last executing test programs: 6m47.498397056s ago: executing program 32 (id=483): r0 = socket$netlink(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) 3m16.232362975s ago: executing program 33 (id=2169): r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) fcntl$lock(r0, 0x410, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) fremovexattr(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="73656375726974792e257dbd3171da799f9c6743c87cd427"]) ptrace(0x10, 0x1) 2m48.365029986s ago: executing program 34 (id=3246): socket$inet6_sctp(0xa, 0x1, 0x84) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x275a, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_sctp(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) socket(0x1, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x3, 0x6) socket$netlink(0x10, 0x3, 0xb) socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) memfd_create(&(0x7f0000000180)='\b\x9dF\xd8\b\xb3~u\xa5\"\xdc\xfdq\xf6c\r;\xfcO\x8c=\x81\xb1\x8aWpA\xd4\x98\x85K\x89>N\x8ar\x17O\x0fKR\xe2{mn\xcc\xbf2\xc0\xa7\x14\xd0\xd4\xfe/m\xdf\xb6]\xc2\xaa\x86\xec(\xf7\xcd\xa6\xd9n^.\x13*\xd4\xb8\xe8\xc4\xefb\x14Vx\xc6\xfe\x9e\xee\xe7\xd7E\xe9\t\x83\xdeNX\xec\xe66\x1b\x97$\xee\x84\x14n,B\xd5?\xe5E:+Pm\x1d\xb4\xb8\xeb\xe8Op2\x82\xc7\x0e\x97\x03\xef\x1a\xa5\x00.\x89\b!m\f\xd9\x8b$}\x9f\fX\x81\xa8\xf6\x94\xbc\xed\x80|l]\xe9\xca\xd3\xc9\xa3\x9e\x9cJI\xf1\xa2\xa0\xc4:\x00\x00\x00\x00\x00\x00\b\x00\x00', 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000004c0)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010025bd7000fadbdf2500000000", @ANYRES32=r1, @ANYBLOB="138000002b9201002400128009000100626f6e6400000000140002800800"], 0x44}, 0x1, 0x0, 0x0, 0x40448e0}, 0x4000) 2m47.315943659s ago: executing program 35 (id=3255): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 2m43.98171092s ago: executing program 36 (id=3284): socket$nl_route(0x10, 0x3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfd, 0x400}, 0xc) getsockname$packet(r0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) socket(0x1, 0x803, 0x0) 2m37.598936238s ago: executing program 37 (id=3342): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x3, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_skbprio={{0xc}, {0x8, 0x2, 0x7fff}}]}, 0x38}}, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r6) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r5, &(0x7f00000000c0)={&(0x7f0000000380)=@xdp={0x2c, 0x7, r7, 0x3e}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)='\'', 0x1}], 0x1}, 0x4) 2m33.36522072s ago: executing program 38 (id=3367): ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f0000000380)=[{0x84, 0x77, 0x0, 0x0, @tick=0x9, {0xfd}, {0x7}, @raw32={[0x2, 0x66704740, 0x8000000]}}, {0x2, 0xff, 0x5, 0x83, @tick=0xfffffdff, {0xfd, 0x1}, {0x3}, @note={0x81, 0x0, 0x0, 0x0, 0x6}}, {0x6, 0x3, 0x9, 0x3, @tick=0x1, {0x10, 0x5}, {0xce, 0x2}, @connect={{0xf, 0x3}, {0x6, 0xb}}}], 0x54) 2m23.393278242s ago: executing program 39 (id=3493): r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfbffffff, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {0xffff, 0xffff}, {0x6, 0xb}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000840)=@newtfilter={0x98, 0x2c, 0xd27, 0x30bd2a, 0x25dfdc00, {0x0, 0x0, 0x0, r3, {0xffff, 0x5}, {}, {0x7, 0x2}}, [@filter_kind_options=@f_matchall={{0xd}, {0x64, 0x2, [@TCA_MATCHALL_ACT={0x60, 0x2, [@m_ife={0x5c, 0x1, 0x0, 0x0, {{0x8}, {0x34, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x8, 0x8, 0x4, 0xa}, 0x1}}, @TCA_IFE_METALST={0x14, 0x6, [@IFE_META_PRIO={0x8, 0x3, @val=0x26884a8d}, @IFE_META_SKBMARK={0x8, 0x1, @val=0x202}]}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x98}, 0x1, 0x0, 0x0, 0x11}, 0x800) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r5 = socket$kcm(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r5, &(0x7f00000000c0)={&(0x7f0000000380)=@xdp={0x2c, 0x7, r6, 0x3e}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)='\r', 0x1}], 0x1}, 0x4) 2m22.912631778s ago: executing program 40 (id=3505): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0x3100, 0x0, &(0x7f0000000000), 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2m21.94960992s ago: executing program 41 (id=3522): bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x2f) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='bbr', 0x3) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e21, @local}, 0x10) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000840)="89000000120081ae08060cdc030000fe7f030000000000000001ffca1b1f0000000024c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00150c00014003080c00bdad446b31007a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947e", 0x75}, {&(0x7f0000000140)="11d6cb557c8496a2fe7a81f38210bfa9b70ee09c", 0x14}], 0x2}, 0x4000000) 40.400066235s ago: executing program 9 (id=4584): getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) syz_usb_connect$uac1(0x5, 0xaa, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$inet6(r0, 0x0, 0x48043) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@rand_addr=0x64010101, @in=@broadcast, 0x0, 0x8001, 0x0, 0x0, 0xa, 0x0, 0x0, 0x4f}, {0x0, 0x0, 0x0, 0x800, 0x7}, {0x0, 0x0, 0xe6}, 0x0, 0x0, 0x0, 0x0, 0x2}, {{@in=@remote, 0x404d3, 0x2b}, 0x0, @in=@local}}, 0xe8) r2 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020b000102"], 0x10}}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="b80000001300e9990000000000000000fc000000000000000100000000000000ac1e000100000000000000000000000000000000000000000a0060"], 0xb8}}, 0x20040014) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@updpolicy={0xb8, 0x13, 0x2, 0x0, 0x25dfdbfe, {{@in6=@private0, @in=@multicast1, 0x0, 0x4, 0x0, 0x0, 0xa, 0x60, 0x80, 0x3b, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, {0xfffffffffffffffe, 0x4}, 0x9, 0x0, 0x0, 0x0, 0x2}}, 0xb8}, 0x1, 0x0, 0x0, 0x80}, 0x50) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9"], 0xb8}}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@updpolicy={0xb8, 0x13, 0xcb23c9c9931e99e9, 0x0, 0x25dfdbfc, {{@in6=@private0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x40, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0xaa3, 0xfffffffffffffff8, 0x4}, {0x0, 0x8}}}, 0xb8}}, 0x0) 39.877260661s ago: executing program 9 (id=4589): r0 = socket$inet(0x2, 0x2, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, 0x0, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="50000000090601020000000000000000020000000900020073797a31000000000500010007000000280007800c00018008000140ffffffff0500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000070601080000001e000000000a00000405000100", @ANYRESHEX=r0], 0x1c}, 0x1, 0x0, 0x0, 0x20000005}, 0x80) close_range(r0, 0xffffffffffffffff, 0x0) 39.715940873s ago: executing program 9 (id=4592): socket(0x2, 0xa, 0x300) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r0 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x318, 0x0, 0xdb0, 0xf5ffffff}, 0x3f01) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) bind$packet(r1, &(0x7f00000006c0)={0x11, 0x0, r4, 0x1, 0xb, 0x6, @remote}, 0x14) syz_emit_ethernet(0xd2, &(0x7f0000000ac0)=ANY=[], 0x0) 39.410936667s ago: executing program 6 (id=4602): setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x4001, 0x3, 0x250, 0x0, 0x700001b, 0x148, 0x0, 0x148, 0x1b8, 0x206, 0x240, 0x1b8, 0x240, 0x7fffffe, 0x0, {[{{@ip={@loopback, @empty, 0xffffffff, 0x0, 'tunl0\x00', 'veth0_to_bond\x00', {0xff}, {}, 0x1}, 0x1ea, 0xc0, 0x120, 0x0, {0x390, 0x8f00}, [@common=@inet=@socket3={{0x28}, 0x1}, @common=@icmp={{0x28}, {0x12, "e07c", 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x2, 0x3, 0x1, 0x2, 0x7], 0x2, 0x5}, {0x0, [0x3, 0x6f455bfb4ce26171, 0x6, 0x6, 0x2, 0x21debfafc4f76fce], 0x3}}}}, {{@ip={@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xe2002454fb7b9fcc, 0xff, 'team0\x00', 'gre0\x00', {}, {0xff}, 0x8, 0x2, 0x5}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x10, 0x9, 0xf9}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000240)=0xe9, 0x4) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000400)=ANY=[@ANYBLOB], 0xdd12}, {&(0x7f0000000600)={0x10, 0x33, 0x2, 0x70bd2d, 0x25dfdbfe}, 0x10}], 0x2, 0x0, 0x0, 0x4000007}, 0x0) 39.372375037s ago: executing program 6 (id=4603): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001400), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340), 0x106}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000006c0), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000b80)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000b40), 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) 39.371943877s ago: executing program 6 (id=4604): socket$kcm(0x10, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000380)=ANY=[], 0x30}}, 0x4090) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth1_to_bridge\x00', 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000540)={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x4400046, r1}) 39.353746528s ago: executing program 6 (id=4605): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, 0x0) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0xa) 39.330328508s ago: executing program 6 (id=4606): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000300)={0x30, 0x2, 0x6, 0x801, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x90}, 0x40c0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) 39.208288749s ago: executing program 6 (id=4608): sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x40}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}]}, 0x4c}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x48, 0x9, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0xffff}, [@IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x2}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x2}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x40c0080) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x7, 0x6, 0x801, 0x0, 0x0, {0xa, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000005}, 0x80) 39.208203059s ago: executing program 42 (id=4608): sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x40}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}]}, 0x4c}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x48, 0x9, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0xffff}, [@IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x2}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x2}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x40c0080) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x7, 0x6, 0x801, 0x0, 0x0, {0xa, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000005}, 0x80) 38.847649704s ago: executing program 9 (id=4610): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0xa) 38.645907756s ago: executing program 9 (id=4614): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000bb0000000032"], 0xf8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40004) sendmsg$nl_xfrm(r0, 0x0, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) io_uring_setup(0x653, &(0x7f0000000000)={0x0, 0x804, 0x0, 0x4}) r2 = socket(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'lo\x00'}) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="38000000031401002abd7000fedbdf250900020073017a31000000000800410072786500140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) 38.403479319s ago: executing program 9 (id=4618): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, 0x0) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0xa) 38.31138122s ago: executing program 43 (id=4618): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, 0x0) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0xa) 34.034716193s ago: executing program 5 (id=4666): gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x88008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x1100, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000808, &(0x7f00000001c0)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x5f82, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x50, 0x1f}, {0x48, 0x0, 0x0, 0x40}, {0x6, 0x1, 0x0, 0x3}]}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xc}, {0xfff3}}}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x20040000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000009c0)=ANY=[@ANYBLOB="38000000041401"], 0x38}}, 0x4010) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, 0x0, 0x40000) ioctl$HIDIOCGUSAGES(0xffffffffffffffff, 0xd01c4813, &(0x7f0000000240)={{0x3, 0xe8b5c71a5eb6f040, 0x5, 0xb7a4, 0x1, 0xffff}, 0x341, [0xc, 0x40, 0xcd7, 0x4, 0x6, 0x0, 0x80000000, 0x7, 0x9, 0x7a18fde9, 0x9, 0xf12, 0x4, 0x3, 0x378, 0x9, 0x4, 0x0, 0x1, 0xffff06bd, 0x0, 0xf, 0x1a, 0xf2, 0xd, 0x9, 0x8, 0x10001, 0x401, 0x80000000, 0x401, 0x3ca5, 0x1, 0x0, 0xff, 0x40000004, 0x4, 0x3, 0x0, 0xaa80, 0x40000000, 0x80000000, 0x7fff, 0x7, 0x5, 0xa, 0x0, 0x10000, 0x405, 0x8, 0xffff, 0x91ba, 0x7, 0xb, 0x9, 0xb6, 0x24, 0xcb, 0x180, 0x7f, 0x5, 0x311, 0x66d1, 0x9, 0x9, 0xb6eb, 0xc74, 0x77, 0x1, 0xc0000000, 0x5cb5, 0xfffffffd, 0x401, 0xedf4, 0x4, 0x1000, 0x6, 0xfffffffe, 0x8001, 0xc1, 0x1, 0x8, 0x1, 0x32, 0x98, 0x7f, 0xffff, 0x401, 0x2, 0x2, 0x4680, 0x9a7f, 0xe665, 0x3d6e, 0x3, 0x7, 0x80, 0x4b, 0x9, 0x2, 0xb, 0x6, 0x4fa4, 0x80000000, 0x1, 0xb, 0x0, 0xfffffffa, 0x3, 0x8001, 0xfd, 0x101, 0x4, 0x10, 0xa, 0x6b13, 0x202, 0x7ff, 0x9, 0x80000000, 0xffff, 0x9, 0x3, 0x6, 0x2, 0xffffff87, 0xe, 0xd, 0x5, 0x8, 0x9, 0x7, 0x6, 0x400, 0x8, 0xff2, 0x6, 0x0, 0x6, 0x0, 0x8, 0x1, 0x3, 0x664, 0x4, 0x9, 0x9, 0x2, 0x1ff, 0xfffffffd, 0xeb6, 0x0, 0x9, 0x10001, 0x1, 0x9, 0x9, 0xff, 0x1, 0x4, 0x7ff, 0xe6, 0x6, 0x10001, 0x9, 0x68, 0x7, 0x201, 0x5, 0x3, 0x9a3f, 0x400000, 0x0, 0x80000067, 0xffffff7e, 0x7, 0x10000000, 0x10001, 0x7, 0x3, 0x10, 0x10a, 0xa, 0x40, 0x18, 0x80, 0xb5f8, 0x8bc, 0x3, 0x8000103, 0x5, 0xfffffffc, 0x4, 0x18000, 0x10, 0x1000, 0x288c, 0x1ffe, 0x73ee, 0x1, 0x5, 0x9, 0x7fffffff, 0x73, 0x6, 0x8, 0x6, 0x400, 0x40, 0x0, 0x0, 0x0, 0x546c, 0x981, 0x5aa, 0x7fff, 0x7, 0x2, 0x7, 0xc4c, 0x400045e3, 0x5, 0x7, 0x3, 0x5, 0x3, 0x0, 0x1, 0x2, 0xffffffff, 0x4, 0x200000ce, 0x6, 0x0, 0x1, 0xa, 0x3, 0x0, 0x9, 0x9, 0x37c, 0x10001, 0x8, 0x1, 0x5, 0x2, 0x6, 0x4, 0x6, 0x1, 0x8, 0x6, 0xfffffffa, 0x5, 0x0, 0x9, 0x5, 0x2, 0x7, 0x3, 0xffffff1b, 0x9, 0x2, 0xd, 0x34ea, 0x10000, 0x0, 0x80002001, 0x8, 0x8000, 0x10004, 0x10, 0x8, 0x8, 0x5, 0x1, 0x6, 0x10001, 0x0, 0x5, 0x10000, 0x4, 0xffff, 0x2, 0x89, 0x2, 0x3, 0x1, 0x73, 0x3, 0x9, 0x4, 0x1, 0xb, 0x1, 0x8, 0x0, 0x81, 0x80000004, 0x9, 0x9, 0x0, 0x4, 0x10000004, 0x0, 0x1, 0xce5fb90f, 0x5, 0x4, 0x10001, 0xf, 0x9, 0x100, 0x44, 0x59b, 0x7, 0x8, 0x9, 0x3, 0x2, 0x4, 0x6, 0x0, 0x8, 0x40, 0xd3, 0x7, 0xffffffff, 0x89aa, 0x8, 0x2, 0xf0ce, 0x2, 0x1, 0x0, 0x2, 0xc6, 0x1000, 0x800001, 0x937, 0xa, 0x5e, 0x3, 0xffffffff, 0x5, 0x9, 0x5, 0xffffffff, 0xbe, 0x1, 0x7, 0xe, 0xffffffff, 0x0, 0x3d6, 0x0, 0xae, 0x6, 0x1, 0xfffffeff, 0x4, 0x5, 0x7fff, 0x103, 0x7, 0x6, 0x709, 0x2, 0x49, 0x10, 0xfffffff7, 0xfffff772, 0x8, 0x80000000, 0x3, 0x7, 0xa9c, 0x9, 0x8, 0x1, 0x2, 0x8d, 0x1000, 0x69f, 0x1ff, 0x9, 0x10, 0x3, 0x10000, 0xfffefffd, 0xf, 0x1, 0x3, 0xffffa9b4, 0x1, 0x4, 0x5, 0x9, 0x4b5f, 0x6, 0x7fffffff, 0xffffffff, 0x1, 0x80000000, 0xb, 0x4, 0x88d, 0x1, 0x7, 0x8, 0x1, 0x89, 0x6, 0x818a, 0x10, 0x8, 0x10, 0xfffffffc, 0xfffff001, 0xa, 0xfffffff7, 0x8000005, 0xfdad, 0xffd, 0x9, 0x10, 0xfffffffd, 0x4, 0x6, 0x400, 0x7, 0x0, 0x80000000, 0xd, 0x2, 0x8001, 0x0, 0x20000003, 0xb6, 0x101, 0x401, 0x2, 0x7, 0xc, 0x6623258, 0xf2, 0x741, 0xfffffffc, 0x9, 0xffffa0a6, 0xc, 0x11, 0x2, 0x8, 0x9, 0x1, 0x7f, 0x98, 0x9, 0xb, 0x800, 0x4, 0x9, 0x5, 0x7, 0x7, 0x8, 0xfe, 0x7f, 0x9, 0x4, 0x6, 0x20080000, 0x2, 0x8000, 0x0, 0x0, 0x1000, 0xb, 0x0, 0x7, 0x400, 0x0, 0xfff, 0x8101, 0x6, 0x0, 0x9, 0xc, 0x5, 0xffe, 0x100, 0xffff, 0x1, 0x401, 0xf0, 0x0, 0xfffff53d, 0x9, 0x2, 0x6, 0x0, 0x4, 0x4b15, 0x10000, 0x1, 0x6, 0x9, 0xd, 0x8, 0x4, 0xfffffe01, 0x1, 0x6, 0x0, 0x2, 0x10001, 0x1, 0x7, 0xe4ce, 0x5, 0x9, 0xffffc487, 0x204, 0x10002, 0x1000, 0x7, 0x6, 0x6, 0x8, 0xfffffe00, 0x1, 0x1, 0x8000000, 0xe, 0x2, 0x2, 0x4, 0x0, 0xb66d, 0x3, 0x1000, 0x1eb4bce6, 0x10, 0x8, 0x1, 0x5, 0x1, 0x5, 0x9, 0x5, 0x7, 0x62f2f805, 0x5, 0x3, 0xffffffff, 0x2, 0x7f, 0x3, 0xd, 0x40, 0x5, 0x2, 0xa, 0x5, 0x6, 0x80000000, 0x25, 0x8, 0x7, 0x7, 0x1, 0x5, 0x9, 0x6708, 0x10001, 0x0, 0x80, 0x8, 0x6, 0x0, 0xa95a, 0x2, 0x5, 0x2, 0x2, 0x4, 0xfff9, 0x80000001, 0x5, 0x1, 0x9, 0x0, 0xb7, 0x3, 0x4000ff, 0x9, 0x0, 0x80, 0xfea5, 0x7fff, 0x7, 0x7, 0x7, 0x7485, 0x197, 0x8, 0x0, 0x5, 0x10, 0x3, 0xe, 0x8, 0x1000, 0x4, 0x7, 0x382d, 0x459, 0xcad, 0x9, 0x0, 0x2, 0x119, 0x6, 0x20000a4, 0xe0, 0xfffffffb, 0x5, 0xffffffff, 0x2, 0x4007, 0xa05a, 0x0, 0x1, 0x3, 0x35, 0x8, 0x1, 0x2, 0x30, 0xb, 0x101, 0x2, 0x9, 0x3, 0x7, 0x8, 0x8, 0x1, 0x2, 0x4, 0x15294b70, 0x3, 0x3, 0x2, 0x1, 0xf, 0x9, 0x1, 0x80000000, 0x9, 0x8001, 0x5, 0x800081, 0x1, 0x2, 0x3fd, 0x1df, 0x6, 0x6, 0xfffffffa, 0x81, 0x9, 0x2, 0x9, 0x1, 0x9, 0x7, 0x2c1, 0x9e95, 0x0, 0xfffffedd, 0x30c8, 0x2, 0x38a0, 0x7b, 0x0, 0x8, 0x4, 0x6, 0x9, 0x0, 0x8, 0x9, 0x8, 0x1ff, 0x7fff, 0x3, 0x9, 0x8, 0x2b, 0x200006, 0x4, 0x7, 0x2, 0x4, 0xbfb, 0x7, 0x405, 0x6, 0x4, 0x91, 0x9, 0x8, 0x3, 0x6ae574d2, 0x6, 0xfffffe00, 0x1000, 0x5, 0x92, 0xffffffff, 0x7fffffff, 0xd7, 0x8001, 0x905, 0x3, 0x6, 0xfffffb31, 0xb, 0x4, 0x7, 0x8, 0x1, 0x6, 0x1, 0xff, 0x103, 0x7, 0x3, 0x6, 0x80000001, 0x0, 0x100a, 0x7fffffff, 0x7fff, 0x2, 0xfffffff8, 0x2, 0x9b3, 0x10001, 0x8, 0x4, 0x8, 0x6, 0x7742348d, 0x5, 0x5, 0x1f, 