last executing test programs: 13m39.352858186s ago: executing program 2 (id=59): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0xff, 0x7, 0x7fc00002}]}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xb4}}, 0x0) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3ff, &(0x7f0000000500)=0x0) io_submit(r3, 0xf000, &(0x7f0000000300)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000001c0)='m', 0xfffffdfc}]) io_destroy(r3) membarrier(0x10, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0}) r5 = socket$nl_audit(0x10, 0x3, 0x9) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) io_uring_setup(0x4fee, &(0x7f0000000040)={0x0, 0xc8df, 0xc000, 0xa, 0xb8}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x800, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {0xd}, {0xe, 0x8}}}, 0x11}, 0x1, 0x0, 0x0, 0x50801}, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r6, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) sendmmsg(r6, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={r4, 0x3, r5, 0x3, 0x80000}) 13m37.089080228s ago: executing program 2 (id=63): bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x5, 0x5, 0x2, 0x4}, 0x50) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x9, 0x3c231, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0xe}, 0x204, 0x2, 0xfb3d, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/rt_cache\x00') r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000180)={0x3, 0x40, 0xfa02, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x4e1e, 0x7, @mcast2}, r4, 0xffffffff}}, 0x48) close_range(r2, 0xffffffffffffffff, 0x0) 13m36.812262698s ago: executing program 2 (id=65): writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x8002) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x20000004, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000280)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xe, @empty, 0x2}, {0xa, 0x4e23, 0x7, @ipv4={'\x00', '\xff\xff', @local}, 0x3}, r1, 0x7}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000100)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x6, @empty, 0x3}, r3}}, 0xfffffff4) r4 = socket$inet(0xa, 0x801, 0x84) connect$inet(r4, &(0x7f0000004cc0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r4, 0x8) syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x802) 13m36.668701232s ago: executing program 2 (id=67): socket(0xa, 0x3, 0xff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) getpriority(0x2, 0x0) 13m36.532304796s ago: executing program 2 (id=69): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x24000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x8b7848, 0x0) 13m36.366378102s ago: executing program 2 (id=72): r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$cgroup_devices(r0, 0x0, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001740)=@newtaction={0x894, 0x30, 0x1, 0x0, 0x0, {0x7a}, [{0x880, 0x1, [@m_police={0x87c, 0x1, 0x0, 0x0, {{0xb}, {0x850, 0x2, 0x0, 0x1, [[@TCA_POLICE_RESULT={0x8, 0x5, 0x20000000}], [@TCA_POLICE_RATE={0x404, 0x2, [0xff, 0xef02, 0xef0a, 0x9, 0x23, 0x400000, 0x80000000, 0xfffffffb, 0xc, 0x3, 0x2, 0x6, 0x73f9e023, 0x6, 0x6, 0x7, 0xfb, 0xeb5, 0x7, 0x24, 0x35bad662, 0x5, 0x4, 0x29, 0x6, 0x8, 0x4, 0x5, 0x1ff, 0x140000, 0x0, 0x1a, 0x8, 0x5, 0x0, 0x5, 0x6, 0x9, 0x7, 0x2, 0x8, 0x0, 0xf, 0x2, 0x98, 0x800, 0x100, 0x8000, 0xca, 0x4, 0x2, 0x3, 0x4, 0x2, 0x1d9, 0x4, 0xfffff2c2, 0x8001, 0x0, 0x1, 0x8, 0x7, 0x9, 0x0, 0x7, 0x8, 0x7, 0x6, 0x7f, 0x3ff, 0x6e09bc56, 0x81, 0x0, 0x400, 0x4, 0x21c30312, 0x6, 0x8, 0x3, 0xc, 0x2, 0x9, 0x9, 0x1, 0xfffffff8, 0x5, 0xb, 0x5, 0xbfc3, 0x3, 0xe8b3, 0x8, 0x1, 0x6252, 0x7, 0x5, 0xc, 0x0, 0x9e, 0x1, 0x27, 0x3, 0x8, 0x10, 0x8001, 0xfff, 0x6, 0x4, 0x3, 0xfff, 0x5, 0x9, 0x16, 0x5, 0x7fffffff, 0x7f, 0x4, 0xffffff81, 0x1, 0x8, 0xc, 0x3ff, 0x6, 0xfffffff2, 0x2b22, 0x2c5, 0x2db1, 0xfffffff7, 0x200, 0x8, 0x10000e46, 0x5, 0xc9b3, 0x0, 0x9, 0x9, 0x2, 0x8, 0x7, 0x5, 0xfffffc00, 0x800, 0x400, 0x9, 0x6, 0x200, 0x48, 0x40, 0x1, 0x9, 0x7, 0x8000, 0x7, 0x1ff, 0x2237, 0x6, 0x5, 0x6, 0x0, 0x4b, 0x4, 0xffff8000, 0x80000001, 0xd, 0x3, 0x3, 0x5, 0x9, 0x5, 0x3ff, 0x800, 0x9, 0x0, 0x6, 0x2, 0x93b, 0x4, 0x9, 0x200, 0x9, 0x0, 0x9, 0x401, 0xb, 0x3, 0xffffffff, 0x3, 0x0, 0x7, 0x3, 0x1, 0x2, 0x8, 0x3, 0x9, 0x0, 0x9, 0xffffffff, 0x400, 0x9, 0x61a0, 0x7, 0x2, 0x9, 0x9, 0x200, 0x9, 0x1, 0x1, 0x0, 0x4, 0x6, 0x40, 0x7, 0xf, 0x40, 0x80, 0x3, 0x1ff, 0x1, 0x9, 0xff, 0x80, 0x0, 0x4, 0x3, 0x7, 0x9, 0x8, 0x0, 0xf17, 0x0, 0xfffffff7, 0x7, 0x9, 0x0, 0x6, 0x7, 0x3, 0x101, 0xfffffffd, 0x3723, 0xf8a, 0xa, 0xcdd6, 0x1, 0x369, 0x3, 0x9, 0x7fff, 0x8, 0x10, 0xfffffff3, 0x10, 0x3ff, 0x5]}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x9, 0x1000, 0x8000, 0x4, 0x4, 0x8, 0x8, 0x80000001, 0x74c6, 0x8, 0x4, 0x40000000, 0x101, 0xffff0a6a, 0x1, 0x7, 0x38, 0x8000, 0x5, 0x3, 0x3, 0x42d, 0x1, 0x9, 0x100, 0x1, 0x1, 0x81, 0x7ff800, 0x3, 0x4, 0x80000000, 0x0, 0x1, 0x6, 0xe, 0x5, 0x7, 0x4, 0xff, 0x2, 0x7, 0xe76, 0x10000, 0xfffffffa, 0x6, 0xd66, 0x9, 0x2, 0xb26, 0xb4, 0xa, 0x800, 0x7fffffff, 0x80, 0xace, 0x80000006, 0x3, 0x3, 0x380, 0x5, 0x100, 0x9, 0x9, 0x1000, 0x7f, 0x3, 0x7, 0x5, 0x18000000, 0x1, 0x10000, 0x2, 0x2, 0x7, 0xef, 0x3, 0x400, 0x0, 0x6, 0x5, 0x92b, 0x5, 0x1000, 0xb, 0x7, 0x5, 0x9, 0x7fffffff, 0x1000, 0x5, 0x76, 0x200, 0x8, 0x2, 0x6, 0x10, 0x7ff, 0x40008, 0x72, 0x7fffffff, 0x311, 0xff, 0x4, 0xffffff2f, 0x1, 0x8, 0x9, 0xa086, 0x1, 0x200, 0x800, 0x7, 0x5, 0x80000000, 0x3ff, 0x9, 0x100, 0x15d2, 0x6, 0x1, 0x1, 0x2, 0x241c1aaa, 0x2, 0x0, 0x2, 0x16b, 0x8, 0x9, 0xa, 0x981, 0x0, 0xb, 0x2, 0x2, 0xffff, 0x81, 0x3, 0x3, 0x7, 0x6, 0x4, 0x2, 0xfffffffd, 0x5, 0x40000000, 0x7a, 0x8f0a, 0x7, 0xd29, 0x7, 0x0, 0x15, 0xfffffa11, 0x2, 0x80000001, 0xfe2, 0xa, 0x8, 0x7f, 0x6, 0x4, 0x9, 0x7, 0x4, 0x6, 0xf, 0x51, 0xff, 0x2, 0xfffffffd, 0x2, 0x8, 0x3, 0xff, 0x8, 0x2c1efe9, 0x3e, 0x5d18, 0x81, 0x400, 0x4, 0x7326deb8, 0x8006, 0x7ff, 0xffffffff, 0x5, 0x0, 0x2, 0x1, 0x6, 0x9e8, 0x101, 0xb31, 0x5, 0xe2, 0x4, 0x7f1e7a56, 0x5, 0x83, 0x9, 0x203e, 0x5, 0x8, 0x5, 0x10001, 0x87, 0x9, 0x1, 0xff, 0x8, 0x9, 0x8001, 0xffffff41, 0x7, 0x0, 0xe, 0x9, 0x3, 0x3, 0x8001, 0x0, 0x401, 0xfffffff9, 0xed, 0x6, 0xb9, 0xc3, 0x200, 0x101, 0x10, 0xa, 0xc, 0x2, 0x101, 0x5, 0x1, 0xa, 0x6, 0x9, 0x7, 0x4, 0x6, 0xbdc0, 0x7, 0x9, 0x9, 0x100, 0x4, 0xfffffffe, 0x81, 0x1000, 0x1, 0x9, 0x4]}, @TCA_POLICE_TBF={0x3c, 0x1, {0xe62f, 0xffffffffffffffff, 0xf, 0x3, 0x7, {0x3, 0x0, 0x8, 0x9, 0x6, 0x6}, {0x8, 0x0, 0x9, 0x9, 0x6, 0x9}, 0x5, 0xa4de, 0x3}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x894}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000c00000009"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000003000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="00000000000065cfeeaa22e70000b708000000000000c84c3ea8c81f8dfc6fdd211577518e377b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200), &(0x7f0000000280), 0x84, r2}, 0x38) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) connect$inet6(r6, &(0x7f0000000440)={0xa, 0x4e21, 0x8, @remote, 0xb}, 0x1c) syz_emit_ethernet(0xfef3, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6001010000641100fe8000f5ffffff0000000000000000bbfe8000000000000000000000000000aa4e200e22"], 0x0) syz_clone3(&(0x7f0000000080)={0x801400, &(0x7f0000000040), 0x0, 0x0, {0xa}, 0x0, 0x0, 0x0, 0x0}, 0x58) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r5, r4, 0x25, 0x0, @void}, 0x10) syz_emit_ethernet(0x1011, &(0x7f0000001b40)=ANY=[], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x111, 0x6}}, 0x20) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940), 0x2, 0x0) ppoll(&(0x7f0000000300)=[{0xffffffffffffffff, 0x4236}], 0x1, 0x0, 0x0, 0x0) r8 = socket$inet_smc(0x2b, 0x1, 0x0) bind$inet(r8, &(0x7f00000001c0)={0x2, 0x4e22, @broadcast}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x2, 0x4}}, 0x20) writev(r7, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) cachestat(r0, &(0x7f0000000000)={0x312, 0x1545}, &(0x7f00000000c0), 0x0) 13m21.213006317s ago: executing program 32 (id=72): r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$cgroup_devices(r0, 0x0, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001740)=@newtaction={0x894, 0x30, 0x1, 0x0, 0x0, {0x7a}, [{0x880, 0x1, [@m_police={0x87c, 0x1, 0x0, 0x0, {{0xb}, {0x850, 0x2, 0x0, 0x1, [[@TCA_POLICE_RESULT={0x8, 0x5, 0x20000000}], [@TCA_POLICE_RATE={0x404, 0x2, [0xff, 0xef02, 0xef0a, 0x9, 0x23, 0x400000, 0x80000000, 0xfffffffb, 0xc, 0x3, 0x2, 0x6, 0x73f9e023, 0x6, 0x6, 0x7, 0xfb, 0xeb5, 0x7, 0x24, 0x35bad662, 0x5, 0x4, 0x29, 0x6, 0x8, 0x4, 0x5, 0x1ff, 0x140000, 0x0, 0x1a, 0x8, 0x5, 0x0, 0x5, 0x6, 0x9, 0x7, 0x2, 0x8, 0x0, 0xf, 0x2, 0x98, 0x800, 0x100, 0x8000, 0xca, 0x4, 0x2, 0x3, 0x4, 0x2, 0x1d9, 0x4, 0xfffff2c2, 0x8001, 0x0, 0x1, 0x8, 0x7, 0x9, 0x0, 0x7, 0x8, 0x7, 0x6, 0x7f, 0x3ff, 0x6e09bc56, 0x81, 0x0, 0x400, 0x4, 0x21c30312, 0x6, 0x8, 0x3, 0xc, 0x2, 0x9, 0x9, 0x1, 0xfffffff8, 0x5, 0xb, 0x5, 0xbfc3, 0x3, 0xe8b3, 0x8, 0x1, 0x6252, 0x7, 0x5, 0xc, 0x0, 0x9e, 0x1, 0x27, 0x3, 0x8, 0x10, 0x8001, 0xfff, 0x6, 0x4, 0x3, 0xfff, 0x5, 0x9, 0x16, 0x5, 0x7fffffff, 0x7f, 0x4, 0xffffff81, 0x1, 0x8, 0xc, 0x3ff, 0x6, 0xfffffff2, 0x2b22, 0x2c5, 0x2db1, 0xfffffff7, 0x200, 0x8, 0x10000e46, 0x5, 0xc9b3, 0x0, 0x9, 0x9, 0x2, 0x8, 0x7, 0x5, 0xfffffc00, 0x800, 0x400, 0x9, 0x6, 0x200, 0x48, 0x40, 0x1, 0x9, 0x7, 0x8000, 0x7, 0x1ff, 0x2237, 0x6, 0x5, 0x6, 0x0, 0x4b, 0x4, 0xffff8000, 0x80000001, 0xd, 0x3, 0x3, 0x5, 0x9, 0x5, 0x3ff, 0x800, 0x9, 0x0, 0x6, 0x2, 0x93b, 0x4, 0x9, 0x200, 0x9, 0x0, 0x9, 0x401, 0xb, 0x3, 0xffffffff, 0x3, 0x0, 0x7, 0x3, 0x1, 0x2, 0x8, 0x3, 0x9, 0x0, 0x9, 0xffffffff, 0x400, 0x9, 0x61a0, 0x7, 0x2, 0x9, 0x9, 0x200, 0x9, 0x1, 0x1, 0x0, 0x4, 0x6, 0x40, 0x7, 0xf, 0x40, 0x80, 0x3, 0x1ff, 0x1, 0x9, 0xff, 0x80, 0x0, 0x4, 0x3, 0x7, 0x9, 0x8, 0x0, 0xf17, 0x0, 0xfffffff7, 0x7, 0x9, 0x0, 0x6, 0x7, 0x3, 0x101, 0xfffffffd, 0x3723, 0xf8a, 0xa, 0xcdd6, 0x1, 0x369, 0x3, 0x9, 0x7fff, 0x8, 0x10, 0xfffffff3, 0x10, 0x3ff, 0x5]}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x9, 0x1000, 0x8000, 0x4, 0x4, 0x8, 0x8, 0x80000001, 0x74c6, 0x8, 0x4, 0x40000000, 0x101, 0xffff0a6a, 0x1, 0x7, 0x38, 0x8000, 0x5, 0x3, 0x3, 0x42d, 0x1, 0x9, 0x100, 0x1, 0x1, 0x81, 0x7ff800, 0x3, 0x4, 0x80000000, 0x0, 0x1, 0x6, 0xe, 0x5, 0x7, 0x4, 0xff, 0x2, 0x7, 0xe76, 0x10000, 0xfffffffa, 0x6, 0xd66, 0x9, 0x2, 0xb26, 0xb4, 0xa, 0x800, 0x7fffffff, 0x80, 0xace, 0x80000006, 0x3, 0x3, 0x380, 0x5, 0x100, 0x9, 0x9, 0x1000, 0x7f, 0x3, 0x7, 0x5, 0x18000000, 0x1, 0x10000, 0x2, 0x2, 0x7, 0xef, 0x3, 0x400, 0x0, 0x6, 0x5, 0x92b, 0x5, 0x1000, 0xb, 0x7, 0x5, 0x9, 0x7fffffff, 0x1000, 0x5, 0x76, 0x200, 0x8, 0x2, 0x6, 0x10, 0x7ff, 0x40008, 0x72, 0x7fffffff, 0x311, 0xff, 0x4, 0xffffff2f, 0x1, 0x8, 0x9, 0xa086, 0x1, 0x200, 0x800, 0x7, 0x5, 0x80000000, 0x3ff, 0x9, 0x100, 0x15d2, 0x6, 0x1, 0x1, 0x2, 0x241c1aaa, 0x2, 0x0, 0x2, 0x16b, 0x8, 0x9, 0xa, 0x981, 0x0, 0xb, 0x2, 0x2, 0xffff, 0x81, 0x3, 0x3, 0x7, 0x6, 0x4, 0x2, 0xfffffffd, 0x5, 0x40000000, 0x7a, 0x8f0a, 0x7, 0xd29, 0x7, 0x0, 0x15, 0xfffffa11, 0x2, 0x80000001, 0xfe2, 0xa, 0x8, 0x7f, 0x6, 0x4, 0x9, 0x7, 0x4, 0x6, 0xf, 0x51, 0xff, 0x2, 0xfffffffd, 0x2, 0x8, 0x3, 0xff, 0x8, 0x2c1efe9, 0x3e, 0x5d18, 0x81, 0x400, 0x4, 0x7326deb8, 0x8006, 0x7ff, 0xffffffff, 0x5, 0x0, 0x2, 0x1, 0x6, 0x9e8, 0x101, 0xb31, 0x5, 0xe2, 0x4, 0x7f1e7a56, 0x5, 0x83, 0x9, 0x203e, 0x5, 0x8, 0x5, 0x10001, 0x87, 0x9, 0x1, 0xff, 0x8, 0x9, 0x8001, 0xffffff41, 0x7, 0x0, 0xe, 0x9, 0x3, 0x3, 0x8001, 0x0, 0x401, 0xfffffff9, 0xed, 0x6, 0xb9, 0xc3, 0x200, 0x101, 0x10, 0xa, 0xc, 0x2, 0x101, 0x5, 0x1, 0xa, 0x6, 0x9, 0x7, 0x4, 0x6, 0xbdc0, 0x7, 0x9, 0x9, 0x100, 0x4, 0xfffffffe, 0x81, 0x1000, 0x1, 0x9, 0x4]}, @TCA_POLICE_TBF={0x3c, 0x1, {0xe62f, 0xffffffffffffffff, 0xf, 0x3, 0x7, {0x3, 0x0, 0x8, 0x9, 0x6, 0x6}, {0x8, 0x0, 0x9, 0x9, 0x6, 0x9}, 0x5, 0xa4de, 0x3}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x894}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000c00000009"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000003000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="00000000000065cfeeaa22e70000b708000000000000c84c3ea8c81f8dfc6fdd211577518e377b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200), &(0x7f0000000280), 0x84, r2}, 0x38) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) connect$inet6(r6, &(0x7f0000000440)={0xa, 0x4e21, 0x8, @remote, 0xb}, 0x1c) syz_emit_ethernet(0xfef3, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6001010000641100fe8000f5ffffff0000000000000000bbfe8000000000000000000000000000aa4e200e22"], 0x0) syz_clone3(&(0x7f0000000080)={0x801400, &(0x7f0000000040), 0x0, 0x0, {0xa}, 0x0, 0x0, 0x0, 0x0}, 0x58) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r5, r4, 0x25, 0x0, @void}, 0x10) syz_emit_ethernet(0x1011, &(0x7f0000001b40)=ANY=[], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x111, 0x6}}, 0x20) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940), 0x2, 0x0) ppoll(&(0x7f0000000300)=[{0xffffffffffffffff, 0x4236}], 0x1, 0x0, 0x0, 0x0) r8 = socket$inet_smc(0x2b, 0x1, 0x0) bind$inet(r8, &(0x7f00000001c0)={0x2, 0x4e22, @broadcast}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x2, 0x4}}, 0x20) writev(r7, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) cachestat(r0, &(0x7f0000000000)={0x312, 0x1545}, &(0x7f00000000c0), 0x0) 9m46.32901806s ago: executing program 1 (id=1534): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'wg0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000180)="0b03feff4f00071202004788aa96a13bb1000011000088ca1a00", 0x1fffc, 0x0, &(0x7f0000000140)={0x11, 0x0, r1}, 0x14) 9m45.855743115s ago: executing program 1 (id=1537): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0x403, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, 0x0, 0x428a4}, [@IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x8000) 9m45.621409862s ago: executing program 1 (id=1539): openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0), 0x18, 0x0) 9m45.351575991s ago: executing program 1 (id=1540): r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000a80)='./file1\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="646f74732c747a3d5554432c646f74732c646f74732c6e6f646f74732c666c7573682c646f74732c6e6f646f74732c71756965742c00b3d27234e95eb4b44190021bbbe89ab824d38c571641668d362b4dff6e47bdf1638c7462a3bd66a53b404ae08c32af6843a2469c7210381b9d48047c77540b6447a8e50c44cb44f91e4264a37e0209c3a234f4803ba56b7a24536ee396f4838f4143b92ad909efb23eb22dce6477c2bb5b8f793b9e07c2120d566cf1f6ba51e4d01e8ef223a2ba72cfb3127844c045765149fb1219f433feb977426596e07082254e9930296256df143ff96377d8c28c533724fbd9fdad260e7d875d0f17374141abc60c8e3c07e4a7bc381791172c217f00964aaf6e213a252b9689ae38342862d27437921e13229d407e1a6037e3f16a2cdab8f9c76a66a72ccc67015c9435e200f9fbb9d78ce426b37310b9f127e7b1207c74eff7b853de7043a001de85931463c7fc7c78be9eb9b5f88c0067aabb3a5d1f94bcc90537c1c1ce509450160c"], 0x3, 0x160, &(0x7f0000001080)="$eJzs27+KE1EUB+AzJmrUwtRiMWBjFdTKUpEI4oCipNBKIdokEjDNaBV8ElsfTpBUKYQrOpJoNmHZP7Ozu/m+Jgd+3HBPcedyBubNzQ+j4WT6fvJ8Hp0si/aDyGORRTcuRCsqswAAzpNFSvEjpZQuz+LK10gpNb0jAKBu7n8A2D373v/3G9oYAFAb8z8A7J6Xr14/fVgU/Rd53on4PisH5aD6rfLHT4r+nfyP7mrVvCwHrWV+t8rz//OLcfVvfm9jfilu36ry39mjZ8Vafi2G9bcPAAAAO6GXL22c73u9bXlV/fN+YG1+b8eN9om1AQAcwPTT59Hb8fjdR4XijBY/U0qHWP7lW3UETkkXx1tkEXG0/2n6yQTUbXXom94JAAAAAAAAAAAAAACwTb1fI7Ui4nrTLQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMAevwIAAP//IPZORg==") r1 = syz_open_dev$loop(&(0x7f0000000080), 0x7fffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000001100)=[{{&(0x7f0000000080)={0xa, 0x4e21, 0x0, @private2, 0xd}, 0x1c, 0x0, 0x0, &(0x7f0000000240)=[@hopopts_2292={{0x18, 0x29, 0x36, {0x16}}}, @tclass={{0x14, 0x29, 0x43, 0xfffffd9b}}], 0x30}}], 0x1, 0x10000) ioctl$LOOP_CONFIGURE(r1, 0x4c0a, &(0x7f00000002c0)={r2, 0x0, {0x2a00, 0x80010000, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xd, "fee8a2a478fc179fd2f8dda1af1ea89de2b7fb0a0100000000000000000300000000000004000000000000000000000000000500", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "90be8b1c551265406c7f306003d8a0f4bd00000014000800000000000000007f"}}) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x591) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c0000001a00010025bd7000000000000a00f9"], 0x2c}, 0x1, 0x0, 0x0, 0x20008864}, 0x800) 9m44.393848792s ago: executing program 1 (id=1545): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x4800) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0x403, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, 0x0, 0x428a4}, [@IFLA_IFNAME={0x14, 0x3, 'macvlan1\x00'}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x8000) sendmsg$nl_route(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@dellink={0x20, 0x11, 0x1, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r2, 0x408}}, 0x20}, 0x1, 0x200000000000000, 0x0, 0x4}, 0x40cc040) 9m43.674118055s ago: executing program 1 (id=1546): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_tracing={0x1a, 0x29, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xde9, 0x0, 0x0, 0x0, 0x8}, [@tail_call, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xec9}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @ringbuf_query, @ldst={0x1, 0x3, 0x6, 0x3, 0x3, 0x8, 0xfffffffffffffffc}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}}]}, &(0x7f00000003c0)='GPL\x00', 0x401, 0xa7, &(0x7f00000004c0)=""/167, 0x41100, 0x50, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0xc, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x9, 0x0, 0x3}, 0x10, 0x1cd7e, 0xffffffffffffffff, 0x2, &(0x7f0000000880)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000008c0)=[{0x5, 0x3, 0x6, 0x7}, {0x3, 0x2, 0xe, 0x8}], 0x10, 0x7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioprio_set$pid(0x2, 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f0000000980)=@migrate={0x2e0, 0x21, 0x0, 0x70bd28, 0x25dfdbfb, {{@in=@local, @in=@multicast1, 0x4e21, 0x65, 0x4e23, 0x8, 0xa, 0x80}, 0x0, 0x1}, [@tfcpad={0x8, 0x16, 0x5}, @policy={0xac, 0x7, {{@in=@local, @in=@remote, 0x4e24, 0x3, 0x4e1d, 0x7, 0xa, 0x1a0, 0x10, 0x4f}, {0x0, 0x6, 0x9, 0x7, 0x5, 0x9, 0x5, 0x2}, {0x4, 0x1000, 0x4, 0xffffffffffffffff}, 0x15c5, 0x6e6bb6, 0x2, 0x1, 0x0, 0x2}}, @extra_flags={0x8, 0x18, 0x8}, @sec_ctx={0xf5, 0x8, {0xf1, 0x8, 0x1, 0x3b, 0xe9, "af640a16cfe43821ab57e299ad77552038d55e3e094f4d50f30e08efab916d4c05c78aa9e7bb03c43cf2c2a4cfaf45e61a7def2d773dae5a51bf2a049160239d03f759508e1aaa76889a4fe835eb9f7baa3ee8a5e58245a8da0064dcd1916ee826ce36b08124fbd7cc7b236191776bee245d23d557c4428c9677691dd64720adfd3002a2be079bf297cfa6bec4855f8e1fe8704807fdf934ffe3a0078e6b72d301b0f20d898a16d0f592a1c649a1528bcc0bcd331153e59f9da67a282d65fba7d172eda965bf901dfc5ff4d6f03e1c6c24db91a02dc29cee7d2a6fe2ada6bd858d7d04fba667b051e7"}}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x8147}, @algo_auth_trunc={0xd3, 0x14, {{'streebog512\x00'}, 0x438, 0x180, "c46244fcdb8e9c9584002732c97de685bd974fb6b278abb6b9bb44158fa76564f74269c32133acf69babab822fc0a973f7fcedf8cded86a807e028aea06549ae8ab4e9c2f4772ef935bf3a2caaa8283faa1fba0aef72f008311bf6bb50487583af4f0481e475850de1bdc9c2aeab2c5836d6b8fcf39d1d556e060086aadbd43219a6e20b93b514"}}]}, 0x2e0}}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001f80)=@getpolicy={0x11ec, 0x15, 0x2, 0x70bd2c, 0x25dfdbfe, {{@in=@broadcast, @in=@local, 0x4e20, 0x1, 0x4e23, 0x2, 0xa, 0x20, 0xc0}, 0x6e6bba, 0x1}, [@tfcpad={0x8, 0x16, 0x5}, @XFRMA_IF_ID={0x8, 0x1f, 0x3}, @coaddr={0x14, 0xe, @in=@rand_addr=0x64010100}, @algo_crypt={0x1048, 0x2, {{'xts-aes-neonbs\x00'}, 0x8000, "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"}}, @algo_crypt={0x12d, 0x2, {{'ctr-aes-aesni\x00'}, 0x728, "0e463a5864ba499dbc94891d2db719a8cd6bcf25cdf959a3935be212fde27e13f689a7a98dfa071f84fb3569d53bcf82381d179b036fe1bcba09b9a6eefee7b7bdaaa2f8675445b1302210d05dc8a0d0a3372edb064f6acbc514934bb46335d08dfd7852b65af50244c8a8f83eed2b1e7a98c8be54bbf83d37fbd8397f9d1a5a747e23759635d001d9e4591abfc48d6b57e0c1d97d8be8e1951c344c34f5b56fbfd40641510c2299b935a02b297ce57338e19714322dabda55de4e826b74baee2c620747cfcb4b37ab59140b8d1fb46c5b8ca7c73cafb01f9818b28166a63693c2aa191fbf"}}]}, 0x11ec}, 0x1, 0x0, 0x0, 0x40180}, 0x0) r4 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) fchdir(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) truncate(&(0x7f0000000940)='./file1\x00', 0x2fffffd) sendfile(r6, r6, 0x0, 0xe3aa6ea) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'\x00', 0x52d35ce30131f272}) ioctl$TUNSETOFFLOAD(r7, 0x400454c9, 0x9) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x12, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) bind$l2tp6(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) socket(0x2, 0x80805, 0x0) socket$inet6(0xa, 0x0, 0x85) 9m43.52335702s ago: executing program 33 (id=1546): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_tracing={0x1a, 0x29, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xde9, 0x0, 0x0, 0x0, 0x8}, [@tail_call, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xec9}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @ringbuf_query, @ldst={0x1, 0x3, 0x6, 0x3, 0x3, 0x8, 0xfffffffffffffffc}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}}]}, &(0x7f00000003c0)='GPL\x00', 0x401, 0xa7, &(0x7f00000004c0)=""/167, 0x41100, 0x50, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0xc, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x9, 0x0, 0x3}, 0x10, 0x1cd7e, 0xffffffffffffffff, 0x2, &(0x7f0000000880)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000008c0)=[{0x5, 0x3, 0x6, 0x7}, {0x3, 0x2, 0xe, 0x8}], 0x10, 0x7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioprio_set$pid(0x2, 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f0000000980)=@migrate={0x2e0, 0x21, 0x0, 0x70bd28, 0x25dfdbfb, {{@in=@local, @in=@multicast1, 0x4e21, 0x65, 0x4e23, 0x8, 0xa, 0x80}, 0x0, 0x1}, [@tfcpad={0x8, 0x16, 0x5}, @policy={0xac, 0x7, {{@in=@local, @in=@remote, 0x4e24, 0x3, 0x4e1d, 0x7, 0xa, 0x1a0, 0x10, 0x4f}, {0x0, 0x6, 0x9, 0x7, 0x5, 0x9, 0x5, 0x2}, {0x4, 0x1000, 0x4, 0xffffffffffffffff}, 0x15c5, 0x6e6bb6, 0x2, 0x1, 0x0, 0x2}}, @extra_flags={0x8, 0x18, 0x8}, @sec_ctx={0xf5, 0x8, {0xf1, 0x8, 0x1, 0x3b, 0xe9, "af640a16cfe43821ab57e299ad77552038d55e3e094f4d50f30e08efab916d4c05c78aa9e7bb03c43cf2c2a4cfaf45e61a7def2d773dae5a51bf2a049160239d03f759508e1aaa76889a4fe835eb9f7baa3ee8a5e58245a8da0064dcd1916ee826ce36b08124fbd7cc7b236191776bee245d23d557c4428c9677691dd64720adfd3002a2be079bf297cfa6bec4855f8e1fe8704807fdf934ffe3a0078e6b72d301b0f20d898a16d0f592a1c649a1528bcc0bcd331153e59f9da67a282d65fba7d172eda965bf901dfc5ff4d6f03e1c6c24db91a02dc29cee7d2a6fe2ada6bd858d7d04fba667b051e7"}}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x8147}, @algo_auth_trunc={0xd3, 0x14, {{'streebog512\x00'}, 0x438, 0x180, "c46244fcdb8e9c9584002732c97de685bd974fb6b278abb6b9bb44158fa76564f74269c32133acf69babab822fc0a973f7fcedf8cded86a807e028aea06549ae8ab4e9c2f4772ef935bf3a2caaa8283faa1fba0aef72f008311bf6bb50487583af4f0481e475850de1bdc9c2aeab2c5836d6b8fcf39d1d556e060086aadbd43219a6e20b93b514"}}]}, 0x2e0}}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001f80)=@getpolicy={0x11ec, 0x15, 0x2, 0x70bd2c, 0x25dfdbfe, {{@in=@broadcast, @in=@local, 0x4e20, 0x1, 0x4e23, 0x2, 0xa, 0x20, 0xc0}, 0x6e6bba, 0x1}, [@tfcpad={0x8, 0x16, 0x5}, @XFRMA_IF_ID={0x8, 0x1f, 0x3}, @coaddr={0x14, 0xe, @in=@rand_addr=0x64010100}, @algo_crypt={0x1048, 0x2, {{'xts-aes-neonbs\x00'}, 0x8000, "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"}}, @algo_crypt={0x12d, 0x2, {{'ctr-aes-aesni\x00'}, 0x728, "0e463a5864ba499dbc94891d2db719a8cd6bcf25cdf959a3935be212fde27e13f689a7a98dfa071f84fb3569d53bcf82381d179b036fe1bcba09b9a6eefee7b7bdaaa2f8675445b1302210d05dc8a0d0a3372edb064f6acbc514934bb46335d08dfd7852b65af50244c8a8f83eed2b1e7a98c8be54bbf83d37fbd8397f9d1a5a747e23759635d001d9e4591abfc48d6b57e0c1d97d8be8e1951c344c34f5b56fbfd40641510c2299b935a02b297ce57338e19714322dabda55de4e826b74baee2c620747cfcb4b37ab59140b8d1fb46c5b8ca7c73cafb01f9818b28166a63693c2aa191fbf"}}]}, 0x11ec}, 0x1, 0x0, 0x0, 0x40180}, 0x0) r4 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) fchdir(r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) truncate(&(0x7f0000000940)='./file1\x00', 0x2fffffd) sendfile(r6, r6, 0x0, 0xe3aa6ea) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'\x00', 0x52d35ce30131f272}) ioctl$TUNSETOFFLOAD(r7, 0x400454c9, 0x9) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x12, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) bind$l2tp6(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) socket(0x2, 0x80805, 0x0) socket$inet6(0xa, 0x0, 0x85) 6m4.209487924s ago: executing