last executing test programs: 2.431017109s ago: executing program 4 (id=8): syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000040)='./file0\x00', 0xcc04, &(0x7f0000000880)=ANY=[@ANYBLOB='dots,gid=', @ANYRESHEX=0xee01, @ANYRES8=0x0], 0x1, 0x209, &(0x7f0000000200)="$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") r0 = creat(&(0x7f0000000040)='./file7\x00', 0x1a2) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x1, 0x8, 0x5, 0x0, 0xfdfd}) 2.299272997s ago: executing program 4 (id=12): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4fb5b6f85a83c771}, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/mcfilter6\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000140)=""/196, 0xc4}], 0x1, 0x200000, 0x0) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r5, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x10, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r5, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYRESHEX], 0x190) syz_emit_ethernet(0x66, &(0x7f0000000540)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa86dd6000000000303a20d6d39c2cf791086227ab6483a100fe8000000000000000000000000000bbff02000000000000000000000000000102009078000005dc608cb02b00002f000000000004000000000000000000000100"/116], 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x9, 0x3, 0x6, 0x6009}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000002080)={0x0, 0x2}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}], 0x10) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="1400000017000b63d25a80648c2594f917a3c92b", 0x14}], 0x1}, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000440)=[{0x20, 0x3, 0x81, 0xfffff034}, {0x20, 0x0, 0x0, 0xc00}, {0x6}]}, 0x10) r8 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000040)={'veth0_macvtap\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1c, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000480)={'nat\x00', 0x0, 0x0, 0x0, [0x7fff, 0x2, 0x7, 0x9, 0x8000000000000001, 0x3]}, &(0x7f0000000500)=0x78) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8002, &(0x7f00000000c0), 0x1, 0x4b4, &(0x7f0000000c80)="$eJzs3E9sFNUfAPDvbHdpgR8/KiIKoi6isdHYQkHh4AWjiQdMjHjQY9MWghRqaE2EECmJwaMh8W48evXgVb0ZTyZe8WhiSIjhAnhaM7sz7e52t//Y7oL7+SRL35t9s+99982bfTNvlwD6Vjn9J4n4X0TcjIidtWxjgXLtz707Vybv37kyGQuVyqm/k2q5u2k+k++3PcuMFCIKXyRNL1gzd+nyuYmZmemLWX5s/vwnY3OXLr969vzEmekz0xfGjx8/euTwsdfHX1t/UC3qS+O6u+/z2f173/noxruTxXz7UPa3Po5OKUe5VVOqXux0ZT22oy6dFHvYENZlICLS7ipVx//OGAidB/2iUqlUBts/vVBpdm3ZFuCRlUSvWwD0Rv5Bn17/5o8uTT0eCrdP1C6A0rjvZY/aM8UoZGVKTde3nTQUER8u/PNN+ohNug8BAFDvpxP5TLB5/leIPXXl/p+toQxHxGMRsSsiHo+I3RHxRES17JMR8VTT65cjorJC/eWm/PL5T+HWAwW4inT+90a2ttU4/8tnfzE8kOV2ROQT5ulD2XsyEqXB02dnpg+vUMfPb/3+VbvnynXzv/SR1p/PBbN23Co23aCbmpif2HDATW5fi9hXbI4/KUYkiysBSUTsjYh963jd4br02Ze/27+YKTWWWz3+qkrLdbQOLFVUvo14qdb/C9HQ/0s1JiuvT44Nxcz0obH0KDjUso5ff7v+Xrv6V43/hz+bd3n72I+nHjTsRWn/b6s7/iNfv12KfziJSBbXa+fWX8f1P75se02ztuP/asM+6fG/Jfmgmt6SbftsYn7+4uGILcnJ5dvHl/bN83n5NP6Rg63H/65sn/SdeDoi0oP4mYh4NiKey9p+ICKej4iDK8T/y5svfLzx+DdXGv9Uy/NfQ/8vrdfPncwTl9aaGDh34Ob9NiePtfX/0WpqJNvS+vyXNJwi1trADryFAAAA8NArRPW7/4XRxXShMDpauwe0O7YVZmbn5l85PfvphanabwSGo1TI73TV7geXkvz+53BdfrwpfyS7b/z1wNZqfnRydmaq18FDn9teHfPJsvGf+mug160DNp2f/ED/Wm3877nRpYYAXefzH/pX3fhfaFNkwTdl4L+p9ed/qevtALqv1fi/uoF9gEdLxViGvmb8Q/8qxvuL6UJPWwJ0m89/6Etr/xX/RhKVwdZPDcXywjG0Oc3Y2qKuniTSmVVPat+6kb3y/02hbZkorPY6xYZjbDCWlxmInvTFmT0dP/gr2XflO93U71cep/l0fRPeqO6ehwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADbLvwEAAP//cdfX0w==") r10 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x1c9441, 0x0) pwrite64(r10, &(0x7f00000000c0)='a', 0x1, 0x9400) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7902009875f37538e486dd6317ce62667f2c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa88"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r9, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) sendto$inet6(r0, &(0x7f0000000280)="b2", 0x2a000, 0x4040854, &(0x7f0000000300)={0xa, 0x4e21, 0xbf7, @loopback, 0x800000c0}, 0x1c) 1.907089839s ago: executing program 4 (id=19): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffffff, 0x2}, 0x106020, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000080), 0x1000000) write$binfmt_register(0xffffffffffffffff, &(0x7f0000000300)={0x3a, 'syz2', 0x3a, 'M', 0x3a, 0x8000011000000009, 0x3a, 'B\xd4GGI\x82\\4\xbb\xbb\xbb\xb3\xd4)\xed\x8f\xaa\xf4\xd2{\xc5\t\xa9\xed\xf8e\xaa\xb9\xf5\r\xe3T\x0e\x8a\xd6\x9a_?G\x05\x00\x00\x00\x00\x00\x00\x00\x1e\x9a\xce\xac&x3\x15\x14y\xbf\xc6)\xa8\b/\x01\x00\x00\f\x8e1\xc4\xa1\xb2]I\xa5\x13}9\x1b0x0}) sendto$packet(r2, &(0x7f00000002c0)="05031600d3fc140000004788031c09102c28", 0xfce0, 0x4, &(0x7f0000000140)={0x11, 0x86dd, r3, 0x1, 0x0, 0x6, @multicast}, 0x14) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000011008188040f46ecdb00e3bd6efb4400080000000a000f00000aba8000001201", 0x24}, {&(0x7f0000000200)="cc182c338cba61617516", 0xa}], 0x2}, 0x0) capset(&(0x7f0000000380)={0x20080522}, &(0x7f0000000040)={0x200000, 0x40200003, 0x0, 0x6, 0x7}) ioctl$SNDRV_TIMER_IOCTL_TREAD_OLD(0xffffffffffffffff, 0x40045402, &(0x7f0000000140)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f00000083c0)={{0xffffffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f00000000c0)={0x7, 0x9dc5, 0x0, 0x0, 0xf}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x44, 0x6, 0x508, 0x98, 0x3a0, 0x138, 0x138, 0x98, 0x470, 0x470, 0x470, 0x470, 0x470, 0x6, 0x0, {[{{@ip={@rand_addr=0x64010101, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'batadv0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xa8, 0xd0, 0x0, {}, [@common=@unspec=@statistic={{0x38}, {0x0, 0x0, 0x4, 0x400, 0xf8c, {0x7}}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'virt_wifi0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x568) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000140081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d", 0x24}], 0x1}, 0x0) r6 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000040)='bond0\x00', 0x10) r7 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000580), 0xad81, 0x0) ioctl$PTP_CLOCK_GETCAPS(r7, 0x80503d01, &(0x7f00000005c0)) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, &(0x7f00000001c0)=0xc796, 0x4) 1.341345522s ago: executing program 4 (id=24): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mlockall(0x7) r1 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r1) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f00000001c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x8, 0x4, 0x8, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0xc, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xaa9a}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x1d}}]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x6, [@const={0x9, 0x0, 0x0, 0xa, 0x1}, @ptr={0xd, 0x0, 0x0, 0x2, 0x4}, @union={0x0, 0x5, 0x0, 0x5, 0x1, 0x10000, [{0x4, 0x3, 0x1}, {0x4, 0x2, 0x2}, {0xe, 0x1, 0x4}, {0x6, 0x5, 0x1}, {0xd, 0x4}]}, @volatile={0x5, 0x0, 0x0, 0x9, 0x2}, @float={0x2, 0x0, 0x0, 0x10, 0x10}, @const={0xb, 0x0, 0x0, 0xa, 0x2}, @type_tag={0xa, 0x0, 0x0, 0x12, 0x3}, @const={0x7, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x0, 0x61, 0x61, 0x0]}}, &(0x7f00000002c0)=""/194, 0xba, 0xc2, 0x0, 0x7000000, 0x10000}, 0x28) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x64, r6, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010100}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x6}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x4}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xa0a4}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private0}]}, 0x64}}, 0x1) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0xffffff7f, '\x00', 0x0, r5, 0x3, 0x2, 0x3}, 0x50) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'macvtap0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="580000001000ffff2abd7000fedbdf2500000000", @ANYRES32=0x0, @ANYBLOB="15010000000000001c00128009000100766c616e000000000c000280060001000400000008000500", @ANYRES32=r7, @ANYBLOB='\b\x00\n\x00v'], 0x58}, 0x1, 0x0, 0x0, 0x28001}, 0x8000002) set_mempolicy(0x5, &(0x7f0000000000)=0x4000000ff9, 0xf) prctl$PR_MCE_KILL(0x4e, 0x1, 0x40000000) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="5c0000001400010025bd7000fedbdf25fe800000000000000000000000000034e00000010000000000000000000000004e1d00044e2800000a0020002b000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="b76b6e00020000000c0015"], 0x5c}}, 0x0) 1.308133984s ago: executing program 2 (id=26): ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0xfffe) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) ioctl$IMGETVERSION(0xffffffffffffffff, 0x80044942, &(0x7f0000000040)) r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000080)='bond_slave_1\x00') prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000000c0)) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x4880, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x80000001, 0x4}}, './file0\x00'}) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) connect$tipc(r1, &(0x7f0000000240)=@id={0x1e, 0x3, 0x1, {0x4e24, 0x3}}, 0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000280)) fsetxattr$security_ima(r0, &(0x7f00000002c0), &(0x7f0000000300)=@sha1={0x1, "982b7e49ddd4f0df135d701d7f8dda9e48763f95"}, 