0x40, 0x0, 0x6, 0xffffffff, 0x7, 0xa, 0x8, 0x17f, 0x6, 0x2, 0x1, 0x6, 0x14827783, 0xb, 0xe, 0x5, 0xfffffffd, 0xfe7, 0xfffffffc, 0x8, 0x7ff, 0x3e9, 0x0, 0x3, 0x2000, 0xa, 0x3, 0x9, 0x80000001, 0x81, 0x8, 0x14, 0x8, 0x4, 0x7f, 0xd, 0xf28c, 0x7, 0x6, 0x4, 0x7fffffff, 0xffff, 0x7fffffff, 0xc9, 0x2, 0xfffffffe, 0x924, 0x499, 0x100, 0x1, 0x5, 0xffff351b, 0x7, 0xfffffffb, 0x3, 0x9, 0x2, 0x7, 0x4, 0x4, 0x8, 0xff, 0xee, 0x2, 0x4, 0x8, 0x9f, 0x7, 0x3, 0x9, 0xc9, 0x1, 0x1, 0x1, 0xfffffff7, 0x0, 0x6, 0x5, 0x6, 0x3fc, 0x51, 0x7, 0xefb, 0x200000b8, 0x1, 0x5, 0xfffffff7, 0x7, 0x7, 0x4, 0x6330, 0xff, 0x6, 0xea, 0xbb2d, 0xfff, 0x7, 0x6, 0x0, 0x6, 0xffff, 0xfffffffa, 0x3, 0x0, 0x1, 0x6, 0xfffffc00, 0x5, 0x7, 0x64c822e3, 0xc, 0x6, 0x80, 0x6, 0xfff, 0x0, 0xa7b, 0x1, 0xfffffff7, 0x7, 0x40, 0xa, 0x9b, 0x3, 0xe, 0xf01, 0x1, 0x3, 0x40, 0x3, 0x4, 0x5, 0x5, 0x7ff, 0x5, 0x8, 0x5, 0x3, 0x8, 0x2, 0x80000001, 0x54, 0x80400, 0x1, 0x8, 0xa, 0x9, 0x10000c0, 0x3, 0x72, 0x80, 0x1000, 0x7, 0x800, 0x6, 0x8, 0x3, 0x93c, 0x6, 0x20000000, 0x0, 0xe, 0x5, 0x3, 0xfffffffa, 0xa01, 0xf3, 0xffffff00, 0x8, 0xe, 0x3, 0x3ff, 0x5, 0x2, 0x6, 0xa3, 0xffff, 0xfffffff9, 0x9, 0x5, 0x62, 0x2, 0x1, 0xfffffffa, 0x2, 0x2, 0x9, 0x7, 0x0, 0x7, 0x8, 0x10000, 0x42, 0xaa1, 0x7, 0x2b, 0x6, 0x10, 0x5, 0x200, 0x9, 0x6, 0x3, 0x8, 0x10, 0x4, 0x6, 0x633, 0xf05, 0x401, 0x101, 0x200, 0x8, 0x7ff, 0x0, 0x40, 0x1, 0x10000, 0x9, 0x40, 0x9, 0xb6f, 0x7f, 0x8, 0x6, 0x1, 0x3, 0x80000001, 0x0, 0x8, 0x8, 0x7, 0xde, 0x6, 0x89, 0x0, 0x100, 0x1, 0x9, 0x6, 0x400, 0x1, 0x0, 0x200, 0xe9ab, 0x3, 0x8000, 0x13, 0x2, 0x2, 0x43, 0x3ff, 0x0, 0x7, 0xc, 0x401, 0x6, 0x7, 0xa, 0xf, 0xf39d, 0x71, 0xfff, 0x7, 0x8]}) r5 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x860b01) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffff}, 0x900}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="54000000120001bd00000000000000000a0300004e234e2200000100ffff00"/56, @ANYRES32=r7, @ANYBLOB="050000000300000008000000000000000800030011"], 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x20004010) write$char_usb(r5, &(0x7f0000000040)="e2", 0x2250) socket$nl_route(0x10, 0x3, 0x0) 32.323518984s ago: executing program 5 (id=4675): sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x1) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x3ff}) readlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000200)=""/237, 0xed) 32.243514304s ago: executing program 5 (id=4677): gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x88008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x1100, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000808, &(0x7f00000001c0)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x5f82, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x50, 0x1f}, {0x48, 0x0, 0x0, 0x40}, {0x6, 0x1, 0x0, 0x3}]}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xc}, {0xfff3}}}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x20040000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000009c0)=ANY=[@ANYBLOB="38000000041401"], 0x38}}, 0x4010) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, 0x0, 0x40000) ioctl$HIDIOCGUSAGES(0xffffffffffffffff, 0xd01c4813, &(0x7f0000000240)={{0x3, 0xe8b5c71a5eb6f040, 0x5, 0xb7a4, 0x1, 0xffff}, 0x341, [0xc, 0x40, 0xcd7, 0x4, 0x6, 0x0, 0x80000000, 0x7, 0x9, 0x7a18fde9, 0x9, 0xf12, 0x4, 0x3, 0x378, 0x9, 0x4, 0x0, 0x1, 0xffff06bd, 0x0, 0xf, 0x1a, 0xf2, 0xd, 0x9, 0x8, 0x10001, 0x401, 0x80000000, 0x401, 0x3ca5, 0x1, 0x0, 0xff, 0x40000004, 0x4, 0x3, 0x0, 0xaa80, 0x40000000, 0x80000000, 0x7fff, 0x7, 0x5, 0xa, 0x0, 0x10000, 0x405, 0x8, 0xffff, 0x91ba, 0x7, 0xb, 0x9, 0xb6, 0x24, 0xcb, 0x180, 0x7f, 0x5, 0x311, 0x66d1, 0x9, 0x9, 0xb6eb, 0xc74, 0x77, 0x1, 0xc0000000, 0x5cb5, 0xfffffffd, 0x401, 0xedf4, 0x4, 0x1000, 0x6, 0xfffffffe, 0x8001, 0xc1, 0x1, 0x8, 0x1, 0x32, 0x98, 0x7f, 0xffff, 0x401, 0x2, 0x2, 0x4680, 0x9a7f, 0xe665, 0x3d6e, 0x3, 0x7, 0x80, 0x4b, 0x9, 0x2, 0xb, 0x6, 0x4fa4, 0x80000000, 0x1, 0xb, 0x0, 0xfffffffa, 0x3, 0x8001, 0xfd, 0x101, 0x4, 0x10, 0xa, 0x6b13, 0x202, 0x7ff, 0x9, 0x80000000, 0xffff, 0x9, 0x3, 0x6, 0x2, 0xffffff87, 0xe, 0xd, 0x5, 0x8, 0x9, 0x7, 0x6, 0x400, 0x8, 0xff2, 0x6, 0x0, 0x6, 0x0, 0x8, 0x1, 0x3, 0x664, 0x4, 0x9, 0x9, 0x2, 0x1ff, 0xfffffffd, 0xeb6, 0x0, 0x9, 0x10001, 0x1, 0x9, 0x9, 0xff, 0x1, 0x4, 0x7ff, 0xe6, 0x6, 0x10001, 0x9, 0x68, 0x7, 0x201, 0x5, 0x3, 0x9a3f, 0x400000, 0x0, 0x80000067, 0xffffff7e, 0x7, 0x10000000, 0x10001, 0x7, 0x3, 0x10, 0x10a, 0xa, 0x40, 0x18, 0x80, 0xb5f8, 0x8bc, 0x3, 0x8000103, 0x5, 0xfffffffc, 0x4, 0x18000, 0x10, 0x1000, 0x288c, 0x1ffe, 0x73ee, 0x1, 0x5, 0x9, 0x7fffffff, 0x73, 0x6, 0x8, 0x6, 0x400, 0x40, 0x0, 0x0, 0x0, 0x546c, 0x981, 0x5aa, 0x7fff, 0x7, 0x2, 0x7, 0xc4c, 0x400045e3, 0x5, 0x7, 0x3, 0x5, 0x3, 0x0, 0x1, 0x2, 0xffffffff, 0x4, 0x200000ce, 0x6, 0x0, 0x1, 0xa, 0x3, 0x0, 0x9, 0x9, 0x37c, 0x10001, 0x8, 0x1, 0x5, 0x2, 0x6, 0x4, 0x6, 0x1, 0x8, 0x6, 0xfffffffa, 0x5, 0x0, 0x9, 0x5, 0x2, 0x7, 0x3, 0xffffff1b, 0x9, 0x2, 0xd, 0x34ea, 0x10000, 0x0, 0x80002001, 0x8, 0x8000, 0x10004, 0x10, 0x8, 0x8, 0x5, 0x1, 0x6, 0x10001, 0x0, 0x5, 0x10000, 0x4, 0xffff, 0x2, 0x89, 0x2, 0x3, 0x1, 0x73, 0x3, 0x9, 0x4, 0x1, 0xb, 0x1, 0x8, 0x0, 0x81, 0x80000004, 0x9, 0x9, 0x0, 0x4, 0x10000004, 0x0, 0x1, 0xce5fb90f, 0x5, 0x4, 0x10001, 0xf, 0x9, 0x100, 0x44, 0x59b, 0x7, 0x8, 0x9, 0x3, 0x2, 0x4, 0x6, 0x0, 0x8, 0x40, 0xd3, 0x7, 0xffffffff, 0x89aa, 0x8, 0x2, 0xf0ce, 0x2, 0x1, 0x0, 0x2, 0xc6, 0x1000, 0x800001, 0x937, 0xa, 0x5e, 0x3, 0xffffffff, 0x5, 0x9, 0x5, 0xffffffff, 0xbe, 0x1, 0x7, 0xe, 0xffffffff, 0x0, 0x3d6, 0x0, 0xae, 0x6, 0x1, 0xfffffeff, 0x4, 0x5, 0x7fff, 0x103, 0x7, 0x6, 0x709, 0x2, 0x49, 0x10, 0xfffffff7, 0xfffff772, 0x8, 0x80000000, 0x3, 0x7, 0xa9c, 0x9, 0x8, 0x1, 0x2, 0x8d, 0x1000, 0x69f, 0x1ff, 0x9, 0x10, 0x3, 0x10000, 0xfffefffd, 0xf, 0x1, 0x3, 0xffffa9b4, 0x1, 0x4, 0x5, 0x9, 0x4b5f, 0x6, 0x7fffffff, 0xffffffff, 0x1, 0x80000000, 0xb, 0x4, 0x88d, 0x1, 0x7, 0x8, 0x1, 0x89, 0x6, 0x818a, 0x10, 0x8, 0x10, 0xfffffffc, 0xfffff001, 0xa, 0xfffffff7, 0x8000005, 0xfdad, 0xffd, 0x9, 0x10, 0xfffffffd, 0x4, 0x6, 0x400, 0x7, 0x0, 0x80000000, 0xd, 0x2, 0x8001, 0x0, 0x20000003, 0xb6, 0x101, 0x401, 0x2, 0x7, 0xc, 0x6623258, 0xf2, 0x741, 0xfffffffc, 0x9, 0xffffa0a6, 0xc, 0x11, 0x2, 0x8, 0x9, 0x1, 0x7f, 0x98, 0x9, 0xb, 0x800, 0x4, 0x9, 0x5, 0x7, 0x7, 0x8, 0xfe, 0x7f, 0x9, 0x4, 0x6, 0x20080000, 0x2, 0x8000, 0x0, 0x0, 0x1000, 0xb, 0x0, 0x7, 0x400, 0x0, 0xfff, 0x8101, 0x6, 0x0, 0x9, 0xc, 0x5, 0xffe, 0x100, 0xffff, 0x1, 0x401, 0xf0, 0x0, 0xfffff53d, 0x9, 0x2, 0x6, 0x0, 0x4, 0x4b15, 0x10000, 0x1, 0x6, 0x9, 0xd, 0x8, 0x4, 0xfffffe01, 0x1, 0x6, 0x0, 0x2, 0x10001, 0x1, 0x7, 0xe4ce, 0x5, 0x9, 0xffffc487, 0x204, 0x10002, 0x1000, 0x7, 0x6, 0x6, 0x8, 0xfffffe00, 0x1, 0x1, 0x8000000, 0xe, 0x2, 0x2, 0x4, 0x0, 0xb66d, 0x3, 0x1000, 0x1eb4bce6, 0x10, 0x8, 0x1, 0x5, 0x1, 0x5, 0x9, 0x5, 0x7, 0x62f2f805, 0x5, 0x3, 0xffffffff, 0x2, 0x7f, 0x3, 0xd, 0x40, 0x5, 0x2, 0xa, 0x5, 0x6, 0x80000000, 0x25, 0x8, 0x7, 0x7, 0x1, 0x5, 0x9, 0x6708, 0x10001, 0x0, 0x80, 0x8, 0x6, 0x0, 0xa95a, 0x2, 0x5, 0x2, 0x2, 0x4, 0xfff9, 0x80000001, 0x5, 0x1, 0x9, 0x0, 0xb7, 0x3, 0x4000ff, 0x9, 0x0, 0x80, 0xfea5, 0x7fff, 0x7, 0x7, 0x7, 0x7485, 0x197, 0x8, 0x0, 0x5, 0x10, 0x3, 0xe, 0x8, 0x1000, 0x4, 0x7, 0x382d, 0x459, 0xcad, 0x9, 0x0, 0x2, 0x119, 0x6, 0x20000a4, 0xe0, 0xfffffffb, 0x5, 0xffffffff, 0x2, 0x4007, 0xa05a, 0x0, 0x1, 0x3, 0x35, 0x8, 0x1, 0x2, 0x30, 0xb, 0x101, 0x2, 0x9, 0x3, 0x7, 0x8, 0x8, 0x1, 0x2, 0x4, 0x15294b70, 0x3, 0x3, 0x2, 0x1, 0xf, 0x9, 0x1, 0x80000000, 0x9, 0x8001, 0x5, 0x800081, 0x1, 0x2, 0x3fd, 0x1df, 0x6, 0x6, 0xfffffffa, 0x81, 0x9, 0x2, 0x9, 0x1, 0x9, 0x7, 0x2c1, 0x9e95, 0x0, 0xfffffedd, 0x30c8, 0x2, 0x38a0, 0x7b, 0x0, 0x8, 0x4, 0x6, 0x9, 0x0, 0x8, 0x9, 0x8, 0x1ff, 0x7fff, 0x3, 0x9, 0x8, 0x2b, 0x200006, 0x4, 0x7, 0x2, 0x4, 0xbfb, 0x7, 0x405, 0x6, 0x4, 0x91, 0x9, 0x8, 0x3, 0x6ae574d2, 0x6, 0xfffffe00, 0x1000, 0x5, 0x92, 0xffffffff, 0x7fffffff, 0xd7, 0x8001, 0x905, 0x3, 0x6, 0xfffffb31, 0xb, 0x4, 0x7, 0x8, 0x1, 0x6, 0x1, 0xff, 0x103, 0x7, 0x3, 0x6, 0x80000001, 0x0, 0x100a, 0x7fffffff, 0x7fff, 0x2, 0xfffffff8, 0x2, 0x9b3, 0x10001, 0x8, 0x4, 0x8, 0x6, 0x7742348d, 0x5, 0x5, 0x1f, 0x40, 0x0, 0x6, 0xffffffff, 0x7, 0xa, 0x8, 0x17f, 0x6, 0x2, 0x1, 0x6, 0x14827783, 0xb, 0xe, 0x5, 0xfffffffd, 0xfe7, 0xfffffffc, 0x8, 0x7ff, 0x3e9, 0x0, 0x3, 0x2000, 0xa, 0x3, 0x9, 0x80000001, 0x81, 0x8, 0x14, 0x8, 0x4, 0x7f, 0xd, 0xf28c, 0x7, 0x6, 0x4, 0x7fffffff, 0xffff, 0x7fffffff, 0xc9, 0x2, 0xfffffffe, 0x924, 0x499, 0x100, 0x1, 0x5, 0xffff351b, 0x7, 0xfffffffb, 0x3, 0x9, 0x2, 0x7, 0x4, 0x4, 0x8, 0xff, 0xee, 0x2, 0x4, 0x8, 0x9f, 0x7, 0x3, 0x9, 0xc9, 0x1, 0x1, 0x1, 0xfffffff7, 0x0, 0x6, 0x5, 0x6, 0x3fc, 0x51, 0x7, 0xefb, 0x200000b8, 0x1, 0x5, 0xfffffff7, 0x7, 0x7, 0x4, 0x6330, 0xff, 0x6, 0xea, 0xbb2d, 0xfff, 0x7, 0x6, 0x0, 0x6, 0xffff, 0xfffffffa, 0x3, 0x0, 0x1, 0x6, 0xfffffc00, 0x5, 0x7, 0x64c822e3, 0xc, 0x6, 0x80, 0x6, 0xfff, 0x0, 0xa7b, 0x1, 0xfffffff7, 0x7, 0x40, 0xa, 0x9b, 0x3, 0xe, 0xf01, 0x1, 0x3, 0x40, 0x3, 0x4, 0x5, 0x5, 0x7ff, 0x5, 0x8, 0x5, 0x3, 0x8, 0x2, 0x80000001, 0x54, 0x80400, 0x1, 0x8, 0xa, 0x9, 0x10000c0, 0x3, 0x72, 0x80, 0x1000, 0x7, 0x800, 0x6, 0x8, 0x3, 0x93c, 0x6, 0x20000000, 0x0, 0xe, 0x5, 0x3, 0xfffffffa, 0xa01, 0xf3, 0xffffff00, 0x8, 0xe, 0x3, 0x3ff, 0x5, 0x2, 0x6, 0xa3, 0xffff, 0xfffffff9, 0x9, 0x5, 0x62, 0x2, 0x1, 0xfffffffa, 0x2, 0x2, 0x9, 0x7, 0x0, 0x7, 0x8, 0x10000, 0x42, 0xaa1, 0x7, 0x2b, 0x6, 0x10, 0x5, 0x200, 0x9, 0x6, 0x3, 0x8, 0x10, 0x4, 0x6, 0x633, 0xf05, 0x401, 0x101, 0x200, 0x8, 0x7ff, 0x0, 0x40, 0x1, 0x10000, 0x9, 0x40, 0x9, 0xb6f, 0x7f, 0x8, 0x6, 0x1, 0x3, 0x80000001, 0x0, 0x8, 0x8, 0x7, 0xde, 0x6, 0x89, 0x0, 0x100, 0x1, 0x9, 0x6, 0x400, 0x1, 0x0, 0x200, 0xe9ab, 0x3, 0x8000, 0x13, 0x2, 0x2, 0x43, 0x3ff, 0x0, 0x7, 0xc, 0x401, 0x6, 0x7, 0xa, 0xf, 0xf39d, 0x71, 0xfff, 0x7, 0x8]}) r5 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x860b01) socket$packet(0x11, 0x3, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffff}, 0x900}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="54000000120001bd00000000000000000a0300004e234e2200000100ffff00"/56, @ANYRES32, @ANYBLOB="050000000300000008000000000000000800030011"], 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x20004010) write$char_usb(r5, &(0x7f0000000040)="e2", 0x2250) socket$nl_route(0x10, 0x3, 0x0) 31.354581366s ago: executing program 5 (id=4685): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, 0x0, 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, 0x0) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0xa) 31.278867236s ago: executing program 5 (id=4687): sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x1) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x3ff}) readlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000200)=""/237, 0xed) 30.98018753s ago: executing program 5 (id=4695): gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x88008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x1100, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000808, &(0x7f00000001c0)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x5f82, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x50, 0x1f}, {0x48, 0x0, 0x0, 0x40}, {0x6, 0x1, 0x0, 0x3}]}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xc}, {0xfff3}}}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x20040000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000009c0)=ANY=[@ANYBLOB="38000000041401"], 0x38}}, 0x4010) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, 0x0, 0x40000) ioctl$HIDIOCGUSAGES(0xffffffffffffffff, 0xd01c4813, &(0x7f0000000240)={{0x3, 0xe8b5c71a5eb6f040, 0x5, 0xb7a4, 0x1, 0xffff}, 0x341, [0xc, 0x40, 0xcd7, 0x4, 0x6, 0x0, 0x80000000, 0x7, 0x9, 0x7a18fde9, 0x9, 0xf12, 0x4, 0x3, 0x378, 0x9, 0x4, 0x0, 0x1, 0xffff06bd, 0x0, 0xf, 0x1a, 0xf2, 0xd, 0x9, 0x8, 0x10001, 0x401, 0x80000000, 0x401, 0x3ca5, 0x1, 0x0, 0xff, 0x40000004, 0x4, 0x3, 0x0, 0xaa80, 0x40000000, 0x80000000, 0x7fff, 0x7, 0x5, 0xa, 0x0, 0x10000, 0x405, 0x8, 0xffff, 0x91ba, 0x7, 0xb, 0x9, 0xb6, 0x24, 0xcb, 0x180, 0x7f, 0x5, 0x311, 0x66d1, 0x9, 0x9, 0xb6eb, 0xc74, 0x77, 0x1, 0xc0000000, 0x5cb5, 0xfffffffd, 0x401, 0xedf4, 0x4, 0x1000, 0x6, 0xfffffffe, 0x8001, 0xc1, 0x1, 0x8, 0x1, 0x32, 0x98, 0x7f, 0xffff, 0x401, 0x2, 0x2, 0x4680, 0x9a7f, 0xe665, 0x3d6e, 0x3, 0x7, 0x80, 0x4b, 0x9, 0x2, 0xb, 0x6, 0x4fa4, 0x80000000, 0x1, 0xb, 0x0, 0xfffffffa, 0x3, 0x8001, 0xfd, 0x101, 0x4, 0x10, 0xa, 0x6b13, 0x202, 0x7ff, 0x9, 0x80000000, 0xffff, 0x9, 0x3, 0x6, 0x2, 0xffffff87, 0xe, 0xd, 0x5, 0x8, 0x9, 0x7, 0x6, 0x400, 0x8, 0xff2, 0x6, 0x0, 0x6, 0x0, 0x8, 0x1, 0x3, 0x664, 0x4, 0x9, 0x9, 0x2, 0x1ff, 0xfffffffd, 0xeb6, 0x0, 0x9, 0x10001, 0x1, 0x9, 0x9, 0xff, 0x1, 0x4, 0x7ff, 0xe6, 0x6, 0x10001, 0x9, 0x68, 0x7, 0x201, 0x5, 0x3, 0x9a3f, 0x400000, 0x0, 0x80000067, 0xffffff7e, 0x7, 0x10000000, 0x10001, 0x7, 0x3, 0x10, 0x10a, 0xa, 0x40, 0x18, 0x80, 0xb5f8, 0x8bc, 0x3, 0x8000103, 0x5, 0xfffffffc, 0x4, 0x18000, 0x10, 0x1000, 0x288c, 0x1ffe, 0x73ee, 0x1, 0x5, 0x9, 0x7fffffff, 0x73, 0x6, 0x8, 0x6, 0x400, 0x40, 0x0, 0x0, 0x0, 0x546c, 0x981, 0x5aa, 0x7fff, 0x7, 0x2, 0x7, 0xc4c, 0x400045e3, 0x5, 0x7, 0x3, 0x5, 0x3, 0x0, 0x1, 0x2, 0xffffffff, 0x4, 0x200000ce, 0x6, 0x0, 0x1, 0xa, 0x3, 0x0, 0x9, 0x9, 0x37c, 0x10001, 0x8, 0x1, 0x5, 0x2, 0x6, 0x4, 0x6, 0x1, 0x8, 0x6, 0xfffffffa, 0x5, 0x0, 0x9, 0x5, 0x2, 0x7, 0x3, 0xffffff1b, 0x9, 0x2, 0xd, 0x34ea, 0x10000, 0x0, 0x80002001, 0x8, 0x8000, 0x10004, 0x10, 0x8, 0x8, 0x5, 0x1, 0x6, 0x10001, 0x0, 0x5, 0x10000, 0x4, 0xffff, 0x2, 0x89, 0x2, 0x3, 0x1, 0x73, 0x3, 0x9, 0x4, 0x1, 0xb, 0x1, 0x8, 0x0, 0x81, 0x80000004, 0x9, 0x9, 0x0, 0x4, 0x10000004, 0x0, 0x1, 0xce5fb90f, 0x5, 0x4, 0x10001, 0xf, 0x9, 0x100, 0x44, 0x59b, 0x7, 0x8, 0x9, 0x3, 0x2, 0x4, 0x6, 0x0, 0x8, 0x40, 0xd3, 0x7, 0xffffffff, 0x89aa, 0x8, 0x2, 0xf0ce, 0x2, 0x1, 0x0, 0x2, 0xc6, 0x1000, 0x800001, 0x937, 0xa, 0x5e, 0x3, 0xffffffff, 0x5, 0x9, 0x5, 0xffffffff, 0xbe, 0x1, 0x7, 0xe, 0xffffffff, 0x0, 0x3d6, 0x0, 0xae, 0x6, 0x1, 0xfffffeff, 0x4, 0x5, 0x7fff, 0x103, 0x7, 0x6, 0x709, 0x2, 0x49, 0x10, 0xfffffff7, 0xfffff772, 0x8, 0x80000000, 0x3, 0x7, 0xa9c, 0x9, 0x8, 0x1, 0x2, 0x8d, 0x1000, 0x69f, 0x1ff, 0x9, 0x10, 0x3, 0x10000, 0xfffefffd, 0xf, 0x1, 0x3, 0xffffa9b4, 0x1, 0x4, 0x5, 0x9, 0x4b5f, 0x6, 0x7fffffff, 0xffffffff, 0x1, 0x80000000, 0xb, 0x4, 0x88d, 0x1, 0x7, 0x8, 0x1, 0x89, 0x6, 0x818a, 0x10, 0x8, 0x10, 0xfffffffc, 0xfffff001, 0xa, 0xfffffff7, 0x8000005, 0xfdad, 0xffd, 0x9, 0x10, 0xfffffffd, 0x4, 0x6, 0x400, 0x7, 0x0, 0x80000000, 0xd, 0x2, 0x8001, 0x0, 0x20000003, 0xb6, 0x101, 0x401, 0x2, 0x7, 0xc, 0x6623258, 0xf2, 0x741, 0xfffffffc, 0x9, 0xffffa0a6, 0xc, 0x11, 0x2, 0x8, 0x9, 0x1, 0x7f, 0x98, 0x9, 0xb, 0x800, 0x4, 0x9, 0x5, 0x7, 0x7, 0x8, 0xfe, 0x7f, 0x9, 0x4, 0x6, 0x20080000, 0x2, 0x8000, 0x0, 0x0, 0x1000, 0xb, 0x0, 0x7, 0x400, 0x0, 0xfff, 0x8101, 0x6, 0x0, 0x9, 0xc, 0x5, 0xffe, 0x100, 0xffff, 0x1, 0x401, 0xf0, 0x0, 0xfffff53d, 0x9, 0x2, 0x6, 0x0, 0x4, 0x4b15, 0x10000, 0x1, 0x6, 0x9, 0xd, 0x8, 0x4, 0xfffffe01, 0x1, 0x6, 0x0, 0x2, 0x10001, 0x1, 0x7, 0xe4ce, 0x5, 0x9, 0xffffc487, 0x204, 0x10002, 0x1000, 0x7, 0x6, 0x6, 0x8, 0xfffffe00, 0x1, 0x1, 0x8000000, 0xe, 0x2, 0x2, 0x4, 0x0, 0xb66d, 0x3, 0x1000, 0x1eb4bce6, 0x10, 0x8, 0x1, 0x5, 0x1, 0x5, 0x9, 0x5, 0x7, 0x62f2f805, 0x5, 0x3, 0xffffffff, 0x2, 0x7f, 0x3, 0xd, 0x40, 0x5, 0x2, 0xa, 0x5, 0x6, 0x80000000, 0x25, 0x8, 0x7, 0x7, 0x1, 0x5, 0x9, 0x6708, 0x10001, 0x0, 0x80, 0x8, 0x6, 0x0, 0xa95a, 0x2, 0x5, 0x2, 0x2, 0x4, 0xfff9, 0x80000001, 0x5, 0x1, 0x9, 0x0, 0xb7, 0x3, 0x4000ff, 0x9, 0x0, 0x80, 0xfea5, 0x7fff, 0x7, 0x7, 0x7, 0x7485, 0x197, 0x8, 0x0, 0x5, 0x10, 0x3, 0xe, 0x8, 0x1000, 0x4, 0x7, 0x382d, 0x459, 0xcad, 0x9, 0x0, 0x2, 0x119, 0x6, 0x20000a4, 0xe0, 0xfffffffb, 0x5, 0xffffffff, 0x2, 0x4007, 0xa05a, 0x0, 0x1, 0x3, 0x35, 0x8, 0x1, 0x2, 0x30, 0xb, 0x101, 0x2, 0x9, 0x3, 0x7, 0x8, 0x8, 0x1, 0x2, 0x4, 0x15294b70, 0x3, 0x3, 0x2, 0x1, 0xf, 0x9, 0x1, 0x80000000, 0x9, 0x8001, 0x5, 0x800081, 0x1, 0x2, 0x3fd, 0x1df, 0x6, 0x6, 0xfffffffa, 0x81, 0x9, 0x2, 0x9, 0x1, 0x9, 0x7, 0x2c1, 0x9e95, 0x0, 0xfffffedd, 0x30c8, 0x2, 0x38a0, 0x7b, 0x0, 0x8, 0x4, 0x6, 0x9, 0x0, 0x8, 0x9, 0x8, 0x1ff, 0x7fff, 0x3, 0x9, 0x8, 0x2b, 0x200006, 0x4, 0x7, 0x2, 0x4, 0xbfb, 0x7, 0x405, 0x6, 0x4, 0x91, 0x9, 0x8, 0x3, 0x6ae574d2, 0x6, 0xfffffe00, 0x1000, 0x5, 0x92, 0xffffffff, 0x7fffffff, 0xd7, 0x8001, 0x905, 0x3, 0x6, 0xfffffb31, 0xb, 0x4, 0x7, 0x8, 0x1, 0x6, 0x1, 0xff, 0x103, 0x7, 0x3, 0x6, 0x80000001, 0x0, 0x100a, 0x7fffffff, 0x7fff, 0x2, 0xfffffff8, 0x2, 0x9b3, 0x10001, 0x8, 0x4, 0x8, 0x6, 0x7742348d, 0x5, 0x5, 0x1f, 0x40, 0x0, 0x6, 0xffffffff, 0x7, 0xa, 0x8, 0x17f, 0x6, 0x2, 0x1, 0x6, 0x14827783, 0xb, 0xe, 0x5, 0xfffffffd, 0xfe7, 0xfffffffc, 0x8, 0x7ff, 0x3e9, 0x0, 0x3, 0x2000, 0xa, 0x3, 0x9, 0x80000001, 0x81, 0x8, 0x14, 0x8, 0x4, 0x7f, 0xd, 0xf28c, 0x7, 0x6, 0x4, 0x7fffffff, 0xffff, 0x7fffffff, 0xc9, 0x2, 0xfffffffe, 0x924, 0x499, 0x100, 0x1, 0x5, 0xffff351b, 0x7, 0xfffffffb, 0x3, 0x9, 0x2, 0x7, 0x4, 0x4, 0x8, 0xff, 0xee, 0x2, 0x4, 0x8, 0x9f, 0x7, 0x3, 0x9, 0xc9, 0x1, 0x1, 0x1, 0xfffffff7, 0x0, 0x6, 0x5, 0x6, 0x3fc, 0x51, 0x7, 0xefb, 0x200000b8, 0x1, 0x5, 0xfffffff7, 0x7, 0x7, 0x4, 0x6330, 0xff, 0x6, 0xea, 0xbb2d, 0xfff, 0x7, 0x6, 0x0, 0x6, 0xffff, 0xfffffffa, 0x3, 0x0, 0x1, 0x6, 0xfffffc00, 0x5, 0x7, 0x64c822e3, 0xc, 0x6, 0x80, 0x6, 0xfff, 0x0, 0xa7b, 0x1, 0xfffffff7, 0x7, 0x40, 0xa, 0x9b, 0x3, 0xe, 0xf01, 0x1, 0x3, 0x40, 0x3, 0x4, 0x5, 0x5, 0x7ff, 0x5, 0x8, 0x5, 0x3, 0x8, 0x2, 0x80000001, 0x54, 0x80400, 0x1, 0x8, 0xa, 0x9, 0x10000c0, 0x3, 0x72, 0x80, 0x1000, 0x7, 0x800, 