program 4 (id=2632): socket$netlink(0x10, 0x3, 0x0) setxattr$incfs_metadata(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000100)="1691179929db0b4e76ec5b0ccb2ad4f3f03d68d4a0940b7e77546c068382e8d48f9561a990b2e750a393fb60d397be1ce6b9a8812b94cd1c5c24d195a9dec8a0e2e16351b34a0eab2fdf6b3941d19cc698510902b5d0fd850b9aca884532c66473610b4398e7b9ac56003682190710291049aba6fb750711e9e02980aa53091ed30fb75fa9cb541c216d4c0d64ed5512c8ac11029b4389c32008dddb3e79ba98f188f5d71640b03253e2a5f460", 0xad, 0x3) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) (async) fcntl$dupfd(r0, 0x0, r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) r2 = socket(0x2, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000180)=0x7d34, 0x4) sendto$inet(r2, &(0x7f00000002c0)="b401fcc8cd1bb8b66f7ee68e052af9c34b7d7494", 0x14, 0xc0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r4 = socket(0x400000000010, 0x3, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) (async) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x70bd27, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0x4, 0xffff2153, 0x2, 0xa, 0xd, 0x1c4, 0x7, 0x2, 0x6}}}}]}, 0x58}}, 0x2000c090) socket$unix(0x1, 0x1, 0x0) (async) r7 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) (async) r8 = socket$unix(0x1, 0x1, 0x0) r9 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newtfilter={0x84, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r10, {0x4, 0x5}, {}, {0x7, 0x5}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x4, 0xd, 0x0, 0x9, 0x3}}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x20048081}, 0xc0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r11) socket$nl_route(0x10, 0x3, 0x0) (async) r12 = socket$nl_route(0x10, 0x3, 0x0) ioctl$XFS_IOC_ATTRLIST_BY_HANDLE(r12, 0x4058587a, &(0x7f0000000700)={{r0, &(0x7f0000000440)='syzkaller0\x00', 0x600, &(0x7f00000004c0)={@_ha_fsid={[0x1, 0x400]}, {0x3, 0x1, 0x7, 0x2}}, 0x0, &(0x7f0000000500)={@_ha_fsid}, &(0x7f00000005c0)=0x6}, {[0x9, 0x40, 0x0, 0x9]}, 0x9, 0xb4, &(0x7f0000000600)=""/180}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) socket$kcm(0x11, 0x3, 0x0) (async) r13 = socket$kcm(0x11, 0x3, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000007c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='uni_xlate\x00\x00,iocharset=iso8859-5,shortname=winnt,nonumtail=0,uni_xlate=1,utf8=0,iocharset=maccroatian,iocharset=macgaelic,allow_utime=00000000000000000000527,nfs,nonumtail=0,iocharset=cp865,uid=', @ANYBLOB="dbebdec402a7b694b2b22189fe12bccd0da3a5fe7e5a", @ANYBLOB="2c636f64657061673835352c004c87a56b54e381762bf87fb98d86d772421a964d437fff01c5e125ac0100000000000000000001009dba05feee081e91fc6104fef55112510000"], 0x1, 0x238, &(0x7f0000000200)="$eJzs3c9qE10YB+B3krRf+rlIFq5EcEAXrkrbK2iRCmJXShbqQottQZJQsBBoFWNXXoGX5cY78AKE7nRRGJlM0rSQaov5U+rzbHJgzm/Oe5ITspo3r263m1u7ezuH779FtZpEaTVWk6OIepRi4GMAANfJzyyLo6xwuWSlNKmaAIDJuuDv/8IUSwIAJuzps+eP1zY21p+kaTWi/anTSKJ4La6v7cSbaMV2LEUtjiOyE8X44aON9aikuXrca3c7jTzZfvmlf/+17xG9/HLUoj46v5wWTuW7ncZc/N9ffzXPr0Qtbo7Or4zIR2M+7t89Vf9i1OLr69iNVmxFnh3mPyyn6YPs8493L/KK83zS7TT+680byspT/3AAAAAAAAAAAAAAAAAAAAAAALi2FtM0Tfsddbpn+u+Uj3vXF9OB+tn+PEX+vP5A3VP9dZbyJZJi/jBfiVuVqMxy7wAAAAAAAAAAAAAAAAAAAHBV7O0fNDdbre23Yx0MHusf/53/dhDlfmmtJOIK1NMbLOT1TGetOzHhtaK0f9AcnK7mZhJ/SFUndEiyEcevfG5qfkyrz98Y7y6SiJg7eTN/N7kac2P+pgAAAAAAAAAAAAAAAAAAAFM2fOh3xMXDGRQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADMw/P//Swy6/fAFUzPeIgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+AXwEAAP//QBx8JQ==") (async) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000007c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='uni_xlate\x00\x00,iocharset=iso8859-5,shortname=winnt,nonumtail=0,uni_xlate=1,utf8=0,iocharset=maccroatian,iocharset=macgaelic,allow_utime=00000000000000000000527,nfs,nonumtail=0,iocharset=cp865,uid=', @ANYBLOB="dbebdec402a7b694b2b22189fe12bccd0da3a5fe7e5a", @ANYBLOB="2c636f64657061673835352c004c87a56b54e381762bf87fb98d86d772421a964d437fff01c5e125ac0100000000000000000001009dba05feee081e91fc6104fef55112510000"], 0x1, 0x238, &(0x7f0000000200)="$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") open(&(0x7f0000000400)='./bus\x00', 0x42b42, 0x1c0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000980)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0800281a2a0081000000009e460008000b00060000001d00340003000000"], 0x24}, 0x1, 0x0, 0x0, 0x8c4}, 0x4000) sendmsg$kcm(r13, &(0x7f00000000c0)={&(0x7f0000000840)=@xdp={0x2c, 0x7, r14, 0x3e}, 0x80, &(0x7f0000000480)=[{&(0x7f00000002c0)='\x00@', 0x5dc}], 0x1}, 0x4) (async) sendmsg$kcm(r13, &(0x7f00000000c0)={&(0x7f0000000840)=@xdp={0x2c, 0x7, r14, 0x3e}, 0x80, &(0x7f0000000480)=[{&(0x7f00000002c0)='\x00@', 0x5dc}], 0x1}, 0x4) 6m3.738621029s ago: executing program 4 (id=2636): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) getpid() r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x20e, 0x5ee, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 6m3.527361026s ago: executing program 4 (id=2638): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff00000000030000000000000000000000020000000000000000"], 0x0, 0x56, 0x0, 0x0, 0x400}, 0x28) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000840)={0x4, 0xf, 0x2, 0xfff2, 0x0, 0x3, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000012c0)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) statx(0xffffffffffffffff, 0x0, 0x400, 0x404, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000940)='./file0\x00', r1, r2, 0x1000) setregid(0x0, r2) bpf$MAP_CREATE(0x0, 0x0, 0x50) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x2}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$inet_sctp(0x2, 0x5, 0x84) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x11, 0x1, 0x0, 0x40, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x7, 0x6}, 0x8887, 0x10000, 0x8, 0x1, 0x80d, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) syz_usb_connect$uac1(0x0, 0xb1, 0x0, 0x0) read$ptp(r3, &(0x7f0000000580)=""/215, 0xd7) socket$nl_route(0x10, 0x3, 0x0) syz_read_part_table(0x1056, &(0x7f0000000000)="$eJzsz82JAkEUBODqnd35WS+GoKHMWa+eTMIcjEVBEzMKUZRxxABEhO87dDd0UY8XPqoMV5V0yaXs/59/vyVV8xqvHo/FeVOnZDavt/1P0g5NfTdG17djWXLo65TpX9PeJ+S0GzsmWR3fuRsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAfItrAAAA//82awlP") 6m2.15153628s ago: executing program 4 (id=2645): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r0, &(0x7f0000000280)="ca", &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r0, &(0x7f0000000140), &(0x7f0000000000)=""/6, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000100), &(0x7f0000000000), 0x2}, 0x20) socket$packet(0x11, 0x2, 0x300) socket(0x10, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="640000001000010428bd70000000000000030000", @ANYRES32=0x0, @ANYBLOB="0000000000040000300012800b00010067656e657665000020000280080001000100000014000300000000000000000000000000000000011400030067656e6576"], 0x64}, 0x1, 0x0, 0x0, 0x8008}, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, &(0x7f0000001c80)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000001c00)={0x14, 0x17, 0xa, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4008000) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x65, 0xfe, 0x0, 0x0, 0x0, 0x4, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc09b, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0xa216, 0x6, 0x1000, 0x4, 0x9484, 0x2001, 0x400, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x9, 0x3}, 0x0, 0xa88, 0x8406, 0x9, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000c80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x8000000) 6m1.50989282s ago: executing program 4 (id=2648): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) r0 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14}, 0x94) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) pread64(r1, &(0x7f0000001600)=""/4081, 0xff1, 0xd15) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="81bd2bbd7000fbdbdf251400000018000780080002"], 0x2c}, 0x1, 0x0, 0x0, 0x2004c8c5}, 0x80) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001040)={'sit0\x00', &(0x7f0000001000)={'syztnl0\x00', 0x0, 0x8, 0x7800, 0x8, 0x0, {{0x5, 0x4, 0x0, 0x1, 0x14, 0x64, 0x0, 0x0, 0x29, 0x0, @local, @rand_addr=0x3}}}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)=@o_path={&(0x7f0000000080)='./file1\x00', 0x0, 0x4000, r0}, 0x18) mount$bpf(0x0, &(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x24000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x8b7848, 0x0) 6m1.247643539s ago: executing program 4 (id=2649): r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r0, &(0x7f0000001540)=[{0x0}, {&(0x7f0000001380)=""/129, 0x7ffff000}], 0x2, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) pread64(r3, &(0x7f0000001840)=""/4096, 0x1000, 0x1) (fail_nth: 2) 5m46.039956816s ago: executing program 34 (id=2649): r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r0, &(0x7f0000001540)=[{0x0}, {&(0x7f0000001380)=""/129, 0x7ffff000}], 0x2, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) pread64(r3, &(0x7f0000001840)=""/4096, 0x1000, 0x1) (fail_nth: 2) 3m37.789910094s ago: executing program 0 (id=3291): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r0, 0x0, &(0x7f0000000000)=""/6, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8008}, 0x0) socket$packet(0x11, 0x2, 0x300) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x4008000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x7, 0x34328, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x2}, 0x10026, 0x10003, 0xfffffff8, 0x2, 0x100008, 0x20005, 0x9, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x10) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x65, 0xfe, 0x0, 0x0, 0x0, 0x4, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc09b, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0xa216, 0x6, 0x1000, 0x4, 0x9484, 0x2001, 0x400, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r3 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x4c840) sendmsg$nl_route_sched(r3, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000640)=0x652, 0x4) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x3, 0x3}, 0x30006, 0x105, 0x10000, 0x5, 0x2, 0x90000001, 0x0, 0x0, 0x0, 0x0, 0x8000000c3}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8000000) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r6, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x24000806) sendmsg$nl_route_sched(r5, 0x0, 0x58) close(r4) 3m36.361133129s ago: executing program 0 (id=3297): r0 = socket(0xa, 0x5, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000a000000080000000100000ffffffffffcffffff000000000300000000005f0000005f0009"], 0x0, 0x3a, 0x0, 0x6}, 0x28) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x40d, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x40046}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}, @IFLA_MTU={0x8, 0x4, 0xfffffffe}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44041}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x4, 0x176, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000001c0], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{0x5, 0x18, 0x2, 'lo\x00', 'dvmrp0\x00', 'vlan0\x00', 'macvlan0\x00', @empty, [0x0, 0x0, 0x0, 0xff, 0xff], @multicast, [0xff, 0x0, 0xff, 0xff], 0x6e, 0x6e, 0xe6, [], [], @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x200, 0x7, 0x1, 0x0, "5a01ad0861b20fd6a1e99ac662dffc5eb3af47d01b791c143271ac916294c7b6962b45e573aefbd9859ac41170c9c60baa1009555e7d08bcac711df2d50bf38c"}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x1ee) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x5, 0x7, 0x7ffc0000}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, 0x0, 0x0}, 0x94) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r5, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={0x0, 0xf4}, 0x1, 0x0, 0x0, 0xc001}, 0x4000000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000010001ffffcffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000804003001c0012800b00010067726574617000000c00028008000700ac14142808000a00", @ANYRES32=r6], 0x44}}, 0x804) r7 = socket$packet(0x11, 0x3, 0x300) r8 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000200), r8) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r9, 0x0) fcntl$setpipe(r9, 0x407, 0x10005) ioctl$LOOP_CHANGE_FD(r9, 0x4c06, r7) getsockname$packet(r8, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5) sendto$packet(r7, &(0x7f0000000040)="2717a90af1a30d71286f47000000", 0xe, 0x48000, &(0x7f0000000180)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) listen(r0, 0x100) r10 = socket$inet6_udp(0xa, 0x2, 0x0) r11 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TCSETSF(r11, 0x5404, &(0x7f0000000040)={0x2, 0x3, 0x200, 0x4, 0x16, "4a5ed4a4a1c6bdb1996aa8b1aca8478aee2570"}) bind$inet6(r10, &(0x7f0000000500)={0xa, 0x4e20, 0xffffffff, @empty, 0x8}, 0x1c) 3m34.755172491s ago: executing program 0 (id=3303): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x8, 0xabd4}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000001600156f0000000000000000f5000000", @ANYRES32=0x0, @ANYRES8=r0], 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x800}, 0x10) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000005e"], 0x1c}, 0x1, 0x0, 0x0, 0x4040084}, 0x0) 3m34.574587147s ago: executing program 0 (id=3304): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x880) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x14, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cachetag={'cachetag', 0x3d, ':'}}, {@access_user}, {@cache_fscache}, {@loose}, {@privport}, {@access_client}], [{@fsuuid={'fsuuid', 0x3d, {[0x34, 0x65, 0x63, 0x62, 0x38, 0x63, 0x66, 0x65], 0x2d, [0x39, 0x30, 0x7, 0x64], 0x2d, [0x65, 0x62, 0x31, 0x66], 0x2d, [0x33, 0x34, 0x38, 0x66], 0x2d, [0x37, 0x66, 0x33, 0x37, 0x31, 0x32, 0x31, 0x66]}}}, {@appraise_type}, {@obj_role={'obj_role', 0x3d, 'clsact\x00'}}]}}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xfffffffffffffed0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[], 0x48}, 0x1, 0x0, 0x0, 0xc000}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}, 0x1, 0xfffc}, 0x4000800) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000029c0)={&(0x7f00000001c0)={0xa, 0x4e24, 0x800, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, &(0x7f0000000d40)=[{&(0x7f0000000a00)="b3647d665f21c56df20767f630b413883b31b9468e9acbdcc9c1c2bf1954020cf7872e141d7619ec8e0d1524db874ace78f93e5dd9e4f7b064de455653e9f6c0c369291aa743a349249cd1f00c4aa715f3304b04dcf5e83c6c5a1207", 0x86}, {&(0x7f0000000c00)="fd809ff1a0dd87bb3141d8b8ee8c", 0xe}, {&(0x7f0000000a80)="6eafd116a180adc6ce5c99c327d2d066e89d206672f097afe5479b873b755faa42437ce45786db402c1930ddd2ea7e187d71dc3e54c62e30ad0031a5abd76eb5d6b12c65084544421932ee443f13d5d9beca3c4315fbe4f796bc14089fe44e1e1587cc7c7a29aff11a4c4f9eb39d59881c988caa4f5cb95bc06eff68eb1371e530c779667029272c894d4b59a3c5035d9c6f1bcf82f1e15592539340b02328fc4c87758bc5a1221a176d1b0880f5cca61d368688055d19c68f1ad431d1ee1da4acef94ad303989241446a14f763a", 0xce}, {&(0x7f0000000b80)="c3e1389114feb48c689baf509a35cde405", 0x11}, {&(0x7f0000000bc0)="62bacda168a3"}, {&(0x7f0000000c40)="c025019eba7af23620c051980587cf8c82024632daec4f91b958bf0f"}, {&(0x7f0000000c80)="bcdf489c4387f387cd6aac5ef34c92e003da103625354fa8a41dd6e0494685bb60c868517ce66220d25cd0582378bd0da481256e6898d3076541074fbb117fd6b5e42d57c3af9a8a6e3a70b8139ca337dc7472fe9c2b347c9fe09e3cb4ee6d879093eb2f2b7d56210f2ee1281ff0650e2e7eeaab66faa4537c6f13158f4b015c92781ae818bfb933bd45c6a62fb2b829ca9bad58bd12d489540d23d1fc75cf178bff2af6e931616c3c84453c093bca7063b276182715037685127a5e3c"}], 0x4}, 0x4041) r6 = socket(0x40000000015, 0x5, 0x0) connect$inet(r6, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r6, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x18d883, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x4, &(0x7f0000000800), 0x1, 0x76a, &(0x7f0000001800)="$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") setsockopt$SO_TIMESTAMP(r6, 0x1, 0x40, &(0x7f00000000c0)=0xd95, 0x4019e2060d4e3ac7) sendto$inet(r6, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f0000000d80), 0x36f, 0x20102, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000003080)=@delchain={0x3c, 0x64, 0xf31, 0xfffffffb, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xfff3, 0xffff}, {0x0, 0x1b}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_IPV4_SRC={0x8, 0xa, @initdev={0xac, 0x1e, 0x0, 0x0}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=@getchain={0x3c, 0x66, 0x400, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r4, {0xd, 0xfff3}, {0x3, 0x8}, {0xffee, 0x76e4a3535d78d44}}, [{0x8, 0xb, 0x9}, {0x8, 0xb, 0x5}, {0x8}]}, 0x3c}}, 0x0) 3m34.200128849s ago: executing program 0 (id=3309): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0xd, 0x3, &(0x7f00000008c0)=@framed, &(0x7f0000000400)='syzkaller\x00', 0xfffffffb, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0xf}, 0x94) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[], 0x0, 0x40}, 0x28) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x0, 0xfc, 0x0, 0x0, 0x800000000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) r3 = perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200020000000}, 0x29c0, 0x2, 0x0, 0x0, 0x0, 0xd}, r2, 0xffffffffffffffff, r1, 0x0) r4 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xd0308, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x0, 0x0, 0x5}, 0x0, 0x1, r1, 0x0) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x10) r5 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$selinux_context(r5, &(0x7f0000000340)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000180)=0x5) fcntl$getown(r4, 0x9) readv(r5, &(0x7f0000000580)=[{&(0x7f0000002a80)=""/4096, 0x1000}], 0x1) r6 = socket$key(0xf, 0x3, 0x2) r7 = signalfd(0xffffffffffffffff, &(0x7f0000000b40)={[0x6]}, 0x8) fcntl$lock(r7, 0x5, &(0x7f0000000e00)={0x0, 0x1, 0x3, 0xfffffffffffffffe}) ioctl$TIOCL_GETMOUSEREPORTING(r7, 0x541c, &(0x7f0000000200)) sendmsg$key(r6, &(0x7f0000000240)={0x2, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="021831020b00000000000000fddbdf25030005000000000002000300e00000010000000000000000030012003c80000002004e20ac1414b90000000000000000030006000000000002"], 0x58}}, 0x0) socket$kcm(0x29, 0x0, 0x0) r8 = inotify_init1(0x80800) r9 = creat(&(0x7f00000000c0)='./file0\x00', 0xdafbe5d6891b6e4) r10 = inotify_init1(0x0) r11 = inotify_add_watch(r10, &(0x7f0000000440)='.\x00', 0x20000000) write$binfmt_elf32(r9, &(0x7f0000005640)=ANY=[@ANYRES16=r11], 0x69) inotify_rm_watch(r8, r11) read(r3, &(0x7f0000000000)=""/56, 0x38) 3m33.883889559s ago: executing program 0 (id=3315): perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000001600156f0000000000000000f5000000", @ANYRES32=0x0, @ANYRES8=r0], 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x800}, 0x10) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000005e"], 0x1c}, 0x1, 0x0, 0x0, 0x4040084}, 0x0) 3m33.879925149s ago: executing program 35 (id=3315): perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000001600156f0000000000000000f5000000", @ANYRES32=0x0, @ANYRES8=r0], 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x800}, 0x10) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000005e"], 0x1c}, 0x1, 0x0, 0x0, 0x4040084}, 0x0) 3m1.911843353s ago: executing program 7 (id=3469): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x6, @loopback, 0x3}], 0x1c) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=@newlink={0x40, 0x10, 0x44b, 0x0, 0x0, {0x7a, 0x0, 0x0, 0x0, 0x8840}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gre={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_OFLAGS={0x6, 0x3, 0x80}, @IFLA_GRE_REMOTE={0x8, 0x7, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@ipv6_delroute={0x38, 0x19, 0x1, 0x0, 0x25dfdbfb, {0xa, 0x14, 0x0, 0x0, 0xff, 0x3, 0x0, 0x7, 0x2e00}, [@RTA_PRIORITY={0x8, 0x1e, 0x5}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000090}, 0x50) sendmsg$inet6(r0, &(0x7f0000000800)={&(0x7f0000000080)={0xa, 0x4e24, 0xb, @loopback, 0x4}, 0x1c, &(0x7f0000000100)=[{&(0x7f00000000c0)="88", 0x1}], 0x1}, 0x48043) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x2, 0x20}, 0xc) r4 = dup(r0) r5 = socket(0x10, 0x3, 0x9) connect$netlink(r5, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$TIPC_NL_LINK_RESET_STATS(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0x2, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x40) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='ip6gretap0\x00', 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x8003, 0xbffc, 0x0, 0x5, 0x134, 0x48, 0x2}, 0x9c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0xce20, 0x6, @empty, 0x2d}}, 0x7, 0x1, 0xf06, 0x3, 0xb4, 0x7f, 0x9}, 0x9c) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r7, &(0x7f0000000000)={0x7, 0x1b, 0x2}, 0xffffff9a) splice(r6, 0x0, r0, 0x0, 0xffff, 0x2) write$9p(r1, &(0x7f00000002c0)="a2", 0x1) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=@newlink={0x50, 0x10, 0xc3b, 0x0, 0x25dfdbfc, {}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x20, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_ENCAP_DPORT={0x6, 0x11, 0x4e20}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x6}, @IFLA_GRE_ENCAP_SPORT={0x6, 0x10, 0x4e23}]}}}]}, 0x50}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e60, 0xeffffff2, @empty, 0x5}}, 0x10001fc, 0x6, 0xffff1896, 0x3, 0x26, 0xffffffb9, 0x1a}, 0x9c) 3m0.330401724s ago: executing program 7 (id=3479): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB=' \x00\x00\x00h\x00'], 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5000000010003b0c28bd7000fedbdf8eb4000000", @ANYBLOB="0008000000620000300012800b00010065727370616e0000200002800400120006000f00f321000006000e"], 0x50}, 0x1, 0x0, 0x0, 0x180}, 0x40080c0) 3m0.213039497s ago: executing program 7 (id=3480): ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x1a, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, [@tail_call, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xc}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xba}]}, &(0x7f0000000140)='syzkaller\x00', 0x9a03, 0x79, &(0x7f0000000180)=""/121, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0x1, 0x1, 0x1], 0x0, 0x10, 0x9}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7f}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44085}, 0x800) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/kernel/cpu_byteorder', 0xc802add50e13a400, 0xa) sendmsg$kcm(r2, &(0x7f00000008c0)={&(0x7f0000000480)=@isdn={0x22, 0x5, 0x5, 0xd6, 0x2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000500)="c21227f522523ae251ccc6736669f95960d44ba56572c6c2f840417049d6fe3f60fe12eb07bbcd10c8a64911687a45005ccf83096a5b0d5ba998c78fdadf414fad9a112db5f6a8f82e2feba34e287e32af019eaebf89e8195cdecd79f2de3a335a78d0b18f5c6af70d19e0801ce1cddf2820eb2ecafa", 0x76}, {&(0x7f0000000580)="ea73aec0411ea2c6569278b9993ca71d667e5d91b88739a81d216dd3144fecbff3720b192061958ecf93bf4e56b4a548", 0x30}, {&(0x7f00000005c0)="23d9c541bd2443d9719f1d707120eb2bcac95622a3107432e3c6b789d134248278b9ee4f888d514bdfb2697ae826240101126c073cc5dd34dcdeaacabe10b6d6b7ad618eee25535464aa7f88f8b2a59f443a09b942d036dec06925ee07", 0x5d}, {&(0x7f0000000640)="99f591dea59d35281af9ed52f28f38c27801422d701970cd127e69f14d54ffd75b6f8c14cbb559e05325ebf2f04b8ac28f02f46602745236cda7d869005c2d63f65a1e1f2f9bdd6bfe5aff9e026216f78756f0c23cd10bcb45bc93cf729f5ce92ae4256f80f58c81e9149d8cb2faa563bcd95a4a64637cc4aba88ef83407199309e21363408c09803479f5f3f62009221a1fa650cf59a5ed585fa62f1bfe8632ba6794a79eed071ff5c95aae67d5c3024e5c83a97ab23a441b6cd1f940c91bbea1616c5b1384eb9d94bbd2f5ea560fd499a4ae0c68", 0xd5}, {&(0x7f0000000740)="93e37bd072aa138ec50327ba01a0c851864a7e59a0d5b0068ce72936869f89880d56602c95770729c297fd30240f076f32777fd5c673f87b0ec311f9459cec92a99736b7bc240fcb0eac", 0x4a}, {&(0x7f00000007c0)="db8c9ccb2ac52d7bba4c6d5324669c798b2477ed0f2e24ca7cc1b7f7157dd968186a898cffb3131286ed25bcffd1e1325790", 0x32}, {&(0x7f0000000800)="3c506ac8d57d6080b050968776703d0c7e8b10b310a6bf2824856d93e1943db7256532fc0c0ede01d9b71ae86ce620b9043890fc97f3724a", 0x38}], 0x7}, 0x4000) getpid() io_uring_register$IORING_UNREGISTER_PBUF_RING(r0, 0x17, &(0x7f0000000a80)={&(0x7f0000001000)={[{&(0x7f0000000900)="7810f49bee206e9e977b5fc167c84855e0e31b3bacc965e1043ef22202e4b377dbffbf0332b1a5fca436d162ef5c69b3a18c20dd56298a41dc5fe2d03ac3e5b62caf2698b58a946016a73af0c713f332d3df5228e65bc978fa282ac7d14c80a3d2f319b9a0409941eb35e9015009eaf67035fc139a8797e7", 0x78, 