][ T6600] loop6: detected capacity change from 0 to 1024 [ 1651.697841][ T6600] EXT4-fs: quotafile must be on filesystem root [ 1651.834058][ T28] audit: type=1400 audit(2000001030.749:92083): avc: denied { write } for pid=6594 comm="syz.1.10401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1652.058666][ T28] audit: type=1400 audit(2000001030.799:92084): avc: denied { egress } for pid=22 comm="ksoftirqd/1" saddr=fe80::a8aa:aaff:feaa:aa1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 1652.212732][ T28] audit: type=1400 audit(2000001030.799:92085): avc: denied { sendto } for pid=22 comm="ksoftirqd/1" saddr=fe80::a8aa:aaff:feaa:aa1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 1652.345019][ T28] audit: type=1400 audit(2000001030.799:92086): avc: denied { read write } for pid=6599 comm="syz.6.10402" name="loop6" dev="devtmpfs" ino=1727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1652.453278][ T28] audit: type=1400 audit(2000001030.799:92087): avc: denied { open } for pid=6599 comm="syz.6.10402" path="/dev/loop6" dev="devtmpfs" ino=1727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1652.530409][ T28] audit: type=1400 audit(2000001030.799:92088): avc: denied { ioctl } for pid=6599 comm="syz.6.10402" path="/dev/loop6" dev="devtmpfs" ino=1727 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1652.575349][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1652.581961][ C0] audit: audit_lost=1397 audit_rate_limit=0 audit_backlog_limit=64 [ 1652.589918][ C0] audit: backlog limit exceeded [ 1652.664535][ T6618] tipc: Enabling of bearer rejected, failed to enable media [ 1653.311026][ T6626] loop6: detected capacity change from 0 to 1024 [ 1653.351958][ T6626] EXT4-fs (loop6): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 1653.403115][ T6626] EXT4-fs error (device loop6): ext4_quota_enable:7225: comm syz.6.10407: inode #131072: comm syz.6.10407: iget: illegal inode # [ 1653.437028][ T6626] loop6: lost filesystem error report for type 5 error -117 [ 1653.437232][ T6626] EXT4-fs error (device loop6): ext4_quota_enable:7228: comm syz.6.10407: Bad quota inode: 131072, type: 2 [ 1653.446997][ C0] EXT4-fs (loop6): error count since last fsck: 1 [ 1653.462466][ C0] EXT4-fs (loop6): initial error at time 2000001032: ext4_quota_enable:7225 [ 1653.471301][ C0] EXT4-fs (loop6): last error at time 2000001032: ext4_quota_enable:7225 [ 1653.473790][ T6636] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10408'. [ 1653.505846][ T6626] loop6: lost filesystem error report for type 5 error -117 [ 1653.506061][ T6626] EXT4-fs warning (device loop6): ext4_enable_quotas:7269: Failed to enable quota tracking (type=2, err=-117, ino=131072). Please run e2fsck to fix. [ 1653.581024][ T6626] EXT4-fs (loop6): mount failed [ 1653.709255][ T6639] tipc: Started in network mode [ 1653.718795][ T6639] tipc: Node identity 00000000000000000040ffffe0000001, cluster identity 4711 [ 1653.733233][ T6639] tipc: Enabling of bearer rejected, failed to enable media [ 1655.775398][ T6661] tipc: Enabling of bearer rejected, failed to enable media [ 1656.297944][ T6671] xfrm0 speed is unknown, defaulting to 1000 [ 1656.663677][ T28] kauditd_printk_skb: 349 callbacks suppressed [ 1656.663788][ T28] audit: type=1400 audit(2000001035.779:92408): avc: denied { prog_load } for pid=6670 comm="syz.6.10420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1656.899609][ T28] audit: type=1400 audit(2000001035.839:92410): avc: denied { create } for pid=6670 comm="syz.6.10420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1657.009091][ T28] audit: type=1400 audit(2000001035.839:92409): avc: denied { bpf } for pid=6670 comm="syz.6.10420" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1657.039948][ T6671] gre0 speed is unknown, defaulting to 1000 [ 1657.125948][ T28] audit: type=1400 audit(2000001035.849:92411): avc: denied { write } for pid=6670 comm="syz.6.10420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1657.226991][ T6686] tipc: Enabling of bearer rejected, failed to enable media [ 1657.253644][ T28] audit: type=1400 audit(2000001035.879:92412): avc: denied { prog_load } for pid=6670 comm="syz.6.10420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1657.382724][ T28] audit: type=1400 audit(2000001035.899:92413): avc: denied { perfmon } for pid=6670 comm="syz.6.10420" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1657.706037][ T28] audit: type=1400 audit(2000001035.899:92414): avc: denied { bpf } for pid=6670 comm="syz.6.10420" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1657.726781][ T28] audit: type=1400 audit(2000001036.049:92415): avc: denied { create } for pid=6670 comm="syz.6.10420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1657.746511][ T28] audit: type=1400 audit(2000001036.049:92416): avc: denied { connect } for pid=6670 comm="syz.6.10420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1657.940836][ T28] audit: type=1400 audit(2000001036.219:92417): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1658.203105][ T6703] xfrm0 speed is unknown, defaulting to 1000 [ 1658.210618][ T6700] veth0_to_team: entered promiscuous mode [ 1658.216427][ T6700] veth0_to_team: entered allmulticast mode [ 1658.236762][ T6702] loop6: detected capacity change from 0 to 512 [ 1658.240776][ T6703] gre0 speed is unknown, defaulting to 1000 [ 1658.282119][ T6702] EXT4-fs warning (device loop6): ext4_enable_quotas:7269: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 1658.368382][ T6702] EXT4-fs (loop6): mount failed [ 1658.435648][ T6708] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10422'. [ 1659.289295][ T6714] loop6: detected capacity change from 0 to 1024 [ 1659.376872][ T6714] EXT4-fs: test_dummy_encryption option not supported [ 1659.666033][ T6714] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 1660.197077][ T6720] 8021q: VLANs not supported on ip6gre0 [ 1660.707924][ T6731] tipc: Started in network mode [ 1660.715274][ T6731] tipc: Node identity 00000000000000000040ffffe0000001, cluster identity 4711 [ 1660.738530][ T6731] tipc: Enabling of bearer rejected, failed to enable media [ 1661.668167][ T28] kauditd_printk_skb: 314 callbacks suppressed [ 1661.668187][ T28] audit: type=1400 audit(2000001040.789:92731): avc: denied { kernel } for pid=6727 comm="syz.6.10431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1661.753382][ T28] audit: type=1400 audit(2000001040.809:92732): avc: denied { perfmon } for pid=6727 comm="syz.6.10431" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1661.814177][ T6750] loop6: detected capacity change from 0 to 2048 [ 1661.839432][ T28] audit: type=1400 audit(2000001040.869:92733): avc: denied { map_create } for pid=6753 comm="syz.5.10436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1661.875481][ T6750] EXT4-fs warning (device loop6): read_mmp_block:111: Error -117 while reading MMP block 15 [ 1661.893247][ T28] audit: type=1400 audit(2000001040.869:92734): avc: denied { bpf } for pid=6753 comm="syz.5.10436" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1662.019773][ T28] audit: type=1400 audit(2000001040.869:92735): avc: denied { create } for pid=6753 comm="syz.5.10436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1662.129459][ T6758] netlink: 24 bytes leftover after parsing attributes in process `syz.1.10437'. [ 1662.158906][ T28] audit: type=1400 audit(2000001040.869:92736): avc: denied { map_create } for pid=6753 comm="syz.5.10436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1662.232581][ T28] audit: type=1400 audit(2000001040.869:92737): avc: denied { prog_load } for pid=6753 comm="syz.5.10436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1662.256585][ T6761] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10437'. [ 1662.337407][ T28] audit: type=1400 audit(2000001040.889:92738): avc: denied { bpf } for pid=6726 comm="syz.2.10430" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1662.390868][ T6752] loop6: detected capacity change from 0 to 512 [ 1662.436117][ T28] audit: type=1400 audit(2000001040.899:92739): avc: denied { bpf } for pid=6753 comm="syz.5.10436" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1662.536828][ T6760] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6760 comm=syz.1.10437 [ 1662.570586][ T28] audit: type=1400 audit(2000001040.899:92740): avc: denied { open } for pid=6753 comm="syz.5.10436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1662.661094][ T6752] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 1662.765741][ T6752] EXT4-fs (loop6): revision level too high, forcing read-only mode [ 1662.794933][ T6752] EXT4-fs (loop6): orphan cleanup on readonly fs [ 1662.813625][ T6752] EXT4-fs warning (device loop6): ext4_enable_quotas:7269: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 1662.929718][ T6752] EXT4-fs (loop6): Cannot turn on quotas: error -117 [ 1662.977343][ T6752] EXT4-fs error (device loop6): ext4_validate_block_bitmap:432: comm syz.6.10431: bg 0: block 15: invalid block bitmap [ 1663.146309][ T6752] loop6: lost filesystem error report for type 5 error -117 [ 1663.148670][ T6752] EXT4-fs error (device loop6) in ext4_mb_clear_bb:6679: Corrupt filesystem [ 1663.164988][ T6752] loop6: lost filesystem error report for type 5 error -117 [ 1663.173384][ T6752] EXT4-fs warning (device loop6): ext4_evict_inode:195: inode #16: comm syz.6.10431: data will be lost [ 1663.181842][ C0] EXT4-fs (loop6): error count since last fsck: 2 [ 1663.181982][ C0] EXT4-fs (loop6): initial error at time 2000001042: ext4_validate_block_bitmap:432 [ 1663.182070][ C0] EXT4-fs (loop6): last error at time 2000001042: ext4_mb_clear_bb:6679 [ 1663.726934][ T6785] tipc: Enabling of bearer rejected, failed to enable media [ 1663.804150][ T6780] SELinux: policydb magic number 0x1 does not match expected magic number 0xf97cff8c [ 1663.850366][ T6780] SELinux: failed to load policy [ 1664.039275][ T6792] netlink: 132 bytes leftover after parsing attributes in process `syz.3.10447'. [ 1664.195611][ T6752] EXT4-fs (loop6): 1 truncate cleaned up [ 1664.552346][ T6752] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 1665.237652][ T3188] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1665.385949][ T6810] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10453'. [ 1665.417153][ T6810] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10453'. [ 1665.713519][T20067] IPVS: starting estimator thread 