0x6, 0x8, 0x3, 0x93c, 0x6, 0x20000000, 0x0, 0xe, 0x5, 0x3, 0xfffffffa, 0xa01, 0xf3, 0xffffff00, 0x8, 0xe, 0x3, 0x3ff, 0x5, 0x2, 0x6, 0xa3, 0xffff, 0xfffffff9, 0x9, 0x5, 0x62, 0x2, 0x1, 0xfffffffa, 0x2, 0x2, 0x9, 0x7, 0x0, 0x7, 0x8, 0x10000, 0x42, 0xaa1, 0x7, 0x2b, 0x6, 0x10, 0x5, 0x200, 0x9, 0x6, 0x3, 0x8, 0x10, 0x4, 0x6, 0x633, 0xf05, 0x401, 0x101, 0x200, 0x8, 0x7ff, 0x0, 0x40, 0x1, 0x10000, 0x9, 0x40, 0x9, 0xb6f, 0x7f, 0x8, 0x6, 0x1, 0x3, 0x80000001, 0x0, 0x8, 0x8, 0x7, 0xde, 0x6, 0x89, 0x0, 0x100, 0x1, 0x9, 0x6, 0x400, 0x1, 0x0, 0x200, 0xe9ab, 0x3, 0x8000, 0x13, 0x2, 0x2, 0x43, 0x3ff, 0x0, 0x7, 0xc, 0x401, 0x6, 0x7, 0xa, 0xf, 0xf39d, 0x71, 0xfff, 0x7, 0x8]}) r5 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x860b01) socket$packet(0x11, 0x3, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffff}, 0x900}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="54000000120001bd00000000000000000a0300004e234e2200000100ffff00"/56, @ANYRES32, @ANYBLOB="050000000300000008000000000000000800030011"], 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x20004010) write$char_usb(r5, &(0x7f0000000040)="e2", 0x2250) socket$nl_route(0x10, 0x3, 0x0) 30.96898549s ago: executing program 44 (id=4695): gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x88008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x1100, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000808, &(0x7f00000001c0)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x5f82, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x50, 0x1f}, {0x48, 0x0, 0x0, 0x40}, {0x6, 0x1, 0x0, 0x3}]}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xc}, {0xfff3}}}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x20040000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000009c0)=ANY=[@ANYBLOB="38000000041401"], 0x38}}, 0x4010) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, 0x0, 0x40000) ioctl$HIDIOCGUSAGES(0xffffffffffffffff, 0xd01c4813, &(0x7f0000000240)={{0x3, 0xe8b5c71a5eb6f040, 0x5, 0xb7a4, 0x1, 0xffff}, 0x341, [0xc, 0x40, 0xcd7, 0x4, 0x6, 0x0, 0x80000000, 0x7, 0x9, 0x7a18fde9, 0x9, 0xf12, 0x4, 0x3, 0x378, 0x9, 0x4, 0x0, 0x1, 0xffff06bd, 0x0, 0xf, 0x1a, 0xf2, 0xd, 0x9, 0x8, 0x10001, 0x401, 0x80000000, 0x401, 0x3ca5, 0x1, 0x0, 0xff, 0x40000004, 0x4, 0x3, 0x0, 0xaa80, 0x40000000, 0x80000000, 0x7fff, 0x7, 0x5, 0xa, 0x0, 0x10000, 0x405, 0x8, 0xffff, 0x91ba, 0x7, 0xb, 0x9, 0xb6, 0x24, 0xcb, 0x180, 0x7f, 0x5, 0x311, 0x66d1, 0x9, 0x9, 0xb6eb, 0xc74, 0x77, 0x1, 0xc0000000, 0x5cb5, 0xfffffffd, 0x401, 0xedf4, 0x4, 0x1000, 0x6, 0xfffffffe, 0x8001, 0xc1, 0x1, 0x8, 0x1, 0x32, 0x98, 0x7f, 0xffff, 0x401, 0x2, 0x2, 0x4680, 0x9a7f, 0xe665, 0x3d6e, 0x3, 0x7, 0x80, 0x4b, 0x9, 0x2, 0xb, 0x6, 0x4fa4, 0x80000000, 0x1, 0xb, 0x0, 0xfffffffa, 0x3, 0x8001, 0xfd, 0x101, 0x4, 0x10, 0xa, 0x6b13, 0x202, 0x7ff, 0x9, 0x80000000, 0xffff, 0x9, 0x3, 0x6, 0x2, 0xffffff87, 0xe, 0xd, 0x5, 0x8, 0x9, 0x7, 0x6, 0x400, 0x8, 0xff2, 0x6, 0x0, 0x6, 0x0, 0x8, 0x1, 0x3, 0x664, 0x4, 0x9, 0x9, 0x2, 0x1ff, 0xfffffffd, 0xeb6, 0x0, 0x9, 0x10001, 0x1, 0x9, 0x9, 0xff, 0x1, 0x4, 0x7ff, 0xe6, 0x6, 0x10001, 0x9, 0x68, 0x7, 0x201, 0x5, 0x3, 0x9a3f, 0x400000, 0x0, 0x80000067, 0xffffff7e, 0x7, 0x10000000, 0x10001, 0x7, 0x3, 0x10, 0x10a, 0xa, 0x40, 0x18, 0x80, 0xb5f8, 0x8bc, 0x3, 0x8000103, 0x5, 0xfffffffc, 0x4, 0x18000, 0x10, 0x1000, 0x288c, 0x1ffe, 0x73ee, 0x1, 0x5, 0x9, 0x7fffffff, 0x73, 0x6, 0x8, 0x6, 0x400, 0x40, 0x0, 0x0, 0x0, 0x546c, 0x981, 0x5aa, 0x7fff, 0x7, 0x2, 0x7, 0xc4c, 0x400045e3, 0x5, 0x7, 0x3, 0x5, 0x3, 0x0, 0x1, 0x2, 0xffffffff, 0x4, 0x200000ce, 0x6, 0x0, 0x1, 0xa, 0x3, 0x0, 0x9, 0x9, 0x37c, 0x10001, 0x8, 0x1, 0x5, 0x2, 0x6, 0x4, 0x6, 0x1, 0x8, 0x6, 0xfffffffa, 0x5, 0x0, 0x9, 0x5, 0x2, 0x7, 0x3, 0xffffff1b, 0x9, 0x2, 0xd, 0x34ea, 0x10000, 0x0, 0x80002001, 0x8, 0x8000, 0x10004, 0x10, 0x8, 0x8, 0x5, 0x1, 0x6, 0x10001, 0x0, 0x5, 0x10000, 0x4, 0xffff, 0x2, 0x89, 0x2, 0x3, 0x1, 0x73, 0x3, 0x9, 0x4, 0x1, 0xb, 0x1, 0x8, 0x0, 0x81, 0x80000004, 0x9, 0x9, 0x0, 0x4, 0x10000004, 0x0, 0x1, 0xce5fb90f, 0x5, 0x4, 0x10001, 0xf, 0x9, 0x100, 0x44, 0x59b, 0x7, 0x8, 0x9, 0x3, 0x2, 0x4, 0x6, 0x0, 0x8, 0x40, 0xd3, 0x7, 0xffffffff, 0x89aa, 0x8, 0x2, 0xf0ce, 0x2, 0x1, 0x0, 0x2, 0xc6, 0x1000, 0x800001, 0x937, 0xa, 0x5e, 0x3, 0xffffffff, 0x5, 0x9, 0x5, 0xffffffff, 0xbe, 0x1, 0x7, 0xe, 0xffffffff, 0x0, 0x3d6, 0x0, 0xae, 0x6, 0x1, 0xfffffeff, 0x4, 0x5, 0x7fff, 0x103, 0x7, 0x6, 0x709, 0x2, 0x49, 0x10, 0xfffffff7, 0xfffff772, 0x8, 0x80000000, 0x3, 0x7, 0xa9c, 0x9, 0x8, 0x1, 0x2, 0x8d, 0x1000, 0x69f, 0x1ff, 0x9, 0x10, 0x3, 0x10000, 0xfffefffd, 0xf, 0x1, 0x3, 0xffffa9b4, 0x1, 0x4, 0x5, 0x9, 0x4b5f, 0x6, 0x7fffffff, 0xffffffff, 0x1, 0x80000000, 0xb, 0x4, 0x88d, 0x1, 0x7, 0x8, 0x1, 0x89, 0x6, 0x818a, 0x10, 0x8, 0x10, 0xfffffffc, 0xfffff001, 0xa, 0xfffffff7, 0x8000005, 0xfdad, 0xffd, 0x9, 0x10, 0xfffffffd, 0x4, 0x6, 0x400, 0x7, 0x0, 0x80000000, 0xd, 0x2, 0x8001, 0x0, 0x20000003, 0xb6, 0x101, 0x401, 0x2, 0x7, 0xc, 0x6623258, 0xf2, 0x741, 0xfffffffc, 0x9, 0xffffa0a6, 0xc, 0x11, 0x2, 0x8, 0x9, 0x1, 0x7f, 0x98, 0x9, 0xb, 0x800, 0x4, 0x9, 0x5, 0x7, 0x7, 0x8, 0xfe, 0x7f, 0x9, 0x4, 0x6, 0x20080000, 0x2, 0x8000, 0x0, 0x0, 0x1000, 0xb, 0x0, 0x7, 0x400, 0x0, 0xfff, 0x8101, 0x6, 0x0, 0x9, 0xc, 0x5, 0xffe, 0x100, 0xffff, 0x1, 0x401, 0xf0, 0x0, 0xfffff53d, 0x9, 0x2, 0x6, 0x0, 0x4, 0x4b15, 0x10000, 0x1, 0x6, 0x9, 0xd, 0x8, 0x4, 0xfffffe01, 0x1, 0x6, 0x0, 0x2, 0x10001, 0x1, 0x7, 0xe4ce, 0x5, 0x9, 0xffffc487, 0x204, 0x10002, 0x1000, 0x7, 0x6, 0x6, 0x8, 0xfffffe00, 0x1, 0x1, 0x8000000, 0xe, 0x2, 0x2, 0x4, 0x0, 0xb66d, 0x3, 0x1000, 0x1eb4bce6, 0x10, 0x8, 0x1, 0x5, 0x1, 0x5, 0x9, 0x5, 0x7, 0x62f2f805, 0x5, 0x3, 0xffffffff, 0x2, 0x7f, 0x3, 0xd, 0x40, 0x5, 0x2, 0xa, 0x5, 0x6, 0x80000000, 0x25, 0x8, 0x7, 0x7, 0x1, 0x5, 0x9, 0x6708, 0x10001, 0x0, 0x80, 0x8, 0x6, 0x0, 0xa95a, 0x2, 0x5, 0x2, 0x2, 0x4, 0xfff9, 0x80000001, 0x5, 0x1, 0x9, 0x0, 0xb7, 0x3, 0x4000ff, 0x9, 0x0, 0x80, 0xfea5, 0x7fff, 0x7, 0x7, 0x7, 0x7485, 0x197, 0x8, 0x0, 0x5, 0x10, 0x3, 0xe, 0x8, 0x1000, 0x4, 0x7, 0x382d, 0x459, 0xcad, 0x9, 0x0, 0x2, 0x119, 0x6, 0x20000a4, 0xe0, 0xfffffffb, 0x5, 0xffffffff, 0x2, 0x4007, 0xa05a, 0x0, 0x1, 0x3, 0x35, 0x8, 0x1, 0x2, 0x30, 0xb, 0x101, 0x2, 0x9, 0x3, 0x7, 0x8, 0x8, 0x1, 0x2, 0x4, 0x15294b70, 0x3, 0x3, 0x2, 0x1, 0xf, 0x9, 0x1, 0x80000000, 0x9, 0x8001, 0x5, 0x800081, 0x1, 0x2, 0x3fd, 0x1df, 0x6, 0x6, 0xfffffffa, 0x81, 0x9, 0x2, 0x9, 0x1, 0x9, 0x7, 0x2c1, 0x9e95, 0x0, 0xfffffedd, 0x30c8, 0x2, 0x38a0, 0x7b, 0x0, 0x8, 0x4, 0x6, 0x9, 0x0, 0x8, 0x9, 0x8, 0x1ff, 0x7fff, 0x3, 0x9, 0x8, 0x2b, 0x200006, 0x4, 0x7, 0x2, 0x4, 0xbfb, 0x7, 0x405, 0x6, 0x4, 0x91, 0x9, 0x8, 0x3, 0x6ae574d2, 0x6, 0xfffffe00, 0x1000, 0x5, 0x92, 0xffffffff, 0x7fffffff, 0xd7, 0x8001, 0x905, 0x3, 0x6, 0xfffffb31, 0xb, 0x4, 0x7, 0x8, 0x1, 0x6, 0x1, 0xff, 0x103, 0x7, 0x3, 0x6, 0x80000001, 0x0, 0x100a, 0x7fffffff, 0x7fff, 0x2, 0xfffffff8, 0x2, 0x9b3, 0x10001, 0x8, 0x4, 0x8, 0x6, 0x7742348d, 0x5, 0x5, 0x1f, 0x40, 0x0, 0x6, 0xffffffff, 0x7, 0xa, 0x8, 0x17f, 0x6, 0x2, 0x1, 0x6, 0x14827783, 0xb, 0xe, 0x5, 0xfffffffd, 0xfe7, 0xfffffffc, 0x8, 0x7ff, 0x3e9, 0x0, 0x3, 0x2000, 0xa, 0x3, 0x9, 0x80000001, 0x81, 0x8, 0x14, 0x8, 0x4, 0x7f, 0xd, 0xf28c, 0x7, 0x6, 0x4, 0x7fffffff, 0xffff, 0x7fffffff, 0xc9, 0x2, 0xfffffffe, 0x924, 0x499, 0x100, 0x1, 0x5, 0xffff351b, 0x7, 0xfffffffb, 0x3, 0x9, 0x2, 0x7, 0x4, 0x4, 0x8, 0xff, 0xee, 0x2, 0x4, 0x8, 0x9f, 0x7, 0x3, 0x9, 0xc9, 0x1, 0x1, 0x1, 0xfffffff7, 0x0, 0x6, 0x5, 0x6, 0x3fc, 0x51, 0x7, 0xefb, 0x200000b8, 0x1, 0x5, 0xfffffff7, 0x7, 0x7, 0x4, 0x6330, 0xff, 0x6, 0xea, 0xbb2d, 0xfff, 0x7, 0x6, 0x0, 0x6, 0xffff, 0xfffffffa, 0x3, 0x0, 0x1, 0x6, 0xfffffc00, 0x5, 0x7, 0x64c822e3, 0xc, 0x6, 0x80, 0x6, 0xfff, 0x0, 0xa7b, 0x1, 0xfffffff7, 0x7, 0x40, 0xa, 0x9b, 0x3, 0xe, 0xf01, 0x1, 0x3, 0x40, 0x3, 0x4, 0x5, 0x5, 0x7ff, 0x5, 0x8, 0x5, 0x3, 0x8, 0x2, 0x80000001, 0x54, 0x80400, 0x1, 0x8, 0xa, 0x9, 0x10000c0, 0x3, 0x72, 0x80, 0x1000, 0x7, 0x800, 0x6, 0x8, 0x3, 0x93c, 0x6, 0x20000000, 0x0, 0xe, 0x5, 0x3, 0xfffffffa, 0xa01, 0xf3, 0xffffff00, 0x8, 0xe, 0x3, 0x3ff, 0x5, 0x2, 0x6, 0xa3, 0xffff, 0xfffffff9, 0x9, 0x5, 0x62, 0x2, 0x1, 0xfffffffa, 0x2, 0x2, 0x9, 0x7, 0x0, 0x7, 0x8, 0x10000, 0x42, 0xaa1, 0x7, 0x2b, 0x6, 0x10, 0x5, 0x200, 0x9, 0x6, 0x3, 0x8, 0x10, 0x4, 0x6, 0x633, 0xf05, 0x401, 0x101, 0x200, 0x8, 0x7ff, 0x0, 0x40, 0x1, 0x10000, 0x9, 0x40, 0x9, 0xb6f, 0x7f, 0x8, 0x6, 0x1, 0x3, 0x80000001, 0x0, 0x8, 0x8, 0x7, 0xde, 0x6, 0x89, 0x0, 0x100, 0x1, 0x9, 0x6, 0x400, 0x1, 0x0, 0x200, 0xe9ab, 0x3, 0x8000, 0x13, 0x2, 0x2, 0x43, 0x3ff, 0x0, 0x7, 0xc, 0x401, 0x6, 0x7, 0xa, 0xf, 0xf39d, 0x71, 0xfff, 0x7, 0x8]}) r5 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x860b01) socket$packet(0x11, 0x3, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffff}, 0x900}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="54000000120001bd00000000000000000a0300004e234e2200000100ffff00"/56, @ANYRES32, @ANYBLOB="050000000300000008000000000000000800030011"], 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x20004010) write$char_usb(r5, &(0x7f0000000040)="e2", 0x2250) socket$nl_route(0x10, 0x3, 0x0) 27.73110729s ago: executing program 3 (id=4747): r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0x77, 0x1501) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff0000/0xd000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fec000/0x14000)=nil, &(0x7f0000fe9000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r1 = io_uring_setup(0x1c79, &(0x7f0000000040)={0x0, 0xc8a0, 0xc000, 0x8, 0x23}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x17, 0x3, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0xffffffff, 0x41, &(0x7f00000004c0)={0x4b5a9da54893e123, 0xf, 0x4, 0x4000, 0x3}, 0x26, 0x200, 0x8, 0x0, 0x0, 0x6, 0x0}) 27.595869991s ago: executing program 3 (id=4751): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000001400)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}]}, @NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x9c}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c0000000d0a010300000000000000000a0000010900020073797a31000000000900010073797a31"], 0x2c}, 0x1, 0x0, 0x0, 0x24000801}, 0x8000) close(r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) recvmsg(r1, &(0x7f0000002240)={0x0, 0x0, 0x0}, 0x0) 27.532049973s ago: executing program 3 (id=4753): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = getpgid(0xffffffffffffffff) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x9, 0x0, 0x2, 0x0, 0x0, 0x7fff, 0x80, 0x9, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={&(0x7f0000000140), 0x3}, 0x402, 0x7, 0x3, 0x4, 0x4, 0x3, 0x3f1, 0x0, 0x8, 0x0, 0x51}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401f, 0x68380, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7e, 0x1, @perf_bp={0x0, 0x1}, 0x10c0e8, 0x0, 0x0, 0x3, 0x6, 0x7ffd, 0x7fff}, 0x0, 0xff6fbfffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x36, &(0x7f0000000580)=ANY=[], 0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000000b00010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}}}, {0x14, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x94}, 0x1, 0x0, 0x0, 0x2000094}, 0x0) connect$inet6(r2, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=' ', 0x1}], 0x1}}], 0x1, 0x4400c800) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x11feb0, 0x1002, 0x20da, 0x0, 0x0, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000180)={0xfffffffd, 0x0, 0x0, 'queue0\x00'}) r5 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000c40), &(0x7f00000000c0)=0x8) socket$inet(0x2, 0x4000000000000001, 0x100) keyctl$restrict_keyring(0xa, 0x0, 0x0, &(0x7f0000000000)='ig:cw2e') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x6, 0x4, 0x3, 0x7}, 0x50) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000001980), 0x0, 0x2000c040) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x3, 0x0, 0xd, 0x8, 0x0, 0x5, 0x82, 0x1dcfdddb1722872a, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xcc20, 0x6, @perf_config_ext={0x8, 0x1}, 0x800, 0x7fffffffffffffff, 0x4, 0x5, 0xa, 0x8000, 0x0, 0x0, 0xe1, 0x0, 0x1}, r0, 0x1, r1, 0x2) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, 0x0) 27.281063485s ago: executing program 3 (id=4758): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) unshare(0x6020400) umount2(&(0x7f00000003c0)='./file0\x00', 0xa) 27.190322377s ago: executing program 3 (id=4760): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) 26.05200085s ago: executing program 3 (id=4768): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = getpgid(0xffffffffffffffff) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x9, 0x0, 0x2, 0x0, 0x0, 0x7fff, 0x80, 0x9, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={&(0x7f0000000140), 0x3}, 0x402, 0x7, 0x3, 0x4, 0x4, 0x3, 0x3f1, 0x0, 0x8, 0x0, 0x51}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401f, 0x68380, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7e, 0x1, @perf_bp={0x0, 0x1}, 0x10c0e8, 0x0, 0x0, 0x3, 0x6, 0x7ffd, 0x7fff}, 0x0, 0xff6fbfffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x36, &(0x7f0000000580)=ANY=[], 0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000000b00010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}}}, {0x14, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x94}, 0x1, 0x0, 0x0, 0x2000094}, 0x0) connect$inet6(r2, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=' ', 0x1}], 0x1}}], 0x1, 0x4400c800) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x11feb0, 0x1002, 0x20da, 0x0, 0x0, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000180)={0xfffffffd, 0x0, 0x0, 'queue0\x00'}) r5 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000c40), &(0x7f00000000c0)=0x8) socket$inet(0x2, 0x4000000000000001, 0x100) keyctl$restrict_keyring(0xa, 0x0, 0x0, &(0x7f0000000000)='ig:cw2e') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x6, 0x4, 0x3, 0x7}, 0x50) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000001980), 0x0, 0x2000c040) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x3, 0x0, 0xd, 0x8, 0x0, 0x5, 0x82, 0x1dcfdddb1722872a, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xcc20, 0x6, @perf_config_ext={0x8, 0x1}, 0x800, 0x7fffffffffffffff, 0x4, 0x5, 0xa, 0x8000, 0x0, 0x0, 0xe1, 0x0, 0x1}, r0, 0x1, r1, 0x2) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, 0x0) 25.841572483s ago: executing program 45 (id=4768): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = getpgid(0xffffffffffffffff) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x9, 0x0, 0x2, 0x0, 0x0, 0x7fff, 0x80, 0x9, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={&(0x7f0000000140), 0x3}, 0x402, 0x7, 0x3, 0x4, 0x4, 0x3, 0x3f1, 0x0, 0x8, 0x0, 0x51}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401f, 0x68380, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7e, 0x1, @perf_bp={0x0, 0x1}, 0x10c0e8, 0x0, 0x0, 0x3, 0x6, 0x7ffd, 0x7fff}, 0x0, 0xff6fbfffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x36, &(0x7f0000000580)=ANY=[], 0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000000b00010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}}}, {0x14, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x94}, 0x1, 0x0, 0x0, 0x2000094}, 0x0) connect$inet6(r2, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r2, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=' ', 0x1}], 0x1}}], 0x1, 0x4400c800) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x11feb0, 0x1002, 0x20da, 0x0, 0x0, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000180)={0xfffffffd, 0x0, 0x0, 'queue0\x00'}) r5 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000c40), &(0x7f00000000c0)=0x8) socket$inet(0x2, 0x4000000000000001, 0x100) keyctl$restrict_keyring(0xa, 0x0, 0x0, &(0x7f0000000000)='ig:cw2e') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x6, 0x4, 0x3, 0x7}, 0x50) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000001980), 0x0, 0x2000c040) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x3, 0x0, 0xd, 0x8, 0x0, 0x5, 0x82, 0x1dcfdddb1722872a, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xcc20, 0x6, @perf_config_ext={0x8, 0x1}, 0x800, 0x7fffffffffffffff, 0x4, 0x5, 0xa, 0x8000, 0x0, 0x0, 0xe1, 0x0, 0x1}, r0, 0x1, r1, 0x2) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, 0x0) 23.613706061s ago: executing program 7 (id=4796): mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) readlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000200)=""/237, 0xed) 23.544008882s ago: executing program 7 (id=4798): syz_open_dev$tty1(0xc, 0x4, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x2000000000000013, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xb8, &(0x7f0000000140)=""/184, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='bic', 0xff3d) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000001c0), 0x4) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001040)=ANY=[@ANYBLOB="e7265155a026b5843c4059a728744d64ef9a6668391f702eefcbdc36eebfc4c4dc", @ANYRES16=r5, @ANYBLOB="01000000000000000000010000000500040001000000"], 0x1c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0208"], 0x48) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x80, &(0x7f0000000000)=""/4102, &(0x7f00000010c0)=0x1006) 19.125334465s ago: executing program 7 (id=4812): sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x0, 0x5, 0x0, 0x0, 0xa, 0x20, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xac, 0xfff, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x7fffffff}, {0x2, 