0x3}, {&(0x7f0000000980)="2b100f697b75f5833e3190031bb4b354c1ccdf88226d9726d66f1c06f100cebfaa9ef62bf3b2eebb37835c861a4edd777e6780aaf9ab8b2fe0a28b4d7ea3ad2169075589eea7fdcce00f8a6b154c3cef3bc67334ba28a916b1bcbe9b10d267dc2b6c1e3a8ef9220594be5f8d4e916a615ddbbcb819767a738639d94aaf3b5b8e265d3a4d200a10eba26ad3a25d35631be4acf087ab18eb73626dac11b93e66a00f452a8cadcdea570afd4681be132344bfbb26311d2cc55810658bcec03270adb0ce77993c0511ec394a17709443cd36a391b355e001e9579cd6f5813062fba398950d9466f924089b", 0xe9, 0x2}]}, 0x2}, 0x1) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000ac0)={{0x2, 0x4e20, @rand_addr=0x64010100}, {0x306, @local}, 0x10, {0x2, 0x4e23, @rand_addr=0x64010101}, 'geneve1\x00'}) ioctl$AUTOFS_IOC_FAIL(r1, 0x9361, 0x1) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000b40)={0x0, @multicast2, @private}, &(0x7f0000000b80)=0xc) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x7, '\x00', r3, 0xffffffffffffffff, 0x5, 0x0, 0x1}, 0x50) sendmsg$nl_route(r2, &(0x7f0000000d00)={&(0x7f0000000c40)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000c80)=@mpls_delroute={0x2c, 0x19, 0x400, 0x70bd27, 0x25dfdbfe, {0x1c, 0x0, 0x0, 0x0, 0xff, 0x1, 0xfd, 0x2, 0xa00}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x2}, @RTA_OIF={0x8, 0x4, r3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000008) socket$tipc(0x1e, 0x2, 0x0) getsockopt$sock_buf(r2, 0x1, 0x1c, &(0x7f0000000d40)=""/64, &(0x7f0000000d80)=0x40) sendmsg$nl_route_sched(r2, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e00)=@newtclass={0x54, 0x28, 0x608, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0xffff}, {0xc, 0xe}, {0xc, 0x9}}, [@tclass_kind_options=@c_cake={0x9}, @TCA_RATE={0x6, 0x5, {0x44, 0x8}}, @tclass_kind_options=@c_mq={0x7}, @tclass_kind_options=@c_mqprio={0xb}, @tclass_kind_options=@c_sfb={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4880}, 0x0) ioctl(r2, 0x9, &(0x7f0000000f00)="2fda2e0a8c5c7a6f20eda7b6ba4468b6993ab32f3f4a355232fc523294138903d722131e6e11c2a0af1f550653f8eba1ab8aa953205ec84b169a95c9d447a115cb1f4c037116030c1e0a3306471971e0070602940152287b52e29853ee996d6107a1e0287b7e209feb017d49aa466f6c34f181f1b362dfe45e51fd3fea0ab9fc5db97d0df2796bb6c3db1101ac763cafef4dec87e4ee6e24b59ec3e7434bf39069ab5fb5b51770d836609c75e6fe21d81a339864175249629d2852a21419653e9100e1331add7d7ec5f5d647c7e36807ae017d8f1653e8731d087d15645ce5dd2b73b852522bb2") ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000002000)) fsetxattr$security_capability(r0, &(0x7f0000002040), &(0x7f0000002080)=@v2={0x2000000, [{0x2, 0x6}, {0x2, 0x5}]}, 0x14, 0x2) r4 = fsmount(r0, 0x0, 0x7b) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f00000020c0)={{0x2, 0x4e21, @broadcast}, {0x1, @link_local}, 0x8, {0x2, 0x4e23, @loopback}, 'veth0_to_team\x00'}) connect(r0, &(0x7f0000002140)=@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @multicast2}}, 0x80) connect$inet6(r4, &(0x7f00000021c0)={0xa, 0x4e23, 0x8, @empty, 0x3ff}, 0x1c) unlinkat(r4, &(0x7f0000002200)='./file0\x00', 0x200) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f0000002240)={{0x75c, 0x4}, 0x100, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000002380)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002400), r2) sendmsg$NL80211_CMD_LEAVE_IBSS(r4, &(0x7f00000024c0)={&(0x7f00000023c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002480)={&(0x7f0000002440)={0x14, r6, 0x2, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000004}, 0x800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002500)) ioctl$EVIOCSABS3F(r5, 0x401845ff, &(0x7f0000002540)={0x9, 0x7fff, 0x5, 0xfffffff7, 0x3, 0x1000}) 2m59.571714118s ago: executing program 7 (id=3483): r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x8080, &(0x7f0000000040)=ANY=[@ANYBLOB="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", @ANYRES8], 0x3, 0x232, &(0x7f0000000640)="$eJzs2r+LHGUYB/BnzsSLFy574i8SEF+0UJshd7VFDklAXFA0K0RBMvFmddlx99hZDlbEbKWtf4K1WNoJktLmGv8CC7trrkwhjmz21GzYFEHNJfHzaeaBd77M+zLvvDzFHLz29af9bp13i3GsZFmsXIhp3MxiI1biT9N49eUrPz3/7pX339xuty++k9Kl7cubWymlMy/8+MHn3714Y3z6ve/P/LAa+xsfHhxu/br/7P7Zg98vf9KrU69Og+E4FenacDgurlVl2unV/Tylt6uyqMvUG9TlaGG8Ww13dyepGOysr+2OyrpOxWCS+uUkjYdpPJqk4uOiN0h5nqf1teCf6Hx7s2nisDl5NZqmeeKbOH0j1n+JVmRPpuypC9kzV7PnptnZw6ZpHfdU+U94//9vtx3qpyKqr/Y6e535dT6+3Y1eVFHG+WjFbzHbJkfm9aU32hfPp1s24svq+lH++l7nscX8ZrRiY3l+c55Pi/nVWIs4GXGU34pWPL08v7U0fypeeem25+fRip8/imFUsROz7N/5LzZTev2t9h35c7fuAwB41OTpL0v7tzy/2/g8fw/94R391Yk4d+J4105EPfmsX1RVOXpki9kqH4BpKP7NYjXuKZVFTGf74IGY/OMPx6d3rMcS98niOQkAAAAAAAAAAMDD4n79gQsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHA3fwQAAP//rHDMJg==") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r1 = io_uring_setup(0x1430, &(0x7f0000000180)={0x0, 0x5eaa, 0x4000, 0x3, 0x23f}) io_uring_register$IORING_REGISTER_SYNC_CANCEL(r1, 0x18, &(0x7f0000000000)={0x3, r0, 0x0, {0xf, 0x5}, 0x2}, 0x1) r2 = socket$caif_stream(0x25, 0x1, 0x0) ioctl$OCFS2_IOC_GROUP_ADD(r2, 0x40186f02, &(0x7f0000000200)={0xc, 0x96, 0x80e}) r3 = socket$tipc(0x1e, 0x2, 0x0) connect$tipc(r3, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x2}}, 0x10) 2m59.50591162s ago: executing program 7 (id=3485): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000006c0), 0x2000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000000c0)={0x8, 0x1, 'client0\x00', 0x6, "a72e4d63bc515a59", "7f42e1e396067740e0182ac6b9dcfe2f1897f395d794ee4ceb8d7d066a182639", 0x42b, 0x80}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x24000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, 0x0, 0x4896) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) set_mempolicy(0x3, &(0x7f0000000000)=0x4000000ffb, 0x8) io_setup(0x10000, &(0x7f00000014c0)) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) copy_file_range(r3, &(0x7f0000000080)=0x6923, r3, &(0x7f00000000c0)=0x2, 0x11, 0x0) mount$bpf(0x200000000000, &(0x7f0000000040)='./file2\x00', 0x0, 0x23e182a, 0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={[{@release_agent={'release_agent', 0x3d, './file1'}}, {@nofavordynmods}, {@noprefix}, {@none}, {@clone_children}, {@favordynmods}, {@clone_children}, {@name={'name', 0x3d, 'client0\x00'}}]}) 2m57.504353944s ago: executing program 7 (id=3497): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_tracing={0x1a, 0x29, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xde9, 0x0, 0x0, 0x0, 0x8}, [@tail_call, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xec9}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @ringbuf_query, @ldst={0x1, 0x3, 0x6, 0x3, 0x3, 0x8, 0xfffffffffffffffc}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}}]}, &(0x7f00000003c0)='GPL\x00', 0x401, 0xa7, &(0x7f00000004c0)=""/167, 0x41100, 0x50, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0xc, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x9, 0x0, 0x3}, 0x10, 0x1cd7e, 0xffffffffffffffff, 0x2, &(0x7f0000000880)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000008c0)=[{0x5, 0x3, 0x6, 0x7}, {0x3, 0x2, 0xe, 0x8}], 0x10, 0x7}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES32=r0], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) ioprio_set$pid(0x2, 0x0, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f0000000980)=@migrate={0x2e0, 0x21, 0x0, 0x70bd28, 0x25dfdbfb, {{@in=@local, @in=@multicast1, 0x4e21, 0x65, 0x4e23, 0x8, 0xa, 0x80}, 0x0, 0x1}, [@tfcpad={0x8, 0x16, 0x5}, @policy={0xac, 0x7, {{@in=@local, @in=@remote, 0x4e24, 0x3, 0x4e1d, 0x7, 0xa, 0x1a0, 0x10, 0x4f}, {0x0, 0x6, 0x9, 0x7, 0x5, 0x9, 0x5, 0x2}, {0x4, 0x1000, 0x4, 0xffffffffffffffff}, 0x15c5, 0x6e6bb6, 0x2, 0x1, 0x0, 0x2}}, @extra_flags={0x8, 0x18, 0x8}, @sec_ctx={0xf5, 0x8, {0xf1, 0x8, 0x1, 0x3b, 0xe9, "af640a16cfe43821ab57e299ad77552038d55e3e094f4d50f30e08efab916d4c05c78aa9e7bb03c43cf2c2a4cfaf45e61a7def2d773dae5a51bf2a049160239d03f759508e1aaa76889a4fe835eb9f7baa3ee8a5e58245a8da0064dcd1916ee826ce36b08124fbd7cc7b236191776bee245d23d557c4428c9677691dd64720adfd3002a2be079bf297cfa6bec4855f8e1fe8704807fdf934ffe3a0078e6b72d301b0f20d898a16d0f592a1c649a1528bcc0bcd331153e59f9da67a282d65fba7d172eda965bf901dfc5ff4d6f03e1c6c24db91a02dc29cee7d2a6fe2ada6bd858d7d04fba667b051e7"}}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x8147}, @algo_auth_trunc={0xd3, 0x14, {{'streebog512\x00'}, 0x438, 0x180, "c46244fcdb8e9c9584002732c97de685bd974fb6b278abb6b9bb44158fa76564f74269c32133acf69babab822fc0a973f7fcedf8cded86a807e028aea06549ae8ab4e9c2f4772ef935bf3a2caaa8283faa1fba0aef72f008311bf6bb50487583af4f0481e475850de1bdc9c2aeab2c5836d6b8fcf39d1d556e060086aadbd43219a6e20b93b514"}}]}, 0x2e0}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001f80)=@getpolicy={0xdec, 0x15, 0x2, 0x70bd2c, 0x25dfdbfe, {{@in=@broadcast, @in=@local, 0x4e20, 0x1, 0x4e23, 0x2, 0xa, 0x20, 0xc0}, 0x6e6bba, 0x1}, [@tfcpad={0x8, 0x16, 0x5}, @XFRMA_IF_ID={0x8, 0x1f, 0x3}, @coaddr={0x14, 0xe, @in=@rand_addr=0x64010100}, @algo_crypt={0xc48, 0x2, {{'xts-aes-neonbs\x00'}, 0x6000, "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"}}, @algo_crypt={0x12d, 0x2, {{'ctr-aes-aesni\x00'}, 0x728, "0e463a5864ba499dbc94891d2db719a8cd6bcf25cdf959a3935be212fde27e13f689a7a98dfa071f84fb3569d53bcf82381d179b036fe1bcba09b9a6eefee7b7bdaaa2f8675445b1302210d05dc8a0d0a3372edb064f6acbc514934bb46335d08dfd7852b65af50244c8a8f83eed2b1e7a98c8be54bbf83d37fbd8397f9d1a5a747e23759635d001d9e4591abfc48d6b57e0c1d97d8be8e1951c344c34f5b56fbfd40641510c2299b935a02b297ce57338e19714322dabda55de4e826b74baee2c620747cfcb4b37ab59140b8d1fb46c5b8ca7c73cafb01f9818b28166a63693c2aa191fbf"}}]}, 0xdec}, 0x1, 0x0, 0x0, 0x40180}, 0x0) r6 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) r7 = fsmount(r6, 0x0, 0x0) fchdir(r7) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) truncate(&(0x7f0000000940)='./file1\x00', 0x2fffffd) sendfile(r8, r8, 0x0, 0xe3aa6ea) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000080)={'\x00', 0x52d35ce30131f272}) ioctl$TUNSETOFFLOAD(r9, 0x400454c9, 0x9) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x12, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) bind$l2tp6(0xffffffffffffffff, 0x0, 0x0) socket(0x2, 0x80805, 0x0) socket$inet6(0xa, 0x0, 0x85) 2m41.42146696s ago: executing program 36 (id=3497): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_tracing={0x1a, 0x29, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xde9, 0x0, 0x0, 0x0, 0x8}, [@tail_call, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xec9}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}, @ringbuf_query, @ldst={0x1, 0x3, 0x6, 0x3, 0x3, 0x8, 0xfffffffffffffffc}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}}]}, &(0x7f00000003c0)='GPL\x00', 0x401, 0xa7, &(0x7f00000004c0)=""/167, 0x41100, 0x50, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0xc, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x9, 0x0, 0x3}, 0x10, 0x1cd7e, 0xffffffffffffffff, 0x2, &(0x7f0000000880)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000008c0)=[{0x5, 0x3, 0x6, 0x7}, {0x3, 0x2, 0xe, 0x8}], 0x10, 0x7}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES32=r0], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) ioprio_set$pid(0x2, 0x0, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f0000000980)=@migrate={0x2e0, 0x21, 0x0, 0x70bd28, 0x25dfdbfb, {{@in=@local, @in=@multicast1, 0x4e21, 0x65, 0x4e23, 0x8, 0xa, 0x80}, 0x0, 0x1}, [@tfcpad={0x8, 0x16, 0x5}, @policy={0xac, 0x7, {{@in=@local, @in=@remote, 0x4e24, 0x3, 0x4e1d, 0x7, 0xa, 0x1a0, 0x10, 0x4f}, {0x0, 0x6, 0x9, 0x7, 0x5, 0x9, 0x5, 0x2}, {0x4, 0x1000, 0x4, 0xffffffffffffffff}, 0x15c5, 0x6e6bb6, 0x2, 0x1, 0x0, 0x2}}, @extra_flags={0x8, 0x18, 0x8}, @sec_ctx={0xf5, 0x8, {0xf1, 0x8, 0x1, 0x3b, 0xe9, "af640a16cfe43821ab57e299ad77552038d55e3e094f4d50f30e08efab916d4c05c78aa9e7bb03c43cf2c2a4cfaf45e61a7def2d773dae5a51bf2a049160239d03f759508e1aaa76889a4fe835eb9f7baa3ee8a5e58245a8da0064dcd1916ee826ce36b08124fbd7cc7b236191776bee245d23d557c4428c9677691dd64720adfd3002a2be079bf297cfa6bec4855f8e1fe8704807fdf934ffe3a0078e6b72d301b0f20d898a16d0f592a1c649a1528bcc0bcd331153e59f9da67a282d65fba7d172eda965bf901dfc5ff4d6f03e1c6c24db91a02dc29cee7d2a6fe2ada6bd858d7d04fba667b051e7"}}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x8147}, @algo_auth_trunc={0xd3, 0x14, {{'streebog512\x00'}, 0x438, 0x180, "c46244fcdb8e9c9584002732c97de685bd974fb6b278abb6b9bb44158fa76564f74269c32133acf69babab822fc0a973f7fcedf8cded86a807e028aea06549ae8ab4e9c2f4772ef935bf3a2caaa8283faa1fba0aef72f008311bf6bb50487583af4f0481e475850de1bdc9c2aeab2c5836d6b8fcf39d1d556e060086aadbd43219a6e20b93b514"}}]}, 0x2e0}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001f80)=@getpolicy={0xdec, 0x15, 0x2, 0x70bd2c, 0x25dfdbfe, {{@in=@broadcast, @in=@local, 0x4e20, 0x1, 0x4e23, 0x2, 0xa, 0x20, 0xc0}, 0x6e6bba, 0x1}, [@tfcpad={0x8, 0x16, 0x5}, @XFRMA_IF_ID={0x8, 0x1f, 0x3}, @coaddr={0x14, 0xe, @in=@rand_addr=0x64010100}, @algo_crypt={0xc48, 0x2, {{'xts-aes-neonbs\x00'}, 0x6000, "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"}}, @algo_crypt={0x12d, 0x2, {{'ctr-aes-aesni\x00'}, 0x728, "0e463a5864ba499dbc94891d2db719a8cd6bcf25cdf959a3935be212fde27e13f689a7a98dfa071f84fb3569d53bcf82381d179b036fe1bcba09b9a6eefee7b7bdaaa2f8675445b1302210d05dc8a0d0a3372edb064f6acbc514934bb46335d08dfd7852b65af50244c8a8f83eed2b1e7a98c8be54bbf83d37fbd8397f9d1a5a747e23759635d001d9e4591abfc48d6b57e0c1d97d8be8e1951c344c34f5b56fbfd40641510c2299b935a02b297ce57338e19714322dabda55de4e826b74baee2c620747cfcb4b37ab59140b8d1fb46c5b8ca7c73cafb01f9818b28166a63693c2aa191fbf"}}]}, 0xdec}, 0x1, 0x0, 0x0, 0x40180}, 0x0) r6 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) r7 = fsmount(r6, 0x0, 0x0) fchdir(r7) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) truncate(&(0x7f0000000940)='./file1\x00', 0x2fffffd) sendfile(r8, r8, 0x0, 0xe3aa6ea) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1400) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000080)={'\x00', 0x52d35ce30131f272}) ioctl$TUNSETOFFLOAD(r9, 0x400454c9, 0x9) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x12, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) bind$l2tp6(0xffffffffffffffff, 0x0, 0x0) socket(0x2, 0x80805, 0x0) socket$inet6(0xa, 0x0, 0x85) 57.659503403s ago: executing program 5 (id=4730): socket$inet6_mptcp(0xa, 0x1, 0x106) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r1) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010026bd7000fcdbdf250200000008000100", @ANYRES32=r3], 0x1c}}, 0x840) write$nci(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="6105077f02000009f108aa3c00000000"], 0x13) 54.33033717s ago: executing program 5 (id=4736): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x100000000000009, 0x3c033, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x8312, 0x32, 0x7, 0x6, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x400000000, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) recvmsg$unix(r2, 0x0, 0x40) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) r3 = shmget(0x0, 0x3000, 0x4, &(0x7f000074a000/0x3000)=nil) shmctl$SHM_STAT_ANY(r3, 0xf, &(0x7f00000000c0)=""/62) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$nl_sock_diag(0x10, 0x3, 0x4) socket$nl_xfrm(0x10, 0x3, 0x6) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0xab, @empty, 0x1}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffffffffffde1, 0x10, &(0x7f0000002e00), &(0x7f0000000300), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) 50.115657604s ago: executing program 5 (id=4747): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) io_setup(0x443, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) 47.897964746s ago: executing program 5 (id=4771): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000340)={0x1d, r1, 0x0, {0x2, 0x0, 0x6}, 0xfe}, 0x18) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000004c0)="81b641f1f384acecc0475735cd04b673974b299942a69d28480326f800e0bc3586bb85f47e9422ed55cc8f820774c61e55a5045d37a19859ff0d6e092de3ccdd8c8c890bd0df1c95b545277113cd075ff9d6a96831532aefd9c0f1ecdc2d65aa1acd1592c61b6f7e6a", 0x69}, {&(0x7f0000000c00)="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", 0x65e}], 0x2}, 0x24000881) 46.598414097s ago: executing program 3 (id=4778): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000f00)=@base={0x5, 0x4, 0xfff, 0x7}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000080850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000021c0)={r2, 0x0, 0x0}, 0x10) 46.593948327s ago: executing program 9 (id=4779): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f00003b6000/0x4000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x8003}, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000200)=0x8, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000500)=ANY=[@ANYBLOB="340000070015000300020000400002000008000039000000000400008008000500f70402cc"], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="38000000180001000300000000000000020000000000000900002000060015000400000014100008800c000180060001000000000079336269041e1e98cbfd7b5034e77d5949e72a60b927b30dd68f968b09b20c9ebc910668c341aacaac0ba03ba7285bc0a9f9077afc81cec2417eb5900c3f261bb292abc4ccf681bd5827d6dad8811e063ad3b7a5a18ebc3b063e9ab8b9"], 0x38}}, 0x0) set_mempolicy(0x4005, &(0x7f0000000300)=0x4, 0x7) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x24111, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xf}, 0x106200, 0xfff, 0x20da, 0x9, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)="ee7dbf81ff960a589ea62a755925b909b4c9e17fce52eb35eee3235fac001cbf30c2baa1ef87661dd5be0bd40f58d7c1", &(0x7f0000000200), 0x3f}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340), 0x0}, 0x20) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000004000/0x2000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) setuid(0xee01) io_uring_register$IORING_REGISTER_IOWQ_AFF(0xffffffffffffffff, 0x25, 0x0, 0x0) r3 = io_uring_setup(0x1b7a, &(0x7f0000000040)={0x0, 0x970, 0x1f480, 0x0, 0x31a}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[], 0x14}, 0x1, 0x2}, 0x0) io_uring_enter(r3, 0x8ae, 0x6933, 0x17, 0x0, 0xeffd) r4 = signalfd(r0, &(0x7f0000000180)={[0x400]}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="05edff0000000100000000000000c581f2d4bec3008a776f8ad0be73ab2ea63d56e6f227bfa116a8277958f62f88fef893bc28cf7050d40885c0cc05b2fcae74d38fee1b9b693ed89fba214515376c622eeefbd297f7284543dba2c5a6b12cbe295df09f9dd098eecaf2e1c0785df635490875affec50c182b046e861b4a544644eb69f080ebcd9491d7e95f0345ce61eeb9", @ANYRES32=r4, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB='\x00'/28], 0x50) io_uring_setup(0x1e64, &(0x7f0000000040)={0x0, 0xc89a, 0xc000, 0x7fff, 0x65}) socket$inet_sctp(0x2, 0x1, 0x84) 46.51402527s ago: executing program 5 (id=4780): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x84}, 0x1, 0x0, 0x0, 0x40008d0}, 0x40) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "d65b"}]}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x68}, 0x1, 0x0, 0x0, 0x24000840}, 0x40) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000010007c0000000000000000000500000a480000000e"], 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 46.395853633s ago: executing program 3 (id=4781): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000072"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x20008000) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="b4050000fdff7f006110a40000000000c60000000000000095000000000000009f33ef60916e6e713f1e6b0b725ad99b817fd98cd824498949714e32f21dcc4ae5437aca55f21f3ca9e822d182054d54d53cd2b6da714e4beb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d00"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$kcm(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/194, 0xc2}], 0x1}, 0x40000101) 46.364838655s ago: executing program 5 (id=4782): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x100000000000009, 0x3c033, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x8312, 0x32, 0x7, 0x6, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x400000000, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) recvmsg$unix(r2, 0x0, 0x40) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) r3 = shmget(0x0, 0x3000, 0x4, &(0x7f000074a000/0x3000)=nil) shmctl$SHM_STAT_ANY(r3, 0xf, &(0x7f00000000c0)=""/62) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$nl_sock_diag(0x10, 0x3, 0x4) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x2b, 0x80801, 0x1) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0), 0x10) connect$inet6(r4, &(0x7f00000001c0)={0xa, 0x0, 0xab, @empty, 0x1}, 0x1c) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffffffffffde1, 0x10, &(0x7f0000002e00), &(0x7f0000000300), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r5, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 44.089526627s ago: executing program 3 (id=4784): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="030000000400000004000000010018000000", @ANYRESHEX, @ANYBLOB="18"], 0x50) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000400)=@srh={0x5c, 0x0, 0x4, 0x0, 0x7, 0x60, 0x7}, 0x8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, 0x0, &(0x7f0000000900)) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c010000", @ANYRES16, @ANYBLOB="01000000000000000000170000000c00060001000000010000000c01308014000400976f1044852bca665354bd217b6b9037200001800c000500fdff060200000200080001000300000005000200030000000500020008000000240003"], 0x12c}, 0x1, 0x0, 0x0, 0x24004821}, 0x0) 42.071143172s ago: executing program 3 (id=4785): sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc00000019000100000000000000000020010000000000000000000000000000ac141415000000e0ffffff000000000000000005000000030a00200000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000ac00000000000000ff0f000000000000ffffffffffffffff0000000000000000ffffffffffffffffffffff7f0000000000000000000000000200000000000000000a00000000000000000000008040000000000000000008000000000000000001000003000000004400050000000000000000000000000000000000000004d23c00000000"], 0xfc}}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc000000190001002dbd70000000000064010100000000000000000000000000fc01000000000000000000000000000000000000000000000a0000"], 0xfc}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) r2 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r2, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000081) 40.135958934s ago: executing program 3 (id=4786): syz_mount_image$ext4(&(0x7f0000000700)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8052, &(0x7f0000000000)={[{@noauto_da_alloc}, {@oldalloc}, {@barrier_val={'barrier', 0x3d, 0x5}}]}, 0x43, 0x4eb, &(0x7f00000010c0)="$eJzs3E9sVMUfAPDv27a05c+P/hBRELWIxkZiCwWFg4nBaOJBEyMm6rFpC0EKNbQkQtAsicGjIfFuPHrw4sGreiHGk4lXPJoYEmK4ACbGNW/3vd3tdrely7YL9vNJtjszb9+bmZ03b+fNdDeAdWs4/ZNUwtciYmtEFBpfMFx5un3z4uSdmxcno1gqHfszKe92K41nssPEpiwyUogofJrUNtSZO3/h1MTMzPTZLD42f/rDsbnzF54/OZClHDly6OCBwy+Ov7DySjXJL63XrV2fzO7e+fr7V96c7M3T89zq69EpwzHcrChlz3Q6sy7bUhdOertYEFYkPf/T5uor9/+t0RNLNV5xDUsGrLZSqVTqb725WGp0aVEK8MBKotslALoj/6BP73/zR7OBwIbVGX503Y2jlRugtN63s0fEk+XEfB6kr+H+tpOGI+K94l9fpo+4u3mIbwqrVBYAYH344Wg+EmwY/w1VVkb+Pnf15fT5f9kaylBE/D8itkXEQxGxPSIejogdEfFIRDzacPyeiCgtkX/jbHM1/+ogp3C9Q1VtKh3/vZStbdXGfwsKMNSTxbZE5APm6f3ZezISff3HT85MH1gijx9f/fXzVtvqx3/pI80/Hwtm5bje2zBBNzUxP9F2hRvcuBSxq7ex/klvRFJtmyQidkbErhUcd6gufPK5r3dXI30LX7d8/ctKTdfROrDOVPoq4tlK+xdjQfvXckwWrE+enjgxfWL6zHh1fXJsIGam94+lZ8H+pnn8/Mvlt1rlv2z9v/u9cZfXDn9/LOtZ9y5t/41153/k67e1+g8lEUl1vXZu5Xlc/u2zlvc07Z7/G5J3yuH8vvSjifn5swciNiRvLE4fr+2bx9PnKFbqP7K3ef/flu2TvhOPRUR6Ej8eEU9E5Q4xLfueiHgqIvYuUf+fXnn6g/brv7rS+k81XP8qLb+g/Wvr9a0CSbY2WEkZrN/Uc2rPtTstLh531/6HyqGRLGXx9S8tYbLgEtGqpPmnXZryT0feQQAAALj/FSJic91c0uYoFEZHK3NA22NjYWZ2bn7f8dlzZ6bSbRFD0VfIZ7oq88F9ST7/OVQXH2+IH8zmjb/oGSzHRydnZ6a6WnNgU7nPJ4XRiHd76vp/6o/OTDED9zPf14L1a6n+nw7id1xZw8IAa+ruP/+vfryqBQHWXF3/b/UN/2Ib//cFPADc/wM1y//Qj2sGPPhK+jKsayvq//v8CCD8l/TG29WwH5eB9cX4H9alZb/Xf0+BUn/zTQOx+MUxsPQBe6K9Ygw2yasrgXRk1ZXcB9vZK/81hZavicLKDtgfnWnT49WUS22dvcWzcyd2dPzkL2X/K9/pFvx2Tfpps0BXLkcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAd928AAAD//0ly4GI=") renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file2\x00', 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x36, 0x6, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2, @perf_config_ext={0xffffffffffffffff, 0x5}, 0x6e35, 0x0, 0x0, 0x7, 0x8, 0x8, 0x9, 0x0, 0x0, 0x0, 0x7ffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x17440000) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x13}, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x2, 0x3, 0x2c, 0x64, 0x0, 0x7, 0x6, 0x0, @remote, @remote, {[@ra={0x94, 0x4, 0x1}]}}, {{0x4e22, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x2, 