0... [ 1665.807079][ T6818] IPVS: using max 2496 ests per chain, 124800 per kthread [ 1666.420571][ T6827] tipc: Started in network mode [ 1666.445147][ T6827] tipc: Node identity 00000000000000000040ffffe0000001, cluster identity 4711 [ 1666.490970][ T6827] tipc: Enabling of bearer rejected, failed to enable media [ 1666.579104][ T6832] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10457'. [ 1666.677178][ T28] kauditd_printk_skb: 506 callbacks suppressed [ 1666.677197][ T28] audit: type=1400 audit(2000001045.789:93240): avc: denied { recv } for pid=3188 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1666.885030][ T28] audit: type=1400 audit(2000001045.799:93241): avc: denied { recv } for pid=28 comm="kauditd" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1666.982959][ T28] audit: type=1400 audit(2000001045.839:93242): avc: denied { create } for pid=6829 comm="syz.3.10458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1667.099116][ T28] audit: type=1400 audit(2000001045.859:93243): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1667.227047][ T28] audit: type=1400 audit(2000001045.859:93244): avc: denied { recv } for pid=6781 comm="syz.2.10444" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1667.358400][ T28] audit: type=1400 audit(2000001045.869:93245): avc: denied { write } for pid=6829 comm="syz.3.10458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1667.428478][ T6844] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1667.457905][ T28] audit: type=1400 audit(2000001045.879:93246): avc: denied { nlmsg_write } for pid=6829 comm="syz.3.10458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1667.472553][ T6844] audit: audit_lost=1410 audit_rate_limit=0 audit_backlog_limit=64 [ 1667.490680][ T6847] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1667.963184][ T6844] program syz.1.10463 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1668.456755][ T6858] af_packet: tpacket_rcv: packet too big, clamped from 3 to 4294967272. macoff=96 [ 1668.668673][ T6868] tipc: Enabling of bearer rejected, failed to enable media [ 1668.704711][ T6868] netlink: 'syz.1.10469': attribute type 1 has an invalid length. [ 1668.986185][ T6883] netlink: 24 bytes leftover after parsing attributes in process `syz.5.10473'. [ 1669.103776][ T6887] loop6: detected capacity change from 0 to 512 [ 1669.106895][ T6880] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10473'. [ 1669.149268][ T6887] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1669.282252][ T6887] ext4 filesystem being mounted at /159/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 1669.306969][ T6880] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6880 comm=syz.5.10473 [ 1669.467093][ T6894] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 1669.794109][ T6896] netlink: 'syz.1.10477': attribute type 1 has an invalid length. [ 1669.894951][ T6896] 8021q: adding VLAN 0 to HW filter on device bond3 [ 1669.931887][ T6898] vlan3: entered allmulticast mode [ 1669.951664][ T6898] bond3: entered allmulticast mode [ 1669.992451][ T6896] bond3: (slave geneve2): making interface the new active one [ 1670.013183][ T6896] geneve2: entered allmulticast mode [ 1670.030749][ T6896] bond3: (slave geneve2): Enslaving as an active interface with an up link [ 1670.524304][ T6906] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10478'. [ 1671.178846][ T3188] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1671.839195][ T28] kauditd_printk_skb: 499 callbacks suppressed [ 1671.839272][ T28] audit: type=1400 audit(2000001050.959:93737): avc: denied { watch watch_reads } for pid=6933 comm="syz.1.10487" path="/proc/775/task/776/ns" dev="proc" ino=145354 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1671.912166][ T28] audit: type=1400 audit(2000001050.969:93738): avc: denied { recv } for pid=6920 comm="syz.2.10484" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1671.994871][ T28] audit: type=1400 audit(2000001050.969:93739): avc: denied { recv } for pid=6911 comm="syz.5.10481" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1672.039379][ T6936] netlink: 16 bytes leftover after parsing attributes in process `syz.3.10488'. [ 1672.067058][ T28] audit: type=1400 audit(2000001050.989:93740): avc: denied { recv } for pid=558 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1672.116943][ T28] audit: type=1400 audit(2000001050.999:93741): avc: denied { recv } for pid=6933 comm="syz.1.10487" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1672.166956][ T28] audit: type=1400 audit(2000001051.009:93742): avc: denied { create } for pid=6933 comm="syz.1.10487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1672.245443][ T28] audit: type=1400 audit(2000001051.009:93743): avc: denied { setopt } for pid=6933 comm="syz.1.10487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1672.327531][ T28] audit: type=1400 audit(2000001051.009:93744): avc: denied { write } for pid=6933 comm="syz.1.10487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1672.406995][ T28] audit: type=1400 audit(2000001051.029:93745): avc: denied { open } for pid=6935 comm="syz.3.10488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1672.602366][ T6946] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1673.257225][ T6956] loop6: detected capacity change from 0 to 512 [ 1673.301421][ T6956] EXT4-fs (loop6): Invalid default hash set in the superblock [ 1675.741854][ T6972] loop6: detected capacity change from 0 to 128 [ 1675.749668][ T6972] vfat: Unknown parameter 'shor4name' [ 1676.125181][ T6979] tipc: Enabling of bearer rejected, failed to enable media [ 1676.152089][ T6979] netlink: 'syz.3.10500': attribute type 1 has an invalid length. [ 1676.833791][ T6989] loop6: detected capacity change from 0 to 512 [ 1676.853468][ T28] kauditd_printk_skb: 362 callbacks suppressed [ 1676.853521][ T28] audit: type=1400 audit(2000001055.969:94004): avc: denied { mounton } for pid=6988 comm="syz.6.10503" path="/168/file0" dev="tmpfs" ino=900 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1676.887717][ T6989] EXT4-fs (loop6): feature flags set on rev 0 fs, running e2fsck is recommended [ 1676.922498][ T6989] EXT4-fs (loop6): warning: checktime reached, running e2fsck is recommended [ 1676.951785][ T6989] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a80ec01c, mo2=0002] [ 1676.969056][ T28] audit: type=1400 audit(2000001056.009:94005): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1676.994904][ T6989] System zones: 0-2, 18-18, 34-34 [ 1677.010635][ T6989] EXT4-fs error (device loop6): ext4_orphan_get:1423: comm syz.6.10503: bad orphan inode 15 [ 1677.020907][ T6989] loop6: lost filesystem error report for type 5 error -117 [ 1677.020985][ T28] audit: type=1400 audit(2000001056.019:94006): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1677.028361][ C1] EXT4-fs (loop6): error count since last fsck: 1 [ 1677.028384][ C1] EXT4-fs (loop6): initial error at time 2000001056: ext4_orphan_get:1423 [ 1677.028407][ C1] EXT4-fs (loop6): last error at time 2000001056: ext4_orphan_get:1423 [ 1677.047087][ T6989] ext4_test_bit(bit=14, block=18) = 1 [ 1677.054501][ T28] audit: type=1400 audit(2000001056.019:94007): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1677.103091][ T6989] is_bad_inode(inode)=0 [ 1677.154152][ T6989] NEXT_ORPHAN(inode)=2264924160 [ 1677.156930][ T28] audit: type=1400 audit(2000001056.089:94008): avc: denied { open } for pid=6992 comm="syz.5.10504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1677.175487][ T6989] max_ino=32 [ 1677.199109][ T6989] i_nlink=0 [ 1677.203522][ T6989] EXT4-fs error (device loop6): ext4_do_update_inode:5690: inode #15: comm syz.6.10503: corrupted inode contents [ 1677.214354][ T28] audit: type=1400 audit(2000001056.089:94009): avc: denied { perfmon } for pid=6992 comm="syz.5.10504" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1677.235779][ T6989] loop6: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 1677.236846][ T6989] EXT4-fs error (device loop6): ext4_dirty_inode:6587: inode #15: comm syz.6.10503: mark_inode_dirty error [ 1677.268389][ T6989] loop6: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 1677.268630][ T6989] EXT4-fs error (device loop6): ext4_do_update_inode:5690: inode #15: comm syz.6.10503: corrupted inode contents [ 1677.308385][ T6989] loop6: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 1677.308571][ T6989] EXT4-fs error (device loop6): ext4_xattr_delete_inode:3001: inode #15: comm syz.6.10503: mark_inode_dirty error [ 1677.308720][ T28] audit: type=1400 audit(2000001056.089:94010): avc: denied { kernel } for pid=6992 comm="syz.5.10504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1677.358012][ T6989] loop6: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 1677.362241][ T6989] EXT4-fs error (device loop6): ext4_xattr_delete_inode:3004: inode #15: comm syz.6.10503: mark inode dirty (error -117) [ 1677.415502][ T6989] loop6: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 1677.423190][ T28] audit: type=1400 audit(2000001056.119:94011): avc: denied { perfmon } for pid=6992 comm="syz.5.10504" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1677.484057][ T28] audit: type=1400 audit(2000001056.119:94012): avc: denied { map_create } for pid=6992 comm="syz.5.10504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1677.503739][ T6989] EXT4-fs warning (device loop6): ext4_evict_inode:287: xattr delete (err -117) [ 1677.537405][ T6989] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1677.558041][ T6989] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1678.588487][ T3188] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1679.618731][ T7015] tipc: Enabling of bearer rejected, failed to enable media [ 1679.829521][ T7015] netlink: 'syz.5.10511': attribute type 1 has an invalid length. [ 1680.611352][ T7020] loop6: detected capacity change from 0 to 512 [ 1680.642221][ T7020] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1680.681562][ T7020] ext4 filesystem being mounted at /169/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 1680.949297][ T7036] netlink: 24 bytes leftover after parsing attributes in process `syz.2.10515'. [ 1680.959088][ T7036] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10515'. [ 1681.046627][ T7040] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7040 comm=syz.2.10515 [ 1681.141573][ T7038] xfrm0 speed is