0xfffffffffffffff9, 0x40800000000000, 0x800000000000000}, 0x0, 0x0, 0x1}, [@tmpl={0x44, 0x5, [{{@in=@empty, 0x4d2, 0x3c}, 0x0, @in=@broadcast, 0x0, 0x0, 0x3, 0x0, 0x7}]}]}, 0xfc}}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc000000190001002dbd70000000000064010100000000000000000000000000fc01000000000000000000000000000000000000000000000a0000"], 0xfc}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={0x0, 0x10}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x2, 0x200, @loopback, 0x7}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x24000045, &(0x7f00000001c0)={0xa, 0x2, 0xdfff, @loopback}, 0x1c) 19.001050487s ago: executing program 7 (id=4815): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, 0x0) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(0x0, 0xa) 18.902651938s ago: executing program 7 (id=4818): mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) readlink(0x0, &(0x7f0000000200)=""/237, 0xed) 18.144416597s ago: executing program 7 (id=4821): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) 18.067527558s ago: executing program 46 (id=4821): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{0x0}], 0x1) 9.567083783s ago: executing program 0 (id=4889): socket(0x2, 0xa, 0x300) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x318, 0x0, 0xdb0, 0xf5ffffff}, 0x3f01) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000300)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) bind$packet(r0, &(0x7f00000006c0)={0x11, 0x0, r4, 0x1, 0xb, 0x6, @remote}, 0x14) syz_emit_ethernet(0xd2, 0x0, 0x0) 8.593864185s ago: executing program 0 (id=4899): syz_io_uring_setup(0x2f00, &(0x7f0000000080)={0x0, 0x4000, 0x20, 0x2, 0xfd}, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) futex(&(0x7f000000cffc), 0xb, 0x0, 0x0, &(0x7f0000048000)=0x1, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) r3 = socket$netlink(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x1c) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_emit_ethernet(0x3e, &(0x7f0000000580)={@multicast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "108f84", 0x8, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, {[], @echo_request}}}}}, 0x0) 6.809109096s ago: executing program 8 (id=4912): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 6.796614806s ago: executing program 0 (id=4913): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000600)=@newtaction={0x14, 0x30, 0xb}, 0x14}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8000) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socket(0x400000000010, 0x3, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000340)=@newtfilter={0x84, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r5, {0x4, 0x5}, {}, {0x7, 0x5}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x4, 0xb, 0x0, 0x9, 0x3}}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x20048091}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x149540, 0x0) close(r6) socket$nl_route(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) r7 = socket$kcm(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r7, &(0x7f00000001c0)={&(0x7f0000000840)=@xdp={0x2c, 0x7, r8, 0x31}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000002c0)='\x00', 0x5dc}], 0x1}, 0x4) 6.759266277s ago: executing program 8 (id=4914): gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x88008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x1100, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000808, &(0x7f00000001c0)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x5f82, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="809a72", 0x3, 0x8, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x50, 0x1f}, {0x48, 0x0, 0x0, 0x40}, {0x6, 0x1, 0x0, 0x3}]}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xc}, {0xfff3}}}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x20040000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000009c0)=ANY=[@ANYBLOB="38000000041401"], 0x38}}, 0x4010) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, 0x0, 0x40000) ioctl$HIDIOCGUSAGES(0xffffffffffffffff, 0xd01c4813, &(0x7f0000000240)={{0x3, 0xe8b5c71a5eb6f040, 0x5, 0xb7a4, 0x1, 0xffff}, 0x341, [0xc, 0x40, 0xcd7, 0x4, 0x6, 0x0, 0x80000000, 0x7, 0x9, 0x7a18fde9, 0x9, 0xf12, 0x4, 0x3, 0x378, 0x9, 0x4, 0x0, 0x1, 0xffff06bd, 0x0, 0xf, 0x1a, 0xf2, 0xd, 0x9, 0x8, 0x10001, 0x401, 0x80000000, 0x401, 0x3ca5, 0x1, 0x0, 0xff, 0x40000004, 0x4, 0x3, 0x0, 0xaa80, 0x40000000, 0x80000000, 0x7fff, 0x7, 0x5, 0xa, 0x0, 0x10000, 0x405, 0x8, 0xffff, 0x91ba, 0x7, 0xb, 0x9, 0xb6, 0x24, 0xcb, 0x180, 0x7f, 0x5, 0x311, 0x66d1, 0x9, 0x9, 0xb6eb, 0xc74, 0x77, 0x1, 0xc0000000, 0x5cb5, 0xfffffffd, 0x401, 0xedf4, 0x4, 0x1000, 0x6, 0xfffffffe, 0x8001, 0xc1, 0x1, 0x8, 0x1, 0x32, 0x98, 0x7f, 0xffff, 0x401, 0x2, 0x2, 0x4680, 0x9a7f, 0xe665, 0x3d6e, 0x3, 0x7, 0x80, 0x4b, 0x9, 0x2, 0xb, 0x6, 0x4fa4, 0x80000000, 0x1, 0xb, 0x0, 0xfffffffa, 0x3, 0x8001, 0xfd, 0x101, 0x4, 0x10, 0xa, 0x6b13, 0x202, 0x7ff, 0x9, 0x80000000, 0xffff, 0x9, 0x3, 0x6, 0x2, 0xffffff87, 0xe, 0xd, 0x5, 0x8, 0x9, 0x7, 0x6, 0x400, 0x8, 0xff2, 0x6, 0x0, 0x6, 0x0, 0x8, 0x1, 0x3, 0x664, 0x4, 0x9, 0x9, 0x2, 0x1ff, 0xfffffffd, 0xeb6, 0x0, 0x9, 0x10001, 0x1, 0x9, 0x9, 0xff, 0x1, 0x4, 0x7ff, 0xe6, 0x6, 0x10001, 0x9, 0x68, 0x7, 0x201, 0x5, 0x3, 0x9a3f, 0x400000, 0x0, 0x80000067, 0xffffff7e, 0x7, 0x10000000, 0x10001, 0x7, 0x3, 0x10, 0x10a, 0xa, 0x40, 0x18, 0x80, 0xb5f8, 0x8bc, 0x3, 0x8000103, 0x5, 0xfffffffc, 0x4, 0x18000, 0x10, 0x1000, 0x288c, 0x1ffe, 0x73ee, 0x1, 0x5, 0x9, 0x7fffffff, 0x73, 0x6, 0x8, 0x6, 0x400, 0x40, 0x0, 0x0, 0x0, 0x546c, 0x981, 0x5aa, 0x7fff, 0x7, 0x2, 0x7, 0xc4c, 0x400045e3, 0x5, 0x7, 0x3, 0x5, 0x3, 0x0, 0x1, 0x2, 0xffffffff, 0x4, 0x200000ce, 0x6, 0x0, 0x1, 0xa, 0x3, 0x0, 0x9, 0x9, 0x37c, 0x10001, 0x8, 0x1, 0x5, 0x2, 0x6, 0x4, 0x6, 0x1, 0x8, 0x6, 0xfffffffa, 0x5, 0x0, 0x9, 0x5, 0x2, 0x7, 0x3, 0xffffff1b, 0x9, 0x2, 0xd, 0x34ea, 0x10000, 0x0, 0x80002001, 0x8, 0x8000, 0x10004, 0x10, 0x8, 0x8, 0x5, 0x1, 0x6, 0x10001, 0x0, 0x5, 0x10000, 0x4, 0xffff, 0x2, 0x89, 0x2, 0x3, 0x1, 0x73, 0x3, 0x9, 0x4, 0x1, 0xb, 0x1, 0x8, 0x0, 0x81, 0x80000004, 0x9, 0x9, 0x0, 0x4, 0x10000004, 0x0, 0x1, 0xce5fb90f, 0x5, 0x4, 0x10001, 0xf, 0x9, 0x100, 0x44, 0x59b, 0x7, 0x8, 0x9, 0x3, 0x2, 0x4, 0x6, 0x0, 0x8, 0x40, 0xd3, 0x7, 0xffffffff, 0x89aa, 0x8, 0x2, 0xf0ce, 0x2, 0x1, 0x0, 0x2, 0xc6, 0x1000, 0x800001, 0x937, 0xa, 0x5e, 0x3, 0xffffffff, 0x5, 0x9, 0x5, 0xffffffff, 0xbe, 0x1, 0x7, 0xe, 0xffffffff, 0x0, 0x3d6, 0x0, 0xae, 0x6, 0x1, 0xfffffeff, 0x4, 0x5, 0x7fff, 0x103, 0x7, 0x6, 0x709, 0x2, 0x49, 0x10, 0xfffffff7, 0xfffff772, 0x8, 0x80000000, 0x3, 0x7, 0xa9c, 0x9, 0x8, 0x1, 0x2, 0x8d, 0x1000, 0x69f, 0x1ff, 0x9, 0x10, 0x3, 0x10000, 0xfffefffd, 0xf, 0x1, 0x3, 0xffffa9b4, 0x1, 0x4, 0x5, 0x9, 0x4b5f, 0x6, 0x7fffffff, 0xffffffff, 0x1, 0x80000000, 0xb, 0x4, 0x88d, 0x1, 0x7, 0x8, 0x1, 0x89, 0x6, 0x818a, 0x10, 0x8, 0x10, 0xfffffffc, 0xfffff001, 0xa, 0xfffffff7, 0x8000005, 0xfdad, 0xffd, 0x9, 0x10, 0xfffffffd, 0x4, 0x6, 0x400, 0x7, 0x0, 0x80000000, 0xd, 0x2, 0x8001, 0x0, 0x20000003, 0xb6, 0x101, 0x401, 0x2, 0x7, 0xc, 0x6623258, 0xf2, 0x741, 0xfffffffc, 0x9, 0xffffa0a6, 0xc, 0x11, 0x2, 0x8, 0x9, 0x1, 0x7f, 0x98, 0x9, 0xb, 0x800, 0x4, 0x9, 0x5, 0x7, 0x7, 0x8, 0xfe, 0x7f, 0x9, 0x4, 0x6, 0x20080000, 0x2, 0x8000, 0x0, 0x0, 0x1000, 0xb, 0x0, 0x7, 0x400, 0x0, 0xfff, 0x8101, 0x6, 0x0, 0x9, 0xc, 0x5, 0xffe, 0x100, 0xffff, 0x1, 0x401, 0xf0, 0x0, 0xfffff53d, 0x9, 0x2, 0x6, 0x0, 0x4, 0x4b15, 0x10000, 0x1, 0x6, 0x9, 0xd, 0x8, 0x4, 0xfffffe01, 0x1, 0x6, 0x0, 0x2, 0x10001, 0x1, 0x7, 0xe4ce, 0x5, 0x9, 0xffffc487, 0x204, 0x10002, 0x1000, 0x7, 0x6, 0x6, 0x8, 0xfffffe00, 0x1, 0x1, 0x8000000, 0xe, 0x2, 0x2, 0x4, 0x0, 0xb66d, 0x3, 0x1000, 0x1eb4bce6, 0x10, 0x8, 0x1, 0x5, 0x1, 0x5, 0x9, 0x5, 0x7, 0x62f2f805, 0x5, 0x3, 0xffffffff, 0x2, 0x7f, 0x3, 0xd, 0x40, 0x5, 0x2, 0xa, 0x5, 0x6, 0x80000000, 0x25, 0x8, 0x7, 0x7, 0x1, 0x5, 0x9, 0x6708, 0x10001, 0x0, 0x80, 0x8, 0x6, 0x0, 0xa95a, 0x2, 0x5, 0x2, 0x2, 0x4, 0xfff9, 0x80000001, 0x5, 0x1, 0x9, 0x0, 0xb7, 0x3, 0x4000ff, 0x9, 0x0, 0x80, 0xfea5, 0x7fff, 0x7, 0x7, 0x7, 0x7485, 0x197, 0x8, 0x0, 0x5, 0x10, 0x3, 0xe, 0x8, 0x1000, 0x4, 0x7, 0x382d, 0x459, 0xcad, 0x9, 0x0, 0x2, 0x119, 0x6, 0x20000a4, 0xe0, 0xfffffffb, 0x5, 0xffffffff, 0x2, 0x4007, 0xa05a, 0x0, 0x1, 0x3, 0x35, 0x8, 0x1, 0x2, 0x30, 0xb, 0x101, 0x2, 0x9, 0x3, 0x7, 0x8, 0x8, 0x1, 0x2, 0x4, 0x15294b70, 0x3, 0x3, 0x2, 0x1, 0xf, 0x9, 0x1, 0x80000000, 0x9, 0x8001, 0x5, 0x800081, 0x1, 0x2, 0x3fd, 0x1df, 0x6, 0x6, 0xfffffffa, 0x81, 0x9, 0x2, 0x9, 0x1, 0x9, 0x7, 0x2c1, 0x9e95, 0x0, 0xfffffedd, 0x30c8, 0x2, 0x38a0, 0x7b, 0x0, 0x8, 0x4, 0x6, 0x9, 0x0, 0x8, 0x9, 0x8, 0x1ff, 0x7fff, 0x3, 0x9, 0x8, 0x2b, 0x200006, 0x4, 0x7, 0x2, 0x4, 0xbfb, 0x7, 0x405, 0x6, 0x4, 0x91, 0x9, 0x8, 0x3, 0x6ae574d2, 0x6, 0xfffffe00, 0x1000, 0x5, 0x92, 0xffffffff, 0x7fffffff, 0xd7, 0x8001, 0x905, 0x3, 0x6, 0xfffffb31, 0xb, 0x4, 0x7, 0x8, 0x1, 0x6, 0x1, 0xff, 0x103, 0x7, 0x3, 0x6, 0x80000001, 0x0, 0x100a, 0x7fffffff, 0x7fff, 0x2, 0xfffffff8, 0x2, 0x9b3, 0x10001, 0x8, 0x4, 0x8, 0x6, 0x7742348d, 0x5, 0x5, 0x1f, 0x40, 0x0, 0x6, 0xffffffff, 0x7, 0xa, 0x8, 0x17f, 0x6, 0x2, 0x1, 0x6, 0x14827783, 0xb, 0xe, 0x5, 0xfffffffd, 0xfe7, 0xfffffffc, 0x8, 0x7ff, 0x3e9, 0x0, 0x3, 0x2000, 0xa, 0x3, 0x9, 0x80000001, 0x81, 0x8, 0x14, 0x8, 0x4, 0x7f, 0xd, 0xf28c, 0x7, 0x6, 0x4, 0x7fffffff, 0xffff, 0x7fffffff, 0xc9, 0x2, 0xfffffffe, 0x924, 0x499, 0x100, 0x1, 0x5, 0xffff351b, 0x7, 0xfffffffb, 0x3, 0x9, 0x2, 0x7, 0x4, 0x4, 0x8, 0xff, 0xee, 0x2, 0x4, 0x8, 0x9f, 0x7, 0x3, 0x9, 0xc9, 0x1, 0x1, 0x1, 0xfffffff7, 0x0, 0x6, 0x5, 0x6, 0x3fc, 0x51, 0x7, 0xefb, 0x200000b8, 0x1, 0x5, 0xfffffff7, 0x7, 0x7, 0x4, 0x6330, 0xff, 0x6, 0xea, 0xbb2d, 0xfff, 0x7, 0x6, 0x0, 0x6, 0xffff, 0xfffffffa, 0x3, 0x0, 0x1, 0x6, 0xfffffc00, 0x5, 0x7, 0x64c822e3, 0xc, 0x6, 0x80, 0x6, 0xfff, 0x0, 0xa7b, 0x1, 0xfffffff7, 0x7, 0x40, 0xa, 0x9b, 0x3, 0xe, 0xf01, 0x1, 0x3, 0x40, 0x3, 0x4, 0x5, 0x5, 0x7ff, 0x5, 0x8, 0x5, 0x3, 0x8, 0x2, 0x80000001, 0x54, 0x80400, 0x1, 0x8, 0xa, 0x9, 0x10000c0, 0x3, 0x72, 0x80, 0x1000, 0x7, 0x800, 0x6, 0x8, 0x3, 0x93c, 0x6, 0x20000000, 0x0, 0xe, 0x5, 0x3, 0xfffffffa, 0xa01, 0xf3, 0xffffff00, 0x8, 0xe, 0x3, 0x3ff, 0x5, 0x2, 0x6, 0xa3, 0xffff, 0xfffffff9, 0x9, 0x5, 0x62, 0x2, 0x1, 0xfffffffa, 0x2, 0x2, 0x9, 0x7, 0x0, 0x7, 0x8, 0x10000, 0x42, 0xaa1, 0x7, 0x2b, 0x6, 0x10, 0x5, 0x200, 0x9, 0x6, 0x3, 0x8, 0x10, 0x4, 0x6, 0x633, 0xf05, 0x401, 0x101, 0x200, 0x8, 0x7ff, 0x0, 0x40, 0x1, 0x10000, 0x9, 0x40, 0x9, 0xb6f, 0x7f, 0x8, 0x6, 0x1, 0x3, 0x80000001, 0x0, 0x8, 0x8, 0x7, 0xde, 0x6, 0x89, 0x0, 0x100, 0x1, 0x9, 0x6, 0x400, 0x1, 0x0, 0x200, 0xe9ab, 0x3, 0x8000, 0x13, 0x2, 0x2, 0x43, 0x3ff, 0x0, 0x7, 0xc, 0x401, 0x6, 0x7, 0xa, 0xf, 0xf39d, 0x71, 0xfff, 0x7, 0x8]}) socket$packet(0x11, 0x3, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffff}, 0x900}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="54000000120001bd00000000000000000a0300004e234e2200000100ffff00"/56, @ANYRES32, @ANYBLOB="050000000300000008000000000000000800030011"], 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x20004010) write$char_usb(0xffffffffffffffff, &(0x7f0000000040)="e2", 0x2250) socket$nl_route(0x10, 0x3, 0x0) 5.892387087s ago: executing program 8 (id=4926): gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x88008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x1100, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000808, &(0x7f00000001c0)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x5f82, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="809a72", 0x3, 0x8, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x50, 0x1f}, {0x48, 0x0, 0x0, 0x40}, {0x6, 0x1, 0x0, 0x3}]}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xc}, {0xfff3}}}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x20040000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000009c0)=ANY=[@ANYBLOB="38000000041401"], 0x38}}, 0x4010) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, 0x0, 0x40000) r5 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x860b01) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffff}, 0x900}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="54000000120001bd00000000000000000a0300004e234e2200000100ffff00"/56, @ANYRES32=r7, @ANYBLOB="050000000300000008000000000000000800030011"], 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x20004010) write$char_usb(r5, &(0x7f0000000040)="e2", 0x2250) socket$nl_route(0x10, 0x3, 0x0) 5.371799884s ago: executing program 4 (id=4929): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0x1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x1, 0x470bd27, 0x25dfd402, {0x0, 0x0, 0x0, r3, 0x64e98, 0x16ac1}}, 0x20}, 0x1, 0x0, 0x0, 0x400c080}, 0x200088c2) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB="4c000000020603000000000000000000000000001400078008001240000000000500150002000000050001000600000005000500020000000500040000000000090002"], 0x4c}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000080900010073797a30000000005c000000030a03000000000000000000050000000900010073797a30000000000900030073797a300000000008000a40000000032800048008000240000000120800014000000000140004"], 0xa4}}, 0x0) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001a00)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x11, 0x16, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xd}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}]}, &(0x7f0000000400)='GPL\x00', 0x7fe, 0x1000, &(0x7f0000000a00)=""/4096, 0x41000, 0x40, '\x00', r3, 0x0, r5, 0x8, &(0x7f0000001a40)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001a80)={0x3, 0x1, 0x8, 0x376}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000001ac0), &(0x7f0000001b00)=[{0x3, 0x5, 0x4, 0x1}, {0x2, 0x3, 0xe, 0xb}, {0x1, 0x4, 0x9, 0x5}], 0x10, 0x4}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x19}}]}, &(0x7f0000000240)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x24018804) r7 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80000) ioctl$sock_SIOCBRDELBR(r7, 0x89a1, &(0x7f00000000c0)='veth1\x00') r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0xfe}, 0x0, 0x0, 0x43a1bd78, 0x7, 0x9, 0x6, 0x6, 0x0, 0x0, 0x0, 0x200b}, 0xffffffffffffffff, 0x24000000000, 0xffffffffffffffff, 0xa) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r11, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000001200010025bd7000fddbdf25ac1e0101000000000000000000000000008004d60200ff00"], 0x34}, 0x1, 0x0, 0x0, 0x44901}, 0x20048080) r12 = gettid() process_vm_readv(r12, &(0x7f0000001140)=[{&(0x7f0000000000)=""/87, 0x62}, {&(0x7f0000001200)=""/4096, 0x100a}], 0x2, &(0x7f00000011c0)=[{0xffffffffffffffff, 0x19000}], 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x8, 0x94, 0x7fff0000}]}) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in=@local, 0x0, 0x5, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa9, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3}, {0x0, 0x4, 0x40800000000000, 0x800000000000000}}, [@tmpl={0x44, 0x5, [{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x3c}, 0x0, @in=@broadcast, 0x0, 0x0, 0x3, 0x0, 0x1000000}]}]}, 0xfc}}, 0x48016) r13 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r13, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000740)=ANY=[@ANYBLOB="180100002100010000000000fefffffffc0200000000000000000000000000fefc020000000000000000000000000001fffc0000000000040a00e08000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="02000000000000009c001100ac1414aa000000000000000000000000fc000000000000000000000000000001fc020000000000000000000000000000fe8000000000000000000000000000aa330300d3010000000000000000000000000000000000ffff7f00000100000000000000000000ffff0a01010264010102000000000000000000000000fc0200000000000000000000000000003c00000000000000080008002c0013"], 0x118}, 0x1, 0x0, 0x0, 0x800}, 0x42000) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="380000006800010003001000fdffff7f00000000000000000c00020001000000150000000c000c8006000100d43f000006000300010000005e5214d7fdbf019bd315e7ee93b1d78a56dbdb3c1ce925ba09f28c58aceea9b78f408cb4195e6724e7f4b358becdcd6b943c0fd74bfefe2f6361aa39362f3f8898379046eb1aedc174fe1ab9df11e38b17a696b4cc3558acadf263df8860bd436b1c3ee6c365b9e8d899f9332ca0dbb33e22850d68528b2c"], 0x38}, 0x1, 0x0, 0x0, 0x4008018}, 0x4000080) 5.301420245s ago: executing program 4 (id=4930): gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x88008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x1100, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000808, &(0x7f00000001c0)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x5f82, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="809a72", 0x3, 0x8, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x50, 0x1f}, {0x48, 0x0, 0x0, 0x40}, {0x6, 0x1, 0x0, 0x3}]}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xc}, {0xfff3}}}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x20040000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000009c0)=ANY=[@ANYBLOB="38000000041401"], 0x38}}, 0x4010) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, 0x0, 0x40000) r5 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x860b01) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffff}, 0x900}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="54000000120001bd00000000000000000a0300004e234e2200000100ffff00"/56, @ANYRES32=r7, @ANYBLOB="050000000300000008000000000000000800030011"], 