0x0, 0xe7}}}}}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x22, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x2}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) r0 = socket(0x2b, 0x1, 0x1) listen(r0, 0x5) accept4$vsock_stream(r0, 0x0, 0x0, 0x80800) accept4(r0, 0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)={0x20, 0x19, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x41}, 0x8004) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) 38.803397367s ago: executing program 8 (id=4793): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000280)="1a00000002000000", 0x8) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local={0x3}, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x12, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}}}}}}, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0), 0x0) sendto$inet6(r0, &(0x7f0000000100)="b8", 0xffe0, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000000)=ANY=[], 0xffc9) 38.70642166s ago: executing program 8 (id=4794): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 38.70625752s ago: executing program 8 (id=4795): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={0x0, 0x5c}}, 0x20084884) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000000000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040007}, 0x0) 38.634847832s ago: executing program 8 (id=4796): sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc00000019000100000000000000000020010000000000000000000000000000ac141415000000e0ffffff000000000000000005000000030a00200000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000ac00000000000000ff0f000000000000ffffffffffffffff0000000000000000ffffffffffffffffffffff7f0000000000000000000000000200000000000000000a00000000000000000000008040000000000000000008000000000000000001000003000000004400050000000000000000000000000000000000000004d23c00000000"], 0xfc}}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc000000190001002dbd70000000000064010100000000000000000000000000fc01000000000000000000000000000000000000000000000a0000"], 0xfc}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) r2 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r2, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000081) 37.898475916s ago: executing program 6 (id=4800): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000040)="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", 0x378}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x9, 0x10, 0x0, 0xb}, 0x94) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x2000c805) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000008c0)=r3, 0x4) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="1e000300008c71ef28ff4b"], 0xffdd) 37.437103551s ago: executing program 8 (id=4801): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xffe0}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0x4d, 0xfffffffb, 0x7fffffff}}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) r4 = socket(0x400000000010, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001340)=@newtfilter={0x30, 0x2c, 0xd27, 0x70bd2d, 0x25dfdc00, {0x0, 0x0, 0x0, r6, {0x0, 0xb}, {}, {0xfff3, 0xffe0}}, [@filter_kind_options=@f_fw={{0x7}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0xc854}, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 37.291063255s ago: executing program 9 (id=4802): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x3}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x48}}, 0x0) 37.13340745s ago: executing program 9 (id=4803): sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000002, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x20, 0x0, 0x33}, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, {0x0, 0x0, 0x200000000000000}}}, 0xb8}, 0x1, 0x0, 0x0, 0x40800}, 0x2c040010) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x15, 0x1, 0x70bd29, 0x0, {{@in=@multicast1=0xe0000002, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x10}, {0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x400}, {0x0, 0x0, 0x101}, 0x0, 0x6e6bb5, 0x0, 0x0, 0x1}}, 0xb8}}, 0x10000000) 37.062738453s ago: executing program 6 (id=4804): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x20084884) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10040007}, 0x0) 36.958643966s ago: executing program 6 (id=4805): socket$kcm(0xa, 0x2, 0x73) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000072"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x20008000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, 0xffffffffffffffff, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r2}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$kcm(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/194, 0xc2}], 0x1}, 0x40000101) 36.954719676s ago: executing program 9 (id=4806): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="5c0100001000130700000000fcdbdf25e0000001000000000000000000000000ff02000000000000000000000000000100040b6e4e2100020000000021000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="fc010000000000000000000000000000000004d632000000e0000002000000000000000000000000000000000000000000000000000000000100008000000000010000000000008001000000ffffffff0000000000000000010000800000000043050000000000000400000000000000ffffffffffffff7f0000000000000000fdffffffffffffff0000000000000000000000002cbd70000035000002000000500000000000000060001200726663343130362867636d28616573292900"/234], 0x15c}, 0x1, 0x0, 0x0, 0x880}, 0x2014) 36.82342889s ago: executing program 9 (id=4807): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x1000080002, 0x100000000000088) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) syz_emit_ethernet(0x0, 0x0, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000140)="91f8a9849519def28691bbc4173c3d6f357d0272b7319130feaab952ac4703cad04be68907e50e997fc26e4c91ea4feb931647fc5393de25000000000000000000", 0x41}, {&(0x7f0000000e80)="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", 0x110}, {&(0x7f00000003c0)="641a6a2b863c0dd898013a3f97a834ebb75a925ab48c844221841a232932fc2e37e327de21450df098c113e179a0d3", 0x2f}, {&(0x7f00000001c0)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c443ce93d82e931eb9918e6c0827686e59209d2e02c9210fd8048f04ad6c48b3072092c483271361816bf21afb8473a064f1988536d4b58", 0x8b}, {&(0x7f0000000640)="893549e41fee68cbb96eef8e21174c97fd72242772f8035d895bf11396b1a6baaafebc787ecff2023c23052e44ca3ef1449b7ab19fb8f25a0893176dd529ad11e04d91478cf66473074a3a55b09ac86a355a3d38933efd090e4477ae5353c3fe7fb4898d72cb", 0x66}, {&(0x7f0000000440)}, {&(0x7f0000000700)="40778e5ab5227cf39454ed4d07d690f66f8c38ea1988e876da1766e1fd7c39ff31251a5889f089819c5c65e0dda5ceab6c1dca302b564e6e6231e0924cf3bdd2afaadd0883dcbc956b3beaddd25c11adcf625bd07bc7fe2cff82a72fe49c88a6a23423d3ec8bb45dc5bc83b7f0e7edb45fc305061404", 0x76}], 0x7}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000b80)="f77d2b5dd5f7d74f0748cf3d2cf218d644566a14103b1c7dd35fd2951bd022f10f2dc7f4ce0d8ac5f4abaca4b97b706153756913b7dd48248b5bfb10460019248bf238743fa2aeb5bef21ce832db670920dc5e911ef2ad63e849901d1001129dbacbfd4924d754", 0x67}, {&(0x7f0000000d00)="31cef842d9c50636f60fc0cfdac56c75f1687f0c56287423f5eed69f117e766bdbad0c2171ad6227e1173ab6efa2fcb1c420a51a0917861009000000f049c606ccab7cda1f0e3490fbe385ea382294882839a22674037b8910bd8a14", 0x5c}], 0x2}}], 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 36.656812656s ago: executing program 8 (id=4808): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="800002010800000008001b000000000008000d"], 0x38}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0xffffffff, {0x0, 0x0, 0x0, r7, {0x0, 0x8}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x24040084) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r7, {0xffff}, {0xffff, 0xffff}, {0x2, 0xa}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x400dc}, 0x20004000) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@newqdisc={0x48, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xffffbddc, {0x0, 0x0, 0x0, r3, {0xffff}, {}, {0x2, 0x6}}, [@qdisc_kind_options=@q_cbq={{0x8}, {0x1c, 0x2, [@TCA_CBS_PARMS={0x18, 0x1, {0x81, '\x00', 0xfffff000, 0x2f, 0x3, 0x581}}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x40098}, 0x40054) 36.582959508s ago: executing program 6 (id=4809): r0 = socket$packet(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b00)=ANY=[], 0x94}}, 0x0) 36.545353869s ago: executing program 6 (id=4810): sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc00000019000100000000000000000020010000000000000000000000000000ac141415000000e0ffffff000000000000000005000000030a00200000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000ac00000000000000ff0f000000000000ffffffffffffffff0000000000000000ffffffffffffffffffffff7f0000000000000000000000000200000000000000000a00000000000000000000008040000000000000000008000000000000000001000003000000004400050000000000000000000000000000000000000004d23c00000000000000ff"], 0xfc}}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc000000190001002dbd70000000000064010100000000000000000000000000fc01000000000000000000000000000000000000000000000a0000"], 0xfc}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) r1 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000081) 32.934178115s ago: executing program 3 (id=4811): sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc00000019000100000000000000000020010000000000000000000000000000ac141415000000e0ffffff000000000000000005000000030a00200000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000ac00000000000000ff0f000000000000ffffffffffffffff0000000000000000ffffffffffffffffffffff7f0000000000000000000000000200000000000000000a00000000000000000000008040000000000000000008000000000000000001000003000000004400050000000000000000000000000000000000000004d23c000000000000"], 0xfc}}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc000000190001002dbd70000000000064010100000000000000000000000000fc01000000000000000000000000000000000000000000000a0000"], 0xfc}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) r2 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r2, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000081) 23.978104852s ago: executing program 6 (id=4812): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f00003b6000/0x4000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x8003}, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000200)=0x8, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000500)=ANY=[@ANYBLOB="340000070015000300020000400002000008000039000000000400008008000500f70402cc"], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="38000000180001000300000000000000020000000000000900002000060015000400000014100008800c000180060001000000000079336269041e1e98cbfd7b5034e77d5949e72a60b927b30dd68f968b09b20c9ebc910668c341aacaac0ba03ba7285bc0a9f9077afc81cec2417eb5900c3f261bb292abc4ccf681bd5827d6dad8811e063ad3b7a5a18ebc3b063e9ab8b9"], 0x38}}, 0x0) set_mempolicy(0x4005, &(0x7f0000000300)=0x4, 0x7) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x24111, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xf}, 0x106200, 0xfff, 0x20da, 0x9, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)="ee7dbf81ff960a589ea62a755925b909b4c9e17fce52eb35eee3235fac001cbf30c2baa1ef87661dd5be0bd40f58d7c1", &(0x7f0000000200), 0x3f}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340), 0x0}, 0x20) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000004000/0x2000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) setuid(0xee01) io_uring_register$IORING_REGISTER_IOWQ_AFF(0xffffffffffffffff, 0x25, 0x0, 0x0) r3 = io_uring_setup(0x1b7a, &(0x7f0000000040)={0x0, 0x970, 0x1f480, 0x0, 0x31a}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[], 0x14}, 0x1, 0x2}, 0x0) io_uring_enter(r3, 0x8ae, 0x6933, 0x17, 0x0, 0xeffd) r4 = signalfd(r0, &(0x7f0000000180)={[0x400]}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="05edff0000000100000000000000c581f2d4bec3008a776f8ad0be73ab2ea63d56e6f227bfa116a8277958f62f88fef893bc28cf7050d40885c0cc05b2fcae74d38fee1b9b693ed89fba214515376c622eeefbd297f7284543dba2c5a6b12cbe295df09f9dd098eecaf2e1c0785df635490875affec50c182b046e861b4a544644eb69f080ebcd9491d7e95f0345ce61eeb9", @ANYRES32=r4, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB='\x00'/28], 0x50) io_uring_setup(0x1e64, &(0x7f0000000040)={0x0, 0xc89a, 0xc000, 0x7fff, 0x65}) socket$inet_sctp(0x2, 0x1, 0x84) 22.108361831s ago: executing program 37 (id=4782): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x100000000000009, 0x3c033, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x8312, 0x32, 0x7, 0x6, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x400000000, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) recvmsg$unix(r2, 0x0, 0x40) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) r3 = shmget(0x0, 0x3000, 0x4, &(0x7f000074a000/0x3000)=nil) shmctl$SHM_STAT_ANY(r3, 0xf, &(0x7f00000000c0)=""/62) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$nl_sock_diag(0x10, 0x3, 0x4) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x2b, 0x80801, 0x1) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0), 0x10) connect$inet6(r4, &(0x7f00000001c0)={0xa, 0x0, 0xab, @empty, 0x1}, 0x1c) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffffffffffde1, 0x10, &(0x7f0000002e00), &(0x7f0000000300), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r5, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 18.762555099s ago: executing program 9 (id=4814): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000040)="a72d11a15c048c0a7d63aebc5cea1f815108f6091475aeec600831aa9d3944e60bc2ad06a619c560aa0118b28f68f1eb14549d633b4b23f179fb680716faa43414787559be90843c35ab30acad8a6740140e00721abc2eb362f7bde53b3c992d3e28ccc20ec84fdc569947047f6c09a647ee8c0a747b951e66c068ccf1af93ee9e6f9528ff79e2f989383b05a690a6bec4634b867c9446c1c644b3010e8a3514c6328323b4bbdd602b8f0dace6aea70902c4ddd2a2f2810f1348b0d0df3c1e6a5938fcfdc87e7580c6be0c6a06eca62d6f787dd16add086a21391c4c707d8b61929d1252681b84c245e0efafe2e6e73ad86a3cf59235ab0eacbb414af92ec3cdac420a064a98e8cc18bdf63f8997f96436e0fe6f06fdbf47fff353b01a861babd4a38d126bfe3e29049e6cc883e6efae6e70ef9ed124b1b09887a58c991e223b6420dca5ae238027e91b17b1707dc5c0d5f59f0ca95614f1ea1d263c1ee54dfe31ae35eb3c8e3b931dff7920c57fbba89adf2e392c1ad719b90c7ade0d38ff9792934ef1fb12f51d8e2fad12486d5883d5b1a46696fad128c6805cfb25bc6487e1e407d6b266971b09d0d864a7a550284e24b6cdc9f4ae1081a638175dffef002c76ac5558d23e41edbe68f4b4950a13aa000326dae5a857603dc5a40d6c6618a98c7b6e1eebd325ea2c14601a25658965f40864fd015d9b2fff83ee5ed3212ebd9fa429f0140f633556ac07c0c08e67a1848c9942ecc47dd4ffede9a429e9e0472be7cdbcd117e621ddf745c00a814ffff0224634472577dc0b35a9c153409f1a2bddc193b20b4d244d9cbbd59816c46000c596865f58b4e640ed4a9ab6086cede697fb113560925498da83273e679e0e28b84961eb7b9c9b4fa916590965c76b48e5d453f27a821bd2bf0946ff2413ec30f7893d1f046e18f736c40ceda26dfc4a0a62f71a3606d3f72c0a858dfd7895e2572292e11af913c6b513a141d28e501ae7c49618d104aac9abb78466a636efb88120d0eef0a501558a5aa34784a9823f2802a0bcdf318f9b436b34b42a2a7cf513f80364ad9a699d2e23eb4f3a2bbce818bd20da61882b3dac699d05dc24f29b72471b712423ace6278c43df2be7a09e815517b86d8b3ce16af3d64a575958c5fd52aac53b391f3d2a67c24c6c13ec11428b61b80a6a58cbba1790a98d190a572070f63fc0b809669895ea9865c3066b06102f6f2c7171dc7f76e1931b3e4deb569ef9d07d5f", 0x378}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x9, 0x10, 0x0, 0xb}, 0x94) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x2000c805) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000008c0)=r3, 0x4) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="1e000300008c71ef28ff4b"], 0xffdd) 16.579946848s ago: executing program 38 (id=4808): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="800002010800000008001b000000000008000d"], 0x38}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0xffffffff, {0x0, 0x0, 0x0, r7, {0x0, 0x8}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x24040084) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r7, {0xffff}, {0xffff, 0xffff}, {0x2, 0xa}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x400dc}, 0x20004000) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@newqdisc={0x48, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xffffbddc, {0x0, 0x0, 0x0, r3, {0xffff}, {}, {0x2, 0x6}}, [@qdisc_kind_options=@q_cbq={{0x8}, {0x1c, 0x2, [@TCA_CBS_PARMS={0x18, 0x1, {0x81, '\x00', 0xfffff000, 0x2f, 0x3, 0x581}}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x40098}, 0x40054) 13.790357888s ago: executing program 39 (id=4811): sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc00000019000100000000000000000020010000000000000000000000000000ac141415000000e0ffffff000000000000000005000000030a00200000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000ac00000000000000ff0f000000000000ffffffffffffffff0000000000000000ffffffffffffffffffffff7f0000000000000000000000000200000000000000000a00000000000000000000008040000000000000000008000000000000000001000003000000004400050000000000000000000000000000000000000004d23c000000000000"], 0xfc}}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc000000190001002dbd70000000000064010100000000000000000000000000fc01000000000000000000000000000000000000000000000a0000"], 0xfc}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) r2 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r2, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000081) 2.949408505s ago: executing program 40 (id=4812): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f00003b6000/0x4000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x8003}, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000200)=0x8, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000500)=ANY=[@ANYBLOB="340000070015000300020000400002000008000039000000000400008008000500f70402cc"], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="38000000180001000300000000000000020000000000000900002000060015000400000014100008800c000180060001000000000079336269041e1e98cbfd7b5034e77d5949e72a60b927b30dd68f968b09b20c9ebc910668c341aacaac0ba03ba7285bc0a9f9077afc81cec2417eb5900c3f261bb292abc4ccf681bd5827d6dad8811e063ad3b7a5a18ebc3b063e9ab8b9"], 0x38}}, 0x0) set_mempolicy(0x4005, &(0x7f0000000300)=0x4, 0x7) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x24111, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xf}, 0x106200, 0xfff, 0x20da, 0x9, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)="ee7dbf81ff960a589ea62a755925b909b4c9e17fce52eb35eee3235fac001cbf30c2baa1ef87661dd5be0bd40f58d7c1", &(0x7f0000000200), 0x3f}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340), 0x0}, 0x20) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000004000/0x2000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) setuid(0xee01) io_uring_register$IORING_REGISTER_IOWQ_AFF(0xffffffffffffffff, 0x25, 0x0, 0x0) r3 = io_uring_setup(0x1b7a, &(0x7f0000000040)={0x0, 0x970, 0x1f480, 0x0, 0x31a}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[], 0x14}, 0x1, 0x2}, 0x0) io_uring_enter(r3, 0x8ae, 0x6933, 0x17, 0x0, 0xeffd) r4 = signalfd(r0, &(0x7f0000000180)={[0x400]}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="05edff0000000100000000000000c581f2d4bec3008a776f8ad0be73ab2ea63d56e6f227bfa116a8277958f62f88fef893bc28cf7050d40885c0cc05b2fcae74d38fee1b9b693ed89fba214515376c622eeefbd297f7284543dba2c5a6b12cbe295df09f9dd098eecaf2e1c0785df635490875affec50c182b046e861b4a544644eb69f080ebcd9491d7e95f0345ce61eeb9", @ANYRES32=r4, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB='\x00'/28], 0x50) io_uring_setup(0x1e64, &(0x7f0000000040)={0x0, 0xc89a, 0xc000, 0x7fff, 0x65}) socket$inet_sctp(0x2, 0x1, 0x84) 0s ago: executing program 41 (id=4814): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000040)="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", 0x378}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x9, 0x10, 0x0, 0xb}, 0x94) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x2000c805) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000008c0)=r3, 0x4) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="1e000300008c71ef28ff4b"], 0xffdd) kernel console output (not intermixed with test programs): ter on device bond0 [ 722.876050][T17333] netlink: 68 bytes leftover after parsing attributes in process `syz.5.3575'. [ 722.889574][T17278] 8021q: adding VLAN 0 to HW filter on device team0 [ 722.936276][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 722.943493][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 722.963307][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 722.970569][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.097063][T17339] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 724.235458][T17356] netlink: 68 bytes leftover after parsing attributes in process `syz.8.3581'. [ 724.542670][T17278] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 724.779089][T17370] bond1: entered promiscuous mode [ 724.784684][T17370] 8021q: adding VLAN 0 to HW filter on device bond1 [ 724.858043][T17278] veth0_vlan: entered promiscuous mode [ 724.875450][T17278] veth1_vlan: entered promiscuous mode [ 724.935462][T17278] veth0_macvtap: entered promiscuous mode [ 724.950309][T17278] veth1_macvtap: entered promiscuous mode [ 724.975466][T17278] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 724.991093][T17278] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 725.006717][ T4648] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 725.040572][ T4634] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 725.070660][ T4634] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 725.118212][ T4634] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 725.192666][T17391] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3584'. [ 726.052271][T17416] netlink: 48 bytes leftover after parsing attributes in process `syz.5.3594'. [ 726.062113][T17412] netlink: 56 bytes leftover after parsing attributes in process `syz.9.3592'. [ 727.435748][ T28] kauditd_printk_skb: 481 callbacks suppressed [ 727.435765][ T28] audit: type=1400 audit(1774922368.404:82190): avc: denied { kernel } for pid=17435 comm="syz.6.3599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 727.488177][ T28] audit: type=1400 audit(1774922368.451:82191): avc: denied { open } for pid=17439 comm="syz.9.3600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 727.516238][ T28] audit: type=1400 audit(1774922368.451:82192): avc: denied { perfmon } for pid=17439 comm="syz.9.3600" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 727.540726][ T28] audit: type=1400 audit(1774922368.451:82193): avc: denied { kernel } for pid=17439 comm="syz.9.3600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 727.583112][ T28] audit: type=1400 audit(1774922368.525:82194): avc: denied { name_bind } for pid=17439 comm="syz.9.3600" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 727.640148][ T28] audit: type=1400 audit(1774922368.525:82195): avc: denied { open } for pid=17439 comm="syz.9.3600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 727.682076][ T28] audit: type=1400 audit(1774922368.525:82196): avc: denied { perfmon } for pid=17439 comm="syz.9.3600" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 727.732637][ T28] audit: type=1400 audit(1774922368.525:82197): avc: denied { kernel } for pid=17439 comm="syz.9.3600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 727.774738][T17446] netlink: 40 bytes leftover after parsing attributes in process `syz.8.3601'. [ 727.783791][ T28] audit: type=1400 audit(1774922368.572:82198): avc: denied { create } for pid=17439 comm="syz.9.3600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 727.831137][ T28] audit: type=1326 audit(1774922368.638:82199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17439 comm="syz.9.3600" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1ef87c819 code=0x7ffc0000 [ 728.304395][T17467] netlink: 20 bytes leftover after parsing attributes in process `syz.5.3607'. [ 728.351709][T17471] netlink: 48 bytes leftover after parsing attributes in process `syz.8.3606'. [ 728.832941][T17492] Invalid ELF header magic: != ELF [ 728.993397][T17443] loop9: detected capacity change from 0 to 512 [ 729.245821][T17443] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 729.276971][T17443] ext4 filesystem being mounted at /4/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 729.560417][T17278] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 729.705021][T17550] loop9: detected capacity change from 0 to 1024 [ 729.731971][T17550] EXT4-fs: Ignoring removed nomblk_io_submit option [ 729.762922][T17556] netlink: 48 bytes leftover after parsing attributes in process `syz.3.3617'. [ 729.807919][T17550] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 729.880253][T17278] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 729.991426][T17577] loop9: detected capacity change from 0 to 128 [ 730.001762][T17580] netlink: 48 bytes leftover after parsing attributes in process `syz.5.3621'. [ 730.048542][T17574] 9p: Could not find request transport: xen [ 730.064419][T17574] netlink: 'syz.9.3619': attribute type 10 has an invalid length. [ 730.091119][T17574] team0: Port device dummy0 added [ 730.257442][T17596] Invalid ELF header magic: != ELF [ 730.720546][T17602] FAULT_INJECTION: forcing a failure. [ 730.720546][T17602] name failslab, interval 1, probability 0, space 0, times 0 [ 730.758641][T17602] CPU: 0 UID: 0 PID: 17602 Comm: syz.9.3626 Not tainted syzkaller #0 PREEMPT(full) [ 730.758677][T17602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 730.758693][T17602] Call Trace: [ 730.758702][T17602] [ 730.758769][T17602] __dump_stack+0x1d/0x30 [ 730.758880][T17602] dump_stack_lvl+0x95/0xd0 [ 730.758907][T17602] dump_stack+0x15/0x1b [ 730.758968][T17602] should_fail_ex+0x263/0x280 [ 730.759000][T17602] should_failslab+0x8c/0xb0 [ 730.759028][T17602] __kvmalloc_node_noprof+0x155/0x650 [ 730.759069][T17602] ? xt_alloc_table_info+0x40/0x80 [ 730.759150][T17602] xt_alloc_table_info+0x40/0x80 [ 730.759181][T17602] do_ip6t_set_ctl+0x5e5/0x8f0 [ 730.759225][T17602] nf_setsockopt+0x199/0x1b0 [ 730.759273][T17602] ipv6_setsockopt+0x11a/0x130 [ 730.759302][T17602] udpv6_setsockopt+0x99/0xb0 [ 730.759324][T17602] sock_common_setsockopt+0x69/0x80 [ 730.759433][T17602] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 730.759461][T17602] __sys_setsockopt+0x184/0x200 [ 730.759566][T17602] __x64_sys_setsockopt+0x64/0x80 [ 730.759603][T17602] x64_sys_call+0x2327/0x3020 [ 730.759674][T17602] do_syscall_64+0x12c/0x370 [ 730.759699][T17602] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 730.759722][T17602] RIP: 0033:0x7fc1ef87c819 [ 730.759739][T17602] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 730.759756][T17602] RSP: 002b:00007fc1ee2cf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 730.759791][T17602] RAX: ffffffffffffffda RBX: 00007fc1efaf5fa0 RCX: 00007fc1ef87c819 [ 730.759806][T17602] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000004 [ 730.759821][T17602] RBP: 00007fc1ee2cf090 R08: 0000000000000590 R09: 0000000000000000 [ 730.759834][T17602] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 730.759847][T17602] R13: 00007fc1efaf6038 R14: 00007fc1efaf5fa0 R15: 00007ffdc07c0df8 [ 730.759938][T17602] [ 731.309242][T17619] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 731.503698][T17619] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 731.575140][T17640] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3631'. [ 731.873122][T17655] netlink: 48 bytes leftover after parsing attributes in process `syz.9.3634'. [ 731.908908][T17656] pim6reg: entered allmulticast mode [ 731.995110][T17662] netlink: 48 bytes leftover after parsing attributes in process `syz.9.3638'. [ 732.000224][T17661] netlink: 20 bytes leftover after parsing attributes in process `syz.3.3637'. [ 732.711982][T17694] loop9: detected capacity change from 0 to 1024 [ 732.754370][T17696] netlink: 48 bytes leftover after parsing attributes in process `syz.5.3648'. [ 732.767899][T17694] EXT4-fs (loop9): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: none. [ 732.813317][T17694] ext4 filesystem being mounted at /19/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 732.813584][ T28] kauditd_printk_skb: 644 callbacks suppressed [ 732.813599][ T28] audit: type=1400 audit(1774922629.429:82844): avc: denied { mount } for pid=17692 comm="syz.9.3647" name="/" dev="loop9" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 732.896747][ T28] audit: type=1400 audit(1774922629.457:82845): avc: denied { read write } for pid=17692 comm="syz.9.3647" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 732.945138][ T28] audit: type=1400 audit(1774922629.457:82846): avc: denied { open } for pid=17692 comm="syz.9.3647" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 733.002951][ T28] audit: type=1400 audit(1774922629.466:82847): avc: denied { add_name } for pid=17692 comm="syz.9.3647" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 733.024602][ T28] audit: type=1400 audit(1774922629.466:82848): avc: denied { create } for pid=17692 comm="syz.9.3647" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 733.046912][ T28] audit: type=1400 audit(1774922629.466:82849): avc: denied { write } for pid=17692 comm="syz.9.3647" name="file1" dev="loop9" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 733.072673][ T28] audit: type=1400 audit(1774922629.466:82850): avc: denied { write open } for pid=17692 comm="syz.9.3647" path="/19/file1/file1" dev="loop9" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 733.132181][ T28] audit: type=1400 audit(1774922629.466:82851): avc: denied { allowed } for pid=17692 comm="syz.9.3647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 733.187324][ T28] audit: type=1400 audit(1774922629.466:82852): avc: denied { create } for pid=17692 comm="syz.9.3647" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 733.285044][ T28] audit: type=1400 audit(1774922629.466:82853): avc: denied { map } for pid=17692 comm="syz.9.3647" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=58681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 734.543439][T17278] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 735.510944][T17718] lo speed is unknown, defaulting to 1000 [ 735.576508][T17718] netlink: 28 bytes leftover after parsing attributes in process `syz.8.3652'. [ 735.667052][T17733] loop9: detected capacity change from 0 to 256 [ 735.868683][T17736] netlink: 48 bytes leftover after parsing attributes in process `syz.5.3659'. [ 736.830972][T17733] FAT-fs (loop9): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 737.524762][T17758] loop9: detected capacity change from 0 to 512 [ 737.559253][T17758] EXT4-fs: Ignoring removed nobh option [ 737.601117][T17758] EXT4-fs (loop9): encrypted files will use data=ordered instead of data journaling mode [ 737.615572][T17757] netlink: 128 bytes leftover after parsing attributes in process `syz.3.3663'. [ 737.656796][T17758] EXT4-fs (loop9): 1 truncate cleaned up [ 737.662956][T17758] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 738.173644][ T28] kauditd_printk_skb: 304 callbacks suppressed [ 738.173663][ T28] audit: type=1326 audit(1774922634.443:83158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17737 comm="syz.5.3661" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0ca97ec819 code=0x7ffc0000 [ 738.205516][ T28] audit: type=1326 audit(1774922634.443:83159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17737 comm="syz.5.3661" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0ca97ec819 code=0x7ffc0000 [ 738.230140][ T28] audit: type=1326 audit(1774922634.471:83160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17737 comm="syz.5.3661" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0ca97ec819 code=0x7ffc0000 [ 738.255770][ T28] audit: type=1326 audit(1774922634.471:83161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17737 comm="syz.5.3661" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0ca97ec819 code=0x7ffc0000 [ 738.280690][ T28] audit: type=1326 audit(1774922634.471:83162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17737 comm="syz.5.3661" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f0ca97ec819 code=0x7ffc0000 [ 738.306615][ T28] audit: type=1326 audit(1774922634.508:83163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17737 comm="syz.5.3661" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0ca97ec819 code=0x7ffc0000 [ 738.331571][ T28] audit: type=1326 audit(1774922634.518:83164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17737 comm="syz.5.3661" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0ca97ec819 code=0x7ffc0000 [ 738.356292][ T28] audit: type=1326 audit(1774922634.527:83165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17737 comm="syz.5.3661" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0ca97ec819 code=0x7ffc0000 [ 738.382066][ T28] audit: type=1326 audit(1774922634.527:83166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17737 comm="syz.5.3661" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0ca97ec819 code=0x7ffc0000 [ 738.410681][ T28] audit: type=1326 audit(1774922634.536:83167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17737 comm="syz.5.3661" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7f0ca97ec819 code=0x7ffc0000 [ 738.535139][T17278] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 738.569035][T17773] xt_TPROXY: Can be used only with -p tcp or -p udp [ 738.592924][T17775] netlink: 48 bytes leftover after parsing attributes in process `syz.5.3671'. [ 738.908492][T17790] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 741.139183][T17852] netlink: 20 bytes leftover after parsing attributes in process `syz.6.3688'. [ 742.579965][T17881] netlink: 'syz.9.3706': attribute type 10 has an invalid length. [ 742.610223][T17881] netlink: 2 bytes leftover after parsing attributes in process `syz.9.3706'. [ 742.628767][T17881] bond0: entered promiscuous mode [ 742.642209][T17881] bond_slave_0: entered promiscuous mode [ 742.662005][T17881] bond_slave_1: entered promiscuous mode [ 742.676187][T17881] bridge0: port 3(bond0) entered blocking state [ 742.695843][T17881] bridge0: port 3(bond0) entered disabled state [ 742.711046][T17881] bond0: entered allmulticast mode [ 742.723327][T17881] bond_slave_0: entered allmulticast mode [ 742.738211][T17881] bond_slave_1: entered allmulticast mode [ 742.753908][T17881] bridge0: port 3(bond0) entered blocking state [ 742.760435][T17881] bridge0: port 3(bond0) entered forwarding state [ 742.912286][T17892] dns_resolver: Unsupported server list version (0) [ 743.605658][ T28] kauditd_printk_skb: 440 callbacks suppressed [ 743.605689][ T28] audit: type=1400 audit(1774922639.410:83608): avc: denied { execmem } for pid=17901 comm="syz.9.3711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 744.658581][ T28] audit: type=1400 audit(1774922639.971:83609): avc: denied { perfmon } for pid=17883 comm="syz.3.3707" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 745.727843][ T28] audit: type=1400 audit(1774922640.102:83610): avc: denied { open } for pid=17901 comm="syz.9.3711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 746.580359][T17912] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3712'. [ 746.767700][ T28] audit: type=1400 audit(1774922640.102:83611): avc: denied { kernel } for pid=17901 comm="syz.9.3711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 746.793140][ T28] audit: type=1400 audit(1774922640.345:83612): avc: denied { open } for pid=17901 comm="syz.9.3711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 746.813551][ T28] audit: type=1400 audit(1774922640.345:83613): avc: denied { perfmon } for pid=17901 comm="syz.9.3711" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 746.891031][ T28] audit: type=1400 audit(1774922640.345:83614): avc: denied { kernel } for pid=17901 comm="syz.9.3711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 746.911727][ T28] audit: type=1400 audit(1774922640.495:83615): avc: denied { create } for pid=17901 comm="syz.9.3711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 746.976386][ T28] audit: type=1400 audit(1774922640.710:83616): avc: denied { create } for pid=17901 comm="syz.9.3711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 747.024157][ T28] audit: type=1400 audit(1774922641.084:83617): avc: denied { prog_load } for pid=17901 comm="syz.9.3711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 747.066536][T17921] netlink: 56 bytes leftover after parsing attributes in process `syz.5.3714'. [ 747.437359][T17942] netlink: 56 bytes leftover after parsing attributes in process `syz.5.3721'. [ 749.381910][ T28] kauditd_printk_skb: 192 callbacks suppressed [ 749.381958][ T28] audit: type=1400 audit(1774922644.816:83811): avc: denied { open } for pid=17953 comm="syz.9.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 749.824661][ T28] audit: type=1400 audit(1774922644.816:83812): avc: denied { perfmon } for pid=17953 comm="syz.9.3726" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 750.164102][ T28] audit: type=1400 audit(1774922644.816:83813): avc: denied { kernel } for pid=17953 comm="syz.9.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 750.376086][T17966] netlink: 28 bytes leftover after parsing attributes in process `syz.5.3728'. [ 750.426759][T17961] lo speed is unknown, defaulting to 1000 [ 750.631338][ T28] audit: type=1400 audit(1774922644.826:83814): avc: denied { create } for pid=17953 comm="syz.9.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 750.934539][ T28] audit: type=1400 audit(1774922644.835:83815): avc: denied { create } for pid=17953 comm="syz.9.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 751.043229][ T28] audit: type=1400 audit(1774922644.835:83816): avc: denied { connect } for pid=17953 comm="syz.9.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 751.141316][ T28] audit: type=1400 audit(1774922644.844:83817): avc: denied { bind } for pid=17953 comm="syz.9.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 751.161104][ T28] audit: type=1400 audit(1774922644.854:83818): avc: denied { prog_load } for pid=17953 comm="syz.9.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 751.180610][ T28] audit: type=1400 audit(1774922644.863:83819): avc: denied { prog_run } for pid=17953 comm="syz.9.3726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 751.200244][ T28] audit: type=1326 audit(1774922644.508:83808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17951 comm="syz.6.3725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f14486ec819 code=0x7ffc0000 [ 751.742980][T17978] netlink: 20 bytes leftover after parsing attributes in process `syz.9.3730'. [ 752.298594][T17981] tap0: tun_chr_ioctl cmd 2147767521 [ 753.807886][T17999] netlink: 20 bytes leftover after parsing attributes in process `syz.6.3737'. [ 753.941654][T18004] netlink: 'syz.5.3739': attribute type 3 has an invalid length. [ 753.959987][T18004] netlink: 'syz.5.3739': attribute type 3 has an invalid length. [ 754.415554][T18020] netlink: 14 bytes leftover after parsing attributes in process `syz.6.3745'. [ 754.454371][T18020] hsr_slave_0: left promiscuous mode [ 754.469859][T18020] hsr_slave_1: left promiscuous mode [ 754.739435][ T28] kauditd_printk_skb: 344 callbacks suppressed [ 754.739454][ T28] audit: type=1400 audit(1774922649.942:84164): avc: denied { create } for pid=18026 comm="syz.3.3748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 754.779156][ T28] audit: type=1400 audit(1774922649.970:84165): avc: denied { prog_load } for pid=18028 comm="syz.6.3750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 754.799470][ T28] audit: type=1400 audit(1774922649.989:84166): avc: denied { bpf } for pid=18028 comm="syz.6.3750" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 754.851673][ T28] audit: type=1400 audit(1774922649.989:84167): avc: denied { prog_load } for pid=18028 comm="syz.6.3750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 754.872162][ T28] audit: type=1400 audit(1774922649.989:84168): avc: denied { perfmon } for pid=18028 comm="syz.6.3750" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 754.917124][ T28] audit: type=1400 audit(1774922649.989:84169): avc: denied { perfmon } for pid=18028 comm="syz.6.3750" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 754.939094][ T28] audit: type=1400 audit(1774922649.989:84170): avc: denied { perfmon } for pid=18028 comm="syz.6.3750" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 754.982719][T18039] netlink: 104 bytes leftover after parsing attributes in process `syz.5.3752'. [ 754.991879][ T28] audit: type=1400 audit(1774922649.989:84171): avc: denied { bpf } for pid=18028 comm="syz.6.3750" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 755.014579][ T28] audit: type=1400 audit(1774922649.989:84172): avc: denied { prog_run } for pid=18028 comm="syz.6.3750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 755.055610][ T28] audit: type=1400 audit(1774922650.045:84173): avc: denied { perfmon } for pid=18028 comm="syz.6.3750" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 755.343776][T18055] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3760'. [ 755.358878][T18055] openvswitch: netlink: Flow key attr not present in new flow. [ 755.524921][T18065] netlink: 104 bytes leftover after parsing attributes in process `syz.5.3764'. [ 756.243165][T18119] netlink: 'syz.5.3777': attribute type 1 has an invalid length. [ 756.267945][T18116] netlink: 4 bytes leftover after parsing attributes in process `syz.8.3775'. [ 758.055835][T18238] netlink: 104 bytes leftover after parsing attributes in process `syz.9.3809'. [ 758.499401][T18272] netlink: 104 bytes leftover after parsing attributes in process `syz.6.3826'. [ 758.912193][T18297] netlink: 'syz.6.3837': attribute type 1 has an invalid length. [ 758.935827][T18297] netlink: 'syz.6.3837': attribute type 4 has an invalid length. [ 758.953980][T18297] netlink: 9462 bytes leftover after parsing attributes in process `syz.6.3837'. [ 759.747389][T18349] netlink: 32 bytes leftover after parsing attributes in process `syz.5.3860'. [ 762.674528][ T28] kauditd_printk_skb: 1040 callbacks suppressed [ 762.674545][ T28] audit: type=1400 audit(1774922657.360:85214): avc: denied { perfmon } for pid=18343 comm="syz.6.3859" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 762.704092][ T28] audit: type=1400 audit(1774922657.360:85215): avc: denied { tracepoint } for pid=18343 comm="syz.6.3859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 762.731623][ T28] audit: type=1400 audit(1774922657.416:85216): avc: denied { read write } for pid=17278 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 762.758968][ T28] audit: type=1400 audit(1774922657.416:85217): avc: denied { open } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 762.784267][ T28] audit: type=1400 audit(1774922657.416:85218): avc: denied { ioctl } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 762.864956][T18358] netlink: 24 bytes leftover after parsing attributes in process `syz.5.3864'. [ 762.875426][ T28] audit: type=1400 audit(1774922657.472:85219): avc: denied { read write } for pid=17278 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 762.930923][ T28] audit: type=1400 audit(1774922657.472:85220): avc: denied { open } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 762.979528][ T28] audit: type=1400 audit(1774922657.472:85221): avc: denied { ioctl } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 763.014696][ T28] audit: type=1400 audit(1774922657.500:85222): avc: denied { perfmon } for pid=18347 comm="syz.5.3860" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 763.025535][T18366] netlink: 104 bytes leftover after parsing attributes in process `syz.5.3867'. [ 763.041452][ T28] audit: type=1400 audit(1774922657.500:85223): avc: denied { tracepoint } for pid=18347 comm="syz.5.3860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 763.335000][T18380] netlink: 'syz.6.3873': attribute type 10 has an invalid length. [ 763.363531][T18380] netlink: 2 bytes leftover after parsing attributes in process `syz.6.3873'. [ 763.377966][T18390] netlink: 20 bytes leftover after parsing attributes in process `syz.9.3878'. [ 763.786977][T18423] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 763.794179][T18423] dvmrp1: linktype set to 776 [ 764.530857][T18456] netlink: 32 bytes leftover after parsing attributes in process `syz.5.3910'. [ 764.739359][T18482] netlink: 20 bytes leftover after parsing attributes in process `syz.5.3922'. [ 765.642852][T18570] netlink: 104 bytes leftover after parsing attributes in process `syz.5.3962'. [ 765.831492][T18585] netlink: 'syz.8.3968': attribute type 10 has an invalid length. [ 765.865564][T18581] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3966'. [ 765.972708][T18585] team0 (unregistering): Port device team_slave_0 removed [ 766.089520][T18585] team0 (unregistering): Port device team_slave_1 removed [ 766.268158][T18623] netlink: 104 bytes leftover after parsing attributes in process `syz.9.3985'. [ 767.286758][T18653] netlink: 104 bytes leftover after parsing attributes in process `syz.5.4001'. [ 767.599811][T18678] netlink: 'syz.6.4012': attribute type 1 has an invalid length. [ 767.621678][T18678] netlink: 16150 bytes leftover after parsing attributes in process `syz.6.4012'. [ 767.984386][T18713] netlink: 'syz.3.4030': attribute type 1 has an invalid length. [ 768.001165][T18713] netlink: 16150 bytes leftover after parsing attributes in process `syz.3.4030'. [ 768.028992][ T28] kauditd_printk_skb: 961 callbacks suppressed [ 768.029007][ T28] audit: type=1400 audit(1774922662.374:86185): avc: denied { create } for pid=18720 comm="syz.5.4034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 768.129572][ T28] audit: type=1400 audit(1774922662.374:86186): avc: denied { read write } for pid=17278 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 768.239962][ T28] audit: type=1400 audit(1774922662.374:86187): avc: denied { open } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 768.324969][ T28] audit: type=1400 audit(1774922662.374:86188): avc: denied { ioctl } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 768.368595][T18744] audit: audit_backlog=65 > audit_backlog_limit=64 [ 768.377981][T18744] audit: audit_lost=912 audit_rate_limit=0 audit_backlog_limit=64 [ 768.388904][ T28] audit: type=1400 audit(1774922662.402:86189): avc: denied { prog_load } for pid=18721 comm="syz.8.4035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 768.410039][T18744] audit: backlog limit exceeded [ 768.416331][T18747] audit: audit_backlog=65 > audit_backlog_limit=64 [ 768.419967][T18748] audit: audit_backlog=65 > audit_backlog_limit=64 [ 768.425162][T18746] netlink: 'syz.6.4044': attribute type 13 has an invalid length. [ 768.438204][T18746] netlink: 152 bytes leftover after parsing attributes in process `syz.6.4044'. [ 768.448971][T18746] syz_tun: refused to change device tx_queue_len [ 768.456086][T18746] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 768.503802][T18744] netlink: 'syz.9.4043': attribute type 9 has an invalid length. [ 768.920574][T18794] netlink: 'syz.8.4060': attribute type 29 has an invalid length. [ 768.961491][T18782] netlink: 'syz.8.4060': attribute type 29 has an invalid length. [ 768.975291][T18798] netlink: 'syz.8.4060': attribute type 29 has an invalid length. [ 769.162518][T18815] netlink: 'syz.3.4075': attribute type 7 has an invalid length. [ 769.192623][T18815] netlink: 148 bytes leftover after parsing attributes in process `syz.3.4075'. [ 769.351189][T18834] netlink: 'syz.5.4083': attribute type 1 has an invalid length. [ 769.361534][T18834] netlink: 16150 bytes leftover after parsing attributes in process `syz.5.4083'. [ 769.743139][T18864] netlink: 'syz.3.4097': attribute type 1 has an invalid length. [ 769.757987][T18864] netlink: 16150 bytes leftover after parsing attributes in process `syz.3.4097'. [ 770.086236][T18893] netlink: 'syz.3.4110': attribute type 1 has an invalid length. [ 770.140517][T18898] IPv6: NLM_F_CREATE should be specified when creating new route [ 770.155164][T18898] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 770.162435][T18898] IPv6: NLM_F_CREATE should be set when creating new route [ 770.464246][T18925] netlink: 'syz.3.4126': attribute type 2 has an invalid length. [ 770.919060][T18968] syzkaller0: entered promiscuous mode [ 770.924827][T18968] syzkaller0: entered allmulticast mode [ 770.939336][T18969] IPv6: NLM_F_CREATE should be specified when creating new route [ 770.969612][T18971] tipc: Enabled bearer , priority 0 [ 770.994360][T18968] tc action pedit offset 64 out of bounds [ 771.001224][T18971] syzkaller0: entered promiscuous mode [ 771.006724][T18971] syzkaller0: entered allmulticast mode [ 771.016690][T18975] __nla_validate_parse: 5 callbacks suppressed [ 