unknown, defaulting to 1000 [ 1681.172887][ T7038] gre0 speed is unknown, defaulting to 1000 [ 1681.597953][ T3188] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1681.849514][ T7059] netlink: 'syz.5.10521': attribute type 1 has an invalid length. [ 1681.865413][ T28] kauditd_printk_skb: 432 callbacks suppressed [ 1681.865431][ T28] audit: type=1400 audit(2000001060.979:94428): avc: denied { recv } for pid=32089 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1681.916381][ T28] audit: type=1400 audit(2000001061.029:94429): avc: denied { open } for pid=7049 comm="syz.3.10517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1682.004674][ T28] audit: type=1400 audit(2000001061.029:94430): avc: denied { perfmon } for pid=7049 comm="syz.3.10517" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1682.082752][ T28] audit: type=1400 audit(2000001061.029:94431): avc: denied { kernel } for pid=7049 comm="syz.3.10517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1682.110985][ T7070] tipc: Enabling of bearer rejected, failed to enable media [ 1682.148460][ T28] audit: type=1400 audit(2000001061.029:94432): avc: denied { create } for pid=7062 comm="syz.2.10522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1682.181393][ T7076] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1682.198164][ T7073] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1682.206075][ T7075] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1682.215588][ T7076] audit: audit_lost=1455 audit_rate_limit=0 audit_backlog_limit=64 [ 1682.218197][ T28] audit: type=1400 audit(2000001061.029:94433): avc: denied { write } for pid=7062 comm="syz.2.10522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1682.282390][ T7073] netlink: 12 bytes leftover after parsing attributes in process `syz.2.10525'. [ 1683.109878][ T7095] netlink: 12 bytes leftover after parsing attributes in process `syz.2.10528'. [ 1683.141649][ T7094] netlink: 24 bytes leftover after parsing attributes in process `syz.1.10530'. [ 1683.156377][ T7094] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10530'. [ 1683.225134][ T7098] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7098 comm=syz.1.10530 [ 1683.464226][ T7102] xfrm0 speed is unknown, defaulting to 1000 [ 1683.503812][ T7102] gre0 speed is unknown, defaulting to 1000 [ 1683.718138][ T7108] 9p: Bad value for 'wfdno' [ 1683.999800][ T7114] syzkaller1: entered promiscuous mode [ 1684.025742][ T7114] syzkaller1: entered allmulticast mode [ 1684.049939][ T7102] Set syz1 is full, maxelem 65536 reached [ 1684.073189][ T7116] netlink: 'syz.5.10536': attribute type 1 has an invalid length. [ 1684.192916][ T7119] netlink: 3 bytes leftover after parsing attributes in process `syz.6.10538'. [ 1684.233897][ T7119] 0ªX¹¦À: renamed from batadv0 (while UP) [ 1684.259433][ T7119] 0ªX¹¦À: entered allmulticast mode [ 1684.279122][ T7119] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 1684.313188][ T7123] tipc: Enabling of bearer rejected, failed to enable media [ 1684.327350][ T7123] netlink: 'syz.1.10540': attribute type 1 has an invalid length. [ 1684.644156][ T7137] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10543'. [ 1684.785276][ T7146] netlink: 32 bytes leftover after parsing attributes in process `syz.2.10547'. [ 1684.792139][ T7149] FAULT_INJECTION: forcing a failure. [ 1684.792139][ T7149] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1684.808781][ T7149] CPU: 0 UID: 0 PID: 7149 Comm: syz.5.10548 Tainted: G W syzkaller #0 PREEMPT(full) [ 1684.808895][ T7149] Tainted: [W]=WARN [ 1684.808903][ T7149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1684.808944][ T7149] Call Trace: [ 1684.808951][ T7149] [ 1684.808960][ T7149] __dump_stack+0x1d/0x30 [ 1684.808987][ T7149] dump_stack_lvl+0x95/0xd0 [ 1684.809018][ T7149] dump_stack+0x15/0x1b [ 1684.809090][ T7149] should_fail_ex+0x263/0x280 [ 1684.809120][ T7149] should_fail+0xb/0x20 [ 1684.809145][ T7149] should_fail_usercopy+0x1a/0x20 [ 1684.809181][ T7149] _copy_from_user+0x1c/0xb0 [ 1684.809292][ T7149] ___sys_sendmsg+0xc1/0x1e0 [ 1684.809331][ T7149] __x64_sys_sendmsg+0xd4/0x160 [ 1684.809445][ T7149] x64_sys_call+0x194c/0x3020 [ 1684.809484][ T7149] do_syscall_64+0x12c/0x3b0 [ 1684.809510][ T7149] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1684.809573][ T7149] RIP: 0033:0x7f6d38d4cdd9 [ 1684.809659][ T7149] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1684.809682][ T7149] RSP: 002b:00007f6d3779f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1684.809754][ T7149] RAX: ffffffffffffffda RBX: 00007f6d38fc5fa0 RCX: 00007f6d38d4cdd9 [ 1684.809768][ T7149] RDX: 0000000000000000 RSI: 00002000000003c0 RDI: 0000000000000003 [ 1684.809782][ T7149] RBP: 00007f6d3779f090 R08: 0000000000000000 R09: 0000000000000000 [ 1684.809795][ T7149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1684.809807][ T7149] R13: 00007f6d38fc6038 R14: 00007f6d38fc5fa0 R15: 00007ffeab29f868 [ 1684.809830][ T7149] [ 1684.840797][ T7151] netlink: 'syz.2.10549': attribute type 1 has an invalid length. [ 1685.573516][ T7171] block device autoloading is deprecated and will be removed. [ 1686.068661][ T7185] loop2: detected capacity change from 0 to 1024 [ 1686.104246][ T7185] EXT4-fs (loop2): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: none. [ 1686.129978][ T7185] ext4 filesystem being mounted at /394/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 1686.178397][ T7185] EXT4-fs error (device loop2): ext4_map_blocks:833: inode #15: block 3: comm syz.2.10559: lblock 3 mapped to illegal pblock 3 (length 1) [ 1686.194779][ T7185] EXT4-fs (loop2): Delayed block allocation failed for inode 15 at logical offset 3 with max blocks 1 with error 117 [ 1686.208814][ T7185] EXT4-fs (loop2): This should not happen!! Data will be lost [ 1686.208814][ T7185] [ 1686.269738][ T7185] EXT4-fs error (device loop2): ext4_map_blocks:791: inode #15: block 3: comm syz.2.10559: lblock 3 mapped to illegal pblock 3 (length 1) [ 1686.289992][ T7185] EXT4-fs error (device loop2): ext4_map_blocks:791: inode #15: block 3: comm syz.2.10559: lblock 3 mapped to illegal pblock 3 (length 1) [ 1686.315740][ T7185] EXT4-fs error (device loop2): ext4_map_blocks:791: inode #15: block 3: comm syz.2.10559: lblock 3 mapped to illegal pblock 3 (length 1) [ 1686.346523][ T7183] EXT4-fs error (device loop2): ext4_map_blocks:791: inode #15: block 3: comm syz.2.10559: lblock 3 mapped to illegal pblock 3 (length 1) [ 1686.377448][ T7198] netlink: 'syz.6.10561': attribute type 1 has an invalid length. [ 1686.385822][ T7185] EXT4-fs error (device loop2): ext4_map_blocks:791: inode #15: block 3: comm syz.2.10559: lblock 3 mapped to illegal pblock 3 (length 1) [ 1686.415449][ T7183] EXT4-fs error (device loop2): ext4_map_blocks:791: inode #15: block 3: comm syz.2.10559: lblock 3 mapped to illegal pblock 3 (length 1) [ 1686.447471][ T7185] EXT4-fs error (device loop2): ext4_map_blocks:791: inode #15: block 3: comm syz.2.10559: lblock 3 mapped to illegal pblock 3 (length 1) [ 1686.582305][ T7183] EXT4-fs error (device loop2): ext4_map_blocks:791: inode #15: block 3: comm syz.2.10559: lblock 3 mapped to illegal pblock 3 (length 1) [ 1686.606681][ T7185] EXT4-fs error (device loop2): ext4_map_blocks:791: inode #15: block 3: comm syz.2.10559: lblock 3 mapped to illegal pblock 3 (length 1) [ 1686.879516][ T28] kauditd_printk_skb: 677 callbacks suppressed [ 1686.879597][ T28] audit: type=1400 audit(2000001065.999:95094): avc: denied { write } for pid=7199 comm="syz.6.10562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1687.014172][ T7207] netlink: 32 bytes leftover after parsing attributes in process `syz.3.10563'. [ 1687.160062][ T7210] netlink: 32 bytes leftover after parsing attributes in process `syz.3.10563'. [ 1687.197273][ T28] audit: type=1400 audit(2000001066.029:95095): avc: denied { recv } for pid=7182 comm="syz.1.10558" saddr=172.20.20.170 src=20004 daddr=172.20.20.170 dest=20004 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1687.430430][ T28] audit: type=1400 audit(2000001066.049:95096): avc: denied { write } for pid=7199 comm="syz.6.10562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1687.525551][ T28] audit: type=1400 audit(2000001066.059:95097): avc: denied { read } for pid=7202 comm="syz.3.10563" dev="nsfs" ino=4026532364 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1687.616415][ T28] audit: type=1400 audit(2000001066.069:95098): avc: denied { read open } for pid=7202 comm="syz.3.10563" path="net:[4026532364]" dev="nsfs" ino=4026532364 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1687.702967][ T7216] tipc: Enabling of bearer rejected, failed to enable media [ 1687.734283][ T28] audit: type=1400 audit(2000001066.069:95099): avc: denied { create } for pid=7202 comm="syz.3.10563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1687.776562][ T7216] netlink: 'syz.1.10565': attribute type 1 has an invalid length. [ 1687.826075][ T28] audit: type=1400 audit(2000001066.079:95100): avc: denied { write } for pid=7202 comm="syz.3.10563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1687.870602][ T7185] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1687.871872][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1687.883782][ C0] audit: audit_lost=1462 audit_rate_limit=0 audit_backlog_limit=64 [ 1688.377875][ T7185] EXT4-fs warning (device loop2): ext4_evict_inode:195: inode #15: comm syz.2.10559: data will be lost [ 1688.407690][ T7185] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 1688.702205][ T7233] netlink: 16 bytes leftover after parsing attributes in process `syz.1.10571'. [ 1689.171826][ T7253] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10577'. [ 1690.326394][ T7242] xt_CT: No such helper "snmp_trap" [ 1691.488157][ T7278] tipc: Enabling of bearer rejected, failed to enable media [ 1691.674753][ T7277] netlink: 'syz.5.10581': attribute type 1 has an invalid length. [ 1691.996669][ T28] kauditd_printk_skb: 421 callbacks suppressed [ 1691.996690][ T28] audit: type=1400 audit(2000001071.109:95516): avc: denied { recv } for pid=7272 comm="syz.1.10580" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1692.112196][ T7282] syzkaller1: entered promiscuous mode [ 1692.134400][ T28] audit: type=1400 audit(2000001071.119:95517): avc: denied { recv } for pid=6284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1692.160629][ T7282] syzkaller1: entered