0x15, 0x2) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000340)) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000440)={&(0x7f0000000380), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, 0x0, 0x320, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x800) ioctl$SNDRV_TIMER_IOCTL_CREATE(r1, 0xc02054a5, &(0x7f0000000480)={0x2, r2, 'id1\x00'}) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r2, &(0x7f0000000500)={0x40000010}) setsockopt$MRT6_INIT(r5, 0x29, 0xc8, &(0x7f0000000540), 0x4) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000580)) r6 = io_uring_setup(0x6ee1, &(0x7f00000005c0)={0x0, 0x665a, 0x8, 0x1, 0x3e, 0x0, r5}) ioctl$SG_BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000640)={'\x00', 0x1000, 0xfffffff8, 0x1ff, 0x501b4326, 0x8, r3}) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000006c0)) futex(&(0x7f0000000700)=0x1, 0x100, 0x0, &(0x7f0000000740)={0x77359400}, &(0x7f0000000780)=0x2, 0x2) fcntl$setstatus(r6, 0x4, 0x4400) getpid() ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f00000007c0)) pread64(r4, &(0x7f0000000800)=""/62, 0x3e, 0x8000000000000001) 1.236170028s ago: executing program 2 (id=28): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800000}, 0x94) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x209, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x81, 0x3fff8000}, 0x404, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0xfffe, 0x0, 0x0, 0x0, 0x200e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x2, &(0x7f00000004c0)=[{0x2, 0x6, 0x9, 0xe08}, {0x5c, 0xb8, 0x5, 0xf8c}]}) r2 = msgget$private(0x0, 0x1c0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x8, 0x31, 0xffffffffffffffff, 0x0) r3 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_MFC(r3, 0x0, 0xcc, &(0x7f0000000140)={@multicast2, @multicast1, 0x0, "aaa517d60f2811d48c8a2cc60c4380bc23b510d442ff13482864280a9c0f4eb5", 0x0, 0x0, 0x0, 0x3}, 0x3c) msgsnd(r2, &(0x7f0000000080)=ANY=[@ANYRES8], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0xffe, &(0x7f0000000940)={&(0x7f00000013c0)=ANY=[@ANYBLOB="640000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="e5fda988000000002800128009000100766c616e00000000180002800c0002001c0000001f000000060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="0a000100000070"], 0x64}, 0x1, 0x0, 0x0, 0x8811}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1018, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x8, 0x6}, 0x2021, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000900), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0004170000000700"/28], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000340)={r8}, 0xc) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r6, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port1\x00', 0x62, 0x604, 0x0, 0xa, 0x3, 0xfffffffe, 0x1, 0x0, 0x7cce8c743ee810df, 0x2e}) r9 = epoll_create(0x2) r10 = perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000240), 0xe}, 0x0, 0x0, 0xfffffffc, 0x2, 0xfffffffffffffffc, 0xfffffff8, 0x9}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x8) epoll_ctl$EPOLL_CTL_ADD(r9, 0x1, r10, &(0x7f0000000340)={0x10000000}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r6, 0x40505330, &(0x7f00000001c0)={0x800100, 0xfffffffd, 0x4, 0x6, 0x1101, 0xbbfb}) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c01000021000900000000000000000000000000000000000000ffffe0000001fe8000"/64, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="faef520b097600000c0111"], 0x15c}}, 0x20008080) r12 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r12, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) 1.235777408s ago: executing program 0 (id=29): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x9, 0x3, 0x6, 0x6009}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000002080)={0x0, 0x2}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}], 0x10) sendto$inet6(r0, &(0x7f0000000280)="b2", 0x2a000, 0x4040854, &(0x7f0000000300)={0xa, 0x4e21, 0xbf7, @loopback, 0x800000c0}, 0x1c) 1.19911472s ago: executing program 0 (id=31): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r0}, &(0x7f0000000740), &(0x7f0000000780)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) 1.149622193s ago: executing program 1 (id=32): pipe(&(0x7f00000045c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000440)=[{&(0x7f00000000c0)="3b256c7a40ff8cf30d776a89d5cfc3ce7467bd24", 0x14}], 0x1, 0x0) r2 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) syz_emit_ethernet(0x3b6, &(0x7f0000000940)={@multicast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "122d92", 0x380, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, [{0x0, 0xa, "a78ce54006598080a8030037004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af0302"}, {0x0, 0x1, "000000050000000026000400"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c41bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0dea07c9a1f643c822a18b79f7c5eba31fb68b2d734a6671e27182aee96f24a4a5cf390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5ac010000000000000090aa235a670670ffc5dc49dfb58d00000000000000"}, {0x0, 0xb, "17dcea46805d4809c20547406b18901b0aeff04c0300f3c75dc2d227a83b89483b1084743475671545e65eb2e9ac946a3f0e2bc4619f91394c02bcfbbb7d71138537d68e2d2c6393a9f3becd1a9f51a948b5b303f4f003"}, {0x21, 0x0, "b8a3e100908f6164000000020000000000000000000000ffff008879e66485201a0015ca83747357a02745000400"/55}, {0x0, 0x14, "5e14f0e74d2d42cfb3f27fafb60845f90b6dfc2e37bc87c6905bbc94d33e1ea71a28105f543e868a8a53b360a9d33e2b1e26eb1d18065daa7628cf9ef083611c9f6ae2e1eb3d8bf9c6ab2642c4808288e62afbf03269f1f98aea6ab3beb5fdc5fdaabc2c676d8800871a6aa54155dea2d995cb22c9924e0ad38c6967052cc7786d779b8353aac33a57d79b05613a12328f61129017fb632dbf04542188b196e213408c"}, {0x0, 0x5, "d5170000dce9674a36da018dff16e70b8b14c4b7a94fe18e88605aa6be1a02a326a6bce65f81ed"}]}}}}}}, 0x0) setsockopt$inet_int(r2, 0x0, 0x3, &(0x7f0000000140)=0x5, 0x4) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x14, 0x2, 0x6, 0x5}, 0x14}}, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0xa2) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000280)={0x0, 0xd, 0x0, 0x5, 0xffffffff, 0xfffffffd}) io_uring_register$IORING_REGISTER_BUFFERS2(0xffffffffffffffff, 0xf, 0x0, 0x0) r4 = dup2(r3, r3) ioctl$BLKTRACESTART(r4, 0x1261, 0x0) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.148198494s ago: executing program 2 (id=33): r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000c"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x15, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7679b6df}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x0, 0xffffffffffffff9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffe}, 0x37) r5 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) r6 = pidfd_getfd(0xffffffffffffffff, r5, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="d800000018007b18e00212ba0d8105040a871100fe0f040b067c55a1bc0009001e0006990300000015000500fe800000000100000300014002000c59c266cd3e72d30901a8040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090080001fb791643a5ee4b11602b2a10c11ce1b14d6d130dfe1d9d322fe04fba8cae8c9010000734d7a50f4fa61ee8362969ad95667e04adcdf634c1f215ce3bb9ad8ffd5e1cace81ed0b7fece0b42a9ecbee5de6cdd40dd60105e9f16e9cb58000000000000000000000000000be", 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x0) bind$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x2, 0x2, {{0x42}, 0x3}}, 0x10) listen(r0, 0x0) r8 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r8, &(0x7f0000000240)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x41}, 0x4}}, 0x10, 0x0}, 0x5) getsockopt$TIPC_CONN_TIMEOUT(r6, 0x10f, 0x82, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x385200, 0x0) close_range(r5, r0, 0x0) socket$tipc(0x1e, 0x5, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000c"], 0x50) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x15, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7679b6df}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0x0, 0xffffffffffffff9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffe}, 0x37) (async) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) (async) pidfd_getfd(0xffffffffffffffff, r5, 0x0) (async) socket$kcm(0x10, 0x2, 0x0) (async) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="d800000018007b18e00212ba0d8105040a871100fe0f040b067c55a1bc0009001e0006990300000015000500fe800000000100000300014002000c59c266cd3e72d30901a8040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090080001fb791643a5ee4b11602b2a10c11ce1b14d6d130dfe1d9d322fe04fba8cae8c9010000734d7a50f4fa61ee8362969ad95667e04adcdf634c1f215ce3bb9ad8ffd5e1cace81ed0b7fece0b42a9ecbee5de6cdd40dd60105e9f16e9cb58000000000000000000000000000be", 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x0) (async) bind$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x2, 0x2, {{0x42}, 0x3}}, 0x10) (async) listen(r0, 0x0) (async) socket$tipc(0x1e, 0x5, 0x0) (async) sendmsg$tipc(r8, &(0x7f0000000240)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x41}, 0x4}}, 0x10, 0x0}, 0x5) (async) getsockopt$TIPC_CONN_TIMEOUT(r6, 0x10f, 