771.016735][T18975] netlink: 16 bytes leftover after parsing attributes in process `syz.9.4147'. [ 771.042923][T18971] tipc: Resetting bearer [ 771.071069][T18970] tipc: Resetting bearer [ 771.078653][T18970] tipc: Disabling bearer [ 771.171117][T18981] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4149'. [ 771.502048][T18991] syzkaller0: entered promiscuous mode [ 771.507624][T18991] syzkaller0: entered allmulticast mode [ 771.852484][T19041] sch_tbf: burst 555 is lower than device syzkaller0 mtu (1500) ! [ 771.879457][T19041] syzkaller0: entered promiscuous mode [ 771.885958][T19041] syzkaller0: entered allmulticast mode [ 771.890044][T19047] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4182'. [ 771.898865][T19041] tipc: Started in network mode [ 771.905478][T19041] tipc: Node identity , cluster identity 4711 [ 771.917419][T19041] tipc: Failed to obtain node identity [ 771.923279][T19041] tipc: Enabling of bearer rejected, failed to enable media [ 772.179534][ T7652] IPVS: starting estimator thread 0... [ 772.198211][T19057] lo speed is unknown, defaulting to 1000 [ 772.281102][T19073] IPVS: using max 2832 ests per chain, 141600 per kthread [ 772.307153][T19077] lo speed is unknown, defaulting to 1000 [ 772.415055][T19090] netlink: 20 bytes leftover after parsing attributes in process `syz.8.4199'. [ 772.628898][T12006] nci: nci_ntf_packet: unknown ntf opcode 0xe27 [ 772.733078][T19119] netlink: 36 bytes leftover after parsing attributes in process `syz.5.4212'. [ 772.746863][T19119] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4212'. [ 772.837987][T19124] netlink: 8 bytes leftover after parsing attributes in process `syz.9.4213'. [ 773.226610][T19155] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4229'. [ 773.235756][T19155] lo: Caught tx_queue_len zero misconfig [ 773.380327][T19096] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 773.391900][ T28] kauditd_printk_skb: 1275 callbacks suppressed [ 773.391918][ T28] audit: type=1400 audit(1774922667.388:87456): avc: denied { prog_load } for pid=19165 comm="syz.5.4233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 773.452915][ T28] audit: type=1400 audit(1774922667.388:87457): avc: denied { map_create } for pid=19165 comm="syz.5.4233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 773.474844][ T28] audit: type=1400 audit(1774922667.388:87458): avc: denied { map_read map_write } for pid=19165 comm="syz.5.4233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 773.495373][ T28] audit: type=1400 audit(1774922667.388:87459): avc: denied { prog_run } for pid=19165 comm="syz.5.4233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 773.559565][ T28] audit: type=1400 audit(1774922667.397:87460): avc: denied { create } for pid=19165 comm="syz.5.4233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 773.588433][ T28] audit: type=1400 audit(1774922667.397:87461): avc: denied { write } for pid=19165 comm="syz.5.4233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 773.613123][ T28] audit: type=1400 audit(1774922667.378:87455): avc: denied { bpf } for pid=19159 comm="syz.8.4228" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 773.633891][ T28] audit: type=1400 audit(1774922667.397:87462): avc: denied { bpf } for pid=19159 comm="syz.8.4228" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 773.666456][ T28] audit: type=1400 audit(1774922667.397:87463): avc: denied { prog_run } for pid=19159 comm="syz.8.4228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 773.688875][ T28] audit: type=1400 audit(1774922667.434:87464): avc: denied { write } for pid=19164 comm="syz.3.4232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 774.130527][T19215] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4252'. [ 774.193554][T19221] netlink: 8 bytes leftover after parsing attributes in process `syz.9.4255'. [ 774.208043][T19220] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:20005 [ 774.228478][T19220] IPVS: length: 136 != 8 [ 774.253561][T19220] IPVS: lblc: FWM 3 0x00000003 - no destination available [ 774.749276][T19255] netlink: 'syz.5.4272': attribute type 16 has an invalid length. [ 774.781261][T19255] netlink: 'syz.5.4272': attribute type 17 has an invalid length. [ 774.887986][T19255] A link change request failed with some changes committed already. Interface teql0 may have been left with an inconsistent configuration, please check. [ 775.195339][T19266] A link change request failed with some changes committed already. Interface bond1 may have been left with an inconsistent configuration, please check. [ 776.051014][T19368] sch_tbf: burst 555 is lower than device syzkaller0 mtu (1514) ! [ 776.065193][T19368] syzkaller0: entered promiscuous mode [ 776.072815][T19368] syzkaller0: entered allmulticast mode [ 776.097695][T12006] nci: nci_ntf_packet: unsupported ntf opcode 0xf00 [ 776.109905][T19369] syzkaller0: entered promiscuous mode [ 776.126170][T19369] syzkaller0: entered allmulticast mode [ 776.493842][T19418] netlink: 'syz.5.4312': attribute type 16 has an invalid length. [ 776.526224][T19418] netlink: 'syz.5.4312': attribute type 17 has an invalid length. [ 776.628716][T19418] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 776.844219][T19360] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 776.973511][T19460] __nla_validate_parse: 2 callbacks suppressed [ 776.973543][T19460] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4319'. [ 776.997712][T19464] syzkaller0: entered promiscuous mode [ 777.003222][T19464] syzkaller0: entered allmulticast mode [ 777.250269][T19488] netlink: 48 bytes leftover after parsing attributes in process `syz.9.4327'. [ 777.287794][T19488] netlink: 56 bytes leftover after parsing attributes in process `syz.9.4327'. [ 777.562435][ T4643] nci: nci_ntf_packet: unknown ntf opcode 0xe27 [ 777.706836][T19521] syzkaller0: entered promiscuous mode [ 777.725430][T19521] syzkaller0: entered allmulticast mode [ 777.811415][T19538] sch_tbf: burst 555 is lower than device syzkaller0 mtu (1500) ! [ 778.207066][T19562] netlink: 8 bytes leftover after parsing attributes in process `syz.9.4357'. [ 778.394472][T19575] bridge0: port 3(veth0_to_bridge) entered blocking state [ 778.401849][T19575] bridge0: port 3(veth0_to_bridge) entered disabled state [ 778.410380][T19575] veth0_to_bridge: entered allmulticast mode [ 778.417883][T19575] veth0_to_bridge: entered promiscuous mode [ 778.424040][T19575] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 778.437520][T19575] bridge0: port 3(veth0_to_bridge) entered blocking state [ 778.444966][T19575] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 778.602800][T19587] netlink: 20 bytes leftover after parsing attributes in process `syz.9.4368'. [ 778.646939][T19589] netlink: 8 bytes leftover after parsing attributes in process `syz.9.4369'. [ 778.746319][ T28] kauditd_printk_skb: 1911 callbacks suppressed [ 778.746338][ T28] audit: type=1400 audit(1774922672.392:89376): avc: denied { prog_load } for pid=19596 comm="syz.6.4372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 778.815501][ T28] audit: type=1400 audit(1774922672.392:89377): avc: denied { bpf } for pid=19596 comm="syz.6.4372" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 778.841585][ T28] audit: type=1400 audit(1774922672.392:89378): avc: denied { map_create } for pid=19596 comm="syz.6.4372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 778.902751][ T28] audit: type=1400 audit(1774922672.392:89379): avc: denied { map_read map_write } for pid=19596 comm="syz.6.4372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 778.928886][ T28] audit: type=1400 audit(1774922672.392:89380): avc: denied { perfmon } for pid=19596 comm="syz.6.4372" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 778.950591][ T28] audit: type=1400 audit(1774922672.392:89381): avc: denied { setopt } for pid=19596 comm="syz.6.4372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 778.971230][ T28] audit: type=1400 audit(1774922672.392:89382): avc: denied { create } for pid=19596 comm="syz.6.4372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 779.001334][ T28] audit: type=1400 audit(1774922672.392:89383): avc: denied { write } for pid=19596 comm="syz.6.4372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 779.022955][ T28] audit: type=1400 audit(1774922672.448:89384): avc: denied { module_request } for pid=19598 comm="syz.6.4373" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 779.055713][ T28] audit: type=1400 audit(1774922672.467:89385): avc: denied { sys_module } for pid=19598 comm="syz.6.4373" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 779.153828][T19618] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4381'. [ 779.206319][T19621] netlink: 16186 bytes leftover after parsing attributes in process `syz.9.4382'. [ 779.266032][T19624] netlink: 16 bytes leftover after parsing attributes in process `syz.9.4384'. [ 779.586395][T19637] syzkaller0: entered promiscuous mode [ 779.591927][T19637] syzkaller0: entered allmulticast mode [ 779.627473][T19638] syzkaller0: entered promiscuous mode [ 779.632979][T19638] syzkaller0: entered allmulticast mode [ 779.805608][T19642] netlink: 8 bytes leftover after parsing attributes in process `syz.9.4393'. [ 780.214623][T19665] syzkaller0: entered promiscuous mode [ 780.220176][T19665] syzkaller0: entered allmulticast mode [ 780.636501][T19505] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 781.112187][T19720] sch_tbf: burst 555 is lower than device syzkaller0 mtu (1514) ! [ 781.227943][T19717] lo speed is unknown, defaulting to 1000 [ 781.312075][T19717] chnl_net:caif_netlink_parms(): no params data found [ 781.365236][T19717] bridge0: port 1(bridge_slave_0) entered blocking state [ 781.373120][T19717] bridge0: port 1(bridge_slave_0) entered disabled state [ 781.380460][T19717] bridge_slave_0: entered allmulticast mode [ 781.387454][T19717] bridge_slave_0: entered promiscuous mode [ 781.397785][T19717] bridge0: port 2(bridge_slave_1) entered blocking state [ 781.405075][T19717] bridge0: port 2(bridge_slave_1) entered disabled state [ 781.412336][T19717] bridge_slave_1: entered allmulticast mode [ 781.419600][T19717] bridge_slave_1: entered promiscuous mode [ 781.441761][T19717] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 781.452482][T19717] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 781.472507][T19717] team0: Port device team_slave_0 added [ 781.479121][T19717] team0: Port device team_slave_1 added [ 781.497445][T19717] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 781.504413][T19717] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 781.530506][T19717] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 781.544142][T19717] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 781.551886][T19717] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 781.578016][T19717] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 781.614936][T19717] hsr_slave_0: entered promiscuous mode [ 781.621093][T19717] hsr_slave_1: entered promiscuous mode [ 781.627207][T19717] debugfs: 'hsr0' already exists in 'hsr' [ 781.633059][T19717] Cannot create hsr debugfs directory [ 781.852578][ T309] bond0 (unregistering): Released all slaves [ 781.866010][ T309] bond1 (unregistering): Released all slaves [ 781.879753][ T309] bond2 (unregistering): Released all slaves [ 781.891939][ T309] bond3 (unregistering): (slave batadv0): Removing an active aggregator [ 781.900672][ T309] bond3 (unregistering): (slave batadv0): Releasing backup interface [ 781.909567][ T309] bond3 (unregistering): Released all slaves [ 781.924425][T19777] veth0_to_bridge: Caught tx_queue_len zero misconfig [ 781.946314][ T309] tipc: Disabling bearer [ 781.954978][ T309] tipc: Left network mode [ 781.991200][T19767] syzkaller0: entered promiscuous mode [ 781.996772][T19767] syzkaller0: entered allmulticast mode [ 782.007490][ T309] batman_adv: batadv0: Removing interface: dummy0 [ 782.452085][ T309] IPVS: stop unused estimator thread 0... [ 783.624984][T19909] __nla_validate_parse: 10 callbacks suppressed [ 783.625001][T19909] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4459'. [ 784.205297][T19722] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 784.220989][T19717] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 784.228117][ T28] kauditd_printk_skb: 569 callbacks suppressed [ 784.228135][ T28] audit: type=1400 audit(1774922677.518:89955): avc: denied { read } for pid=19717 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 784.271951][ T28] audit: type=1400 audit(1774922677.518:89956): avc: denied { read } for pid=19717 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 784.302775][T19717] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 784.312478][T19919] netlink: 68 bytes leftover after parsing attributes in process `syz.9.4463'. [ 784.343194][ T28] audit: type=1400 audit(1774922677.518:89957): avc: denied { write } for pid=19717 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 784.371289][T19717] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 784.412833][T19717] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 784.417068][ T28] audit: type=1400 audit(1774922677.555:89958): avc: denied { read write } for pid=17278 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 784.467340][T19931] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.475512][T19931] audit: audit_lost=917 audit_rate_limit=0 audit_backlog_limit=64 [ 784.476127][T19919] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.483678][T19931] audit: backlog limit exceeded [ 784.493983][T19717] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.495687][T19933] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.552574][T19937] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4469'. [ 784.662990][T19953] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4470'. [ 784.717180][T19953] syzkaller0: entered promiscuous mode [ 784.722779][T19953] syzkaller0: entered allmulticast mode [ 784.826627][T19717] 8021q: adding VLAN 0 to HW filter on device bond0 [ 784.913174][T19717] 8021q: adding VLAN 0 to HW filter on device team0 [ 784.933160][ T4673] bridge0: port 1(bridge_slave_0) entered blocking state [ 784.940346][ T4673] bridge0: port 1(bridge_slave_0) entered forwarding state [ 785.116026][ T4673] bridge0: port 2(bridge_slave_1) entered blocking state [ 785.123210][ T4673] bridge0: port 2(bridge_slave_1) entered forwarding state [ 785.587487][T20048] netlink: 20 bytes leftover after parsing attributes in process `syz.5.4478'. [ 785.644676][T19717] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 785.692377][T20058] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4480'. [ 785.760276][T20063] syzkaller0: entered promiscuous mode [ 785.766129][T20063] syzkaller0: entered allmulticast mode [ 785.887823][T20070] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4482'. [ 785.971923][T20070] netlink: 'syz.5.4482': attribute type 1 has an invalid length. [ 785.989447][T19717] veth0_vlan: entered promiscuous mode [ 785.998208][T19717] veth1_vlan: entered promiscuous mode [ 786.015646][T19717] veth0_macvtap: entered promiscuous mode [ 786.022833][T19717] veth1_macvtap: entered promiscuous mode [ 786.051716][T19717] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 786.069097][T19717] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 786.086753][ T4643] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 786.097389][ T4643] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 786.108476][ T4643] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 786.122149][ T4643] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 786.243035][T20086] netlink: 68 bytes leftover after parsing attributes in process `syz.6.4485'. [ 786.363795][T20100] netlink: 20 bytes leftover after parsing attributes in process `syz.5.4488'. [ 786.483501][T20109] netlink: 8 bytes leftover after parsing attributes in process `syz.9.4490'. [ 786.504075][T20112] syzkaller0: entered promiscuous mode [ 786.509781][T20112] syzkaller0: entered allmulticast mode [ 786.740366][T20130] syzkaller0: entered promiscuous mode [ 786.748212][T20130] syzkaller0: entered allmulticast mode [ 787.300773][T20194] syzkaller0: entered promiscuous mode [ 787.306495][T20194] syzkaller0: entered allmulticast mode [ 788.385412][T20006] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 789.584471][ T28] kauditd_printk_skb: 1024 callbacks suppressed [ 789.584487][ T28] audit: type=1400 audit(1774922682.532:90965): avc: denied { create } for pid=20262 comm="syz.6.4534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 790.008813][ T28] audit: type=1400 audit(1774922682.560:90966): avc: denied { accept } for pid=20262 comm="syz.6.4534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 790.250068][ T28] audit: type=1400 audit(1774922682.588:90967): avc: denied { accept } for pid=20262 comm="syz.6.4534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 791.288621][ T28] audit: type=1400 audit(1774922682.597:90968): avc: denied { accept } for pid=20262 comm="syz.6.4534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 791.308353][ T28] audit: type=1400 audit(1774922682.607:90969): avc: denied { accept } for pid=20262 comm="syz.6.4534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 791.328121][ T28] audit: type=1400 audit(1774922682.672:90970): avc: denied { write } for pid=20262 comm="syz.6.4534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 791.371747][ T28] audit: type=1400 audit(1774922682.672:90971): avc: denied { accept } for pid=20262 comm="syz.6.4534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 791.391529][ T28] audit: type=1400 audit(1774922682.953:90972): avc: denied { accept } for pid=20262 comm="syz.6.4534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 791.417070][ T28] audit: type=1400 audit(1774922683.130:90973): avc: denied { accept } for pid=20262 comm="syz.6.4534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 791.457076][T20283] audit: audit_backlog=65 > audit_backlog_limit=64 [ 794.009803][T20338] __nla_validate_parse: 6 callbacks suppressed [ 794.009820][T20338] netlink: 56 bytes leftover after parsing attributes in process `syz.6.4564'. [ 794.129048][ C0] vcan0: j1939_tp_rxtimer: 0xffff8881052be800: rx timeout, send abort [ 794.333748][T20350] syzkaller0: entered promiscuous mode [ 794.346285][T20350] syzkaller0: entered allmulticast mode [ 794.516357][T20352] netlink: 44 bytes leftover after parsing attributes in process `syz.6.4569'. [ 794.663574][ C0] vcan0: j1939_tp_rxtimer: 0xffff88811a313000: rx timeout, send abort [ 794.672053][ C0] vcan0: j1939_tp_rxtimer: 0xffff8881052be800: abort rx timeout. Force session deactivation [ 794.715097][T20355] netlink: 'syz.6.4571': attribute type 1 has an invalid length. [ 794.752232][T20355] netlink: 'syz.6.4571': attribute type 4 has an invalid length. [ 794.778691][T20355] netlink: 9462 bytes leftover after parsing attributes in process `syz.6.4571'. [ 794.885636][T20368] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4576'. [ 794.909480][T20371] netlink: 20 bytes leftover after parsing attributes in process `syz.9.4577'. [ 794.936429][ T28] kauditd_printk_skb: 587 callbacks suppressed [ 794.936445][ T28] audit: type=1400 audit(1774922687.545:91559): avc: denied { perfmon } for pid=20362 comm="syz.8.4574" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 794.970385][ T28] audit: type=1400 audit(1774922687.545:91560): avc: denied { read write } for pid=17278 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 795.038165][T20380] netlink: 56 bytes leftover after parsing attributes in process `syz.6.4575'. [ 795.077753][T20378] syzkaller0: entered promiscuous mode [ 795.077943][ T28] audit: type=1400 audit(1774922687.545:91561): avc: denied { open } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 795.093270][T20378] syzkaller0: entered allmulticast mode [ 795.121824][ T28] audit: type=1400 audit(1774922687.545:91562): avc: denied { ioctl } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 795.159171][ T28] audit: type=1400 audit(1774922687.574:91563): avc: denied { module_request } for pid=20364 comm="syz.6.4575" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 795.181946][ T28] audit: type=1400 audit(1774922687.574:91564): avc: denied { kernel } for pid=20362 comm="syz.8.4574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 795.201659][ T28] audit: type=1400 audit(1774922687.574:91565): avc: denied { perfmon } for pid=20362 comm="syz.8.4574" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 795.206544][ C0] vcan0: j1939_tp_rxtimer: 0xffff88811a313000: abort rx timeout. Force session deactivation [ 795.248906][ T28] audit: type=1400 audit(1774922687.592:91566): avc: denied { sys_module } for pid=20364 comm="syz.6.4575" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 795.275565][ T28] audit: type=1400 audit(1774922687.592:91567): avc: denied { module_request } for pid=20364 comm="syz.6.4575" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 795.301341][ T28] audit: type=1400 audit(1774922687.602:91568): avc: denied { write } for pid=20362 comm="syz.8.4574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 795.383673][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 795.395921][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 795.408341][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 795.420559][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 795.432842][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 795.444982][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 795.457152][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 795.469382][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 795.481806][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 795.494050][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 795.947445][T20405] netlink: 'syz.3.4587': attribute type 1 has an invalid length. [ 796.382153][T20411] netlink: 20 bytes leftover after parsing attributes in process `syz.9.4589'. [ 798.836609][T20436] tipc: Enabling of bearer rejected, already enabled [ 798.956905][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811a9b1c00: rx timeout, send abort [ 798.971702][T20446] netlink: 20 bytes leftover after parsing attributes in process `syz.5.4603'. [ 799.468753][T20469] syzkaller0: entered promiscuous mode [ 799.475615][T20469] syzkaller0: entered allmulticast mode [ 799.491444][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811b25aa00: rx timeout, send abort [ 799.499982][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811a9b1c00: abort rx timeout. Force session deactivation [ 799.571801][T20471] loop9: detected capacity change from 0 to 512 [ 799.598278][T20471] EXT4-fs: Ignoring removed oldalloc option [ 799.631403][T20471] EXT4-fs error (device loop9): ext4_get_branch:178: inode #11: block 4294967295: comm syz.9.4611: invalid block [ 799.664250][T20471] loop9: lost file I/O error report for ino 11 type 5 pos 0x0 len 0x0 error -117 [ 799.664457][T20471] EXT4-fs error (device loop9): ext4_free_branches:1023: inode #11: comm syz.9.4611: invalid indirect mapped block 4294967295 (level 1) [ 799.673760][ C1] EXT4-fs (loop9): error count since last fsck: 1 [ 799.673778][ C1] EXT4-fs (loop9): initial error at time 1774922691: ext4_get_branch:178: inode 11: block 4294967295 [ 799.673816][ C1] EXT4-fs (loop9): last error at time 1774922691: ext4_get_branch:178: inode 11: block 4294967295 [ 799.717618][T20471] loop9: lost file I/O error report for ino 11 type 5 pos 0x0 len 0x0 error -117 [ 799.717895][T20471] EXT4-fs error (device loop9): ext4_free_branches:1023: inode #11: comm syz.9.4611: invalid indirect mapped block 4294967295 (level 1) [ 799.741267][T20471] loop9: lost file I/O error report for ino 11 type 5 pos 0x0 len 0x0 error -117 [ 799.741567][T20471] EXT4-fs (loop9): 2 truncates cleaned up [ 799.759649][T20471] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 800.035520][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811b25aa00: abort rx timeout. Force session deactivation [ 800.291253][ T28] kauditd_printk_skb: 412 callbacks suppressed [ 800.291288][ T28] audit: type=1400 audit(1774922692.550:91981): avc: denied { create } for pid=20488 comm="syz.6.4615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 800.432166][ T28] audit: type=1400 audit(1774922692.587:91982): avc: denied { accept } for pid=20470 comm="syz.9.4611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 800.555662][ T28] audit: type=1400 audit(1774922692.597:91983): avc: denied { create } for pid=20489 comm="syz.5.4616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 800.675134][ T28] audit: type=1400 audit(1774922692.597:91984): avc: denied { accept } for pid=20470 comm="syz.9.4611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 800.739297][ C0] net_ratelimit: 44889 callbacks suppressed [ 800.739318][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 800.757595][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 800.769695][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 800.772598][ T28] audit: type=1400 audit(1774922692.643:91985): avc: denied { write } for pid=20489 comm="syz.5.4616" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 800.781860][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 800.814547][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 800.826796][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 800.838960][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 800.851204][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 800.863808][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 800.876248][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 800.962520][ T28] audit: type=1400 audit(1774922692.662:91986): avc: denied { write } for pid=20472 comm="syz.8.4609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 801.102866][ T28] audit: type=1400 audit(1774922692.662:91987): avc: denied { read } for pid=20489 comm="syz.5.4616" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 801.201167][ T28] audit: type=1400 audit(1774922692.718:91988): avc: denied { accept } for pid=20470 comm="syz.9.4611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 801.304052][ T28] audit: type=1400 audit(1774922692.774:91989): avc: denied { accept } for pid=20470 comm="syz.9.4611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 801.423339][ T28] audit: type=1400 audit(1774922692.784:91990): avc: denied { setopt } for pid=20488 comm="syz.6.4615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 802.089477][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811b101200: rx timeout, send abort [ 802.514929][T20474] EXT4-fs error (device loop9): ext4_validate_block_bitmap:432: comm ext4lazyinit: bg 0: block 5: invalid block bitmap [ 802.624015][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811ab28400: rx timeout, send abort [ 802.632314][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811b101200: abort rx timeout. Force session deactivation [ 803.166827][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811ab28400: abort rx timeout. Force session deactivation [ 803.309863][T17278] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 805.119042][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811b06b200: rx timeout, send abort [ 805.653599][ C1] vcan0: j1939_tp_rxtimer: 0xffff8881052fee00: rx timeout, send abort [ 805.661935][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811b06b200: abort rx timeout. Force session deactivation [ 805.681263][ T28] kauditd_printk_skb: 384 callbacks suppressed [ 805.681281][ T28] audit: type=1400 audit(1774922697.592:92375): avc: denied { accept } for pid=20608 comm="syz.6.4641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 805.741023][ T28] audit: type=1400 audit(1774922697.629:92376): avc: denied { accept } for pid=20608 comm="syz.6.4641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 805.761341][ T28] audit: type=1400 audit(1774922697.629:92377): avc: denied { accept } for pid=20608 comm="syz.6.4641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 805.782188][ T28] audit: type=1400 audit(1774922697.685:92378): avc: denied { kernel } for pid=20596 comm="syz.5.4635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 805.984120][ T28] audit: type=1400 audit(1774922697.854:92379): avc: denied { read write } for pid=17278 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 806.095507][ C0] net_ratelimit: 20690 callbacks suppressed [ 806.095532][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 806.113644][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 806.126054][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 806.138239][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 806.150763][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 806.162957][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 806.175554][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 806.187779][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 806.196417][ C1] vcan0: j1939_tp_rxtimer: 0xffff8881052fee00: abort rx timeout. Force session deactivation [ 806.200149][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 806.221959][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 806.249218][ T28] audit: type=1400 audit(1774922697.854:92380): avc: denied { read write open } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 806.454209][ T28] audit: type=1400 audit(1774922697.919:92381): avc: denied { ioctl } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 806.634060][ T28] audit: type=1400 audit(1774922697.919:92382): avc: denied { prog_load } for pid=20667 comm="syz.3.4643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 806.726427][ T28] audit: type=1400 audit(1774922698.022:92383): avc: denied { prog_load } for pid=20669 comm="syz.9.4644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 806.811567][ T28] audit: type=1400 audit(1774922698.022:92384): avc: denied { bpf } for pid=20669 comm="syz.9.4644" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 807.511136][T20697] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4652'. [ 807.760618][T20706] syzkaller0: entered promiscuous mode [ 807.772503][T20706] syzkaller0: entered allmulticast mode [ 809.040681][T20785] syzkaller0: entered promiscuous mode [ 809.046432][T20785] syzkaller0: entered allmulticast mode [ 809.160459][T20793] netlink: 20 bytes leftover after parsing attributes in process `syz.6.4666'. [ 809.339229][T20800] tipc: Started in network mode [ 809.348892][T20800] tipc: Node identity 00000000000000000000000000000001, cluster identity 4711 [ 809.359282][T20800] tipc: New replicast peer: 0000:0000:0000:0000:0000:0000:0000:0000 [ 809.368130][T20800] tipc: Enabled bearer , priority 10 [ 809.548399][T20803] syzkaller0: entered promiscuous mode [ 809.554018][T20803] syzkaller0: entered allmulticast mode [ 810.588104][T14888] tipc: Node number set to 1 [ 810.653578][T20832] syzkaller0: entered promiscuous mode [ 810.663209][T20832] syzkaller0: entered allmulticast mode [ 810.693372][T20841] netlink: 20 bytes leftover after parsing attributes in process `syz.8.4677'. [ 811.035679][ T28] kauditd_printk_skb: 458 callbacks suppressed [ 811.035696][ T28] audit: type=1400 audit(1774922702.605:92843): avc: denied { create } for pid=20856 comm="syz.9.4687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 811.133654][T20857] syzkaller0: entered promiscuous mode [ 811.139296][ T28] audit: type=1400 audit(1774922702.652:92844): avc: denied { create } for pid=20856 comm="syz.9.4687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 811.162849][T20857] syzkaller0: entered allmulticast mode [ 811.177243][ T28] audit: type=1400 audit(1774922702.652:92845): avc: denied { ioctl } for pid=20856 comm="syz.9.4687" path="socket:[82585]" dev="sockfs" ino=82585 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 811.228894][ T28] audit: type=1400 audit(1774922702.727:92846): avc: denied { setopt } for pid=20856 comm="syz.9.4687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 811.251723][ T28] audit: type=1400 audit(1774922702.727:92847): avc: denied { write } for pid=20856 comm="syz.9.4687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 811.277556][ T28] audit: type=1400 audit(1774922702.774:92848): avc: denied { create } for pid=20848 comm="syz.8.4683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 811.301164][ T28] audit: type=1400 audit(1774922702.774:92849): avc: denied { name_bind } for pid=20858 comm="syz.5.4688" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 811.325500][ T28] audit: type=1400 audit(1774922702.783:92850): avc: denied { write } for pid=20848 comm="syz.8.4683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 811.451513][ C0] net_ratelimit: 20600 callbacks suppressed [ 811.451531][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 811.455054][ T28] audit: type=1326 audit(1774922702.914:92851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20862 comm="syz.3.4690" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95435fc819 code=0x7ffc0000 [ 811.457619][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 811.484782][T20867] netlink: 20 bytes leftover after parsing attributes in process `syz.9.4691'. [ 811.493653][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 811.516010][ T28] audit: type=1326 audit(1774922702.914:92852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20862 comm="syz.3.4690" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95435fc819 code=0x7ffc0000 [ 811.526505][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 811.562582][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 811.574806][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 811.587253][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 811.599573][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 811.612032][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 811.624289][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 811.915459][T20882] sch_tbf: burst 555 is lower than device syzkaller0 mtu (1500) ! [ 811.961481][T20882] tipc: Enabled bearer , priority 0 [ 814.233893][ T4648] tipc: Resetting bearer [ 814.241642][T20913] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4703'. [ 814.605096][T20916] tipc: Resetting bearer [ 814.626021][T20915] tipc: Resetting bearer [ 814.935768][T20923] syzkaller0: entered promiscuous mode [ 814.941507][T20923] syzkaller0: entered allmulticast mode [ 815.443744][ T4646] tipc: Resetting bearer [ 816.807583][ C0] net_ratelimit: 17478 callbacks suppressed [ 816.807640][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 816.825822][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 816.838464][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 816.850645][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 816.863249][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 816.875442][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 816.888003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 816.894388][ T28] kauditd_printk_skb: 455 callbacks suppressed [ 816.894457][ T28] audit: type=1400 audit(1774922707.245:93269): avc: denied { execmem } for pid=20963 comm="syz.5.4718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 816.900297][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 816.926519][ T28] audit: type=1400 audit(1774922708.096:93270): avc: denied { create } for pid=20955 comm="syz.6.4717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 816.938142][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 816.970861][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 820.265528][ T28] audit: type=1400 audit(1774922708.096:93271): avc: denied { write } for pid=20955 comm="syz.6.4717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 820.287260][ T28] audit: type=1400 audit(1774922709.097:93272): avc: denied { prog_load } for pid=20955 comm="syz.6.4717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 820.307154][ T28] audit: type=1400 audit(1774922709.097:93273): avc: denied { bpf } for pid=20955 comm="syz.6.4717" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 821.302216][ T28] audit: type=1400 audit(1774922709.097:93274): avc: denied { perfmon } for pid=20955 comm="syz.6.4717" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 821.323446][ T28] audit: type=1400 audit(1774922709.097:93275): avc: denied { prog_load } for pid=20955 comm="syz.6.4717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 821.520299][ T28] audit: type=1400 audit(1774922709.106:93276): avc: denied { create } for pid=20955 comm="syz.6.4717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 821.548471][ T28] audit: type=1400 audit(1774922711.118:93277): avc: denied { create } for pid=20968 comm="syz.8.4719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 821.569951][ T28] audit: type=1400 audit(1774922711.118:93278): avc: denied { write } for pid=20968 comm="syz.8.4719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 822.013519][T20975] netlink: 68 bytes leftover after parsing attributes in process `syz.9.4720'. [ 822.163268][ C0] net_ratelimit: 17556 callbacks suppressed [ 822.163287][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 822.181578][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.193852][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.206360][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 822.218723][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.230993][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.243553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 822.247803][ T28] kauditd_printk_skb: 24 callbacks suppressed [ 822.247818][ T28] audit: type=1400 audit(1774922713.091:93303): avc: denied { module_request } for pid=20974 comm="syz.9.4720" kmod="crypto-xcbc(aes)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 822.255882][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.296693][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.300643][ T28] audit: type=1400 audit(1774922713.138:93304): avc: denied { module_request } for pid=20974 comm="syz.9.4720" kmod="crypto-hmac(sm3)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 822.308926][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 822.373830][ T28] audit: type=1400 audit(1774922713.185:93305): avc: denied { module_request } for pid=20974 comm="syz.9.4720" kmod="crypto-hmac(sm3)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 822.429733][ T28] audit: type=1400 audit(1774922713.250:93306): avc: denied { prog_load } for pid=20993 comm="syz.8.4721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 822.474856][ T28] audit: type=1400 audit(1774922713.250:93307): avc: denied { bpf } for pid=20993 comm="syz.8.4721" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 822.516069][ T28] audit: type=1400 audit(1774922713.288:93308): avc: denied { module_request } for pid=20974 comm="syz.9.4720" kmod="crypto-ecb(cipher_null)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 822.551789][ T28] audit: type=1400 audit(1774922713.325:93309): avc: denied { module_request } for pid=20974 comm="syz.9.4720" kmod="crypto-ecb(cipher_null)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 822.654820][ T28] audit: type=1400 audit(1774922713.465:93310): avc: denied { module_request } for pid=20974 comm="syz.9.4720" kmod="crypto-cbc(des)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 822.710839][ T28] audit: type=1400 audit(1774922713.503:93311): avc: denied { module_request } for pid=20974 comm="syz.9.4720" kmod="crypto-cbc(des)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 822.759460][ T28] audit: type=1400 audit(1774922713.550:93312): avc: denied { open } for pid=21005 comm="syz.8.4722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 824.024203][ T7654] lo speed is unknown, defaulting to 1000 [ 824.029976][ T7654] syz2: Port: 1 Link ACTIVE [ 824.399300][T21046] netlink: 'syz.3.4723': attribute type 24 has an invalid length. [ 824.437725][T21052] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4725'. [ 824.636552][T21058] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4727'. [ 824.947992][T21069] ipt_REJECT: TCP_RESET invalid for non-tcp [ 827.519322][ C0] net_ratelimit: 19989 callbacks suppressed [ 827.519339][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.537490][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.549663][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 827.561934][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.574055][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.586260][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 827.598500][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.610682][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.622841][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 827.635462][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.813429][T21091] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4735'. [ 827.940961][T21063] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 827.955452][ T28] kauditd_printk_skb: 141 callbacks suppressed [ 827.955469][ T28] audit: type=1400 audit(1774922718.423:93454): avc: denied { read } for pid=21082 comm="syz.8.4733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 828.097065][ T28] audit: type=1400 audit(1774922718.479:93455): avc: denied { read } for pid=21082 comm="syz.8.4733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 828.280558][ T28] audit: type=1400 audit(1774922718.545:93457): avc: denied { open } for pid=21095 comm="syz.5.4736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 828.318559][T21100] netlink: 'syz.9.4738': attribute type 25 has an invalid length. [ 828.330287][ T28] audit: type=1400 audit(1774922718.545:93458): avc: denied { perfmon } for pid=21095 comm="syz.5.4736" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 828.354395][ T28] audit: type=1400 audit(1774922718.545:93459): avc: denied { kernel } for pid=21095 comm="syz.5.4736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 828.378987][ T28] audit: type=1400 audit(1774922718.535:93456): avc: denied { read write } for pid=17278 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 828.407892][ T28] audit: type=1400 audit(1774922718.545:93461): avc: denied { read write open } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 828.450338][T21103] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4737'. [ 828.498277][ T28] audit: type=1400 audit(1774922718.545:93462): avc: denied { ioctl } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 828.533355][ T28] audit: type=1400 audit(1774922718.545:93460): avc: denied { perfmon } for pid=21095 comm="syz.5.4736" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 828.556079][ T28] audit: type=1400 audit(1774922718.610:93463): avc: denied { execmem } for pid=21095 comm="syz.5.4736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 828.632887][T21106] netlink: 20 bytes leftover after parsing attributes in process `syz.8.4739'. [ 829.976227][T21129] netlink: 104 bytes leftover after parsing attributes in process `syz.3.4745'. [ 832.875357][ C0] net_ratelimit: 19249 callbacks suppressed [ 832.875376][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.893488][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.905728][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 832.917889][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 832.930208][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.942485][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.955002][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 832.967204][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 832.979649][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.991841][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 833.111813][T21164] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4756'. [ 833.248558][T21168] netlink: 20 bytes leftover after parsing attributes in process `syz.6.4759'. [ 833.309531][ T28] kauditd_printk_skb: 243 callbacks suppressed [ 833.309551][ T28] audit: type=1400 audit(1774922723.437:93707): avc: denied { allowed } for pid=21169 comm="syz.9.4758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 833.336705][T21134] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 833.403843][ T28] audit: type=1400 audit(1774922723.455:93708): avc: denied { perfmon } for pid=21169 comm="syz.9.4758" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 833.502664][ T28] audit: type=1400 audit(1774922723.484:93709): avc: denied { create } for pid=21169 comm="syz.9.4758" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 833.556476][ T28] audit: type=1400 audit(1774922723.484:93710): avc: denied { kernel } for pid=21169 comm="syz.9.4758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 833.581679][ T28] audit: type=1400 audit(1774922723.502:93711): avc: denied { map_create } for pid=21167 comm="syz.6.4759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 833.607310][ T28] audit: type=1400 audit(1774922723.502:93712): avc: denied { allowed } for pid=21167 comm="syz.6.4759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 833.631429][T21176] tipc: Resetting bearer [ 833.647057][ T28] audit: type=1400 audit(1774922723.502:93713): avc: denied { create } for pid=21167 comm="syz.6.4759" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 833.672712][ T28] audit: type=1400 audit(1774922723.512:93714): avc: denied { create } for pid=21167 comm="syz.6.4759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 833.692982][T21175] tipc: Resetting bearer [ 833.737500][ T28] audit: type=1400 audit(1774922723.549:93715): avc: denied { module_request } for pid=21169 comm="syz.9.4758" kmod="bpf_preload" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 833.770952][T21183] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4762'. [ 833.782245][ T28] audit: type=1400 audit(1774922723.586:93716): avc: denied { perfmon } for pid=21169 comm="syz.9.4758" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 834.022514][T21190] syzkaller0: entered promiscuous mode [ 834.034338][T21190] syzkaller0: entered allmulticast mode [ 834.047463][T21190] tipc: Started in network mode [ 834.053392][T21190] tipc: Node identity 7aa6f5ed59ea, cluster identity 4711 [ 834.063255][T21190] tipc: Enabled bearer , priority 0 [ 834.092527][T21189] tipc: Resetting bearer [ 834.124513][T21189] tipc: Disabling bearer [ 834.304313][T21201] netlink: 8 bytes leftover after parsing attributes in process `syz.8.4767'. [ 834.604944][T21208] syzkaller0: entered promiscuous mode [ 834.610852][T21208] syzkaller0: entered allmulticast mode [ 835.242633][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811b0e0800: rx timeout, send abort [ 835.546877][ T4648] tipc: Resetting bearer [ 835.777191][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811a9b8200: rx timeout, send abort [ 835.786096][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811b0e0800: abort rx timeout. Force session deactivation [ 835.858799][T21223] netlink: 20 bytes leftover after parsing attributes in process `syz.9.4779'. [ 835.934940][T21228] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4780'. [ 836.320090][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811a9b8200: abort rx timeout. Force session deactivation [ 838.244974][ C0] net_ratelimit: 15744 callbacks suppressed [ 838.245031][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 838.277701][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 838.312682][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 838.336286][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 838.359196][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 838.379914][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 838.409779][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 838.432726][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 838.462414][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 838.478065][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 839.242288][ T28] kauditd_printk_skb: 203 callbacks suppressed [ 839.242309][ T28] audit: type=1400 audit(1774922728.179:93920): avc: denied { create } for pid=21245 comm="syz.3.4784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 841.060920][ T28] audit: type=1400 audit(1774922729.919:93921): avc: denied { map_create } for pid=21245 comm="syz.3.4784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 841.081230][ T28] audit: type=1400 audit(1774922729.919:93922): avc: denied { write } for pid=21245 comm="syz.3.4784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 841.122810][ T28] audit: type=1400 audit(1774922730.724:93923): avc: denied { create } for pid=21249 comm="syz.3.4785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 