allmulticast mode [ 1692.249413][ T28] audit: type=1400 audit(2000001071.119:95518): avc: denied { recv } for pid=7272 comm="syz.1.10580" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1692.361618][ T28] audit: type=1400 audit(2000001071.119:95519): avc: denied { recv } for pid=7272 comm="syz.1.10580" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1692.473640][ T28] audit: type=1400 audit(2000001071.179:95520): avc: denied { recv } for pid=7272 comm="syz.1.10580" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1692.583259][ T28] audit: type=1400 audit(2000001071.179:95521): avc: denied { recv } for pid=7272 comm="syz.1.10580" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1692.696055][ T28] audit: type=1400 audit(2000001071.179:95522): avc: denied { recv } for pid=7272 comm="syz.1.10580" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1692.787152][ T28] audit: type=1400 audit(2000001071.179:95523): avc: denied { recv } for pid=7272 comm="syz.1.10580" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1692.866218][ T28] audit: type=1400 audit(2000001071.209:95524): avc: denied { create } for pid=7280 comm="syz.5.10582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1692.922171][ T28] audit: type=1400 audit(2000001071.209:95525): avc: denied { prog_load } for pid=7280 comm="syz.5.10582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1693.108799][ T7301] SELinux: Context system_u:object_r:anacron_exec_t:s0 is not valid (left unmapped). [ 1693.125346][ T7302] tipc: Enabling of bearer rejected, failed to enable media [ 1693.162083][ T7305] batman_adv: Cannot find parent device. Skipping batadv-on-batadv check for gretap1 [ 1693.541936][ T7312] tipc: Enabling of bearer rejected, failed to enable media [ 1693.589988][ T7316] netlink: 104 bytes leftover after parsing attributes in process `syz.3.10593'. [ 1693.731436][ T7312] netlink: 'syz.2.10592': attribute type 1 has an invalid length. [ 1694.530011][ T7328] tipc: Enabling of bearer rejected, failed to enable media [ 1695.921380][ T7341] loop2: detected capacity change from 0 to 164 [ 1696.966786][ T7359] IPVS: length: 146 != 8 [ 1697.000972][ T28] kauditd_printk_skb: 331 callbacks suppressed [ 1697.000991][ T28] audit: type=1400 audit(2000001076.119:95857): avc: denied { prog_load } for pid=7362 comm="syz.2.10607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1697.055029][ T28] audit: type=1400 audit(2000001076.119:95858): avc: denied { read write } for pid=7348 comm="syz.3.10604" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1697.071269][ T7349] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1697.118801][ T28] audit: type=1400 audit(2000001076.129:95859): avc: denied { read write open } for pid=7348 comm="syz.3.10604" path="/dev/raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1697.136424][ T7349] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1697.187959][ T7364] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10607'. [ 1697.209038][ T28] audit: type=1400 audit(2000001076.149:95861): avc: denied { bpf } for pid=7362 comm="syz.2.10607" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1697.270983][ T28] audit: type=1400 audit(2000001076.149:95860): avc: denied { ioctl } for pid=7348 comm="syz.3.10604" path="/dev/raw-gadget" dev="devtmpfs" ino=142 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1697.318375][ T28] audit: type=1400 audit(2000001076.149:95862): avc: denied { prog_load } for pid=7362 comm="syz.2.10607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1697.351791][ T28] audit: type=1400 audit(2000001076.149:95863): avc: denied { bpf } for pid=7362 comm="syz.2.10607" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1697.373587][ T28] audit: type=1400 audit(2000001076.159:95864): avc: denied { open } for pid=7362 comm="syz.2.10607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1697.412556][ T28] audit: type=1400 audit(2000001076.159:95865): avc: denied { perfmon } for pid=7362 comm="syz.2.10607" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1697.437467][ T7370] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7370 comm=syz.2.10607 [ 1697.480516][ T28] audit: type=1400 audit(2000001076.159:95866): avc: denied { kernel } for pid=7362 comm="syz.2.10607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1697.795711][ T7388] tipc: Enabling of bearer rejected, failed to enable media [ 1697.830413][ T7388] netlink: 'syz.2.10609': attribute type 1 has an invalid length. [ 1698.170346][ T7414] tipc: Enabling of bearer rejected, failed to enable media [ 1698.194196][ T7413] loop2: detected capacity change from 0 to 512 [ 1698.207675][ T7413] EXT4-fs: Ignoring removed mblk_io_submit option [ 1698.230323][ T7413] EXT4-fs error (device loop2): ext4_orphan_get:1397: inode #15: comm syz.2.10612: inode has both inline data and extents flags [ 1698.256688][ T7413] loop2: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 1698.256828][ T7413] EXT4-fs error (device loop2): ext4_orphan_get:1402: comm syz.2.10612: couldn't read orphan inode 15 (err -117) [ 1698.280768][ C0] EXT4-fs (loop2): error count since last fsck: 1 [ 1698.287286][ C0] EXT4-fs (loop2): initial error at time 2000001077: ext4_orphan_get:1397: inode 15 [ 1698.296798][ C0] EXT4-fs (loop2): last error at time 2000001077: ext4_orphan_get:1397: inode 15 [ 1698.334652][ T7413] loop2: lost filesystem error report for type 5 error -117 [ 1698.337848][ T7413] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1698.373162][ T7417] netlink: 92 bytes leftover after parsing attributes in process `syz.6.10613'. [ 1698.410191][ T7413] EXT4-fs error (device loop2): __ext4_add_entry:2412: inode #2: comm syz.2.10612: Directory hole found for htree leaf block 0 [ 1698.832000][ T7449] netlink: 68 bytes leftover after parsing attributes in process `syz.3.10615'. [ 1698.999078][T32089] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1699.417581][ T7476] loop2: detected capacity change from 0 to 512 [ 1699.427514][ T7476] EXT4-fs (loop2): unable to read superblock [ 1699.491348][ T7476] loop2: detected capacity change from 0 to 1024 [ 1699.501257][ T7476] EXT4-fs: quotafile must be on filesystem root [ 1701.045367][ T7500] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10621'. [ 1701.235620][ T7507] tipc: Enabling of bearer rejected, failed to enable media [ 1701.260872][ T7507] netlink: 'syz.1.10622': attribute type 1 has an invalid length. [ 1701.319335][ T7510] tipc: Enabling of bearer rejected, failed to enable media [ 1701.595080][ T7516] FAULT_INJECTION: forcing a failure. [ 1701.595080][ T7516] name failslab, interval 1, probability 0, space 0, times 0 [ 1701.607741][ T7516] CPU: 0 UID: 0 PID: 7516 Comm: syz.2.10625 Tainted: G W syzkaller #0 PREEMPT(full) [ 1701.607779][ T7516] Tainted: [W]=WARN [ 1701.607789][ T7516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1701.607826][ T7516] Call Trace: [ 1701.607834][ T7516] [ 1701.607842][ T7516] __dump_stack+0x1d/0x30 [ 1701.607894][ T7516] dump_stack_lvl+0x95/0xd0 [ 1701.607915][ T7516] dump_stack+0x15/0x1b [ 1701.607937][ T7516] should_fail_ex+0x263/0x280 [ 1701.608008][ T7516] should_failslab+0x8c/0xb0 [ 1701.608043][ T7516] __kmalloc_noprof+0xb8/0x4d0 [ 1701.608078][ T7516] ? bpf_test_init+0x86/0x130 [ 1701.608109][ T7516] bpf_test_init+0x86/0x130 [ 1701.608140][ T7516] bpf_prog_test_run_xdp+0x306/0xa10 [ 1701.608238][ T7516] ? __rcu_read_unlock+0x4e/0x70 [ 1701.608264][ T7516] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 1701.608292][ T7516] bpf_prog_test_run+0x204/0x340 [ 1701.608319][ T7516] __sys_bpf+0x52e/0x7e0 [ 1701.608365][ T7516] __x64_sys_bpf+0x41/0x50 [ 1701.608392][ T7516] x64_sys_call+0x10cb/0x3020 [ 1701.608421][ T7516] do_syscall_64+0x12c/0x3b0 [ 1701.608492][ T7516] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1701.608518][ T7516] RIP: 0033:0x7fdebd74cdd9 [ 1701.608538][ T7516] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1701.608561][ T7516] RSP: 002b:00007fdebc19f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1701.608659][ T7516] RAX: ffffffffffffffda RBX: 00007fdebd9c5fa0 RCX: 00007fdebd74cdd9 [ 1701.608682][ T7516] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 1701.608695][ T7516] RBP: 00007fdebc19f090 R08: 0000000000000000 R09: 0000000000000000 [ 1701.608708][ T7516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1701.608724][ T7516] R13: 00007fdebd9c6038 R14: 00007fdebd9c5fa0 R15: 00007fffad879a98 [ 1701.608746][ T7516] [ 1702.015118][ T28] kauditd_printk_skb: 462 callbacks suppressed [ 1702.015136][ T28] audit: type=1400 audit(2000001081.129:96329): avc: denied { read write } for pid=32089 comm="syz-executor" name="loop2" dev="devtmpfs" ino=1775 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1702.065717][ T28] audit: type=1400 audit(2000001081.149:96330): avc: denied { sys_module } for pid=7506 comm="syz.6.10623" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1702.107035][ T28] audit: type=1400 audit(2000001081.149:96331): avc: denied { module_request } for pid=7506 comm="syz.6.10623" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1702.132203][ T7528] netlink: 68 bytes leftover after parsing attributes in process `syz.2.10627'. [ 1702.140109][ T28] audit: type=1400 audit(2000001081.159:96332): avc: denied { read write open } for pid=32089 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=1775 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1702.205102][ T28] audit: type=1400 audit(2000001081.159:96333): avc: denied { ioctl } for pid=32089 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=1775 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1702.238615][ T28] audit: type=1400 audit(2000001081.179:96334): avc: denied { allowed } for pid=7506 comm="syz.6.10623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1702.290625][ T28] audit: type=1400 audit(2000001081.229:96335): avc: denied { open } for pid=7527 comm="syz.2.10627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1702.324875][ T28] audit: type=1400 audit(2000001081.229:96336): avc: denied { perfmon } for pid=7527 comm="syz.2.10627" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1702.362488][ T28] audit: type=1400 audit(2000001081.229:96337): avc: denied { kernel } for pid=7527 comm="syz.2.10627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1702.404291][ T28] audit: type=1400 audit(2000001081.229:96338): avc: denied { perfmon } for pid=7527 