0x82, &(0x7f0000000100), &(0x7f0000000140)=0x4) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x385200, 0x0) (async) close_range(r5, r0, 0x0) (async) 1.145962303s ago: executing program 2 (id=34): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc00000019000100000000000000000020010000000000000000000000000000ac141415000000000000000000000000ea000005000000000a00200000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000ac00000000000000ff0f00000000000000000000000000000000000000000000ffffffffffffffffffffff7f0000000000000000000000000200000000000000000a00000000000000000000008040000000000000000008000000000000000001000000000000004400050000000000000000000000000000000000000004d23c0000000000"], 0xfc}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc000000190001002dbd70000000000064010100000000000000000000000000fc01000000000000000000000000000000000000000000000a0000"], 0xfc}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000100)='\x00', 0x1}], 0x1}}], 0x1, 0x20008050) 1.100098086s ago: executing program 0 (id=35): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0xffffffff) r3 = socket$unix(0x1, 0x5, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r3, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000380)={'veth0_vlan\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000000)={@private2, 0x0, r7}) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f0000000040)={@private2, r7}, 0x14) ioctl$SIOCX25SCAUSEDIAG(r4, 0x89ec, &(0x7f0000000040)={0x9, 0xe6}) 1.099315326s ago: executing program 1 (id=36): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc00000019000100000000000000000020010000000000000000000000000000ac141415000000000000000000000000ea000005000000000a00200000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000ac00000000000000ff0f00000000000000000000000000000000000000000000ffffffffffffffffffffff7f0000000000000000000000000200000000000000000a00000000000000000000008040000000000000000008000000000000000001000000000000004400050000000000000000000000000000000000000004d23c0000000000"], 0xfc}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc000000190001002dbd70000000000064010100000000000000000000000000fc01000000000000000000000000000000000000000000000a0000"], 0xfc}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xff, 0x8, 0x5, 0x7, 0x0, 0x5, 0x80122, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40001, 0x2, @perf_config_ext={0x7fff, 0x1}, 0x100997, 0x7ff, 0x7, 0x2, 0x800084, 0x2, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1, 0x2}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r3, 0x20, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffffe}}, 0x10) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, 0x3, 0x6, 0x401, 0x0, 0x0, {0x7, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x4004000}, 0x20040010) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x3}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000100)='\x00', 0x1}], 0x1}}], 0x1, 0x20008050) 1.046627039s ago: executing program 3 (id=37): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000003c00090000000000fcdbdf25020000000400000004000180"], 0x1c}}, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000000)=""/224) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000000c0)={0x9, 0x3, 0x6, 0x6009}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xd, @loopback, 0xc}], 0x1c) sendto$inet6(r1, &(0x7f0000000280)="b2", 0x2a000, 0x4040854, &(0x7f0000000300)={0xa, 0x4e21, 0xbf7, @loopback, 0x800000c0}, 0x1c) 1.046212219s ago: executing program 4 (id=38): bpf$MAP_CREATE(0x0, &(0x7f0000004440)=ANY=[@ANYBLOB="0900000004000000040000000700", @ANYRES32=0x0, @ANYRES32], 0x48) 1.007649302s ago: executing program 4 (id=39): pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=ANY=[@ANYBLOB="0b00000005000000070100000900000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r4}, 0xc) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0xffffffffffffff2c}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r5 = io_uring_setup(0x4fee, &(0x7f0000000040)={0x0, 0xc8df, 0xc000, 0xa, 0x20002f7}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x10, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {0x9, 0xffff}, {0xe, 0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x40005}, 0x20040000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r5, 0x2219, 0x7721, 0x16, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00\x00'], 0x3}, 0x1, 0x0, 0x0, 0x40900}, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r7, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) prlimit64(0x0, 0xe, &(0x7f0000000600)={0x9, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x40200, 0x0) sendfile(r8, r9, 0x0, 0x10ffff) splice(r0, 0x0, r2, 0x0, 0x10d00, 0xf) 996.758742ms ago: executing program 0 (id=40): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1200000004000000000000800000000000000000a4b36f259b36707cf387657693ae18518763e044878b4bda6a0af137b00f3a11d74da29de3df96a0a7804c75cea9c88d0bee5389f932492649af47a7a629f6d8917b1e52d880bf968a60768f2c3e313541c93d3fba32345429c4ad70", @ANYRESOCT, @ANYBLOB='\x00\x00@\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00 \x00'/28], 0x50) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x646f02, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WDS_PEER(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x0, 0x400, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @random="023d01df41cb"}]}, 0x34}}, 0x4000080) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(r1, 0x400455c8, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r3, 0x800448d3, &(0x7f00000023c0)) 931.912276ms ago: executing program 3 (id=41): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4000000000000007919000000000000620000000000000095107400000000008facdfd7ebdbdb0e342ddf85668c8bcb4a3dda2d612d16f1716a362aad118a81e75b9d7945e77d5b477e77d13d75e682617c0481090c83376431ed74668bd6d0550fa824e0e0b12f44f06fd54191bcad3808af6d77161268be5f07b8cc5cbf036c38d650"], &(0x7f0000003ff6)='GPL\x00', 0x9, 0xfd90, &(0x7f0000000280)=""/211, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff90, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x64}, 0x21) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x18, 0x7, &(0x7f0000000080)=@framed={{}, [@jmp={0x5, 0x0, 0xe, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000140)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x46}, 0x94) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r3}, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r3, 0x0}, 0x20) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000480)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e22, @empty}}, 0xfffffff8, 0x40, 0xc, 0xffffffbb, 0x40, 0x1, 0x1}, &(0x7f00000003c0)=0x9c) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000380)={r5, 0x0, 0x1, 0x3}, 0x10) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'gre0\x00', &(0x7f0000000080)={'tunl0\x00', 0x0, 0x7, 0x8, 0x0, 0x2, {{0x2a, 0x4, 0x0, 0x8, 0xa8, 0x851, 0x0, 0x9, 0x2f, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@lsrr={0x83, 0x13, 0x12, [@dev={0xac, 0x14, 0x14, 0x23}, @dev={0xac, 0x14, 0x14, 0x16}, @multicast1, @rand_addr=0x64010102]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0xdb, [@private=0xa010100]}, @timestamp={0x44, 0x1c, 0xef, 0x0, 0x5, [0xfdd5, 0x2, 0x40, 0x41b, 0xc, 0x85b1]}, @timestamp_prespec={0x44, 0xc, 0x4c, 0x3, 0xb, [{@broadcast, 0x7ff}]}, @lsrr={0x83, 0x13, 0x59, [@dev={0xac, 0x14, 0x14, 0x30}, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010101, @empty]}, @timestamp_addr={0x44, 0x1c, 0x1c, 0x1, 0xa, [{@empty, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x200}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x8}]}, @ssrr={0x89, 0x1f, 0x1b, [@rand_addr=0x64010100, @multicast2, @dev={0xac, 0x14, 0x14, 0x28}, @loopback, @local, @rand_addr=0x64010101, @remote]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x94, r6, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x38, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x10}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x6}, @MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}]}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x9}, @MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}]}]}, 0x94}}, 0x4008800) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001a00)=ANY=[@ANYBLOB="34000000000b010100c3270000000000070000090800027f000000040e000100627974656f726465720000000800034000000000"], 0x34}, 0x1, 0x0, 0x0, 0x804}, 0x48000) 931.658395ms ago: executing program 0 (id=42): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001400000008000f00fc00000018000180140002006e657464657673696d300000000000000800060000fcffff08000900fc000000080011000700000008000e00800000000800", @ANYRES64=r2], 0x5c}, 0x1, 0x0, 0x0, 0x4000800}, 0x88010) 880.132609ms ago: executing program 3 (id=43): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x18050, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e0a, 0x1, @perf_bp={0x0, 0x3}, 0x1216, 0x10000, 0x5, 0x6, 0x8, 0x7, 0x3, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x3fffffffc, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) cachestat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x3000010, &(0x7f0000000040)={[{@user_xattr}, {@discard}]}, 