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x20004010) write$char_usb(r5, &(0x7f0000000040)="e2", 0x2250) socket$nl_route(0x10, 0x3, 0x0) 5.265974215s ago: executing program 4 (id=4931): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x10, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffffffe}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@call={0x85, 0x0, 0x0, 0xe}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x0, 0x8, &(0x7f00000002c0), &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.219090136s ago: executing program 4 (id=4932): setresuid(0x0, 0xee01, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x24040811}, 0x8410) 5.218718656s ago: executing program 4 (id=4933): syz_open_dev$tty1(0xc, 0x4, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x2000000000000013, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xb8, &(0x7f0000000140)=""/184, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='bic', 0xff3d) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000001c0), 0x4) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001040)=ANY=[@ANYBLOB="e7265155a026b5843c4059a728744d64ef9a6668391f702eefcbdc36eebfc4c4dc", @ANYRES16=r5, @ANYBLOB="01000000000000000000010000000500040001000000"], 0x1c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0208"], 0x48) r6 = socket(0x2, 0x80805, 0x0) getsockopt$bt_hci(r6, 0x84, 0x80, &(0x7f0000000000)=""/4102, &(0x7f00000010c0)=0x1006) 5.030323008s ago: executing program 8 (id=4934): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, 0x0) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0xa) 4.995285569s ago: executing program 8 (id=4935): r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0x77, 0x1501) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff0000/0xd000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fec000/0x14000)=nil, &(0x7f0000fe9000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x1c79, &(0x7f0000000040)={0x0, 0xc8a0, 0xc000, 0x8, 0x23}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x17, 0x3, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0xffffffff, 0x41, 0x0, 0x0, 0x200, 0x8, 0x0, 0x0, 0x6, 0x0}) 4.788466141s ago: executing program 8 (id=4936): sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000440)=[{{0x0, 0x0, &(0x7f0000000540), 0x0, 0x0, 0x0, 0x900}}], 0x1, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000000)=""/102, 0x365}, {&(0x7f0000000280)=""/76, 0x14c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/92, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x188}, {&(0x7f00000007c0)=""/154, 0x2c}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 4.788265281s ago: executing program 47 (id=4936): sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000440)=[{{0x0, 0x0, &(0x7f0000000540), 0x0, 0x0, 0x0, 0x900}}], 0x1, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000000)=""/102, 0x365}, {&(0x7f0000000280)=""/76, 0x14c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/92, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x188}, {&(0x7f00000007c0)=""/154, 0x2c}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 4.571774634s ago: executing program 1 (id=4939): setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x4001, 0x3, 0x200, 0x0, 0x700001b, 0x148, 0x0, 0x148, 0x1b8, 0x206, 0x240, 0x1b8, 0x240, 0x7fffffe, 0x0, {[{{@ip={@loopback, @empty, 0xffffffff, 0x0, 'tunl0\x00', 'veth0_to_bond\x00', {0xff}, {}, 0x1}, 0x1ea, 0x70, 0xd0, 0x0, {0x390, 0x8f00}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x2, 0x3, 0x1, 0x2, 0x7], 0x2, 0x5}, {0x0, [0x3, 0x6f455bfb4ce26171, 0x6, 0x6, 0x2, 0x21debfafc4f76fce], 0x3}}}}, {{@ip={@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xe2002454fb7b9fcc, 0xff, 'team0\x00', 'gre0\x00', {}, {0xff}, 0x8, 0x2, 0x5}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x10, 0x9, 0xf9}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x260) r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000240)=0xe9, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000400)=ANY=[@ANYBLOB], 0xdd12}], 0x1, 0x0, 0x0, 0x4000007}, 0x0) 4.544532644s ago: executing program 1 (id=4940): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0x1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x1, 0x470bd27, 0x25dfd402, {0x0, 0x0, 0x0, r3, 0x64e98, 0x16ac1}}, 0x20}, 0x1, 0x0, 0x0, 0x400c080}, 0x200088c2) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB="4c000000020603000000000000000000000000001400078008001240000000000500150002000000050001000600000005000500020000000500040000000000090002"], 0x4c}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000080900010073797a30000000005c000000030a03000000000000000000050000000900010073797a30000000000900030073797a300000000008000a40000000032800048008000240000000120800014000000000140004"], 0xa4}}, 0x0) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001a00)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x11, 0x16, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xd}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}]}, &(0x7f0000000400)='GPL\x00', 0x7fe, 0x1000, &(0x7f0000000a00)=""/4096, 0x41000, 0x40, '\x00', r3, 0x0, r5, 0x8, &(0x7f0000001a40)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001a80)={0x3, 0x1, 0x8, 0x376}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000001ac0), &(0x7f0000001b00)=[{0x3, 0x5, 0x4, 0x1}, {0x2, 0x3, 0xe, 0xb}, {0x1, 0x4, 0x9, 0x5}], 0x10, 0x4}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x19}}]}, &(0x7f0000000240)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x24018804) r7 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80000) ioctl$sock_SIOCBRDELBR(r7, 0x89a1, &(0x7f00000000c0)='veth1\x00') r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0xfe}, 0x0, 0x0, 0x43a1bd78, 0x7, 0x9, 0x6, 0x6, 0x0, 0x0, 0x0, 0x200b}, 0xffffffffffffffff, 0x24000000000, 0xffffffffffffffff, 0xa) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r11, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000001200010025bd7000fddbdf25ac1e0101000000000000000000000000008004d60200ff00"], 0x34}, 0x1, 0x0, 0x0, 0x44901}, 0x20048080) r12 = gettid() process_vm_readv(r12, &(0x7f0000001140)=[{&(0x7f0000000000)=""/87, 0x62}, {&(0x7f0000001200)=""/4096, 0x100a}], 0x2, &(0x7f00000011c0)=[{0xffffffffffffffff, 0x19000}], 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x8, 0x94, 0x7fff0000}]}) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in=@local, 0x0, 0x5, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa9, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3}, {0x0, 0x4, 0x40800000000000, 0x800000000000000}}, [@tmpl={0x44, 0x5, [{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x3c}, 0x0, @in=@broadcast, 0x0, 0x0, 0x3, 0x0, 0x1000000}]}]}, 0xfc}}, 0x48016) r13 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r13, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000740)=ANY=[@ANYBLOB="180100002100010000000000fefffffffc0200000000000000000000000000fefc020000000000000000000000000001fffc0000000000040a00e08000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="02000000000000009c001100ac1414aa000000000000000000000000fc000000000000000000000000000001fc020000000000000000000000000000fe8000000000000000000000000000aa330300d3010000000000000000000000000000000000ffff7f00000100000000000000000000ffff0a01010264010102000000000000000000000000fc0200000000000000000000000000003c00000000000000080008002c0013"], 0x118}, 0x1, 0x0, 0x0, 0x800}, 0x42000) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="380000006800010003001000fdffff7f00000000000000000c00020001000000150000000c000c8006000100d43f000006000300010000005e5214d7fdbf019bd315e7ee93b1d78a56dbdb3c1ce925ba09f28c58aceea9b78f408cb4195e6724e7f4b358becdcd6b943c0fd74bfefe2f6361aa39362f3f8898379046eb1aedc174fe1ab9df11e38b17a696b4cc3558acadf263df8860bd436b1c3ee6c365b9e8d899f9332ca0dbb33e22850d68528b2c"], 0x38}, 0x1, 0x0, 0x0, 0x4008018}, 0x4000080) 4.410656276s ago: executing program 1 (id=4941): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r3 = socket$unix(0x1, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000026c0)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd2c, 0x1, {0x0, 0x0, 0x0, r5, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18, 0x1, {0x0, '\x00', 0x1, 0x7, 0x100, 0x8}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56441, 0x70bd25, 0x80000, {0x0, 0x0, 0x0, r5, {}, {0x2, 0xb}, {0x9, 0xb}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008065}, 0x204c0c0) ioctl$SIOCSIFHWADDR(r1, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 3.831632803s ago: executing program 1 (id=4945): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, 0x0) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0xa) 3.797167543s ago: executing program 1 (id=4946): socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x9, 0x0, 0x2, 0x0, 0x0, 0x7fff, 0x80, 0x9, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={&(0x7f0000000140), 0x3}, 0x402, 0x7, 0x3, 0x4, 0x4, 0x3, 0x3f1, 0x0, 0x8, 0x0, 0x51}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401f, 0x68380, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7e, 0x1, @perf_bp={0x0, 0x1}, 0x10c0e8, 0x0, 0x0, 0x3, 0x6, 0x7ffd, 0x7fff}, 0x0, 0xff6fbfffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000580)=ANY=[], 0x8) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000000b00010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @flow_offload={{0x11}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}}}, {0x14, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x94}, 0x1, 0x0, 0x0, 0x2000094}, 0x0) 3.438488858s ago: executing program 2 (id=4947): syz_io_uring_setup(0x2f00, &(0x7f0000000080)={0x0, 0x4000, 0x20, 0x2, 0xfd}, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) futex(&(0x7f000000cffc), 0xb, 0x0, 0x0, &(0x7f0000048000)=0x1, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) r1 = socket$netlink(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast2}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x1c) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_emit_ethernet(0x3e, &(0x7f0000000580)={@multicast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "108f84", 0x8, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, {[], @echo_request}}}}}, 0x0) 3.24750822s ago: executing program 1 (id=4948): syz_open_dev$tty1(0xc, 0x4, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x2000000000000013, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xb8, &(0x7f0000000140)=""/184, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='bic', 0xff3d) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000001c0), 0x4) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001040)=ANY=[@ANYBLOB="e7265155a026b5843c4059a728744d64ef9a6668391f702eefcbdc36eebfc4c4dc", @ANYRES16=r4, @ANYBLOB="01000000000000000000010000000500040001000000"], 0x1c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0208"], 0x48) r5 = socket(0x2, 0x80805, 0x0) getsockopt$bt_hci(r5, 0x84, 0x80, &(0x7f0000000000)=""/4102, &(0x7f00000010c0)=0x1006) sendto$inet(r3, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) recvfrom$inet(r3, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0xc9100120, 0x0, 0xfffffffffffffd25) 3.174632661s ago: executing program 2 (id=4949): r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000200)='`', 0x1) setsockopt$inet6_udp_int(r0, 0x11, 0x68, &(0x7f0000000080)=0xa40, 0x4) recvmmsg(r1, &(0x7f0000001bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)=""/35, 0x23}, 0x7}], 0x1, 0x40000100, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e23, 0x3, @mcast1, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) write(r2, &(0x7f0000000300)="89ba41c97928dec7cec15a160d3dba2553b519a795020072aed129d4b5247c983455b3d757e8b2333a64d9abf416fd83f942661c47bcdf71f7d07ba20d03474a4a4bce636ea8d2b882b2b49ef18e2a96e41f206d930eda2769c5ee6d5e3d541ce9a21c3ce5cb5fbdad9a45de0000000000000000000000000000f1d3b9821c18", 0x80) 3.145307921s ago: executing program 48 (id=4948): syz_open_dev$tty1(0xc, 0x4, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x2000000000000013, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xb8, &(0x7f0000000140)=""/184, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='bic', 0xff3d) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000001c0), 0x4) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001040)=ANY=[@ANYBLOB="e7265155a026b5843c4059a728744d64ef9a6668391f702eefcbdc36eebfc4c4dc", @ANYRES16=r4, @ANYBLOB="01000000000000000000010000000500040001000000"], 0x1c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0208"], 0x48) r5 = socket(0x2, 0x80805, 0x0) getsockopt$bt_hci(r5, 0x84, 0x80, &(0x7f0000000000)=""/4102, &(0x7f00000010c0)=0x1006) sendto$inet(r3, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) recvfrom$inet(r3, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0xc9100120, 0x0, 0xfffffffffffffd25) 3.011620333s ago: executing program 0 (id=4951): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0x1}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x1, 0x470bd27, 0x25dfd402, {0x0, 0x0, 0x0, r2, 0x64e98, 0x16ac1}}, 0x20}, 0x1, 0x0, 0x0, 0x400c080}, 0x200088c2) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB="4c000000020603000000000000000000000000001400078008001240000000000500150002000000050001000600000005000500020000000500040000000000090002"], 0x4c}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000080900010073797a30000000005c000000030a03000000000000000000050000000900010073797a30000000000900030073797a300000000008000a40000000032800048008000240000000120800014000000000140004"], 0xa4}}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001a00)=0xffffffffffffffff, 0x4) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x19}}]}, &(0x7f0000000240)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x24018804) r5 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80000) ioctl$sock_SIOCBRDELBR(r5, 0x89a1, &(0x7f00000000c0)='veth1\x00') r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0xfe}, 0x0, 0x0, 0x43a1bd78, 0x7, 0x9, 0x6, 0x6, 0x0, 0x0, 0x0, 0x200b}, 0xffffffffffffffff, 0x24000000000, 0xffffffffffffffff, 0xa) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000001200010025bd7000fddbdf25ac1e0101000000000000000000000000008004d60200ff00"], 0x34}, 0x1, 0x0, 0x0, 0x44901}, 0x20048080) r10 = gettid() process_vm_readv(r10, &(0x7f0000001140)=[{&(0x7f0000000000)=""/87, 0x62}, {&(0x7f0000001200)=""/4096, 0x100a}], 0x2, &(0x7f00000011c0)=[{0xffffffffffffffff, 0x19000}], 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x8, 0x94, 0x7fff0000}]}) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in=@local, 0x0, 0x5, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa9, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3}, {0x0, 0x4, 0x40800000000000, 0x800000000000000}}, [@tmpl={0x44, 0x5, [{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x3c}, 0x0, @in=@broadcast, 0x0, 0x0, 0x3, 0x0, 0x1000000}]}]}, 0xfc}}, 0x48016) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r11, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000740)=ANY=[@ANYBLOB="180100002100010000000000fefffffffc0200000000000000000000000000fefc020000000000000000000000000001fffc0000000000040a00e08000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="02000000000000009c001100ac1414aa000000000000000000000000fc000000000000000000000000000001fc020000000000000000000000000000fe8000000000000000000000000000aa330300d3010000000000000000000000000000000000ffff7f00000100000000000000000000ffff0a01010264010102000000000000000000000000fc0200000000000000000000000000003c00000000000000080008002c0013"], 0x118}, 0x1, 0x0, 0x0, 0x800}, 0x42000) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="380000006800010003001000fdffff7f00000000000000000c00020001000000150000000c000c8006000100d43f000006000300010000005e5214d7fdbf019bd315e7ee93b1d78a56dbdb3c1ce925ba09f28c58aceea9b78f408cb4195e6724e7f4b358becdcd6b943c0fd74bfefe2f6361aa39362f3f8898379046eb1aedc174fe1ab9df11e38b17a696b4cc3558acadf263df8860bd436b1c3ee6c365b9e8d899f9332ca0dbb33e22850d68528b2c"], 0x38}, 0x1, 0x0, 0x0, 0x4008018}, 0x4000080) 2.780426096s ago: executing program 0 (id=4952): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x10, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffffffe}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@call={0x85, 0x0, 0x0, 0xe}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x4, 0x8, &(0x7f00000002c0)="b8000005", &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.672391857s ago: executing program 0 (id=4953): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x4800}, 0xc114) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000280)=ANY=[@ANYRES64], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000100)=0x2) recvmmsg(r2, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$netlink(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)=[{0x0}], 0x1, 0x0, 0x0, 0x41}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r5, 0x1, 0x100, 0x25dfdbfd, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x6048800) syz_usb_connect(0x2, 0x2d, 0x0, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x0, 0x0, 0x0) 2.133100744s ago: executing program 2 (id=4954): r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001cc0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002500)={&(0x7f0000002440)={0x14, r0, 0xad9a673c54048f09, 