comm="syz.2.10627" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1703.078319][ T7552] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10635'. [ 1703.092596][ T7553] tipc: Enabling of bearer rejected, failed to enable media [ 1703.132494][ T7553] netlink: 'syz.2.10638': attribute type 1 has an invalid length. [ 1703.234068][ T7552] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7552 comm=syz.6.10635 [ 1703.287937][ T7557] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10634'. [ 1703.530159][ T7582] syzkaller0: entered promiscuous mode [ 1703.535734][ T7582] syzkaller0: entered allmulticast mode [ 1703.547744][ T7582] FAULT_INJECTION: forcing a failure. [ 1703.547744][ T7582] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.560604][ T7582] CPU: 0 UID: 0 PID: 7582 Comm: syz.1.10647 Tainted: G W syzkaller #0 PREEMPT(full) [ 1703.560646][ T7582] Tainted: [W]=WARN [ 1703.560654][ T7582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1703.560686][ T7582] Call Trace: [ 1703.560696][ T7582] [ 1703.560707][ T7582] __dump_stack+0x1d/0x30 [ 1703.560738][ T7582] dump_stack_lvl+0x95/0xd0 [ 1703.560796][ T7582] dump_stack+0x15/0x1b [ 1703.560816][ T7582] should_fail_ex+0x263/0x280 [ 1703.560858][ T7582] should_failslab+0x8c/0xb0 [ 1703.560956][ T7582] __kmalloc_node_track_caller_noprof+0xc3/0x550 [ 1703.560995][ T7582] ? sidtab_sid2str_get+0xa0/0x130 [ 1703.561060][ T7582] kmemdup_noprof+0x2b/0x70 [ 1703.561095][ T7582] sidtab_sid2str_get+0xa0/0x130 [ 1703.561126][ T7582] security_sid_to_context_core+0x1eb/0x2e0 [ 1703.561158][ T7582] security_sid_to_context+0x27/0x40 [ 1703.561261][ T7582] avc_audit_post_callback+0x9d/0x510 [ 1703.561292][ T7582] ? audit_log_lsm_data+0xb3e/0xbb0 [ 1703.561317][ T7582] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 1703.561422][ T7582] common_lsm_audit+0x1ba/0x230 [ 1703.561448][ T7582] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 1703.561518][ T7582] slow_avc_audit+0x14c/0x190 [ 1703.561559][ T7582] avc_has_perm+0x144/0x190 [ 1703.561660][ T7582] selinux_socket_sendmsg+0x1ab/0x1e0 [ 1703.561704][ T7582] security_socket_sendmsg+0x44/0x80 [ 1703.561745][ T7582] __sys_sendto+0x2c3/0x490 [ 1703.561859][ T7582] __x64_sys_sendto+0x76/0x90 [ 1703.561929][ T7582] x64_sys_call+0x2d35/0x3020 [ 1703.561959][ T7582] do_syscall_64+0x12c/0x3b0 [ 1703.561993][ T7582] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1703.562028][ T7582] RIP: 0033:0x7f492dd0cdd9 [ 1703.562108][ T7582] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1703.562131][ T7582] RSP: 002b:00007f492c75f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1703.562159][ T7582] RAX: ffffffffffffffda RBX: 00007f492df85fa0 RCX: 00007f492dd0cdd9 [ 1703.562177][ T7582] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 1703.562194][ T7582] RBP: 00007f492c75f090 R08: 0000200000000140 R09: 0000000000000014 [ 1703.562234][ T7582] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 1703.562250][ T7582] R13: 00007f492df86038 R14: 00007f492df85fa0 R15: 00007ffd9e4299d8 [ 1703.562275][ T7582] [ 1703.828358][ T7578] xt_hashlimit: size too large, truncated to 1048576 [ 1704.330334][ T7601] tipc: Enabling of bearer rejected, failed to enable media [ 1704.368709][ T7601] netlink: 'syz.3.10652': attribute type 1 has an invalid length. [ 1704.604973][ T7613] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10656'. [ 1704.879425][ T7622] Cannot find add_set index 0 as target [ 1704.969414][ T7627] netlink: 24 bytes leftover after parsing attributes in process `syz.6.10660'. [ 1704.982153][ T7627] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10660'. [ 1705.450669][ T7634] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10663'. [ 1705.582312][ T7638] tipc: Enabling of bearer rejected, failed to enable media [ 1705.611782][ T7638] netlink: 'syz.2.10665': attribute type 1 has an invalid length. [ 1707.613569][ T28] kauditd_printk_skb: 579 callbacks suppressed [ 1707.613588][ T28] audit: type=1400 audit(2000001085.939:96918): avc: denied { open } for pid=7648 comm="syz.5.10667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1708.592380][ T28] audit: type=1400 audit(2000001085.939:96919): avc: denied { perfmon } for pid=7648 comm="syz.5.10667" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1708.613526][ T28] audit: type=1400 audit(2000001085.939:96920): avc: denied { kernel } for pid=7648 comm="syz.5.10667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1708.857879][ T28] audit: type=1400 audit(2000001086.389:96921): avc: denied { open } for pid=7648 comm="syz.5.10667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1708.877839][ T28] audit: type=1400 audit(2000001086.389:96922): avc: denied { perfmon } for pid=7648 comm="syz.5.10667" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1709.269272][ T28] audit: type=1400 audit(2000001086.389:96923): avc: denied { kernel } for pid=7648 comm="syz.5.10667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1709.276623][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1709.289443][ T7647] syzkaller0: entered promiscuous mode [ 1709.295833][ C1] audit: audit_lost=1465 audit_rate_limit=0 audit_backlog_limit=64 [ 1709.295854][ C1] audit: backlog limit exceeded [ 1709.296250][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1709.491211][ T7647] syzkaller0: entered allmulticast mode [ 1710.108753][ T7677] netlink: 12 bytes leftover after parsing attributes in process `syz.5.10674'. [ 1710.276132][ T7683] xfrm0 speed is unknown, defaulting to 1000 [ 1710.342619][ T7688] program syz.5.10676 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1710.382425][ T7688] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 1710.426414][ T7683] gre0 speed is unknown, defaulting to 1000 [ 1711.318573][ T7706] netlink: 40 bytes leftover after parsing attributes in process `syz.6.10682'. [ 1711.402703][ T7706] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10682'. [ 1711.581733][ T7707] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7707 comm=syz.6.10682 [ 1711.671553][ T7712] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10685'. [ 1711.732925][ T7709] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10684'. [ 1711.956095][ T7720] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 1712.233542][ T7732] netlink: 68 bytes leftover after parsing attributes in process `syz.6.10690'. [ 1712.653032][ T28] kauditd_printk_skb: 490 callbacks suppressed [ 1712.653051][ T28] audit: type=1400 audit(2000001091.769:97397): avc: denied { open } for pid=7740 comm="syz.2.10694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1712.739072][ T28] audit: type=1400 audit(2000001091.799:97398): avc: denied { perfmon } for pid=7740 comm="syz.2.10694" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1712.760354][ T28] audit: type=1400 audit(2000001091.799:97399): avc: denied { kernel } for pid=7740 comm="syz.2.10694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1712.808470][ T28] audit: type=1400 audit(2000001091.799:97400): avc: denied { recv } for pid=7730 comm="syz.6.10690" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1712.874071][ T28] audit: type=1400 audit(2000001091.799:97401): avc: denied { recv } for pid=7730 comm="syz.6.10690" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1712.960505][ T7747] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1712.962077][ T28] audit: type=1400 audit(2000001091.799:97402): avc: denied { perfmon } for pid=7740 comm="syz.2.10694" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1712.979175][ T7741] batman_adv: batadv0: Adding interface: dummy0 [ 1712.995776][ T7752] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1713.003095][ T28] audit: type=1400 audit(2000001091.799:97403): avc: denied { map_create } for pid=7740 comm="syz.2.10694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1713.020148][ T7752] audit: audit_lost=1472 audit_rate_limit=0 audit_backlog_limit=64 [ 1713.030147][ T7741] batman_adv: batadv0: The MTU of interface dummy0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1713.064514][ T7741] batman_adv: batadv0: Interface activated: dummy0 [ 1713.155376][ T7744] batadv0: mtu less than device minimum [ 1713.161657][ T7744] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 1713.172543][ T7744] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 1713.183517][ T7744] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 1713.194607][ T7744] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 1713.205472][ T7744] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 1713.216375][ T7744] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 1713.227382][ T7744] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 1713.238455][ T7744] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 1713.250131][ T7744] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 1713.325300][ T7763] netlink: 12 bytes leftover after parsing attributes in process `syz.6.10698'. [ 1713.523728][ T7769] netlink: 40 bytes leftover after parsing attributes in process `syz.5.10700'. [ 1713.586891][ T7769] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10700'. [ 1713.735530][ T7779] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7779 comm=syz.5.10700 [ 1715.704575][ T7787] netlink: 12 bytes leftover after parsing attributes in process `syz.5.10707'. [ 1715.893284][ T7792] netlink: 12 bytes leftover after parsing attributes in process `syz.5.10709'. [ 1715.984804][ T7789] xfrm0 speed is unknown, defaulting to 1000 [ 1716.649727][ T7789] gre0 speed is unknown, defaulting to 1000 [ 1716.996695][ T7824] FAULT_INJECTION: forcing a failure. [ 1716.996695][ T7824] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1717.052756][ T7824] CPU: 1 UID: 0 PID: 7824 Comm: syz.2.10719 Tainted: G W syzkaller #0 PREEMPT(full) [ 1717.052802][ T7824] Tainted: [W]=WARN [ 1717.052810][ T7824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1717.052836][ T7824] Call Trace: [ 1717.052901][ T7824] [ 1717.052911][ T7824] __dump_stack+0x1d/0x30 [ 1717.052939][ T7824] dump_stack_lvl+0x95/0xd0 [ 1717.052962][ T7824] dump_stack+0x15/0x1b [ 1717.053030][ T7824] should_fail_ex+0x263/0x280 [ 1717.053063][ T7824] should_fail+0xb/0x20 [ 1717.053142][ T7824] should_fail_usercopy+0x1a/0x20 [ 1717.053233][ T7824] strncpy_from_user+0x27/0x250 [ 1717.053258][ T7824] ? kmem_cache_alloc_noprof+0x18c/0x3f0 [ 1717.053298][ T7824] do_getname+0x59/0x1c0 [ 