0x1, 0x513, &(0x7f0000000380)="$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") r1 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000900)={0x2, 'nr0\x00', {0x2}, 0x5}) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendto$inet6(r1, &(0x7f0000000240)="4962a0076dc141c7db74ec6b288ce89c2485a54aed7c6f54164a5d3f8cf07fcb9126a87c541a0d96c30e7d1ab6b8e4d45906c6937ed29e38231f7666fda08f696726942a58a2c09f609504c7f245a73df122c4f0cb1e2997601add694946fa3f4bd0d4cc2cfc7f874639d6210d22814910fb566f07c7dd7cb641590e433b5fe9d6e6c9394a46378cac467f93790fd1fc027cc73b6eb1c795c30a5e33d83f82618de7ffd9834ae9b5fa71e71d585fbe47ba7ebd5019fe1b6ec3b477c1ff6cf638c2726f28c855fe", 0xc7, 0xc0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) r2 = fspick(0xffffffffffffff9c, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) bind$packet(r3, &(0x7f00000008c0)={0x11, 0x16, r4, 0x1, 0x0, 0x6, @random='\"AY|au'}, 0x14) setsockopt$MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e24, 0x5, @private1, 0x2}, {0xa, 0x4e22, 0x8be, @loopback, 0x76c}, 0xffffffffffffffff, {[0xd8, 0x0, 0xc, 0x7, 0x9, 0x2, 0x5, 0x7]}}, 0x5c) 876.718939ms ago: executing program 0 (id=44): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000300)) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r3, &(0x7f00000001c0)={0x10, 0x0, 0x25dfdbfd, 0x2ffffffff}, 0x5b) r4 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, 0x0, &(0x7f0000000500)=0x62) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000)=0xa93f, 0x4) r5 = getpid() r6 = syz_open_procfs$namespace(r5, &(0x7f0000000180)='ns/cgroup\x00') sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@RTM_NEWNSID={0x4c, 0x58, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@NETNSA_PID={0x8, 0x2, r5}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_PID={0x8, 0x2, r5}, @NETNSA_NSID={0x8, 0x1, 0x3}, @NETNSA_FD={0x8, 0x3, r6}, @NETNSA_FD={0x8, 0x3, r3}, @NETNSA_NSID={0x8, 0x1, 0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x800) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xa, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="620ac4ff000000007110a3000000000095"], &(0x7f0000000480)='GPL\x00'}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000340)={r7, r1}, 0xc) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r9, 0x1, 0x70bd27, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r5}}]}, 0x3c}, 0x1, 0x600, 0x0, 0x4040010}, 0x30) r10 = socket(0x23, 0x4, 0xb) getsockopt(r10, 0x200000000114, 0x2718, &(0x7f0000000580)=""/102393, &(0x7f0000000400)=0x18ff9) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), r3) sendmsg$TIPC_CMD_SET_LINK_PRI(r11, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x30, r12, 0x8, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x14, 0x18, {0x3, @bearer=@l2={'ib', 0x3a, 'batadv0\x00'}}}}, ["", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20008000}, 0x40) 859.48516ms ago: executing program 3 (id=45): bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x400000002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) write$cgroup_pressure(r0, &(0x7f0000000140)={'full'}, 0xfffffdef) ioctl$int_in(r0, 0x5452, &(0x7f0000000240)=0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x4, 0x4, 0xff, 0x200}, 0x50) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, 0x0, 0x0) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000002100), r2) sendmsg$NFC_CMD_LLC_GET_PARAMS(r2, &(0x7f0000002300)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000002240)={0x34, r3, 0x1, 0x70bd27, 0x25dfdbff, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_FIRMWARE_NAME={0x9, 0x14, 'syz0\x00'}, @NFC_ATTR_FIRMWARE_NAME={0x9, 0x14, 'syz0\x00'}]}, 0x34}}, 0x4020084) ioctl$SIOCSIFHWADDR(r1, 0x8918, &(0x7f0000000000)={'ipvlan0\x00', @random="0200ff7fffff"}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f00000002c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4dd318", 0x18, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x2}, @local, {[], {{0x0, 0x4001, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0xc, 0x0, 0x0, {[@generic={0x4, 0x4, "5eee"}]}}}}}}}}, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0xfffffffffffffd40, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r4 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r4, &(0x7f0000000040)={0x2a, 0x1, 0xfffffffe}, 0xc) bind$qrtr(r4, &(0x7f00000002c0)={0x2a, 0x1, 0x2}, 0xc) 738.826437ms ago: executing program 3 (id=46): r0 = memfd_secret(0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080)=r1, 0x4) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000001c0), 0x4) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000200)={0x1, 0x2, "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"}) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000340)=0x3) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, 0x0, &(0x7f0000000480)) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f00000004c0)={0x0, 0x9, [0x6, 0x1000, 0x3, 0x1, 0x0, 0xc]}) r2 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_MFC_PROXY(r2, 0x0, 0xd3, &(0x7f0000000500)={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffffffffffffff, "7a451a069b24c6dfe70009db0ab718e99524c2db87e7a4a2f4bce4c50d839ab4", 0x10000, 0x2, 0x8e0, 0x400}, 0x3c) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000540)=0x2, 0x4) ioctl$KDSETLED(r0, 0x4b32, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000580), 0x4) ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000000640)={0x3f, "1d7a32ffecb58d82f88ea885227efb9ccbbb1709cc863d13e0ec13679819fcba6287c2873cd0829f6ec312a8e1c86c72946b2c74a6fbf034babb7a6254db9fe7c8e8f65a3303f749fbf4daa0629f37662d94492cfc97ad220b7c91f78353c83d139e991d0917ff8b03d945ccd5c54159e4c43e0df674d04cb5e335ef82db84e5"}) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)={0x14, 0x0, 0x800, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0xc800) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET(r4, &(0x7f0000000a00)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x10, 0x3e8, 0x1, 0x70bd26, 0x25dfdbfe, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x4044880) accept4$llc(r0, &(0x7f0000000a40)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000a80)=0x10, 0x80000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000ac0)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x67fa, 0x0, 0x2, 0x0, 0xe, 0x5}, 0x20) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000b00)=""/174) r5 = getpgid(0xffffffffffffffff) syz_open_procfs(r5, &(0x7f0000000bc0)='net/ip6_tables_names\x00') setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000c00)=0x1, 0x4) 708.083199ms ago: executing program 3 (id=47): socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x5, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x1) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x20000805}, 0x804) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0xd41e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x6, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=ANY=[@ANYBLOB="0900000004000000040000000700000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200000001"], 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002b80), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000002c80)={0x0, 0x0, &(0x7f0000002c40)={&(0x7f0000002bc0)={0x34, r2, 0x109, 0x70bd2c, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0xb}, @ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)) getpgid(0x0) setresuid(0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) 240.310486ms ago: executing program 1 (id=48): mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000001, 0x6031, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mremap(&(0x7f00005ab000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffe000/0x1000)=nil) mremap(&(0x7f0000ceb000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f00002a4000/0x2000)=nil, 0x2000) capset(&(0x7f0000000300)={0x20071026}, &(0x7f0000000340)) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) mmap$usbmon(&(0x7f000024b000/0x3000)=nil, 0x3000, 0x3000002, 0x40010, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000002c0)=0x19) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a32000000001400000011000181"], 0x7c}}, 0x4000) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a78000000060a090400000000000000000200fffe0900020073797a32000000000900010073797a30000000004c00048024000180090001006d65746100000000140002800800014000000001080002400000001024000180090001006d617371"], 0xa0}, 0x1, 0x0, 0x0, 0x24040800}, 0x0) munlockall() 224.076077ms ago: executing program 2 (id=49): r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r1, 0x0, 0x4008804) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@delqdisc={0x24, 0x25, 0x400, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xffe0, 0x9}, {0x4}, {0xc, 0x6}}}, 0x24}}, 0x48080) r2 = getpgid(0xffffffffffffffff) r3 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$setregset(0x4205, r3, 0x1, &(0x7f0000000100)={&(0x7f0000000040)="dcef58b7f29c1f7c93d183044aedba283413e674c7719c33a4b17f028f68610a6c55bb2bf8282853f3e16f8394a8676ff55a3507e2ad50248c6130863b0f7433c7fbc9b978a39eae88bffd05d139cedbee444f7c98e1f92b0f64462b4b470bedced2125e0b1f38fbaa348c6d75aa1a4011e9cdae15ecb9309b0101edbf6dd6d111d6132f18", 