0x70bd26, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040}, 0x0) 1.814747017s ago: executing program 2 (id=4955): setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@rand_addr=0x64010101, @in=@broadcast, 0x0, 0x8001, 0x0, 0x0, 0xa, 0x0, 0x0, 0x4f}, {0x0, 0x0, 0x0, 0x800, 0x7}, {0x0, 0x0, 0xe6}, 0x0, 0x0, 0x0, 0x0, 0x2}, {{@in=@remote, 0x404d3, 0x2b}, 0x0, @in=@local}}, 0xe8) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020b000102"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xb8}}, 0x20040014) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@updpolicy={0xb8, 0x13, 0x2, 0x0, 0x25dfdbfe, {{@in6=@private0, @in=@multicast1, 0x0, 0x4, 0x0, 0x0, 0xa, 0x60, 0x80, 0x3b, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, {0xfffffffffffffffe, 0x4}, 0x9, 0x0, 0x0, 0x0, 0x2}}, 0xb8}, 0x1, 0x0, 0x0, 0x80}, 0x50) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9"], 0xb8}}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@updpolicy={0xb8, 0x13, 0xcb23c9c9931e99e9, 0x0, 0x25dfdbfc, {{@in6=@private0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x40, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0xaa3, 0xfffffffffffffff8, 0x4}, {0x0, 0x8}}}, 0xb8}}, 0x0) 1.56614562s ago: executing program 2 (id=4956): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000bb0000000032"], 0xf8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40004) sendmsg$nl_xfrm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[], 0x134}}, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) io_uring_setup(0x653, &(0x7f0000000000)={0x0, 0x804, 0x0, 0x4}) r2 = socket(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'lo\x00'}) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="38000000031401002abd7000fedbdf250900020073017a31000000000800410072786500140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) 501.515564ms ago: executing program 2 (id=4957): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) r3 = fsopen(&(0x7f0000000300)='tracefs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r3, 0x1, &(0x7f0000000580)='gid', &(0x7f0000000440)='0\x00#\x00\xd0\x00 \x00\x00qS\x00\x00\x00\x00\x00\x00\x00\x00$\xf6_\xbdI\x1c\xf2\xa9]\xcc\xe0*\xef\x01\x8d\x15\xd2h\x93\xc9\xb57\xc3\xeaEb\xf8\xe6,\xdf\xd4\xfae\x84\xcc\xd5\"d\xf0D-\x98\x9f\x81{\xfc$\xc4\xbcF\xf8\xc8\x8d\xcb\xb8\xf2\x1e\xe4\'U\xb3\xb8\xd3\xe6\xd7\x80Y\xc2\xeb\n\xb8_\xe8\x96YY\xe3\xc7\xe6\xf28\x19\xa6\xa7\xfa\xdb\x1ce\xc1\x03\x86J\xb2fh\x19\xee#\xcc\x0f\xed\xfea\xdc\x88\xcb%bW\xd35\xda=\xac\x1d\xae\x93\xfd\'T6\x94\n\xa4\x9cU\xc4\fA~[\xbf\x8b\x90\xfe\x04\xe7U\xf3h\x81\x14l7u\x95\x96t\\\x0f\xef;\x03\xa4C\xbc(Vc!a\xc1\xe39\xc6b\x905\xf8\xc9@h\x01\xf5\xcb\x88\xdf9\xaf5\xc8a:z\xe4\xcbag&67\x814\xf6}\xe10v6l\xd6,\x1e\xa0\xcc\xbf\xfdkm\b?\x839\x85N\x1c\xc1\xcb\xfc\x85\xd2\n\x02\"\xf2\x81g\x90\x01n%\x7f_\xe1.f>>\xa5\xfb\"\xab\xdb\x06\x12e\x14\x11~\x9a\bR-\x85\xc3\xa9\xe6\xf6R\x11\"\xc3\xc9\xfc\x14s X\xec\xdd\xc2qB\x85\xf0\xd7\x04\xdd<\x9a\x84\'\xa3\xf1\xd9<\xb9k\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x3, 0x0) r6 = epoll_create1(0x0) r7 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f0000000000)={0xe000202b}) epoll_pwait(r7, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r8 = dup3(r5, r7, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r8, &(0x7f00000001c0)={0x2007}) ioctl$TIOCL_SELLOADLUT(r8, 0x541c, &(0x7f0000000040)={0x5, 0x2c0d, 0x7, 0xfb, 0x10000}) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000009c0)={'veth0_virt_wifi\x00', &(0x7f0000002fc0)=@ethtool_stats}) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x1f, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000009400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x11}, 0x94) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f00000000c0)='source\x00\xb5a8\x8d\xbd\xdf\xfe\x9a\xf2RM\xb6\xe0\xf9\xac\xa2\x06\x1cD\xe7C\xa5<\xd1_\xa0u\xcd\x19\xbf\x114\x01=\x93\xf7\xf7Sn\xcb\xd5\xa7\xc9@D\x00\xff\xaar\t\xa9\x13\b\x9a\x8bF\v\x8a\x93F', 0x0, 0xfeffffff00000000) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x40, &(0x7f0000000380)=ANY=[@ANYRES16=0x0], 0x5, 0x832, &(0x7f0000000bc0)="$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") open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[@ANYBLOB=' \x00\x00\x00'], 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) setitimer(0x1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 0s ago: executing program 4 (id=4958): gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x88008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x1100, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000808, &(0x7f00000001c0)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x5f82, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="809a72", 0x3, 0x8, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x50, 0x1f}, {0x48, 0x0, 0x0, 0x40}, {0x6, 0x1, 0x0, 0x3}]}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xc}, {0xfff3}}}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x20040000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000009c0)=ANY=[@ANYBLOB="38000000041401"], 0x38}}, 0x4010) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, 0x0, 0x40000) ioctl$HIDIOCGUSAGES(0xffffffffffffffff, 0xd01c4813, &(0x7f0000000240)={{0x3, 0xe8b5c71a5eb6f040, 0x5, 0xb7a4, 0x1, 0xffff}, 0x341, [0xc, 0x40, 0xcd7, 0x4, 0x6, 0x0, 0x80000000, 0x7, 0x9, 0x7a18fde9, 0x9, 0xf12, 0x4, 0x3, 0x378, 0x9, 0x4, 0x0, 0x1, 0xffff06bd, 0x0, 0xf, 0x1a, 0xf2, 0xd, 0x9, 0x8, 0x10001, 0x401, 0x80000000, 0x401, 0x3ca5, 0x1, 0x0, 0xff, 0x40000004, 0x4, 0x3, 0x0, 0xaa80, 0x40000000, 0x80000000, 0x7fff, 0x7, 0x5, 0xa, 0x0, 0x10000, 0x405, 0x8, 0xffff, 0x91ba, 0x7, 0xb, 0x9, 0xb6, 0x24, 0xcb, 0x180, 0x7f, 0x5, 0x311, 0x66d1, 0x9, 0x9, 0xb6eb, 0xc74, 0x77, 0x1, 0xc0000000, 0x5cb5, 0xfffffffd, 0x401, 0xedf4, 0x4, 0x1000, 0x6, 0xfffffffe, 0x8001, 0xc1, 0x1, 0x8, 0x1, 0x32, 0x98, 0x7f, 0xffff, 0x401, 0x2, 0x2, 0x4680, 0x9a7f, 0xe665, 0x3d6e, 0x3, 0x7, 0x80, 0x4b, 0x9, 0x2, 0xb, 0x6, 0x4fa4, 0x80000000, 0x1, 0xb, 0x0, 0xfffffffa, 0x3, 0x8001, 0xfd, 0x101, 0x4, 0x10, 0xa, 0x6b13, 0x202, 0x7ff, 0x9, 0x80000000, 0xffff, 0x9, 0x3, 0x6, 0x2, 0xffffff87, 0xe, 0xd, 0x5, 0x8, 0x9, 0x7, 0x6, 0x400, 0x8, 0xff2, 0x6, 0x0, 0x6, 0x0, 0x8, 0x1, 0x3, 0x664, 0x4, 0x9, 0x9, 0x2, 0x1ff, 0xfffffffd, 0xeb6, 0x0, 0x9, 0x10001, 0x1, 0x9, 0x9, 0xff, 0x1, 0x4, 0x7ff, 0xe6, 0x6, 0x10001, 0x9, 0x68, 0x7, 0x201, 0x5, 0x3, 0x9a3f, 0x400000, 0x0, 0x80000067, 0xffffff7e, 0x7, 0x10000000, 0x10001, 0x7, 0x3, 0x10, 0x10a, 0xa, 0x40, 0x18, 0x80, 0xb5f8, 0x8bc, 0x3, 0x8000103, 0x5, 0xfffffffc, 0x4, 0x18000, 0x10, 0x1000, 0x288c, 0x1ffe, 0x73ee, 0x1, 0x5, 0x9, 0x7fffffff, 0x73, 0x6, 0x8, 0x6, 0x400, 0x40, 0x0, 0x0, 0x0, 0x546c, 0x981, 0x5aa, 0x7fff, 0x7, 0x2, 0x7, 0xc4c, 0x400045e3, 0x5, 0x7, 0x3, 0x5, 0x3, 0x0, 0x1, 0x2, 0xffffffff, 0x4, 0x200000ce, 0x6, 0x0, 0x1, 0xa, 0x3, 0x0, 0x9, 0x9, 0x37c, 0x10001, 0x8, 0x1, 0x5, 0x2, 0x6, 0x4, 0x6, 0x1, 0x8, 0x6, 0xfffffffa, 0x5, 0x0, 0x9, 0x5, 0x2, 0x7, 0x3, 0xffffff1b, 0x9, 0x2, 0xd, 0x34ea, 0x10000, 0x0, 0x80002001, 0x8, 0x8000, 0x10004, 0x10, 0x8, 0x8, 0x5, 0x1, 0x6, 0x10001, 0x0, 0x5, 0x10000, 0x4, 0xffff, 0x2, 0x89, 0x2, 0x3, 0x1, 0x73, 0x3, 0x9, 0x4, 0x1, 0xb, 0x1, 0x8, 0x0, 0x81, 0x80000004, 0x9, 0x9, 0x0, 0x4, 0x10000004, 0x0, 0x1, 0xce5fb90f, 0x5, 0x4, 0x10001, 0xf, 0x9, 0x100, 0x44, 0x59b, 0x7, 0x8, 0x9, 0x3, 0x2, 0x4, 0x6, 0x0, 0x8, 0x40, 0xd3, 0x7, 0xffffffff, 0x89aa, 0x8, 0x2, 0xf0ce, 0x2, 0x1, 0x0, 0x2, 0xc6, 0x1000, 0x800001, 0x937, 0xa, 0x5e, 0x3, 0xffffffff, 0x5, 0x9, 0x5, 0xffffffff, 0xbe, 0x1, 0x7, 0xe, 0xffffffff, 0x0, 0x3d6, 0x0, 0xae, 0x6, 0x1, 0xfffffeff, 0x4, 0x5, 0x7fff, 0x103, 0x7, 0x6, 0x709, 0x2, 0x49, 0x10, 0xfffffff7, 0xfffff772, 0x8, 0x80000000, 0x3, 0x7, 0xa9c, 0x9, 0x8, 0x1, 0x2, 0x8d, 0x1000, 0x69f, 0x1ff, 0x9, 0x10, 0x3, 0x10000, 0xfffefffd, 0xf, 0x1, 0x3, 0xffffa9b4, 0x1, 0x4, 0x5, 0x9, 0x4b5f, 0x6, 0x7fffffff, 0xffffffff, 0x1, 0x80000000, 0xb, 0x4, 0x88d, 0x1, 0x7, 0x8, 0x1, 0x89, 0x6, 0x818a, 0x10, 0x8, 0x10, 0xfffffffc, 0xfffff001, 0xa, 0xfffffff7, 0x8000005, 0xfdad, 0xffd, 0x9, 0x10, 0xfffffffd, 0x4, 0x6, 0x400, 0x7, 0x0, 0x80000000, 0xd, 0x2, 0x8001, 0x0, 0x20000003, 0xb6, 0x101, 0x401, 0x2, 0x7, 0xc, 0x6623258, 0xf2, 0x741, 0xfffffffc, 0x9, 0xffffa0a6, 0xc, 0x11, 0x2, 0x8, 0x9, 0x1, 0x7f, 0x98, 0x9, 0xb, 0x800, 0x4, 0x9, 0x5, 0x7, 0x7, 0x8, 0xfe, 0x7f, 0x9, 0x4, 0x6, 0x20080000, 0x2, 0x8000, 0x0, 0x0, 0x1000, 0xb, 0x0, 0x7, 0x400, 0x0, 0xfff, 0x8101, 0x6, 0x0, 0x9, 0xc, 0x5, 0xffe, 0x100, 0xffff, 0x1, 0x401, 0xf0, 0x0, 0xfffff53d, 0x9, 0x2, 0x6, 0x0, 0x4, 0x4b15, 0x10000, 0x1, 0x6, 0x9, 0xd, 0x8, 0x4, 0xfffffe01, 0x1, 0x6, 0x0, 0x2, 0x10001, 0x1, 0x7, 0xe4ce, 0x5, 0x9, 0xffffc487, 0x204, 0x10002, 0x1000, 0x7, 0x6, 0x6, 0x8, 0xfffffe00, 0x1, 0x1, 0x8000000, 0xe, 0x2, 0x2, 0x4, 0x0, 0xb66d, 0x3, 0x1000, 0x1eb4bce6, 0x10, 0x8, 0x1, 0x5, 0x1, 0x5, 0x9, 0x5, 0x7, 0x62f2f805, 0x5, 0x3, 0xffffffff, 0x2, 0x7f, 0x3, 0xd, 0x40, 0x5, 0x2, 0xa, 0x5, 0x6, 0x80000000, 0x25, 0x8, 0x7, 0x7, 0x1, 0x5, 0x9, 0x6708, 0x10001, 0x0, 0x80, 0x8, 0x6, 0x0, 0xa95a, 0x2, 0x5, 0x2, 0x2, 0x4, 0xfff9, 0x80000001, 0x5, 0x1, 0x9, 0x0, 0xb7, 0x3, 0x4000ff, 0x9, 0x0, 0x80, 0xfea5, 0x7fff, 0x7, 0x7, 0x7, 0x7485, 0x197, 0x8, 0x0, 0x5, 0x10, 0x3, 0xe, 0x8, 0x1000, 0x4, 0x7, 0x382d, 0x459, 0xcad, 0x9, 0x0, 0x2, 0x119, 0x6, 0x20000a4, 0xe0, 0xfffffffb, 0x5, 0xffffffff, 0x2, 0x4007, 0xa05a, 0x0, 0x1, 0x3, 0x35, 0x8, 0x1, 0x2, 0x30, 0xb, 0x101, 0x2, 0x9, 0x3, 0x7, 0x8, 0x8, 0x1, 0x2, 0x4, 0x15294b70, 0x3, 0x3, 0x2, 0x1, 0xf, 0x9, 0x1, 0x80000000, 0x9, 0x8001, 0x5, 0x800081, 0x1, 0x2, 0x3fd, 0x1df, 0x6, 0x6, 0xfffffffa, 0x81, 0x9, 0x2, 0x9, 0x1, 0x9, 0x7, 0x2c1, 0x9e95, 0x0, 0xfffffedd, 0x30c8, 0x2, 0x38a0, 0x7b, 0x0, 0x8, 0x4, 0x6, 0x9, 0x0, 0x8, 0x9, 0x8, 0x1ff, 0x7fff, 0x3, 0x9, 0x8, 0x2b, 0x200006, 0x4, 0x7, 0x2, 0x4, 0xbfb, 0x7, 0x405, 0x6, 0x4, 0x91, 0x9, 0x8, 0x3, 0x6ae574d2, 0x6, 0xfffffe00, 0x1000, 0x5, 0x92, 0xffffffff, 0x7fffffff, 0xd7, 0x8001, 0x905, 0x3, 0x6, 0xfffffb31, 0xb, 0x4, 0x7, 0x8, 0x1, 0x6, 0x1, 0xff, 0x103, 0x7, 0x3, 0x6, 0x80000001, 0x0, 0x100a, 0x7fffffff, 0x7fff, 0x2, 0xfffffff8, 0x2, 0x9b3, 0x10001, 0x8, 0x4, 0x8, 0x6, 0x7742348d, 0x5, 0x5, 0x1f, 0x40, 0x0, 0x6, 0xffffffff, 0x7, 0xa, 0x8, 0x17f, 0x6, 0x2, 0x1, 0x6, 0x14827783, 0xb, 0xe, 0x5, 0xfffffffd, 0xfe7, 0xfffffffc, 0x8, 0x7ff, 0x3e9, 0x0, 0x3, 0x2000, 0xa, 0x3, 0x9, 0x80000001, 0x81, 0x8, 0x14, 0x8, 0x4, 0x7f, 0xd, 0xf28c, 0x7, 0x6, 0x4, 0x7fffffff, 0xffff, 0x7fffffff, 0xc9, 0x2, 0xfffffffe, 0x924, 0x499, 0x100, 0x1, 0x5, 0xffff351b, 0x7, 0xfffffffb, 0x3, 0x9, 0x2, 0x7, 0x4, 0x4, 0x8, 0xff, 0xee, 0x2, 0x4, 0x8, 0x9f, 0x7, 0x3, 0x9, 0xc9, 0x1, 0x1, 0x1, 0xfffffff7, 0x0, 0x6, 0x5, 0x6, 0x3fc, 0x51, 0x7, 0xefb, 0x200000b8, 0x1, 0x5, 0xfffffff7, 0x7, 0x7, 0x4, 0x6330, 0xff, 0x6, 0xea, 0xbb2d, 0xfff, 0x7, 0x6, 0x0, 0x6, 0xffff, 0xfffffffa, 0x3, 0x0, 0x1, 0x6, 0xfffffc00, 0x5, 0x7, 0x64c822e3, 0xc, 0x6, 0x80, 0x6, 0xfff, 0x0, 0xa7b, 0x1, 0xfffffff7, 0x7, 0x40, 0xa, 0x9b, 0x3, 0xe, 0xf01, 0x1, 0x3, 0x40, 0x3, 0x4, 0x5, 0x5, 0x7ff, 0x5, 0x8, 0x5, 0x3, 0x8, 0x2, 0x80000001, 0x54, 0x80400, 0x1, 0x8, 0xa, 0x9, 0x10000c0, 0x3, 0x72, 0x80, 0x1000, 0x7, 0x800, 0x6, 0x8, 0x3, 0x93c, 0x6, 0x20000000, 0x0, 0xe, 0x5, 0x3, 0xfffffffa, 0xa01, 0xf3, 0xffffff00, 0x8, 0xe, 0x3, 0x3ff, 0x5, 0x2, 0x6, 0xa3, 0xffff, 0xfffffff9, 0x9, 0x5, 0x62, 0x2, 0x1, 0xfffffffa, 0x2, 0x2, 0x9, 0x7, 0x0, 0x7, 0x8, 0x10000, 0x42, 0xaa1, 0x7, 0x2b, 0x6, 0x10, 0x5, 0x200, 0x9, 0x6, 0x3, 0x8, 0x10, 0x4, 0x6, 0x633, 0xf05, 0x401, 0x101, 0x200, 0x8, 0x7ff, 0x0, 0x40, 0x1, 0x10000, 0x9, 0x40, 0x9, 0xb6f, 0x7f, 0x8, 0x6, 0x1, 0x3, 0x80000001, 0x0, 0x8, 0x8, 0x7, 0xde, 0x6, 0x89, 0x0, 0x100, 0x1, 0x9, 0x6, 0x400, 0x1, 0x0, 0x200, 0xe9ab, 0x3, 0x8000, 0x13, 0x2, 0x2, 0x43, 0x3ff, 0x0, 0x7, 0xc, 0x401, 0x6, 0x7, 0xa, 0xf, 0xf39d, 0x71, 0xfff, 0x7, 0x8]}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffff}, 0x900}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) r6 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="54000000120001bd00000000000000000a0300004e234e2200000100ffff00"/56, @ANYRES32=r6, @ANYBLOB="050000000300000008000000000000000800030011"], 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x20004010) write$char_usb(0xffffffffffffffff, &(0x7f0000000040)="e2", 0x2250) socket$nl_route(0x10, 0x3, 0x0) kernel console output (not intermixed with test programs): 387093][ T28] audit: type=1326 audit(1777840464.849:6223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15780 comm="syz.9.3767" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f637cf4cdd9 code=0x7ffc0000 [ 443.436586][T15789] syzkaller0: entered promiscuous mode [ 443.449383][T15789] syzkaller0: entered allmulticast mode [ 443.567970][T15805] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3775'. [ 444.435786][T15846] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 3, id = 0 [ 444.618633][T15860] syzkaller0: entered promiscuous mode [ 444.636833][T15860] syzkaller0: entered allmulticast mode [ 444.852862][T15870] syzkaller0: entered promiscuous mode [ 445.056011][T15896] netlink: 12 bytes leftover after parsing attributes in process `syz.6.3792'. [ 445.435387][T15929] syzkaller0: entered promiscuous mode [ 445.441010][T15929] syzkaller0: entered allmulticast mode [ 445.474454][T15934] tipc: Enabled bearer , priority 0 [ 445.481686][T15934] syzkaller0: entered promiscuous mode [ 445.487428][T15934] syzkaller0: entered allmulticast mode [ 445.497730][T15934] tipc: Resetting bearer [ 445.504995][T15933] tipc: Resetting bearer [ 445.512515][T15933] tipc: Disabling bearer [ 445.674752][T15945] syzkaller0: entered promiscuous mode [ 445.708908][ T3023] 8021q: adding VLAN 0 to HW filter on device eth25 [ 445.725436][T15960] netlink: 'syz.5.3806': attribute type 4 has an invalid length. [ 445.879995][T15982] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=15982 comm=syz.9.3814 [ 445.932691][T15986] tipc: Enabled bearer , priority 0 [ 445.950251][T15986] syzkaller0: entered promiscuous mode [ 445.965115][T15986] syzkaller0: entered allmulticast mode [ 446.007508][T15986] tipc: Resetting bearer [ 446.021686][T15985] tipc: Resetting bearer [ 446.040192][T15985] tipc: Disabling bearer [ 446.046086][ T28] kauditd_printk_skb: 21 callbacks suppressed [ 446.046106][ T28] audit: type=1400 audit(1777840467.579:6245): avc: denied { write } for pid=15970 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 446.133816][ T28] audit: type=1400 audit(1777840467.669:6246): avc: denied { write } for pid=16002 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 446.174747][ T3416] usb 14-1: device descriptor read/8, error -110 [ 446.245798][T16010] netlink: 'syz.2.3823': attribute type 4 has an invalid length. [ 446.257314][ T3023] 8021q: adding VLAN 0 to HW filter on device eth26 [ 446.293887][ T3416] usb 14-1: new SuperSpeed USB device number 6 using vhci_hcd [ 446.317645][T16020] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=16020 comm=syz.9.3827 [ 446.343944][ T3416] usb 14-1: enqueue for inactive port 0 [ 446.385144][ T3416] usb 14-1: enqueue for inactive port 0 [ 446.411189][ T3416] usb 14-1: enqueue for inactive port 0 [ 446.717721][ T28] audit: type=1400 audit(1777840468.259:6247): avc: denied { write } for pid=16046 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 446.781064][ T28] audit: type=1400 audit(1777840468.319:6248): avc: denied { write } for pid=16091 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 446.811735][T16095] netlink: 'syz.9.3839': attribute type 4 has an invalid length. [ 446.863784][T16101] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=16101 comm=syz.2.3841 [ 446.926988][T16113] lo speed is unknown, defaulting to 1000 [ 446.952006][T16113] lo speed is unknown, defaulting to 1000 [ 446.975107][T16113] lo speed is unknown, defaulting to 1000 [ 447.103126][T16126] syzkaller0: entered promiscuous mode [ 447.149406][T16126] syzkaller0: entered allmulticast mode [ 447.574417][ T3416] usb usb14-port1: attempt power cycle [ 447.772150][T16113] infiniband sz1: set down [ 447.791057][T16113] infiniband sz1: added lo [ 447.796657][T16113] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 447.796863][T16113] infiniband sz1: Couldn't open port 1 [ 447.812277][ T23] lo speed is unknown, defaulting to 1000 [ 447.831974][T16113] RDS/IB: sz1: added [ 447.902347][T16113] smc: adding ib device sz1 with port count 1 [ 447.904454][T16169] netlink: 'syz.3.3854': attribute type 4 has an invalid length. [ 447.913134][T16113] smc: ib device sz1 port 1 has no pnetid [ 447.922563][ T23] lo speed is unknown, defaulting to 1000 [ 447.939811][T16113] lo speed is unknown, defaulting to 1000 [ 447.947769][ T28] audit: type=1400 audit(1777840469.489:6249): avc: denied { write } for pid=16107 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 447.982894][T16179] random: crng reseeded on system resumption [ 448.033331][ T28] audit: type=1400 audit(1777840469.519:6250): avc: denied { write } for pid=16178 comm="syz.6.3856" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 448.078622][ T28] audit: type=1400 audit(1777840469.619:6251): avc: denied { write } for pid=16182 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 448.168599][T16113] lo speed is unknown, defaulting to 1000 [ 448.377250][T16198] syzkaller0: entered promiscuous mode [ 448.382848][T16198] syzkaller0: entered allmulticast mode [ 448.778913][ T28] audit: type=1400 