1717.053335][ T7824] getname_flags+0x1d/0x30 [ 1717.053369][ T7824] do_sys_openat2+0x60/0x130 [ 1717.053396][ T7824] __x64_sys_creat+0x65/0x90 [ 1717.053423][ T7824] x64_sys_call+0x2ea0/0x3020 [ 1717.053452][ T7824] do_syscall_64+0x12c/0x3b0 [ 1717.053494][ T7824] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1717.053519][ T7824] RIP: 0033:0x7fdebd74cdd9 [ 1717.053538][ T7824] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1717.053567][ T7824] RSP: 002b:00007fdebc19f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1717.053592][ T7824] RAX: ffffffffffffffda RBX: 00007fdebd9c5fa0 RCX: 00007fdebd74cdd9 [ 1717.053665][ T7824] RDX: 0000000000000000 RSI: 0000000000000026 RDI: 00002000000000c0 [ 1717.053681][ T7824] RBP: 00007fdebc19f090 R08: 0000000000000000 R09: 0000000000000000 [ 1717.053697][ T7824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1717.053718][ T7824] R13: 00007fdebd9c6038 R14: 00007fdebd9c5fa0 R15: 00007fffad879a98 [ 1717.053741][ T7824] [ 1717.740673][ T28] kauditd_printk_skb: 373 callbacks suppressed [ 1717.740691][ T28] audit: type=1400 audit(2000001096.859:97774): avc: denied { prog_load } for pid=7831 comm="syz.2.10720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1717.816628][ T28] audit: type=1400 audit(2000001096.889:97775): avc: denied { bpf } for pid=7831 comm="syz.2.10720" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1717.896195][ T28] audit: type=1400 audit(2000001096.889:97776): avc: denied { perfmon } for pid=7831 comm="syz.2.10720" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1717.970246][ T28] audit: type=1400 audit(2000001096.889:97777): avc: denied { prog_run } for pid=7831 comm="syz.2.10720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1718.038550][ T28] audit: type=1400 audit(2000001096.899:97778): avc: denied { create } for pid=7831 comm="syz.2.10720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1718.117389][ T28] audit: type=1400 audit(2000001096.909:97779): avc: denied { open } for pid=7831 comm="syz.2.10720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1718.192020][ T28] audit: type=1400 audit(2000001096.909:97780): avc: denied { perfmon } for pid=7831 comm="syz.2.10720" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1718.283432][ T28] audit: type=1400 audit(2000001096.909:97781): avc: denied { kernel } for pid=7831 comm="syz.2.10720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1718.305568][ T28] audit: type=1400 audit(2000001096.919:97782): avc: denied { write } for pid=7831 comm="syz.2.10720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1718.337964][ T28] audit: type=1400 audit(2000001097.449:97783): avc: denied { recv } for pid=7734 comm="syz.1.10691" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1718.471901][ T7840] x_tables: duplicate underflow at hook 1 [ 1718.803861][ T7840] netlink: 16 bytes leftover after parsing attributes in process `syz.6.10721'. [ 1718.994685][ T7848] tipc: Enabling of bearer rejected, failed to enable media [ 1719.024545][ T7850] tipc: Enabling of bearer rejected, failed to enable media [ 1719.377496][ T7852] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1719.387440][ T7852] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1719.877215][ T7869] net_ratelimit: 10 callbacks suppressed [ 1719.877235][ T7869] veth0_to_bridge: mtu less than device minimum [ 1720.268566][ T7884] tipc: Enabling of bearer rejected, failed to enable media [ 1720.670561][ T7888] xfrm0 speed is unknown, defaulting to 1000 [ 1720.846402][ T7888] gre0 speed is unknown, defaulting to 1000 [ 1721.210123][ T7890] SELinux: failed to load policy [ 1721.217320][ T7900] syzkaller0: entered promiscuous mode [ 1721.235866][ T7900] syzkaller0: entered allmulticast mode [ 1721.323901][ T7903] netlink: 24 bytes leftover after parsing attributes in process `syz.1.10740'. [ 1721.455106][ T7906] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10740'. [ 1721.970648][ T7913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7913 comm=syz.1.10740 [ 1722.103800][ T7915] tipc: Enabling of bearer rejected, failed to enable media [ 1722.168221][ T7919] netlink: 12 bytes leftover after parsing attributes in process `syz.2.10743'. [ 1722.310823][ T7923] syzkaller1: left promiscuous mode [ 1722.337556][ T7923] syzkaller1: left allmulticast mode [ 1722.446727][ T7935] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10749'. [ 1722.703161][ T7945] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10751'. [ 1722.750770][ T28] kauditd_printk_skb: 506 callbacks suppressed [ 1722.750789][ T28] audit: type=1400 audit(2000001101.869:98288): avc: denied { create } for pid=7951 comm="syz.6.10754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1722.914387][ T7955] xfrm0 speed is unknown, defaulting to 1000 [ 1723.018129][ T7955] gre0 speed is unknown, defaulting to 1000 [ 1723.372336][ T28] audit: type=1400 audit(2000001101.919:98289): avc: denied { create } for pid=7941 comm="syz.5.10752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1723.393026][ T28] audit: type=1400 audit(2000001101.929:98290): avc: denied { read } for pid=7941 comm="syz.5.10752" dev="nsfs" ino=4026533493 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1723.447648][ T28] audit: type=1400 audit(2000001101.929:98291): avc: denied { open } for pid=7941 comm="syz.5.10752" path="net:[4026533493]" dev="nsfs" ino=4026533493 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1723.471160][ T28] audit: type=1400 audit(2000001101.929:98292): avc: denied { create } for pid=7941 comm="syz.5.10752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1723.493161][ T28] audit: type=1400 audit(2000001101.939:98293): avc: denied { open } for pid=7941 comm="syz.5.10752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1723.527224][ T7953] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1723.537059][ T7959] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1723.553063][ T7953] audit: audit_lost=1475 audit_rate_limit=0 audit_backlog_limit=64 [ 1723.568179][ T7961] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1723.751651][ T7963] netlink: 76 bytes leftover after parsing attributes in process `syz.2.10756'. [ 1723.780351][ T7963] netlink: 12 bytes leftover after parsing attributes in process `syz.2.10756'. [ 1725.102474][ T7986] syzkaller1: entered promiscuous mode [ 1725.142838][ T7987] netlink: 16 bytes leftover after parsing attributes in process `syz.2.10764'. [ 1725.163325][ T7986] syzkaller1: entered allmulticast mode [ 1725.451936][ T8000] tipc: Enabling of bearer rejected, failed to enable media [ 1725.618858][ T8006] netlink: 76 bytes leftover after parsing attributes in process `syz.5.10768'. [ 1725.670117][ T8006] netlink: 12 bytes leftover after parsing attributes in process `syz.5.10768'. [ 1726.732262][ T8034] tipc: Enabling of bearer rejected, failed to enable media [ 1726.855286][ T8037] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 1727.026002][ T8046] __nla_validate_parse: 1 callbacks suppressed [ 1727.026018][ T8046] netlink: 76 bytes leftover after parsing attributes in process `syz.6.10781'. [ 1727.099114][ T8053] netlink: 12 bytes leftover after parsing attributes in process `syz.6.10781'. [ 1727.574539][ T8065] xfrm0 speed is unknown, defaulting to 1000 [ 1727.623520][ T8065] gre0 speed is unknown, defaulting to 1000 [ 1727.731066][ T8065] SELinux: failed to load policy [ 1727.757214][ T28] kauditd_printk_skb: 537 callbacks suppressed [ 1727.757233][ T28] audit: type=1400 audit(2000001106.879:98826): avc: denied { prog_run } for pid=8064 comm="syz.3.10785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1727.795177][ T28] audit: type=1400 audit(2000001106.899:98827): avc: denied { getopt } for pid=8064 comm="syz.3.10785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1727.829394][ T28] audit: type=1400 audit(2000001106.939:98828): avc: denied { recv } for pid=8026 comm="syz.5.10775" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1727.892306][ T28] audit: type=1400 audit(2000001106.939:98829): avc: denied { recv } for pid=8026 comm="syz.5.10775" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1727.920784][ T28] audit: type=1400 audit(2000001106.939:98830): avc: denied { recv } for pid=8026 comm="syz.5.10775" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1727.947896][ T28] audit: type=1400 audit(2000001106.949:98831): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1728.017343][ T28] audit: type=1400 audit(2000001106.949:98832): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1728.045169][ T28] audit: type=1400 audit(2000001106.949:98833): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1728.071395][ T28] audit: type=1400 audit(2000001106.949:98834): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1728.111526][ T28] audit: type=1400 audit(2000001106.949:98835): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1728.604046][ T8080] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 1728.990861][ T8087] netlink: 24 bytes leftover after parsing attributes in process `syz.5.10791'. [ 1729.049894][ T8087] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10791'. [ 1729.141637][ T8089] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10789'. [ 1729.327071][ T8087] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8087 comm=syz.5.10791 [ 1730.028648][ T8052] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 1730.162658][ T8096] FAULT_INJECTION: forcing a failure. [ 1730.162658][ T8096] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1730.321201][ T8101] netlink: 32 bytes leftover after parsing attributes in process `syz.1.10794'. [ 1730.330684][ T8096] CPU: 0 UID: 0 PID: 8096 Comm: syz.6.10793 Tainted: G W syzkaller #0 PREEMPT(full) [ 1730.330789][ T8096] Tainted: [W]=WARN [ 1730.330798][ T8096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1730.330813][ T8096] Call Trace: [ 1730.330822][ T8096] [ 1730.330832][ T8096] __dump_stack+0x1d/0x30 [ 1730.330860][ T8096] dump_stack_lvl+0x95/0xd0 [ 1730.330894][ T8096] dump_stack+0x15/0x1b [ 1730.330979][ T8096] should_fail_ex+0x263/0x280 [ 1730.331008][ T8096] should_fail+0xb/0x20 [ 1730.331037][ T8096] should_fail_usercopy+0x1a/0x20 [ 1730.331071][ T8096] _copy_from_user+0x1c/0xb0 [ 1730.331113][ T8096] __sys_sendto+0x1ca/0x490 [ 1730.331142][ T8096] __x64_sys_sendto+0x76/0x90 [ 1730.331237][ T8096] x64_sys_call+0x2d35/0x3020 [ 1730.331261][ T8096] do_syscall_64+0x12c/0x3b0 [ 1730.331299][ T8096] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1730.331326][ T8096] RIP: 0033:0x7f48a6f7d60e [ 1730.331347][ T8096] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1730.331371][ T8096] RSP: 002b:00007f48a5a15e88 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1730.331393][ T8096] RAX: ffffffffffffffda RBX: 00007f48a5a176c0 RCX: 00007f48a6f7d60e [ 1730.331410][ T8096] RDX: 0000000000000020 RSI: 00007f48a5a16000 RDI: 0000000000000003 [ 1730.331478][ T8096] RBP: 0000000000000000 R08: 00007f48a5a15f04 R09: 000000000000000c [ 1730.331495][ T8096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1730.331524][ T8096] R13: 00007f48a5a15f58 R14: 00007f48a5a16000 R15: 0000000000000000 [ 1730.331543][ T8096] [ 1730.520638][ T8103] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10794'. [ 1730.678679][ T8102] xfrm0 speed is unknown, defaulting to 1000 [ 1730.717585][ T8102] gre0 speed is unknown, defaulting to 1000 [ 1730.851121][ T8109] netlink: 20 bytes leftover after parsing attributes in process `syz.6.10797'. [ 1730.952694][ T8102] SELinux: failed to load policy [ 1731.219492][ T8125] xfrm0 speed is unknown, defaulting to 1000 [ 1732.324973][ T8125] gre0 speed is unknown, defaulting to 1000 [ 1732.550349][ T8143] tipc: Enabling of bearer rejected, failed to enable media [ 1732.798301][ T28] kauditd_printk_skb: 351 callbacks suppressed [ 1732.798323][ T28] audit: type=1400 audit(2000001111.919:99187): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1732.897196][ T28] audit: type=1400 audit(2000001111.919:99188): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1732.932624][ T8147] netlink: 32 bytes leftover after parsing attributes in process `syz.6.10808'. [ 1732.968536][ T8147] netlink: 12 bytes leftover after parsing attributes in process `syz.6.10808'. [ 1732.975847][ T28] audit: type=1400 audit(2000001111.969:99189): avc: denied { recv } for pid=2046 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1733.035994][ T28] audit: type=1400 audit(2000001111.969:99190): avc: denied { recv } for pid=8137 comm="syz.3.10805" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1733.072855][ T8149] netlink: 'syz.5.10809': attribute type 16 has an invalid length. [ 1733.102977][ T28] audit: type=1400 audit(2000001111.999:99191): avc: denied { execmem } for pid=8144 comm="syz.1.10807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1733.154595][ T28] audit: type=1400 audit(2000001111.999:99192): avc: denied { create } for pid=8145 comm="syz.6.10808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1733.195795][ T28] audit: type=1400 audit(2000001111.999:99193): avc: denied { allowed } for pid=8145 comm="syz.6.10808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1733.215558][ T28] audit: type=1400 audit(2000001112.009:99194): avc: denied { create } for pid=8145 comm="syz.6.10808" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1733.250267][ T28] audit: type=1400 audit(2000001112.049:99195): avc: denied { create } for pid=8145 comm="syz.6.10808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1733.279222][ T28] audit: type=1400 audit(2000001112.049:99196): avc: denied { write } for pid=8145 comm="syz.6.10808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1733.539751][ T8149] bridge0: port 2(bridge_slave_1) entered disabled state [ 1733.547037][ T8149] bridge0: port 1(bridge_slave_0) entered disabled state [ 1733.588517][ T8160] SELinux: failed to load policy [ 1734.082188][ T8149] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1734.143607][ T8149] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1734.388801][T19469] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1734.401014][ T8158] xfrm0 speed is unknown, defaulting to 1000 [ 1734.422780][T19469] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1734.440728][T19469] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1734.480393][T19469] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1734.496966][ T8158] gre0 speed is unknown, defaulting to 1000 [ 1734.646734][ T8197] tipc: Enabling of bearer rejected, failed to enable media [ 1734.762657][ T8199] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10816'. [ 1735.582312][ T8205] netlink: 32 bytes leftover after parsing attributes in process `syz.1.10820'. [ 1735.635078][ T8206] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10820'. [ 1736.725443][ T8221] 8021q: VLANs not supported on ip6gre0 [ 1736.854051][ T8231] xfrm0 speed is unknown, defaulting to 1000 [ 1736.967362][ T8231] gre0 speed is unknown, defaulting to 1000 [ 1737.174298][ T8233] SELinux: failed to load policy [ 1737.281417][ T8247] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 1737.333878][ T8249] tipc: Enabling of bearer rejected, failed to enable media [ 1737.492875][ T8251] netlink: 24 bytes leftover after parsing attributes in process `syz.3.10833'. [ 1737.540938][ T8251] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10833'. [ 1737.610588][ T8255] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8255 comm=syz.3.10833 [ 1737.857971][ T28] kauditd_printk_skb: 416 callbacks suppressed [ 1737.857989][ T28] audit: type=1400 audit(2000001373.036:99613): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1737.910763][ T8261] netlink: 24 bytes leftover after parsing attributes in process `syz.5.10837'. [ 1737.934160][ T28] audit: type=1400 audit(2000001373.036:99614): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1737.978285][ T28] audit: type=1400 audit(2000001373.036:99615): avc: denied { recv } for pid=3284 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1737.993676][ T8267] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10837'. [ 1738.116988][ T28] audit: type=1400 audit(2000001373.046:99616): avc: denied { prog_load } for pid=8260 comm="syz.5.10837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1738.156191][ T8267] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8267 comm=syz.5.10837 [ 1738.157170][ T28] audit: type=1400 audit(2000001373.046:99617): avc: denied { bpf } for pid=8260 comm="syz.5.10837" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1738.212735][ T28] audit: type=1400 audit(2000001373.046:99618): avc: denied { prog_load } for pid=8260 comm="syz.5.10837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1738.234273][ T28] audit: type=1400 audit(2000001373.046:99619): avc: denied { bpf } for pid=8260 comm="syz.5.10837" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1738.287851][ T28] audit: type=1400 audit(2000001373.046:99620): avc: denied { open } for pid=8260 comm="syz.5.10837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1738.341000][ T28] audit: type=1400 audit(2000001373.056:99621): avc: denied { perfmon } for pid=8260 comm="syz.5.10837" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1738.371193][ T28] audit: type=1400 audit(2000001373.056:99622): avc: denied { kernel } for pid=8260 comm="syz.5.10837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1738.415043][ T8277] xfrm0 speed is unknown, defaulting to 1000 [ 1738.534468][ T8277] gre0 speed is unknown, defaulting to 1000 [ 1738.692577][ T8286] tipc: Enabling of bearer rejected, failed to enable media [ 1738.918945][ T8279] SELinux: failed to load policy [ 1739.379898][ T8301] wireguard0: entered promiscuous mode [ 1739.385503][ T8301] wireguard0: entered allmulticast mode [ 1739.442945][ T8298] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10849'. [ 1739.451939][ T8298] netlink: 24 bytes leftover after parsing attributes in process `syz.3.10849'. [ 1739.554670][ T8308] netlink: 24 bytes leftover after parsing attributes in process `syz.2.10852'. [ 1739.607906][ T8310] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10852'. [ 1739.692099][ T8310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8310 comm=syz.2.10852 [ 1740.339111][ T8320] tipc: Enabling of bearer rejected, failed to enable media [ 1740.417183][ T8323] xfrm0 speed is unknown, defaulting to 1000 [ 1740.591176][ T8323] gre0 speed is unknown, defaulting to 1000 [ 1740.731031][ T8323] SELinux: failed to load policy [ 1741.801966][ T8352] netlink: 'syz.6.10866': attribute type 3 has an invalid length. [ 1741.994999][ T8356] netlink: 24 bytes leftover after parsing attributes in process `syz.5.10868'. [ 1742.126280][ T8359] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10868'. [ 1742.330505][ T8363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8363 comm=syz.5.10868 [ 1742.421198][ T8365] tipc: Enabling of bearer rejected, failed to enable media [ 1742.450204][ T8367] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10871'. [ 1742.697747][ T8375] FAULT_INJECTION: forcing a failure. [ 1742.697747][ T8375] name failslab, interval 1, probability 0, space 0, times 0 [ 1742.912643][ T28] kauditd_printk_skb: 769 callbacks suppressed [ 1742.912677][ T28] audit: type=1400 audit(2000001377.916:100392): avc: denied { execmem } for pid=8376 comm="syz.5.10875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1742.991059][ T8381] netlink: 32 bytes leftover after parsing attributes in process `syz.5.10875'. [ 1743.055469][ T8375] CPU: 0 UID: 0 PID: 8375 Comm: syz.2.10874 Tainted: G W syzkaller #0 PREEMPT(full) [ 1743.055562][ T8375] Tainted: [W]=WARN [ 1743.055571][ T8375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1743.055595][ T8375] Call Trace: [ 1743.055603][ T8375] [ 1743.055612][ T8375] __dump_stack+0x1d/0x30 [ 1743.055638][ T8375] dump_stack_lvl+0x95/0xd0 [ 1743.055659][ T8375] dump_stack+0x15/0x1b [ 1743.055721][ T8375] should_fail_ex+0x263/0x280 [ 1743.055749][ T8375] should_failslab+0x8c/0xb0 [ 1743.055800][ T8375] kmem_cache_alloc_noprof+0x66/0x3f0 [ 1743.055837][ T8375] ? __kernfs_new_node+0x70/0x400 [ 1743.055872][ T8375] __kernfs_new_node+0x70/0x400 [ 1743.055954][ T8375] ? radix_tree_iter_tag_clear+0x105/0x180 [ 1743.055998][ T8375] ? idr_alloc_u32+0x14e/0x1a0 [ 1743.056100][ T8375] ? kernfs_xattr_get+0x61/0x80 [ 1743.056165][ T8375] kernfs_new_node+0xd0/0x140 [ 1743.056196][ T8375] __kernfs_create_file+0x4b/0x180 [ 1743.056268][ T8375] ? __pfx_dev_attr_show+0x10/0x10 [ 1743.056302][ T8375] ? __pfx_dev_attr_store+0x10/0x10 [ 1743.056414][ T8375] sysfs_add_file_mode_ns+0x132/0x1b0 [ 1743.056442][ T8375] internal_create_group+0x441/0x9e0 [ 1743.056474][ T8375] ? kernfs_add_one+0x212/0x280 [ 1743.056587][ T8375] sysfs_create_groups+0x3f/0xf0 [ 