0x85}) ptrace$setregset(0x4205, r3, 0x200, &(0x7f00000001c0)={&(0x7f0000000440)="c94522e546f93f6dedf11f1509685636", 0x60}) r4 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000280)='cpu.pressure\x00', 0x2, 0x0) kcmp(r2, r3, 0x4, r4, r0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x670, 0x5, 0x4b0, 0x338, 0x338, 0xffffffff, 0x290, 0x0, 0x418, 0x418, 0xffffffff, 0x418, 0x418, 0x5, 0x0, {[{{@uncond, 0x0, 0x198, 0x1e0, 0x48, {}, [@common=@unspec=@string={{0xc0}, {0x5, 0xf, 'kmp\x00', "4801d3e4c6b2bfd892aa7400051624fa86999b13d39b99407a9b7abe75a728baa18da576811985de44110b8602025e1298ea55f1c5087ab16f67b18ca90ac68f0b3d6a068f727f7d23fa5fad26a59a5da2651212bdf9d29248ae63e2349b2470915eea2c39ade5129ff26b6fe772493180cfda2cdd49412e9469d85abdb467ba", 0x79, 0x2, {0x1}}}, @common=@unspec=@rateest={{0x68}, {'wlan1\x00', 'ip6tnl0\x00', 0x12, 0x2, 0x9, 0x2004, 0x5, 0x3, {0xc35}, {0x1ff}}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x12, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv6=@rand_addr=' \x01\x00', @port=0x4e21, @icmp_id=0x68}}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xa, 0x4, "ed481ca2c99b76ccda2879f6a12da5725ea2669d62d23b45710a851be124"}}}, {{@ip={@local, @remote, 0xff, 0x0, 'virt_wifi0\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x2, @local, @empty, @icmp_id=0x68, @port=0x4e22}}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@icmp={{0x28}, {0xc, "1542", 0x1}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x2, @ipv4=@broadcast, @ipv4=@empty, @gre_key=0x3, @icmp_id=0x64}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x510) 163.06685ms ago: executing program 2 (id=50): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='comm\x00') exit(0x5) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000001440)=""/4106, 0x100a}], 0x1, 0x303, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b40000000000000006000000000000001e000000000000009500000c0000000054f6370561224cfba6a9a3e0172a664ff9f59a2c254f839fc4622afa1b1c7afb36c949b0f82969ba49408b5c9b4a88851f3ae581fbc76180d954c95620"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x3c) 18.676188ms ago: executing program 1 (id=51): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x9, 0x3, 0x6, 0x6009}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000002080)={0x0, 0x2}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}], 0x10) sendto$inet6(r0, &(0x7f0000000280)="b2", 0x2a000, 0x4040854, &(0x7f0000000300)={0xa, 0x4e21, 0xbf7, @loopback, 0x800000c0}, 0x1c) 17.559149ms ago: executing program 1 (id=52): r0 = socket(0x2a, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0x9, 0x5}}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x9}, {}, {0x1, 0xfff1}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x38, 0x2, [@TCA_CGROUP_EMATCHES={0x34, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x28, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x27, 0x7, 0x2000}, {{0x3, 0x0, 0x1, 0x1}, {0x4, 0x1, 0x0, 0x1}}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x3, 0x8, 0x1ff}, {0x6}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}]}]}}]}, 0x68}}, 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 0s ago: executing program 1 (id=53): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000140)=0x40, 0x4) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000300)=0x1, 0x4) bind$xdp(r1, &(0x7f0000000100)={0x2c, 0x0, r3}, 0x10) bind$xdp(r0, &(0x7f0000000240)={0x2c, 0x1, r3, 0x0, r1}, 0x10) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f00000001c0)=0x600, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x13, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x29}, 0x94) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x23, &(0x7f0000000140), 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000780)=[{0x200000000006, 0xf, 0x6, 0x7ffc1ffb}]}) prlimit64(0x0, 0xe, &(0x7f0000000100)={0x8, 0x800001000089}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d459d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x4, 0xc}, 0x2, 0xc005, 0x9, 0x0, 0x1, 0xfffffffd, 0xf, 0x0, 0x0, 0x0, 0x1e00000000000000}, 0x0, 0x2, 0xffffffffffffffff, 0x7) r4 = perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0xa, 0x0, 0x0, 0xa, 0x0, 0x5, 0x10000, 0xa, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x3ff, 0x1}, 0x10082, 0xa7, 0x2, 0x5, 0xa5, 0x9b9b, 0x7000, 0x0, 0x0, 0x0, 0x800000000003}, 0x0, 0x1, 0xffffffffffffffff, 0x9) mlockall(0x7) munmap(&(0x7f0000470000/0x400000)=nil, 0xe06500) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x130f) prctl$PR_SET_MM(0x23, 0x6, &(0x7f000005b000/0x2000)=nil) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffd000/0x3000)=nil) brk(0x200004ffc000) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x61, 0x1, 0x1, 0x3, 0x0, 0x144b, 0x800, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x1, 0x800, 0x0, 0x2, 0x3, 0x5, 0x0, 0x7, 0x0, 0x8}, 0x0, 0x2, r4, 0x2) ioprio_set$pid(0x3, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.173' (ED25519) to the list of known hosts. [ 26.024410][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 26.024425][ T29] audit: type=1400 audit(1770219749.376:70): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.053366][ T29] audit: type=1400 audit(1770219749.406:71): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.054140][ T3301] cgroup: Unknown subsys name 'net' [ 26.081099][ T29] audit: type=1400 audit(1770219749.436:72): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.201337][ T3301] cgroup: Unknown subsys name 'cpuset' [ 26.207354][ T3301] cgroup: Unknown subsys name 'rlimit' [ 26.336943][ T29] audit: type=1400 audit(1770219749.686:73): avc: denied { setattr } for pid=3301 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.360257][ T29] audit: type=1400 audit(1770219749.686:74): avc: denied { create } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.380737][ T29] audit: type=1400 audit(1770219749.686:75): avc: denied { write } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.401094][ T29] audit: type=1400 audit(1770219749.686:76): avc: denied { read } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.421428][ T29] audit: type=1400 audit(1770219749.716:77): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.445801][ T3303] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.446216][ T29] audit: type=1400 audit(1770219749.716:78): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.477986][ T29] audit: type=1400 audit(1770219749.716:79): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 26.501498][ T3301] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.286385][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 28.305045][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 28.353737][ T3322] chnl_net:caif_netlink_parms(): no params data found [ 28.432007][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 28.443333][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.450394][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.457613][ T3313] bridge_slave_0: entered allmulticast mode [ 28.463918][ T3313] bridge_slave_0: entered promiscuous mode [ 28.470489][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.477556][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.484793][ T3312] bridge_slave_0: entered allmulticast mode [ 28.491318][ T3312] bridge_slave_0: entered promiscuous mode [ 28.497798][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 28.517721][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.524841][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.532087][ T3313] bridge_slave_1: entered allmulticast mode [ 28.538388][ T3313] bridge_slave_1: entered promiscuous mode [ 28.544692][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.551747][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.558817][ T3312] bridge_slave_1: entered allmulticast mode [ 28.565265][ T3312] bridge_slave_1: entered promiscuous mode [ 28.599604][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.606690][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.614044][ T3322] bridge_slave_0: entered allmulticast mode [ 28.620514][ T3322] bridge_slave_0: entered promiscuous mode [ 28.638225][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.648384][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.657887][ T3322] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.665061][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.672516][ T3322] bridge_slave_1: entered allmulticast mode [ 28.678882][ T3322] bridge_slave_1: entered promiscuous mode [ 28.690706][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.700963][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.746000][ T3312] team0: Port device team_slave_0 added [ 28.752635][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.774405][ T3313] team0: Port device team_slave_0 added [ 28.780021][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.787099][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.794371][ T3319] bridge_slave_0: entered allmulticast