audit(1777840470.319:6252): avc: denied { write } for pid=16211 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 448.870444][ T28] audit: type=1400 audit(1777840470.409:6253): avc: denied { write } for pid=16223 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 448.950267][ T3023] 8021q: adding VLAN 0 to HW filter on device eth7 [ 449.164891][ T28] audit: type=1400 audit(1777840470.699:6254): avc: denied { write } for pid=16226 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 449.229638][ T3023] 8021q: adding VLAN 0 to HW filter on device eth8 [ 449.345966][T16113] lo speed is unknown, defaulting to 1000 [ 449.474127][ T3416] usb usb14-port1: unable to enumerate USB device [ 449.850054][T16277] netlink: 39 bytes leftover after parsing attributes in process `syz.5.3882'. [ 449.982131][T16285] syzkaller0: entered promiscuous mode [ 450.013726][T16285] syzkaller0: entered allmulticast mode [ 450.289661][T16308] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3892'. [ 450.343389][T16312] netlink: 39 bytes leftover after parsing attributes in process `syz.2.3894'. [ 450.348674][T16113] lo speed is unknown, defaulting to 1000 [ 450.543485][T16113] lo speed is unknown, defaulting to 1000 [ 450.722584][T16337] tipc: Enabled bearer , priority 0 [ 450.752885][T16113] lo speed is unknown, defaulting to 1000 [ 450.757202][T16337] syzkaller0: entered promiscuous mode [ 450.791137][T16337] syzkaller0: entered allmulticast mode [ 450.837449][T16337] tipc: Resetting bearer [ 450.870132][T16336] tipc: Resetting bearer [ 450.904192][T16336] tipc: Disabling bearer [ 450.927162][T16113] lo speed is unknown, defaulting to 1000 [ 451.135501][ T28] kauditd_printk_skb: 1045 callbacks suppressed [ 451.135524][ T28] audit: type=1326 audit(1777840472.589:7300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16324 comm="syz.6.3898" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f33e8ade159 code=0x7ffc0000 [ 451.194108][ T28] audit: type=1326 audit(1777840472.589:7301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16324 comm="syz.6.3898" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f33e8ade159 code=0x7ffc0000 [ 451.351644][ T28] audit: type=1326 audit(1777840472.589:7302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16324 comm="syz.6.3898" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f33e8ade159 code=0x7ffc0000 [ 451.462400][ T28] audit: type=1326 audit(1777840472.589:7303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16324 comm="syz.6.3898" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f33e8ade159 code=0x7ffc0000 [ 451.568951][ T28] audit: type=1326 audit(1777840472.589:7304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16324 comm="syz.6.3898" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f33e8ade159 code=0x7ffc0000 [ 451.675791][ T28] audit: type=1326 audit(1777840472.589:7305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16324 comm="syz.6.3898" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f33e8ade159 code=0x7ffc0000 [ 451.799627][ T28] audit: type=1326 audit(1777840472.589:7306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16324 comm="syz.6.3898" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f33e8ade159 code=0x7ffc0000 [ 451.927301][ T28] audit: type=1326 audit(1777840472.589:7307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16324 comm="syz.6.3898" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f33e8ade159 code=0x7ffc0000 [ 451.983932][ T28] audit: type=1326 audit(1777840472.589:7308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16324 comm="syz.6.3898" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f33e8ade159 code=0x7ffc0000 [ 452.033850][ T28] audit: type=1326 audit(1777840472.589:7309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16324 comm="syz.6.3898" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f33e8ade159 code=0x7ffc0000 [ 452.263939][T16361] loop3: detected capacity change from 0 to 512 [ 452.271015][T16363] vhci_hcd vhci_hcd.0: failed to lookup sock [ 452.294879][T16113] lo speed is unknown, defaulting to 1000 [ 452.404459][T16361] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 452.447991][T16113] lo speed is unknown, defaulting to 1000 [ 452.694263][T16113] lo speed is unknown, defaulting to 1000 [ 452.738763][T14278] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 452.881886][T16113] lo speed is unknown, defaulting to 1000 [ 453.083280][T16386] netlink: 39 bytes leftover after parsing attributes in process `syz.9.3907'. [ 454.572043][T16412] loop2: detected capacity change from 0 to 512 [ 454.625069][T16412] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 455.709713][T16425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16425 comm=syz.3.3920 [ 455.832320][T16429] loop3: detected capacity change from 0 to 1024 [ 455.843611][T16429] EXT4-fs: test_dummy_encryption option not supported [ 456.024682][T14148] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 456.154167][T16433] usb usb8: usbfs: process 16433 (syz.3.3922) did not claim interface 0 before use [ 456.982129][T16432] syzkaller0: entered promiscuous mode [ 456.989262][T16432] syzkaller0: entered allmulticast mode [ 458.179264][T16453] syzkaller0: entered promiscuous mode [ 458.191464][T16453] syzkaller0: entered allmulticast mode [ 458.204601][ T28] kauditd_printk_skb: 1440 callbacks suppressed [ 458.204617][ T28] audit: type=1400 audit(1777840479.749:8750): avc: denied { write } for pid=16438 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 458.271204][ T28] audit: type=1400 audit(1777840479.809:8751): avc: denied { write } for pid=16461 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 458.588594][ T28] audit: type=1400 audit(1777840480.129:8752): avc: denied { write } for pid=16464 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 458.620843][T16474] loop6: detected capacity change from 0 to 512 [ 458.672397][T16474] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 458.685693][ T28] audit: type=1400 audit(1777840480.159:8753): avc: denied { write } for pid=16480 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 458.872856][T16489] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16489 comm=syz.5.3931 [ 459.038181][T16505] syzkaller0: entered promiscuous mode [ 459.052036][T16505] syzkaller0: entered allmulticast mode [ 459.090963][T16510] loop2: detected capacity change from 0 to 1024 [ 459.104366][T16510] EXT4-fs: test_dummy_encryption option not supported [ 459.203863][ T28] audit: type=1400 audit(1777840480.709:8754): avc: denied { write } for pid=16490 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 459.249200][ T28] audit: type=1400 audit(1777840480.739:8755): avc: denied { write } for pid=16518 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 459.410253][T16528] syzkaller0: entered promiscuous mode [ 459.415898][T16528] syzkaller0: entered allmulticast mode [ 459.718614][T10968] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 460.898821][T16544] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16544 comm=syz.9.3946 [ 461.113985][ T28] audit: type=1400 audit(1777840482.629:8756): avc: denied { write } for pid=16526 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 461.197733][ T28] audit: type=1400 audit(1777840482.739:8757): avc: denied { write } for pid=16556 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 461.443297][T16571] loop6: detected capacity change from 0 to 512 [ 461.485471][T16571] EXT4-fs error (device loop6): ext4_iget_extra_inode:5128: inode #15: comm syz.6.3954: corrupted in-inode xattr: invalid ea_ino [ 461.512835][T16571] loop6: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 461.513186][T16571] EXT4-fs error (device loop6): ext4_orphan_get:1402: comm syz.6.3954: couldn't read orphan inode 15 (err -117) [ 461.522438][ C0] EXT4-fs (loop6): error count since last fsck: 1 [ 461.522465][ C0] EXT4-fs (loop6): initial error at time 1777840483: ext4_iget_extra_inode:5128: inode 15 [ 461.522501][ C0] EXT4-fs (loop6): last error at time 1777840483: ext4_iget_extra_inode:5128: inode 15 [ 461.592543][T16580] syzkaller0: entered promiscuous mode [ 461.610953][T16580] syzkaller0: entered allmulticast mode [ 461.616923][T16573] loop2: detected capacity change from 0 to 512 [ 461.691790][T16571] loop6: lost filesystem error report for type 5 error -117 [ 461.693270][T16571] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 461.694776][T16573] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 461.817974][T16590] EXT4-fs error (device loop6): ext4_find_dest_de:2050: inode #2: block 13: comm syz.6.3954: bad entry in directory: directory entry overrun - offset=76, inode=0, rec_len=1024, size=1024 fake=0 [ 461.841107][ T28] audit: type=1400 audit(1777840483.359:8758): avc: denied { write } for pid=16570 comm="syz.6.3954" name="/" dev="loop6" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 461.934561][ T28] audit: type=1400 audit(1777840483.419:8759): avc: denied { write } for pid=16565 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 461.964279][T16598] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16598 comm=syz.3.3958 [ 461.981150][T10968] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 462.071428][T16605] loop3: detected capacity change from 0 to 1024 [ 462.093921][T16605] EXT4-fs: test_dummy_encryption option not supported [ 462.242808][T14148] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 462.380576][T16617] usb usb8: usbfs: process 16617 (syz.3.3960) did not claim interface 0 before use [ 464.184735][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 464.184756][ T28] audit: type=1400 audit(1777840485.729:8761): avc: denied { write } for pid=16604 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 464.285807][T16630] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3964'. [ 464.300495][ T28] audit: type=1400 audit(1777840485.829:8762): avc: denied { write } for pid=16629 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 464.350445][T16630] netlink: 40 bytes leftover after parsing attributes in process `syz.9.3964'. [ 464.881091][ T28] audit: type=1400 audit(1777840486.419:8763): avc: denied { write } for pid=16636 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 464.995927][T16657] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16657 comm=syz.3.3970 [ 465.013260][ T28] audit: type=1400 audit(1777840486.549:8764): avc: denied { write } for pid=16653 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 465.114503][T16669] netlink: 44 bytes leftover after parsing attributes in process `syz.3.3972'. [ 465.179417][T16674] binfmt_misc: register: failed to install interpreter file ./file0 [ 465.215480][T16674] x_tables: duplicate underflow at hook 1 [ 465.291656][T16683] rdma_rxe: rxe_newlink: failed to add lo [ 465.410556][ T28] audit: type=1400 audit(1777840486.949:8765): avc: denied { write } for pid=16670 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 465.506261][ T28] audit: type=1400 audit(1777840487.049:8766): avc: denied { write } for pid=16695 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 465.751665][ T28] audit: type=1400 audit(1777840487.289:8767): avc: denied { write } for pid=16700 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 465.811307][ T28] audit: type=1400 audit(1777840487.349:8768): avc: denied { write } for pid=16713 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 466.040926][ T28] audit: type=1400 audit(1777840487.579:8769): avc: denied { write } for pid=16716 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 466.116696][ T28] audit: type=1400 audit(1777840487.659:8770): avc: denied { write } for pid=16731 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 466.192294][T16737] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16737 comm=syz.2.3982 [ 466.205380][T16734] loop3: detected capacity change from 0 to 1024 [ 466.221896][T16739] netlink: 'syz.5.3983': attribute type 4 has an invalid length. [ 466.226842][T16734] EXT4-fs: test_dummy_encryption option not supported [ 466.399388][T16745] rdma_rxe: rxe_newlink: failed to add lo [ 466.430640][T16754] syzkaller0: entered promiscuous mode [ 466.443271][T16754] syzkaller0: entered allmulticast mode [ 466.525411][T16767] syzkaller0: entered promiscuous mode [ 466.721465][T16769] usb usb8: usbfs: process 16769 (syz.3.3981) did not claim interface 0 before use [ 467.485529][T16767] syzkaller0: entered allmulticast mode [ 470.351581][T16801] netlink: 'syz.6.3996': attribute type 4 has an invalid length. [ 470.464780][T16810] sz1: rxe_newlink: already configured on lo [ 470.616356][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 470.616376][ T28] audit: type=1400 audit(1777840492.159:8773): avc: denied { write } for pid=16775 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 470.648200][T16813] syzkaller0: entered promiscuous mode [ 470.654282][T16813] syzkaller0: entered allmulticast mode [ 470.688301][T16820] loop9: detected capacity change from 0 to 1024 [ 470.697104][T16820] EXT4-fs: test_dummy_encryption option not supported [ 470.995591][T16823] usb usb8: usbfs: process 16823 (syz.9.4003) did not claim interface 0 before use [ 471.906310][ T28] audit: type=1400 audit(1777840493.249:8774): avc: denied { write } for pid=16824 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 473.922080][ T28] audit: type=1400 audit(1777840495.459:8775): avc: denied { write } for pid=16834 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 474.004389][ T28] audit: type=1400 audit(1777840495.549:8776): avc: denied { write } for pid=16856 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 474.448617][T16866] lo speed is unknown, defaulting to 1000 [ 474.463436][T16870] syzkaller0: entered promiscuous mode [ 474.479203][T16873] netlink: 'syz.5.4012': attribute type 4 has an invalid length. [ 474.494760][T16870] syzkaller0: entered allmulticast mode [ 474.851284][T16881] loop5: detected capacity change from 0 to 512 [ 474.969166][T16881] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 475.181656][ T28] audit: type=1400 audit(1777840496.719:8777): avc: denied { write } for pid=16859 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 475.220376][T16891] syzkaller0: entered promiscuous mode [ 475.226205][T16891] syzkaller0: entered allmulticast mode [ 475.243360][T16866] loop9: detected capacity change from 0 to 512 [ 475.274251][ T28] audit: type=1400 audit(1777840496.819:8778): avc: denied { write } for pid=16894 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 475.302013][T16866] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 475.426820][T16904] netlink: 16 bytes leftover after parsing attributes in process `syz.3.4017'. [ 475.449864][T12903] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 475.517475][T14185] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 475.600811][T16914] loop5: detected capacity change from 0 to 1024 [ 475.612277][T16914] EXT4-fs: test_dummy_encryption option not supported [ 477.655123][ T28] audit: type=1400 audit(1777840499.199:8779): avc: denied { write } for pid=16901 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 477.741569][T16931] netlink: 24 bytes leftover after parsing attributes in process `syz.5.4022'. [ 477.778466][ T28] audit: type=1400 audit(1777840499.299:8780): avc: denied { write } for pid=16928 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 477.945064][ T28] audit: type=1400 audit(1777840499.489:8781): avc: denied { write } for pid=16936 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 478.030300][ T28] audit: type=1400 audit(1777840499.569:8782): avc: denied { write } for pid=16949 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 478.126035][T16954] syzkaller0: entered promiscuous mode [ 478.139119][T16954] syzkaller0: entered allmulticast mode [ 478.373662][ T28] audit: type=1400 audit(1777840499.909:8783): avc: denied { write } for pid=16956 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 478.398580][T16973] loop6: detected capacity change from 0 to 128 [ 478.450812][T16978] tipc: Enabled bearer , priority 0 [ 478.471327][T16978] tipc: Resetting bearer [ 478.490441][T16977] tipc: Disabling bearer [ 478.510020][T16983] netlink: 60 bytes leftover after parsing attributes in process `syz.6.4031'. [ 478.510798][ T28] audit: type=1400 audit(1777840500.049:8784): avc: denied { write } for pid=16980 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 478.524912][T16984] netlink: 24 bytes leftover after parsing attributes in process `syz.9.4034'. [ 478.550381][T16983] unsupported nlmsg_type 40 [ 478.776391][T16990] loop9: detected capacity change from 0 to 512 [ 478.842424][ T28] audit: type=1326 audit(1777840500.359:8785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16972 comm="syz.6.4031" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f33e8b3cdd9 code=0x7fc00000 [ 478.884768][T16990] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 479.058676][T17007] syzkaller0: entered promiscuous mode [ 479.123425][T17007] syzkaller0: entered allmulticast mode [ 479.407457][ T4466] IPVS: starting estimator thread 0... [ 479.473234][T12903] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 479.601540][ T28] audit: type=1400 audit(1777840501.139:8786): avc: denied { write } for pid=16991 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 