1743.056614][ T8375] device_add_attrs+0x64/0x3f0 [ 1743.056635][ T8375] ? kobject_put+0x108/0x180 [ 1743.056667][ T8375] device_add+0x37a/0x790 [ 1743.056707][ T8375] netdev_register_kobject+0x109/0x230 [ 1743.056754][ T8375] ? register_netdevice+0xa96/0x1160 [ 1743.056779][ T8375] register_netdevice+0xaaf/0x1160 [ 1743.056803][ T8375] macvlan_common_newlink+0xa03/0xbe0 [ 1743.056864][ T8375] ? rtnl_is_locked+0x15/0x20 [ 1743.056908][ T8375] macvtap_newlink+0xde/0x140 [ 1743.056957][ T8375] ? __pfx_macvtap_newlink+0x10/0x10 [ 1743.056980][ T8375] rtnl_newlink_create+0x1e4/0x650 [ 1743.057061][ T8375] ? security_capable+0x7b/0x90 [ 1743.057094][ T8375] ? netlink_ns_capable+0x86/0xa0 [ 1743.057124][ T8375] rtnl_newlink+0x1185/0x1400 [ 1743.057162][ T8375] ? __rcu_read_unlock+0x4e/0x70 [ 1743.057260][ T8375] ? avc_has_perm_noaudit+0xab/0x130 [ 1743.057322][ T8375] ? cred_has_capability+0x224/0x2a0 [ 1743.057408][ T8375] ? selinux_capable+0x31/0x40 [ 1743.057504][ T8375] ? security_capable+0x7b/0x90 [ 1743.057543][ T8375] ? ns_capable+0x7c/0xb0 [ 1743.057586][ T8375] ? __pfx_rtnl_newlink+0x10/0x10 [ 1743.057615][ T8375] rtnetlink_rcv_msg+0x64b/0x720 [ 1743.057649][ T8375] netlink_rcv_skb+0x123/0x220 [ 1743.057703][ T8375] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1743.057741][ T8375] rtnetlink_rcv+0x1c/0x30 [ 1743.057815][ T8375] netlink_unicast+0x5a8/0x680 [ 1743.057844][ T8375] netlink_sendmsg+0x5c8/0x6f0 [ 1743.057900][ T8375] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1743.057933][ T8375] ____sys_sendmsg+0x563/0x5b0 [ 1743.057962][ T8375] ___sys_sendmsg+0x195/0x1e0 [ 1743.058159][ T8375] __x64_sys_sendmsg+0xd4/0x160 [ 1743.058190][ T8375] x64_sys_call+0x194c/0x3020 [ 1743.058229][ T8375] do_syscall_64+0x12c/0x3b0 [ 1743.058258][ T8375] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1743.058280][ T8375] RIP: 0033:0x7fdebd74cdd9 [ 1743.058300][ T8375] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1743.058355][ T8375] RSP: 002b:00007fdebc19f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1743.058377][ T8375] RAX: ffffffffffffffda RBX: 00007fdebd9c5fa0 RCX: 00007fdebd74cdd9 [ 1743.058392][ T8375] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 1743.058406][ T8375] RBP: 00007fdebc19f090 R08: 0000000000000000 R09: 0000000000000000 [ 1743.058419][ T8375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1743.058433][ T8375] R13: 00007fdebd9c6038 R14: 00007fdebd9c5fa0 R15: 00007fffad879a98 [ 1743.058464][ T8375] [ 1743.815074][ T28] audit: type=1400 audit(2000001378.126:100393): avc: denied { prog_load } for pid=8376 comm="syz.5.10875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1743.879468][ T28] audit: type=1400 audit(2000001378.136:100394): avc: denied { bpf } for pid=8376 comm="syz.5.10875" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1743.945665][ T28] audit: type=1400 audit(2000001378.136:100395): avc: denied { prog_load } for pid=8376 comm="syz.5.10875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1743.965784][ T28] audit: type=1400 audit(2000001378.136:100396): avc: denied { bpf } for pid=8376 comm="syz.5.10875" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1744.146631][ T28] audit: type=1400 audit(2000001378.136:100397): avc: denied { perfmon } for pid=8376 comm="syz.5.10875" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1744.656069][ T8388] netlink: 32 bytes leftover after parsing attributes in process `syz.6.10877'. [ 1744.776304][ T28] audit: type=1400 audit(2000001378.136:100398): avc: denied { prog_load } for pid=8376 comm="syz.5.10875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1744.986467][ T8391] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1745.003923][ T8392] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1745.011982][ T28] audit: type=1400 audit(2000001378.136:100399): avc: denied { bpf } for pid=8376 comm="syz.5.10875" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1745.485220][ T8405] netlink: 24 bytes leftover after parsing attributes in process `syz.2.10882'. [ 1745.610823][ T8402] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10882'. [ 1745.623467][ T8411] tipc: Enabling of bearer rejected, failed to enable media [ 1745.809202][ T8402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8402 comm=syz.2.10882 [ 1747.484061][ T8440] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10893'. [ 1747.612164][ T8441] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10890'. [ 1747.621339][ T8441] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10890'. [ 1747.926490][ T28] kauditd_printk_skb: 318 callbacks suppressed [ 1747.926510][ T28] audit: type=1400 audit(2000001383.096:100714): avc: denied { recv } for pid=8423 comm="syz.1.10890" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1748.267754][ T28] audit: type=1400 audit(2000001383.146:100715): avc: denied { recv } for pid=8423 comm="syz.1.10890" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1748.326920][ T28] audit: type=1400 audit(2000001383.146:100716): avc: denied { recv } for pid=8423 comm="syz.1.10890" saddr=10.128.0.163 src=30036 daddr=10.128.0.130 dest=55220 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1748.397622][ T28] audit: type=1400 audit(2000001383.176:100717): avc: denied { read } for pid=8427 comm="syz.6.10891" dev="nsfs" ino=4026532922 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1748.464133][ T8450] tipc: Enabling of bearer rejected, failed to enable media [ 1748.513924][ T28] audit: type=1400 audit(2000001383.176:100718): avc: denied { read open } for pid=8427 comm="syz.6.10891" path="net:[4026532922]" dev="nsfs" ino=4026532922 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1748.631268][ T8450] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1748.642845][ T8454] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1748.665142][ T8455] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1748.666391][ T28] audit: type=1400 audit(2000001383.186:100719): avc: denied { prog_load } for pid=8442 comm="syz.3.10894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1748.672999][ T8455] audit: audit_lost=1480 audit_rate_limit=0 audit_backlog_limit=64 [ 1748.919999][ T8464] netlink: 24 bytes leftover after parsing attributes in process `syz.3.10900'. [ 1749.016461][ T8460] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10900'. [ 1749.126072][ T8464] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8464 comm=syz.3.10900 [ 1749.316000][ T8491] tipc: Enabling of bearer rejected, failed to enable media [ 1749.596078][ T8499] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10912'. [ 1749.605371][ T8499] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10912'. [ 1750.090963][ T8503] netlink: 'syz.2.10915': attribute type 1 has an invalid length. [ 1750.565750][ T8516] netlink: 68 bytes leftover after parsing attributes in process `syz.5.10919'. [ 1750.579911][ T8519] netlink: 68 bytes leftover after parsing attributes in process `syz.2.10921'. [ 1750.607908][ T8520] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10922'. [ 1750.621145][ T8522] tipc: Enabling of bearer rejected, failed to enable media [ 1750.687832][ T8520] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10922'. [ 1750.924488][ T8525] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8525 comm=syz.6.10922 [ 1751.190639][ C1] ================================================================== [ 1751.198968][ C1] BUG: KCSAN: data-race in virtqueue_get_buf_ctx / vring_interrupt [ 1751.207070][ C1] [ 1751.209419][ C1] read-write to 0xffff88810224b25c of 2 bytes by interrupt on cpu 0: [ 1751.217513][ C1] virtqueue_get_buf_ctx+0x607/0xdb0 [ 1751.222846][ C1] virtqueue_get_buf+0x1f/0x30 [ 1751.227642][ C1] __free_old_xmit+0x53/0x340 [ 1751.232446][ C1] virtnet_free_old_xmit+0x39/0x1b0 [ 1751.237819][ C1] virtnet_poll_tx+0x2de/0xca0 [ 1751.242625][ C1] __napi_poll+0x61/0x300 [ 1751.246987][ C1] net_rx_action+0x452/0x930 [ 1751.251794][ C1] handle_softirqs+0xb9/0x280 [ 1751.256509][ C1] __irq_exit_rcu+0x42/0xd0 [ 1751.261032][ C1] common_interrupt+0x83/0x90 [ 1751.265736][ C1] asm_common_interrupt+0x26/0x40 [ 1751.270883][ C1] _raw_spin_unlock_irqrestore+0x1a/0x30 [ 1751.276630][ C1] __skb_try_recv_datagram+0x123/0x320 [ 1751.282116][ C1] __unix_dgram_recvmsg+0x25a/0x870 [ 1751.287439][ C1] unix_dgram_recvmsg+0x7e/0x90 [ 1751.292525][ C1] sock_recvmsg_nosec+0xc2/0xf0 [ 1751.297408][ C1] ____sys_recvmsg+0x26f/0x280 [ 1751.302207][ C1] ___sys_recvmsg+0x11f/0x3b0 [ 1751.306907][ C1] do_recvmmsg+0x1ef/0x560 [ 1751.311334][ C1] __x64_sys_recvmmsg+0xe5/0x170 [ 1751.316372][ C1] x64_sys_call+0x80f/0x3020 [ 1751.320975][ C1] do_syscall_64+0x12c/0x3b0 [ 1751.325578][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1751.331690][ C1] [ 1751.334016][ C1] read to 0xffff88810224b25c of 2 bytes by interrupt on cpu 1: [ 1751.342016][ C1] vring_interrupt+0x48/0x310 [ 1751.346721][ C1] __handle_irq_event_percpu+0x8b/0x480 [ 1751.352396][ C1] handle_irq_event+0x64/0xf0 [ 1751.357091][ C1] handle_edge_irq+0x154/0x450 [ 1751.361919][ C1] __common_interrupt+0x60/0xb0 [ 1751.366815][ C1] common_interrupt+0x7e/0x90 [ 1751.371639][ C1] asm_common_interrupt+0x26/0x40 [ 1751.376780][ C1] _raw_spin_unlock_irqrestore+0x1a/0x30 [ 1751.382454][ C1] avc_alloc_node+0x21c/0x280 [ 1751.387167][ C1] avc_compute_av+0xb0/0x430 [ 1751.391954][ C1] avc_perm_nonode+0x5e/0xe0 [ 1751.396761][ C1] avc_has_perm_noaudit+0xf2/0x130 [ 1751.401922][ C1] avc_has_perm+0x60/0x190 [ 1751.406385][ C1] may_create+0x455/0x4a0 [ 1751.410741][ C1] selinux_inode_symlink+0x22/0x30 [ 1751.415976][ C1] security_inode_symlink+0x75/0xb0 [ 1751.421302][ C1] vfs_symlink+0x8e/0x220 [ 1751.425665][ C1] filename_symlinkat+0xe8/0x2b0 [ 1751.430801][ C1] __se_sys_symlinkat+0x43/0x1b0 [ 1751.435768][ C1] __x64_sys_symlinkat+0x43/0x50 [ 1751.440728][ C1] x64_sys_call+0x2b7d/0x3020 [ 1751.445505][ C1] do_syscall_64+0x12c/0x3b0 [ 1751.450292][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1751.456221][ C1] [ 1751.458718][ C1] value changed: 0x25f1 -> 0x25f2 [ 1751.464007][ C1] [ 1751.466426][ C1] Reported by Kernel Concurrency Sanitizer on: [ 1751.473020][ C1] CPU: 1 UID: 0 PID: 8527 Comm: syz-executor Tainted: G W syzkaller #0 PREEMPT(full) [ 1751.484595][ C1] Tainted: [W]=WARN [ 1751.488446][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1751.498709][ C1] ==================================================================