mode [ 28.800716][ T3319] bridge_slave_0: entered promiscuous mode [ 28.807789][ T3312] team0: Port device team_slave_1 added [ 28.814301][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.823913][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.831148][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.838444][ T3317] bridge_slave_0: entered allmulticast mode [ 28.844971][ T3317] bridge_slave_0: entered promiscuous mode [ 28.852058][ T3313] team0: Port device team_slave_1 added [ 28.857632][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.864721][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.872057][ T3317] bridge_slave_1: entered allmulticast mode [ 28.878446][ T3317] bridge_slave_1: entered promiscuous mode [ 28.885098][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.892274][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.899696][ T3319] bridge_slave_1: entered allmulticast mode [ 28.906228][ T3319] bridge_slave_1: entered promiscuous mode [ 28.939348][ T3322] team0: Port device team_slave_0 added [ 28.945814][ T3322] team0: Port device team_slave_1 added [ 28.969933][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.976939][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.002895][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.018909][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.026154][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.052077][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.063020][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.069949][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.096782][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.108585][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.118985][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.135279][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.142254][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.168226][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.180172][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.190304][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.203924][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.210907][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.237168][ T3322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.248427][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.255406][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.281359][ T3322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.305448][ T3319] team0: Port device team_slave_0 added [ 29.334305][ T3317] team0: Port device team_slave_0 added [ 29.344425][ T3319] team0: Port device team_slave_1 added [ 29.356485][ T3312] hsr_slave_0: entered promiscuous mode [ 29.362531][ T3312] hsr_slave_1: entered promiscuous mode [ 29.370983][ T3313] hsr_slave_0: entered promiscuous mode [ 29.377031][ T3313] hsr_slave_1: entered promiscuous mode [ 29.383087][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 29.388788][ T3313] Cannot create hsr debugfs directory [ 29.399376][ T3317] team0: Port device team_slave_1 added [ 29.436173][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.443207][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.469140][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.482431][ T3322] hsr_slave_0: entered promiscuous mode [ 29.488407][ T3322] hsr_slave_1: entered promiscuous mode [ 29.494332][ T3322] debugfs: 'hsr0' already exists in 'hsr' [ 29.500040][ T3322] Cannot create hsr debugfs directory [ 29.505813][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.512979][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.539131][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.556923][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.563928][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.589877][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.605441][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.612477][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.638370][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.724665][ T3317] hsr_slave_0: entered promiscuous mode [ 29.730586][ T3317] hsr_slave_1: entered promiscuous mode [ 29.736605][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 29.742400][ T3317] Cannot create hsr debugfs directory [ 29.758468][ T3319] hsr_slave_0: entered promiscuous mode [ 29.764578][ T3319] hsr_slave_1: entered promiscuous mode [ 29.770339][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 29.776070][ T3319] Cannot create hsr debugfs directory [ 29.883020][ T3312] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 29.891564][ T3312] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 29.912866][ T3312] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 29.930129][ T3312] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 29.945151][ T3322] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.953779][ T3322] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.965553][ T3322] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.979071][ T3322] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.998981][ T3313] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 30.011011][ T3313] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 30.020114][ T3313] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 30.029853][ T3313] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 30.069685][ T3319] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 30.079668][ T3319] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 30.105474][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.112507][ T3319] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 30.121661][ T3319] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 30.147811][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.167326][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.174759][ T3317] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 30.184617][ T3317] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 30.193181][ T3317] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 30.202069][ T3317] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 30.212433][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.219504][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.244130][ T3322] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.252469][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.259510][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.287454][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.294614][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.303361][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.310386][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.346012][ T3322] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.363129][ T3312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.377655][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.428366][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.447864][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.459406][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.467833][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.474927][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.489063][ T3322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.497539][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.504653][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.520083][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.527164][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.537346][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.550525][ T3313] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.561214][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.576118][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.589280][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.596356][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.639594][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.664121][ T57] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.671235][ T57] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.682386][ T57] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.689609][ T57] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.713559][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.745509][ T3319] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.798875][ T3322] veth0_vlan: entered promiscuous mode [ 30.810649][ T3322] veth1_vlan: entered promiscuous mode [ 30.827704][ T3312] veth0_vlan: entered promiscuous mode [ 30.843241][ T3312] veth1_vlan: entered promiscuous mode [ 30.861693][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.890005][ T3313] veth0_vlan: entered promiscuous mode [ 30.902473][ T3322] veth0_macvtap: entered promiscuous mode [ 30.910210][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.922721][ T3313] veth1_vlan: entered promiscuous mode [ 30.933639][ T3312] veth0_macvtap: entered promiscuous mode [ 30.941522][ T3322] veth1_macvtap: entered promiscuous mode [ 30.951024][ T3312] veth1_macvtap: entered promiscuous mode [ 