841.174309][ T28] audit: type=1400 audit(1774922730.733:93924): avc: denied { write } for pid=21249 comm="syz.3.4785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 841.222418][ T28] audit: type=1400 audit(1774922730.733:93925): avc: denied { nlmsg_write } for pid=21249 comm="syz.3.4785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 841.268623][ T28] audit: type=1400 audit(1774922730.733:93926): avc: denied { create } for pid=21249 comm="syz.3.4785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 841.317730][ T28] audit: type=1400 audit(1774922730.733:93927): avc: denied { write } for pid=21249 comm="syz.3.4785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 841.351193][ T28] audit: type=1400 audit(1774922730.733:93928): avc: denied { module_request } for pid=21249 comm="syz.3.4785" kmod="crypto-digest_null" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 841.392783][ T28] audit: type=1400 audit(1774922730.761:93929): avc: denied { module_request } for pid=21249 comm="syz.3.4785" kmod="crypto-digest_null-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 842.966428][T21330] syzkaller0: entered promiscuous mode [ 842.972470][T21330] syzkaller0: entered allmulticast mode [ 843.503136][T21344] netlink: 104 bytes leftover after parsing attributes in process `syz.8.4791'. [ 843.598137][ C0] net_ratelimit: 6246 callbacks suppressed [ 843.598160][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 843.616141][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 843.628474][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 843.640723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 843.652974][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 843.665244][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 843.677669][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 843.689858][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 843.702157][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 843.714330][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 844.114488][T21375] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4797'. [ 844.524670][T21402] syzkaller0: entered promiscuous mode [ 844.535940][T21402] syzkaller0: entered allmulticast mode [ 844.592827][ T28] kauditd_printk_skb: 104 callbacks suppressed [ 844.592846][ T28] audit: type=1400 audit(1774922733.997:94034): avc: denied { module_request } for pid=21353 comm="syz.8.4796" kmod="crypto-cbc(des3_ede)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 844.936817][ T28] audit: type=1400 audit(1774922734.035:94035): avc: denied { module_request } for pid=21353 comm="syz.8.4796" kmod="crypto-cbc(cast5)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 845.248451][ T28] audit: type=1400 audit(1774922734.035:94036): avc: denied { module_request } for pid=21353 comm="syz.8.4796" kmod="crypto-cbc(cast5)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 845.316527][T21441] netlink: 104 bytes leftover after parsing attributes in process `syz.9.4803'. [ 845.354207][ T28] audit: type=1400 audit(1774922734.044:94037): avc: denied { perfmon } for pid=21324 comm="syz.3.4786" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 845.449221][ T28] audit: type=1400 audit(1774922734.428:94038): avc: denied { read write } for pid=17278 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 845.487056][T21447] netlink: 12 bytes leftover after parsing attributes in process `syz.9.4806'. [ 845.549962][ T28] audit: type=1400 audit(1774922734.428:94039): avc: denied { open } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 845.628299][ T28] audit: type=1400 audit(1774922734.428:94040): avc: denied { ioctl } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 845.664951][ T28] audit: type=1400 audit(1774922734.549:94041): avc: denied { create } for pid=21437 comm="syz.9.4802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 845.703253][ T28] audit: type=1400 audit(1774922734.568:94042): avc: denied { write } for pid=21437 comm="syz.9.4802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 845.734767][ T28] audit: type=1400 audit(1774922734.596:94043): avc: denied { read write } for pid=17278 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 845.911498][T21454] netlink: 8 bytes leftover after parsing attributes in process `syz.8.4808'. [ 848.953906][ C1] net_ratelimit: 49928 callbacks suppressed [ 848.953906][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 848.953925][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 848.954047][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 848.960110][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 848.971991][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 848.983914][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 848.995829][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 849.007961][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 849.019900][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 849.031803][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 853.124553][ T28] kauditd_printk_skb: 54 callbacks suppressed [ 853.124576][ T28] audit: type=1400 audit(1774922741.827:94098): avc: denied { read write } for pid=17278 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 853.904363][ T28] audit: type=1400 audit(1774922742.070:94099): avc: denied { open } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 854.309954][ C0] net_ratelimit: 65851 callbacks suppressed [ 854.309975][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 854.310030][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 854.316001][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 854.328026][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 854.340122][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 854.351966][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 854.364461][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 854.376245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 854.388455][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 854.400301][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 854.558644][ T28] audit: type=1400 audit(1774922742.351:94100): avc: denied { ioctl } for pid=17278 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 859.665888][ C0] net_ratelimit: 53959 callbacks suppressed [ 859.665914][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 859.665977][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 859.672057][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 859.684008][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 859.695845][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 859.707873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 859.720047][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 859.732164][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 859.743947][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 859.755795][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 861.551230][ T28] audit: type=1400 audit(1774922749.834:94101): avc: denied { create } for pid=21479 comm="syz.3.4811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 861.997952][ T28] audit: type=1400 audit(1774922750.236:94102): avc: denied { create } for pid=21479 comm="syz.3.4811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 862.477710][ T28] audit: type=1400 audit(1774922750.479:94103): avc: denied { execmem } for pid=21480 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 863.763034][ T28] audit: type=1400 audit(1774922751.910:94104): avc: denied { read } for pid=21488 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 864.110007][ T28] audit: type=1400 audit(1774922752.069:94105): avc: denied { read open } for pid=21488 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 864.682989][ T28] audit: type=1400 audit(1774922752.284:94106): avc: denied { mounton } for pid=21488 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 865.021880][ C0] net_ratelimit: 51144 callbacks suppressed [ 865.021903][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 865.022053][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 865.027980][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 865.039872][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 865.051887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 865.063913][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 865.075744][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 865.087837][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 865.099966][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 865.111958][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 865.399586][ T28] audit: type=1400 audit(1774922752.546:94107): avc: denied { module_request } for pid=21488 comm="syz-executor" kmod="netdev-nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 866.234539][ T28] audit: type=1400 audit(1774922754.230:94108): avc: denied { sys_module } for pid=21488 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 866.842032][ T28] audit: type=1400 audit(1774922754.370:94109): avc: denied { module_request } for pid=21488 comm="syz-executor" kmod="nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 867.876121][ T28] audit: type=1400 audit(1774922755.717:94110): avc: denied { execmem } for pid=21492 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 868.960613][ T28] audit: type=1400 audit(1774922756.784:94111): avc: denied { create } for pid=21493 comm="syz.6.4812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 869.877921][T21495] netlink: 20 bytes leftover after parsing attributes in process `syz.6.4812'. [ 870.112724][ T28] audit: type=1400 audit(1774922757.850:94112): avc: denied { open } for pid=21493 comm="syz.6.4812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 870.377878][ C0] net_ratelimit: 52231 callbacks suppressed [ 870.377903][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 870.377988][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 870.383926][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 870.396299][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 870.408191][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 870.420005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 870.431912][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 870.443792][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 870.455782][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 870.467651][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 870.712402][ T28] audit: type=1400 audit(1774922758.103:94113): avc: denied { execmem } for pid=21497 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 871.288534][ T28] audit: type=1400 audit(1774922758.262:94114): avc: denied { allowed } for pid=21493 comm="syz.6.4812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 871.866180][ T28] audit: type=1400 audit(1774922758.299:94115): avc: denied { prog_load } for pid=21496 comm="syz.9.4814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 872.310556][ T28] audit: type=1400 audit(1774922758.318:94116): avc: denied { perfmon } for pid=21493 comm="syz.6.4812" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 872.859181][ T28] audit: type=1400 audit(1774922758.411:94117): avc: denied { bpf } for pid=21496 comm="syz.9.4814" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 873.425558][ T28] audit: type=1400 audit(1774922758.496:94118): avc: denied { kernel } for pid=21493 comm="syz.6.4812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 873.972484][ T28] audit: type=1400 audit(1774922758.505:94119): avc: denied { create } for pid=21493 comm="syz.6.4812" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 874.493798][ T28] audit: type=1400 audit(1774922758.533:94120): avc: denied { perfmon } for pid=21496 comm="syz.9.4814" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 874.955543][ T28] audit: type=1400 audit(1774922758.552:94121): avc: denied { map_create } for pid=21493 comm="syz.6.4812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 875.394068][ T28] audit: type=1400 audit(1774922758.608:94122): avc: denied { allowed } for pid=21493 comm="syz.6.4812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 875.733951][ C1] net_ratelimit: 51741 callbacks suppressed [ 875.733971][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 875.734150][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 875.740040][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 875.752065][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 875.764263][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 875.776115][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 875.787900][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 875.799857][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 875.811802][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 875.823725][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 875.970992][ T28] audit: type=1400 audit(1774922758.617:94123): avc: denied { create } for pid=21496 comm="syz.9.4814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 876.356759][ T28] audit: type=1400 audit(1774922758.729:94124): avc: denied { create } for pid=21493 comm="syz.6.4812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 876.771183][ T28] audit: type=1400 audit(1774922758.842:94125): avc: denied { create } for pid=21493 comm="syz.6.4812" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 877.410650][ T28] audit: type=1400 audit(1774922759.169:94126): avc: denied { setopt } for pid=21496 comm="syz.9.4814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 877.882557][ T28] audit: type=1400 audit(1774922759.590:94127): avc: denied { read } for pid=21504 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 880.708919][ T28] kauditd_printk_skb: 12 callbacks suppressed [ 880.708940][ T28] audit: type=1400 audit(1774922767.765:94140): avc: denied { execmem } for pid=21512 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 881.089933][ C1] net_ratelimit: 54823 callbacks suppressed [ 881.089961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 881.090055][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 881.096066][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 881.108449][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 881.120471][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 881.132615][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 881.144385][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 881.156278][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 881.168166][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 881.180284][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 884.247081][ T28] audit: type=1400 audit(1774922771.086:94141): avc: denied { execmem } for pid=21514 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 884.673085][ T28] audit: type=1400 audit(1774922771.413:94142): avc: denied { read } for pid=21515 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 885.305839][ T28] audit: type=1400 audit(1774922771.535:94143): avc: denied { open } for pid=21515 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 886.030446][ T28] audit: type=1400 audit(1774922771.806:94144): avc: denied { mounton } for pid=21515 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 886.445882][ C0] net_ratelimit: 56033 callbacks suppressed [ 886.445905][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 886.445958][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 886.452074][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 886.463911][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 886.475835][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 886.487668][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 886.499790][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 886.511655][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 886.523514][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 886.535523][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 886.668167][ T28] audit: type=1400 audit(1774922772.012:94145): avc: denied { module_request } for pid=21515 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 887.297676][ T28] audit: type=1400 audit(1774922772.676:94146): avc: denied { sys_module } for pid=21515 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 887.953867][ T28] audit: type=1400 audit(1774922772.882:94147): avc: denied { module_request } for pid=21515 comm="syz-executor" kmod="nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 888.670999][ T28] audit: type=1400 audit(1774922773.266:94148): avc: denied { read } for pid=21517 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 889.175236][ T28] audit: type=1400 audit(1774922773.481:94149): avc: denied { read open } for pid=21517 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 889.814523][ T28] audit: type=1400 audit(1774922773.565:94150): avc: denied { mounton } for pid=21517 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 890.542721][ T28] audit: type=1400 audit(1774922773.705:94151): avc: denied { module_request } for pid=21517 comm="syz-executor" kmod="netdev-nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 891.045963][ T28] audit: type=1400 audit(1774922774.837:94152): avc: denied { sys_module } for pid=21517 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 891.396280][ T28] audit: type=1400 audit(1774922775.202:94153): avc: denied { module_request } for pid=21517 comm="syz-executor" kmod="nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 891.801919][ C0] net_ratelimit: 54547 callbacks suppressed [ 891.801941][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 891.802018][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 891.808044][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 891.819975][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 891.831954][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 891.843798][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 891.855834][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 891.868181][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 891.879923][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 891.891701][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 897.157840][ C1] net_ratelimit: 53213 callbacks suppressed [ 897.157861][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 897.158028][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 897.163942][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 897.175804][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 897.188030][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 897.199957][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 897.211866][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 897.223670][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 897.235601][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 897.247524][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 899.221214][ C0] ================================================================== [ 899.229356][ C0] BUG: KCSAN: data-race in wq_worker_tick / wq_worker_tick [ 899.236599][ C0] [ 899.238932][ C0] read-write to 0xffff8881000c5cd8 of 8 bytes by interrupt on cpu 1: [ 899.247010][ C0] wq_worker_tick+0x64/0x240 [ 899.251628][ C0] sched_tick+0xda/0x210 [ 899.255886][ C0] update_process_times+0x15e/0x190 [ 899.261293][ C0] tick_nohz_handler+0x275/0x3d0 [ 899.266265][ C0] __hrtimer_run_queues+0x218/0x4f0 [ 899.271484][ C0] hrtimer_interrupt+0x269/0x810 [ 899.276449][ C0] __sysvec_apic_timer_interrupt+0x5f/0x1f0 [ 899.282362][ C0] sysvec_apic_timer_interrupt+0x32/0x80 [ 899.288017][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 899.294045][ C0] find_match+0x3b/0x780 [ 899.298319][ C0] __find_rr_leaf+0x160/0x500 [ 899.303027][ C0] fib6_table_lookup+0x1db/0x640 [ 899.307986][ C0] ip6_pol_route+0xbf/0xeb0 [ 899.312513][ C0] ip6_pol_route_input+0x42/0x60 [ 899.317556][ C0] fib6_rule_lookup+0x366/0x4c0 [ 899.322430][ C0] ip6_route_input+0x512/0x620 [ 899.327304][ C0] ip6_rcv_finish+0x1be/0x330 [ 899.332024][ C0] ipv6_rcv+0x72/0x170 [ 899.336122][ C0] process_backlog+0x2a5/0x670 [ 899.340912][ C0] __napi_poll+0x61/0x330 [ 899.345258][ C0] net_rx_action+0x452/0x930 [ 899.349868][ C0] handle_softirqs+0xb9/0x2a0 [ 899.354566][ C0] do_softirq+0x45/0x60 [ 899.358827][ C0] __local_bh_enable_ip+0x70/0x80 [ 899.363885][ C0] __alloc_skb+0x658/0x690 [ 899.368329][ C0] nsim_dev_trap_report_work+0x18a/0x630 [ 899.373986][ C0] process_scheduled_works+0x513/0xa10 [ 899.379471][ C0] worker_thread+0x58a/0x780 [ 899.384087][ C0] kthread+0x22a/0x280 [ 899.388168][ C0] ret_from_fork+0x150/0x360 [ 899.392783][ C0] ret_from_fork_asm+0x1a/0x30 [ 899.397570][ C0] [ 899.399907][ C0] read-write to 0xffff8881000c5cd8 of 8 bytes by interrupt on cpu 0: [ 899.407991][ C0] wq_worker_tick+0x64/0x240 [ 899.412629][ C0] sched_tick+0xda/0x210 [ 899.416894][ C0] update_process_times+0x15e/0x190 [ 899.422124][ C0] tick_nohz_handler+0x275/0x3d0 [ 899.427089][ C0] __hrtimer_run_queues+0x218/0x4f0 [ 899.432310][ C0] hrtimer_interrupt+0x269/0x810 [ 899.437278][ C0] __sysvec_apic_timer_interrupt+0x5f/0x1f0 [ 899.443204][ C0] sysvec_apic_timer_interrupt+0x32/0x80 [ 899.448863][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 899.454860][ C0] __sanitizer_cov_trace_const_cmp4+0x8/0x90 [ 899.460864][ C0] __br_forward+0x295/0x360 [ 899.465391][ C0] br_flood+0x588/0x6d0 [ 899.469567][ C0] br_handle_frame_finish+0xdd2/0xff0 [ 899.474957][ C0] br_nf_hook_thresh+0x233/0x270 [ 899.479916][ C0] br_nf_pre_routing_finish_ipv6+0x550/0x580 [ 899.485944][ C0] br_nf_pre_routing_ipv6+0x1fa/0x2e0 [ 899.491336][ C0] br_nf_pre_routing+0x56a/0xbe0 [ 899.496299][ C0] br_handle_frame+0x85f/0xa60 [ 899.501081][ C0] __netif_receive_skb_core+0x5b1/0x1980 [ 899.506739][ C0] process_backlog+0x25b/0x670 [ 899.511525][ C0] __napi_poll+0x61/0x330 [ 899.515863][ C0] net_rx_action+0x452/0x930 [ 899.520483][ C0] handle_softirqs+0xb9/0x2a0 [ 899.525174][ C0] do_softirq+0x45/0x60 [ 899.529346][ C0] __local_bh_enable_ip+0x70/0x80 [ 899.534383][ C0] __alloc_skb+0x658/0x690 [ 899.538909][ C0] nsim_dev_trap_report_work+0x18a/0x630 [ 899.544560][ C0] process_scheduled_works+0x513/0xa10 [ 899.550049][ C0] worker_thread+0x58a/0x780 [ 899.554671][ C0] kthread+0x22a/0x280 [ 899.558754][ C0] ret_from_fork+0x150/0x360 [ 899.563393][ C0] ret_from_fork_asm+0x1a/0x30 [ 899.568189][ C0] [ 899.570543][ C0] value changed: 0x0000000000d689e0 -> 0x0000000000d6b0f0 [ 899.577662][ C0] [ 899.580006][ C0] Reported by Kernel Concurrency Sanitizer on: [ 899.586170][ C0] CPU: 0 UID: 0 PID: 4668 Comm: kworker/u8:24 Not tainted syzkaller #0 PREEMPT(full) [ 899.595749][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 899.605835][ C0] Workqueue: events_unbound nsim_dev_trap_report_work [ 899.612633][ C0] ================================================================== [ 902.513874][ C0] net_ratelimit: 51861 callbacks suppressed [ 902.513895][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 902.514045][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 902.519912][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 902.532108][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 902.544188][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 902.555924][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 902.568098][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 902.580135][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 902.592079][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 902.604035][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 907.869886][ C0] net_ratelimit: 56141 callbacks suppressed [ 907.869909][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 907.869973][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 907.875973][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 907.888032][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 907.900197][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 907.912315][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 907.924228][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0) [ 907.936096][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 907.948175][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 907.960208][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:26:ab:5c:e7:31, vlan:0)