30.981512][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.998291][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.008025][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.018335][ T3313] veth0_macvtap: entered promiscuous mode [ 31.037700][ T3313] veth1_macvtap: entered promiscuous mode [ 31.047463][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.055629][ T52] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.069624][ T52] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.089734][ T52] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.110436][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.120014][ T3319] veth0_vlan: entered promiscuous mode [ 31.126162][ T52] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.139402][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 31.139488][ T29] audit: type=1400 audit(1770219754.486:90): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.e0t3Dd/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 31.140261][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.170781][ T29] audit: type=1400 audit(1770219754.496:91): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 31.192200][ T3317] veth0_vlan: entered promiscuous mode [ 31.199183][ T29] audit: type=1400 audit(1770219754.496:92): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.e0t3Dd/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 31.208040][ T3317] veth1_vlan: entered promiscuous mode [ 31.229758][ T29] audit: type=1400 audit(1770219754.496:93): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 31.246900][ T3317] veth0_macvtap: entered promiscuous mode [ 31.257340][ T29] audit: type=1400 audit(1770219754.496:94): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.e0t3Dd/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 31.257365][ T29] audit: type=1400 audit(1770219754.496:95): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.e0t3Dd/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 31.265245][ T3317] veth1_macvtap: entered promiscuous mode [ 31.289584][ T29] audit: type=1400 audit(1770219754.496:96): avc: denied { unmount } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 31.322282][ T3319] veth1_vlan: entered promiscuous mode [ 31.349081][ T29] audit: type=1400 audit(1770219754.696:97): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 31.371858][ T29] audit: type=1400 audit(1770219754.696:98): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="gadgetfs" ino=3805 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 31.399257][ T3312] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 31.423042][ T52] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.436502][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.447083][ T29] audit: type=1400 audit(1770219754.796:99): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 31.479344][ T52] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.488282][ T52] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.514464][ T57] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.524316][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.535774][ T3485] loop0: detected capacity change from 0 to 512 [ 31.549068][ T3319] veth0_macvtap: entered promiscuous mode [ 31.556482][ T57] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.568172][ T3485] ======================================================= [ 31.568172][ T3485] WARNING: The mand mount option has been deprecated and [ 31.568172][ T3485] and is ignored by this kernel. Remove the mand [ 31.568172][ T3485] option from the mount to silence this warning. [ 31.568172][ T3485] ======================================================= [ 31.594895][ T3488] loop2: detected capacity change from 0 to 1024 [ 31.610711][ T3488] EXT4-fs: Ignoring removed orlov option [ 31.611207][ T3485] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x61000000 (sector = 1) [ 31.632643][ T3319] veth1_macvtap: entered promiscuous mode [ 31.639612][ T57] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.647304][ T3488] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 31.681098][ T57] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.693903][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.709736][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.729207][ T12] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.738473][ T12] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.749299][ T12] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.784138][ T12] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.803854][ T12] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.820169][ T3497] Process accounting resumed [ 31.838951][ T12] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.852828][ T12] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.868533][ T12] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.879918][ T12] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.896960][ T3506] loop3: detected capacity change from 0 to 256 [ 31.917623][ T3508] loop4: detected capacity change from 0 to 256 [ 32.064215][ T3313] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.076263][ T3522] capability: warning: `syz.3.13' uses deprecated v2 capabilities in a way that may be insecure [ 32.088056][ T3521] loop4: detected capacity change from 0 to 512 [ 32.114939][ T3522] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 32.129518][ T3521] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz.4.12: bg 0: block 393: padding at end of block bitmap is not set [ 32.192763][ T3521] EXT4-fs error (device loop4) in ext4_mb_clear_bb:6689: Corrupt filesystem [ 32.202303][ T3521] EXT4-fs (loop4): 2 truncates cleaned up [ 32.208927][ T3521] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 32.340110][ T3317] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.365500][ T3538] netlink: 20 bytes leftover after parsing attributes in process `syz.0.20'. [ 32.375981][ T3538] xt_CT: You must specify a L4 protocol and not use inversions on it [ 32.381832][ T3538] netlink: 4 bytes leftover after parsing attributes in process `syz.0.20'. [ 32.404615][ T3538] team1: entered promiscuous mode [ 32.409657][ T3538] team1: entered allmulticast mode [ 32.415324][ T3538] 8021q: adding VLAN 0 to HW filter on device team1 [ 32.425386][ T3538] Zero length message leads to an empty skb [ 32.466629][ T3540] netlink: 14 bytes leftover after parsing attributes in process `syz.4.19'. [ 32.493628][ C0] hrtimer: interrupt took 77286 ns [ 32.508502][ T3548] FAULT_INJECTION: forcing a failure. [ 32.508502][ T3548] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 32.521644][ T3548] CPU: 1 UID: 0 PID: 3548 Comm: syz.0.22 Not tainted syzkaller #0 PREEMPT(voluntary) [ 32.521668][ T3548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 32.521682][ T3548] Call Trace: [ 32.521690][ T3548] [ 32.521696][ T3548] __dump_stack+0x1d/0x30 [ 32.521780][ T3548] dump_stack_lvl+0x95/0xd0 [ 32.521802][ T3548] dump_stack+0x15/0x1b [ 32.521820][ T3548] should_fail_ex+0x263/0x280 [ 32.521923][ T3548] should_fail+0xb/0x20 [ 32.521951][ T3548] should_fail_usercopy+0x1a/0x20 [ 32.521981][ T3548] _copy_to_user+0x20/0xa0 [ 32.522066][ T3548] simple_read_from_buffer+0xb5/0x130 [ 32.522098][ T3548] proc_fail_nth_read+0x10e/0x150 [ 32.522194][ T3548] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 32.522295][ T3548] vfs_read+0x1ab/0x7f0 [ 32.522315][ T3548] ? __rcu_read_unlock+0x4e/0x70 [ 32.522345][ T3548] ? __fget_files+0x184/0x1c0 [ 32.522368][ T3548] ? mutex_lock+0x57/0x90 [ 32.522513][ T3548] ksys_read+0xdc/0x1a0 [ 32.522535][ T3548] __x64_sys_read+0x40/0x50 [ 32.522556][ T3548] x64_sys_call+0x2889/0x3000 [ 32.522611][ T3548] do_syscall_64+0xc0/0x2a0 [ 32.522637][ T3548] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 32.522716][ T3548] RIP: 0033:0x7f855987b78e [ 32.522776][ T3548] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 32.522792][ T3548] RSP: 002b:00007f8558316fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 32.522817][ T3548] RAX: ffffffffffffffda RBX: 00007f85583176c0 RCX: 00007f855987b78e [ 32.522830][ T3548] RDX: 000000000000000f RSI: 00007f85583170a0 RDI: 0000000000000004 [ 32.522843][ T3548] RBP: 00007f8558317090 R08: 0000000000000000 R09: 0000000000000000 [ 32.522857][ T3548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 32.522871][ T3548] R13: 00007f8559b36038 R14: 00007f8559b35fa0 R15: 00007ffcfff1fb78 [ 32.522985][ T3548] [ 32.731350][ T3546] FAULT_INJECTION: forcing a failure. [ 32.731350][ T3546] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 32.744485][ T3546] CPU: 0 UID: 0 PID: 3546 Comm: syz.3.18 Not tainted syzkaller #0 PREEMPT(voluntary) [ 32.744526][ T3546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 32.744538][ T3546] Call Trace: [ 32.744544][ T3546] [ 32.744552][ T3546] __dump_stack+0x1d/0x30 [ 32.744647][ T3546] dump_stack_lvl+0x95/0xd0 [ 32.744710][ T3546] dump_stack+0x15/0x1b [ 32.744788][ T3546] should_fail_ex+0x263/0x280 [ 32.744818][ T3546] should_fail+0xb/0x20 [ 32.744843][ T3546] should_fail_usercopy+0x1a/0x20 [ 32.744876][ T3546] _copy_from_user+0x1c/0xb0 [ 32.744953][ T3546] __sys_bpf+0x183/0x7b0 [ 32.745044][ T3546] __x64_sys_bpf+0x41/0x50 [ 32.745066][ T3546] x64_sys_call+0x28e1/0x3000 [ 32.745091][ T3546] do_syscall_64+0xc0/0x2a0 [ 32.745123][ T3546] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 32.745145][ T3546] RIP: 0033:0x7fb74a3eaeb9 [ 32.745159][ T3546] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 32.745174][ T3546] RSP: 002b:00007fb748e05028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 32.745194][ T3546] RAX: ffffffffffffffda RBX: 00007fb74a666180 RCX: 00007fb74a3eaeb9 [ 32.745239][ T3546] RDX: 0000000000000010 RSI: 0000200000003980 RDI: 000000000000000f [ 32.745251][ T3546] RBP: 00007fb748e05090 R08: 0000000000000000 R09: 0000000000000000 [ 32.745266][ T3546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 32.745279][ T3546] R13: 00007fb74a666218 R14: 00007fb74a666180 R15: 00007ffca7b42a48 [ 32.745300][ T3546] [ 32.984470][ T3552] capability: warning: `syz.0.25' uses 32-bit capabilities (legacy support in use) [ 33.029143][ T3554] netlink: 4 bytes leftover after parsing attributes in process `syz.4.24'. [ 33.056627][ T3554] netlink: 12 bytes leftover after parsing attributes in process `syz.4.24'. [ 33.080342][ T3554] vlan2: entered promiscuous mode [ 33.085502][ T3554] macvtap0: entered promiscuous mode [ 33.149840][ T3566] loop3: detected capacity change from 0 to 1764 [ 33.463389][ T3618] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 33.501938][ T3627] syz.3.45 uses obsolete (PF_INET,SOCK_PACKET) [ 34.280756][ T3319] ================================================================== [ 34.288866][ T3319] BUG: KCSAN: data-race in mem_cgroup_flush_stats_ratelimited / tick_do_update_jiffies64 [ 34.298684][ T3319] [ 34.301010][ T3319] read-write to 0xffffffff86a09a00 of 8 bytes by interrupt on cpu 0: [ 34.309069][ T3319] tick_do_update_jiffies64+0x113/0x1c0 [ 34.314633][ T3319] tick_nohz_handler+0x8d/0x3d0 [ 34.319487][ T3319] __hrtimer_run_queues+0x20f/0x590 [ 34.324687][ T3319] hrtimer_interrupt+0x269/0x810 [ 34.329627][ T3319] __sysvec_apic_timer_interrupt+0x5f/0x1d0 [ 34.335522][ T3319] sysvec_apic_timer_interrupt+0x6f/0x80 [ 34.341146][ T3319] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 34.347294][ T3319] copy_page_range+0xc88/0x3cf0 [ 34.352143][ T3319] dup_mmap+0x852/0xf00 [ 34.356298][ T3319] copy_mm+0x119/0x370 [ 34.360354][ T3319] copy_process+0xcbd/0x1f10 [ 34.365115][ T3319] kernel_clone+0x16b/0x5b0 [ 34.369604][ T3319] __x64_sys_clone+0x143/0x180 [ 34.374369][ T3319] x64_sys_call+0x12d0/0x3000 [ 34.379039][ T3319] do_syscall_64+0xc0/0x2a0 [ 34.383543][ T3319] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 34.389424][ T3319] [ 34.391735][ T3319] read to 0xffffffff86a09a00 of 8 bytes by task 3319 on cpu 1: [ 34.399264][ T3319] mem_cgroup_flush_stats_ratelimited+0x29/0x70 [ 34.405504][ T3319] count_shadow_nodes+0x6a/0x230 [ 34.410440][ T3319] do_shrink_slab+0x63/0x670 [ 34.415017][ T3319] shrink_slab+0x538/0x880 [ 34.419423][ T3319] shrink_node+0x6cb/0x2000 [ 34.423915][ T3319] do_try_to_free_pages+0x404/0xcc0 [ 34.429124][ T3319] try_to_free_mem_cgroup_pages+0x222/0x470 [ 34.435014][ T3319] try_charge_memcg+0x37e/0xa10 [ 34.439848][ T3319] __mem_cgroup_charge+0x65/0x150 [ 34.444876][ T3319] filemap_add_folio+0x110/0x350 [ 34.449810][ T3319] __filemap_get_folio_mpol+0x326/0x680 [ 34.455348][ T3319] filemap_fault+0x473/0xbb0 [ 34.459929][ T3319] __do_fault+0xbc/0x200 [ 34.464161][ T3319] handle_mm_fault+0x11d7/0x3030 [ 34.469190][ T3319] do_user_addr_fault+0x62f/0x1050 [ 34.474389][ T3319] exc_page_fault+0x62/0xa0 [ 34.478893][ T3319] asm_exc_page_fault+0x26/0x30 [ 34.483732][ T3319] [ 34.486040][ T3319] value changed: 0x00000000ffff9809 -> 0x00000000ffff980a [ 34.493130][ T3319] [ 34.495440][ T3319] Reported by Kernel Concurrency Sanitizer on: [ 34.501578][ T3319] CPU: 1 UID: 0 PID: 3319 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 34.511545][ T3319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 34.521672][ T3319] ================================================================== [ 34.542397][ T3647] syz.3.47 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 34.553284][ T3647] CPU: 0 UID: 0 PID: 3647 Comm: syz.3.47 Not tainted syzkaller #0 PREEMPT(voluntary) [ 34.553312][ T3647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 34.553325][ T3647] Call Trace: [ 34.553332][ T3647] [ 34.553341][ T3647] __dump_stack+0x1d/0x30 [ 34.553449][ T3647] dump_stack_lvl+0x95/0xd0 [ 34.553471][ T3647] dump_stack+0x15/0x1b [ 34.553554][ T3647] dump_header+0x80/0x240 [ 34.553576][ T3647] oom_kill_process+0x295/0x350 [ 34.553601][ T3647] out_of_memory+0x97d/0xb80 [ 34.553626][ T3647] try_charge_memcg+0x62e/0xa10 [ 34.553655][ T3647] mem_cgroup_swapin_charge_folio+0x103/0x1f0 [ 34.553747][ T3647] __read_swap_cache_async+0x17b/0x2d0 [ 34.553780][ T3647] swap_cluster_readahead+0x262/0x3c0 [ 34.553838][ T3647] swapin_readahead+0xde/0x840 [ 34.553871][ T3647] ? __rcu_read_unlock+0x33/0x70 [ 34.553899][ T3647] ? __rcu_read_unlock+0x4e/0x70 [ 34.553970][ T3647] ? swap_cache_get_folio+0x26f/0x280 [ 34.553998][ T3647] do_swap_page+0x59b/0x2a50 [ 34.554079][ T3647] ? __rcu_read_lock+0x36/0x50 [ 34.554107][ T3647] ? __pfx_default_wake_function+0x10/0x10 [ 34.554140][ T3647] handle_mm_fault+0xb40/0x3030 [ 34.554227][ T3647] ? vma_start_read+0x1c7/0x2c0 [ 34.554254][ T3647] do_user_addr_fault+0x62f/0x1050 [ 34.554277][ T3647] ? fpregs_assert_state_consistent+0xb3/0xe0 [ 34.554300][ T3647] ? arch_exit_to_user_mode_prepare+0x26/0x80 [ 34.554384][ T3647] ? irqentry_exit+0x3c/0x510 [ 34.554607][ T3647] exc_page_fault+0x62/0xa0 [ 34.554627][ T3647] asm_exc_page_fault+0x26/0x30 [ 34.554675][ T3647] RIP: 0033:0x7fb74a3eb9f6 [ 34.554691][ T3647] Code: 00 00 00 00 48 85 ff 74 0b e9 46 f6 ff ff 66 0f 1f 44 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 83 ec 28 31 f6 <64> 48 8b 04 25 28 00 00 00 48 89 44 24 18 8d 07 48 69 c0 83 de 1b [ 34.554716][ T3647] RSP: 002b:00007ffca7b42b80 EFLAGS: 00010246 [ 34.554731][ T3647] RAX: 00000000000085b9 RBX: 00007fb74a665fa0 RCX: 00000000000084d0 [ 34.554743][ T3647] RDX: 00000000000000e9 RSI: 0000000000000000 RDI: 00000000000003e8 [ 34.554754][ T3647] RBP: 00007fb74a667da0 R08: 000000000de714e7 R09: 7fffffffffffffff [ 34.554794][ T3647] R10: 3fffffffffffffff R11: 0000000000000246 R12: 0000000000008666 [ 34.554808][ T3647] R13: 00007fb74a665fac R14: 000000000000835f R15: 00007ffca7b42cb0 [ 34.554829][ T3647] [ 34.554837][ T3647] memory: usage 307200kB, limit 307200kB, failcnt 286 [ 34.785561][ T3647] memory+swap: usage 307384kB, limit 9007199254740988kB, failcnt 0 [ 34.793694][ T3647] kmem: usage 307196kB, limit 9007199254740988kB, failcnt 0 [ 34.800989][ T3647] Memory cgroup stats for /syz3: [ 34.801139][ T3647] cache 0 [ 34.809026][ T3647] rss 4096 [ 34.812059][ T3647] shmem 0 [ 34.814994][ T3647] mapped_file 0 [ 34.818438][ T3647] dirty 0 [ 34.821584][ T3647] writeback 4096 [ 34.825122][ T3647] workingset_refault_anon 8 [ 34.829843][ T3647] workingset_refault_file 385 [ 34.834661][ T3647] swap 188416 [ 34.837936][ T3647] swapcached 4096 [ 34.841637][ T3647] pgpgin 3025 [ 34.844929][ T3647] pgpgout 3024 [ 34.848355][ T3647] pgfault 7175 [ 34.851768][ T3647] pgmajfault 10 [ 34.855217][ T3647] inactive_anon 4096 [ 34.859100][ T3647] active_anon 0 [ 34.862575][ T3647] inactive_file 0 [ 34.866195][ T3647] active_file 0 [ 34.869718][ T3647] unevictable 0 [ 34.873196][ T3647] hierarchical_memory_limit 314572800 [ 34.878566][ T3647] hierarchical_memsw_limit 9223372036854771712 [ 34.884786][ T3647] total_cache 0 [ 34.888240][ T3647] total_rss 4096 [ 34.891829][ T3647] total_shmem 0 [ 34.895316][ T3647] total_mapped_file 0 [ 34.899354][ T3647] total_dirty 0 [ 34.903011][ T3647] total_writeback 4096 [ 34.907076][ T3647] total_workingset_refault_anon 8 [ 34.912184][ T3647] total_workingset_refault_file 385 [ 34.917369][ T3647] total_swap 188416 [ 34.921467][ T3647] total_swapcached 4096 [ 34.925617][ T3647] total_pgpgin 3025 [ 34.929435][ T3647] total_pgpgout 3024 [ 34.933398][ T3647] total_pgfault 7175 [ 34.937283][ T3647] total_pgmajfault 10 [ 34.941298][ T3647] total_inactive_anon 4096 [ 34.945797][ T3647] total_active_anon 0 [ 34.949755][ T3647] total_inactive_file 0 [ 34.953920][ T3647] total_active_file 0 [ 34.957963][ T3647] total_unevictable 0 [ 34.961975][ T3647] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz3,task_memcg=/syz3,task=syz.3.47,pid=3647,uid=0 [ 34.976524][ T3647] Memory cgroup out of memory: Killed process 3647 (syz.3.47) total-vm:96048kB, anon-rss:1204kB, file-rss:22460kB, shmem-rss:0kB, UID:0 pgtables:124kB oom_score_adj:1000 [ 34.998555][ T3647] syz.3.47 (3647) used greatest stack depth: 10056 bytes left [ 35.141062][ T3648] syz.3.47 (3648) used greatest stack depth: 6376 bytes left [ 35.283221][ T3618] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.363427][ T3618] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.414250][ T3618] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.476069][ T3714] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.487214][ T3714] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.498419][ T3714] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.509513][ T3714] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0