479.624920][T17016] IPVS: using max 2256 ests per chain, 112800 per kthread [ 479.657536][ T28] audit: type=1400 audit(1777840501.199:8787): avc: denied { write } for pid=17021 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 479.754476][T17025] lo speed is unknown, defaulting to 1000 [ 479.996427][ T28] audit: type=1400 audit(1777840501.539:8788): avc: denied { read } for pid=17032 comm="syz.9.4041" path="socket:[61376]" dev="sockfs" ino=61376 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 480.197842][T17041] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 480.520959][T17048] loop5: detected capacity change from 0 to 512 [ 480.584061][T17048] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 480.793620][T17060] bridge0: port 2(bridge_slave_1) entered disabled state [ 480.876726][T17060] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4054'. [ 481.004900][T17082] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4064'. [ 481.016235][T17082] netlink: 40 bytes leftover after parsing attributes in process `syz.6.4064'. [ 481.197152][T14185] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 481.335625][T17093] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 481.378087][T17093] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 481.438539][T17093] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 481.508716][T17093] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 481.585877][T15252] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 481.611658][T15252] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 481.662350][T15252] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 481.692659][T15252] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 481.787508][T17103] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=17103 comm=syz.9.4071 [ 482.161345][T17117] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4077'. [ 482.188763][T17119] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4075'. [ 482.197780][T17117] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4077'. [ 482.215156][T17119] netlink: 40 bytes leftover after parsing attributes in process `syz.3.4075'. [ 482.291692][T17125] IPVS: sync thread started: state = MASTER, mcast_ifn = veth1_to_bridge, syncid = 32, id = 0 [ 482.509043][T17129] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=17129 comm=syz.2.4082 [ 483.491913][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 483.491931][ T28] audit: type=1326 audit(1777840505.029:8794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17148 comm="syz.5.4090" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f21de16cdd9 code=0x0 [ 483.641221][T17162] binfmt_misc: register: failed to install interpreter file ./file0 [ 483.667118][T17162] x_tables: duplicate underflow at hook 1 [ 483.773115][T17164] netlink: 4 bytes leftover after parsing attributes in process `syz.9.4093'. [ 483.817314][T17164] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4093'. [ 483.893233][T17169] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=17169 comm=syz.3.4095 [ 484.105800][T17175] syzkaller0: entered promiscuous mode [ 484.532568][T17180] netlink: 'syz.5.4100': attribute type 4 has an invalid length. [ 485.828886][T17204] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4110'. [ 485.919398][ T28] audit: type=1326 audit(1777840507.459:8795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17203 comm="syz.2.4110" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1af0efcdd9 code=0x0 [ 486.112633][T17216] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4111'. [ 486.130079][T17216] netlink: 40 bytes leftover after parsing attributes in process `syz.5.4111'. [ 486.349429][T17219] loop6: detected capacity change from 0 to 512 [ 486.580731][T17219] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 486.748500][T17225] syzkaller0: entered promiscuous mode [ 487.018906][T10968] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 487.475560][T17250] netlink: 12 bytes leftover after parsing attributes in process `syz.6.4123'. [ 487.568177][T17258] netlink: 12 bytes leftover after parsing attributes in process `syz.6.4126'. [ 487.600676][T17259] binfmt_misc: register: failed to install interpreter file ./file0 [ 487.609327][T17259] x_tables: duplicate underflow at hook 1 [ 487.654880][ T28] audit: type=1326 audit(1777840509.199:8796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17257 comm="syz.6.4126" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f33e8b3cdd9 code=0x0 [ 488.265788][T17267] netlink: 'syz.2.4129': attribute type 4 has an invalid length. [ 488.409925][T17276] tipc: Enabling of bearer rejected, failed to enable media [ 488.465577][T17280] netlink: 12 bytes leftover after parsing attributes in process `syz.9.4135'. [ 490.145276][T17306] syzkaller0: entered promiscuous mode [ 490.180725][T17306] syzkaller0: entered allmulticast mode [ 490.400889][T17309] netlink: 12 bytes leftover after parsing attributes in process `syz.9.4144'. [ 490.517621][ T28] audit: type=1326 audit(1777840512.059:8797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17308 comm="syz.9.4144" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f637cf4cdd9 code=0x0 [ 490.681466][T17316] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4146'. [ 490.874721][T17320] tipc: Enabling of bearer rejected, failed to enable media [ 491.065287][T17333] netlink: 'syz.5.4151': attribute type 4 has an invalid length. [ 491.198167][T17343] binfmt_misc: register: failed to install interpreter file ./file0 [ 491.207673][T17343] x_tables: duplicate underflow at hook 1 [ 491.222504][T17344] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4154'. [ 491.234558][T17344] netlink: 40 bytes leftover after parsing attributes in process `syz.5.4154'. [ 491.268125][T17346] syzkaller0: entered promiscuous mode [ 491.273773][T17346] syzkaller0: entered allmulticast mode [ 491.629762][T17364] netlink: 'syz.9.4163': attribute type 4 has an invalid length. [ 491.691576][T17369] syzkaller0: entered promiscuous mode [ 491.701848][T17369] syzkaller0: entered allmulticast mode [ 491.814835][T17375] netlink: 4 bytes leftover after parsing attributes in process `syz.9.4167'. [ 491.824521][T17375] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4167'. [ 492.176320][T17383] loop5: detected capacity change from 0 to 512 [ 492.189992][T17383] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 492.404877][T17399] netlink: 'syz.3.4177': attribute type 4 has an invalid length. [ 492.440017][T17402] syzkaller0: entered promiscuous mode [ 492.445708][T17402] syzkaller0: entered allmulticast mode [ 492.674149][T17414] binfmt_misc: register: failed to install interpreter file ./file0 [ 492.687771][T17414] x_tables: duplicate underflow at hook 1 [ 492.754539][T17417] loop3: detected capacity change from 0 to 764 [ 492.764623][T17417] rock: directory entry would overflow storage [ 492.770997][T17417] rock: sig=0x4654, size=5, remaining=4 [ 492.901215][T14185] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 493.623789][T17432] ALSA: seq fatal error: cannot create timer (-19) [ 494.044741][T17447] xt_hashlimit: size too large, truncated to 1048576 [ 494.431888][T17465] xt_hashlimit: size too large, truncated to 1048576 [ 494.808765][ T28] audit: type=1400 audit(1777840516.349:8798): avc: denied { create } for pid=17477 comm="syz.6.4208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 494.890684][ T28] audit: type=1400 audit(1777840516.379:8799): avc: denied { write } for pid=17477 comm="syz.6.4208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 495.063796][T17487] ALSA: seq fatal error: cannot create timer (-19) [ 495.215785][T17504] syzkaller0: entered promiscuous mode [ 495.228170][T17504] syzkaller0: entered allmulticast mode [ 495.493128][T17535] rdma_rxe: rxe_newlink: failed to add lo [ 495.520984][T17538] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4222'. [ 495.547583][T17538] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4222'. [ 495.724475][T17531] loop5: detected capacity change from 0 to 764 [ 495.734393][T17531] rock: directory entry would overflow storage [ 495.740638][T17531] rock: sig=0x4654, size=5, remaining=4 [ 495.843343][T17549] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 495.858393][T17575] tipc: Enabling of bearer rejected, failed to enable media [ 495.929635][T17549] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 496.001418][T17585] syzkaller0: entered promiscuous mode [ 496.024019][T17585] syzkaller0: entered allmulticast mode [ 496.063408][T17549] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 496.125366][T17549] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 496.155213][T17606] rdma_rxe: rxe_newlink: failed to add lo [ 496.196087][ T1723] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 496.229652][ T1723] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 496.270619][ T1723] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 496.297550][ T1723] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 496.398373][T17619] binfmt_misc: register: failed to install interpreter file ./file0 [ 496.419574][T17619] x_tables: duplicate underflow at hook 1 [ 496.515680][T17625] loop6: detected capacity change from 0 to 764 [ 496.544814][T17625] rock: directory entry would overflow storage [ 496.559626][T17625] rock: sig=0x4654, size=5, remaining=4 [ 496.562095][T17627] tipc: Enabling of bearer rejected, failed to enable media [ 496.807297][T17638] syzkaller0: entered promiscuous mode [ 496.865169][T17638] syzkaller0: entered allmulticast mode [ 496.957082][T17645] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4247'. [ 497.238719][T17663] tipc: Enabling of bearer rejected, failed to enable media [ 497.345877][T17673] syzkaller0: entered promiscuous mode [ 497.365902][T17673] syzkaller0: entered allmulticast mode [ 497.840528][T17705] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=17705 comm=syz.2.4267 [ 497.921022][T17709] syzkaller0: entered promiscuous mode [ 497.940187][T17709] syzkaller0: entered allmulticast mode [ 497.953525][T17711] tipc: Enabled bearer , priority 0 [ 497.973920][T17715] netlink: 4 bytes leftover after parsing attributes in process `syz.9.4268'. [ 497.987561][T17715] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4268'. [ 498.000801][T17710] tipc: Disabling bearer [ 498.158181][T17734] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=17734 comm=syz.5.4280 [ 498.254726][T17738] binfmt_misc: register: failed to install interpreter file ./file0 [ 498.273589][T17738] x_tables: duplicate underflow at hook 1 [ 498.424824][T17746] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4285'. [ 498.450054][T17748] syzkaller0: entered promiscuous mode [ 498.461401][T17748] syzkaller0: entered allmulticast mode [ 498.663635][T17755] tipc: Enabled bearer , priority 0 [ 498.703233][T17754] tipc: Disabling bearer [ 498.744792][T17758] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=17758 comm=syz.9.4291 [ 498.771353][T17759] loop5: detected capacity change from 0 to 1024 [ 498.789811][T17759] EXT4-fs: test_dummy_encryption option not supported [ 498.950666][T17765] netdevsim netdevsim9 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 499.091186][T17767] usb usb8: usbfs: process 17767 (syz.5.4290) did not claim interface 0 before use [ 499.954838][T17765] netdevsim netdevsim9 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 500.865601][T17769] rdma_rxe: rxe_newlink: failed to add lo [ 501.016509][T17765] netdevsim netdevsim9 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 501.166824][T17765] netdevsim netdevsim9 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 501.292427][T13880] netdevsim netdevsim9 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 501.323176][T13880] netdevsim netdevsim9 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 501.361804][T13880] netdevsim netdevsim9 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 501.388903][T13880] netdevsim netdevsim9 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 501.522728][T17788] tipc: Enabled bearer , priority 0 [ 501.541459][T17787] tipc: Disabling bearer [ 501.584174][T17790] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=17790 comm=syz.3.4303 [ 501.702666][T17794] loop3: detected capacity change from 0 to 1024 [ 501.731053][T17794] EXT4-fs: test_dummy_encryption option not supported [ 501.756457][T17796] rdma_rxe: rxe_newlink: failed to add lo [ 502.083072][T17803] usb usb8: usbfs: process 17803 (syz.3.4305) did not claim interface 0 before use [ 502.917561][T17805] ALSA: seq fatal error: cannot create timer (-19) [ 504.637282][T17822] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=17822 comm=syz.3.4316 [ 504.685369][T17826] rdma_rxe: rxe_newlink: failed to add lo [ 504.703542][T17828] xt_hashlimit: size too large, truncated to 1048576 [ 504.765060][T17833] loop6: detected capacity change from 0 to 1024 [ 504.785377][T17833] EXT4-fs: test_dummy_encryption option not supported [ 504.816733][T17840] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.972684][T17849] syzkaller0: entered promiscuous mode [ 504.981066][T17849] syzkaller0: entered allmulticast mode [ 505.076296][T17852] binfmt_misc: register: failed to install interpreter file ./file0 [ 505.363704][T17854] x_tables: duplicate underflow at hook 1 [ 505.711214][T17866] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=17866 comm=syz.5.4333 [ 506.771377][T17892] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=17892 comm=syz.3.4345 [ 507.068846][T17922] loop6: detected capacity change from 0 to 1024 [ 507.084333][T17922] EXT4-fs: test_dummy_encryption option not supported [ 507.173948][ T28] audit: type=1326 audit(1777840528.669:8800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17911 comm="syz.2.4355" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af0efcdd9 code=0x7ffc0000 [ 507.222405][ T28] audit: type=1326 audit(1777840528.669:8801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17911 comm="syz.2.4355" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af0efcdd9 code=0x7ffc0000 [ 507.248592][ T28] audit: type=1326 audit(1777840528.669:8802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17911 comm="syz.2.4355" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af0efcdd9 code=0x7ffc0000 [ 507.251369][T17925] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4358'. [ 507.274485][ T28] audit: type=1326 audit(1777840528.669:8803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17911 comm="syz.2.4355" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af0efcdd9 code=0x7ffc0000 [ 507.375417][T17933] netlink: 40 bytes leftover after parsing attributes in process `syz.5.4358'. [ 507.389238][T17932] usb usb8: usbfs: process 17932 (syz.6.4359) did not claim interface 0 before use [ 508.273614][ T28] audit: type=1326 audit(1777840528.669:8804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17911 comm="syz.2.4355" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1af0efcdd9 code=0x7ffc0000 [ 509.120489][ T28] audit: type=1326 audit(1777840528.669:8805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17911 comm="syz.2.4355" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=426 compat=0 ip=0x7f1af0efcdd9 code=0x7ffc0000 [ 509.146103][ T28] audit: type=1326 audit(1777840528.739:8806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17911 comm="syz.2.4355" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f1af0ebd60e code=0x7ffc0000 [ 509.171717][ T28] audit: type=1326 audit(1777840528.739:8807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17911 comm="syz.2.4355" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f1af0ebd60e code=0x7ffc0000 [ 509.206254][ T28] audit: type=1326 audit(1777840528.749:8808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17911 comm="syz.2.4355" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f1af0ebd60e code=0x7ffc0000 [ 509.237200][T17939] syzkaller0: entered promiscuous mode [ 509.242832][T17939] syzkaller0: entered allmulticast mode [ 509.251890][ T28] audit: type=1326 audit(1777840528.749:8809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17911 comm="syz.2.4355" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f1af0ebd60e code=0x7ffc0000 [ 509.263774][T17936] ALSA: seq fatal error: cannot create timer (-19) [ 509.430055][T17956] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4369'. [ 509.464119][T17958] netlink: 'syz.5.4364': attribute type 4 has an invalid length. [ 509.637001][T17970] ALSA: seq fatal error: cannot create timer (-19) [ 509.666784][T17973] loop2: detected capacity change from 0 to 1024 [ 509.675788][T17973] EXT4-fs: test_dummy_encryption option not supported [ 509.938564][T17980] usb usb8: usbfs: process 17980 (syz.2.4376) did not claim interface 0 before use [ 511.840466][T17981] syzkaller0: entered promiscuous mode [ 512.055254][T17981] syzkaller0: entered allmulticast mode [ 512.521432][T18004] syzkaller0: entered promiscuous mode [ 512.540136][T18004] syzkaller0: entered allmulticast mode [ 512.587551][T18017] rdma_rxe: rxe_newlink: failed to add lo [ 512.667441][T18023] loop2: detected capacity change from 0 to 1024 [ 512.694151][T18023] EXT4-fs: test_dummy_encryption option not supported [ 512.867252][T18045] rdma_rxe: rxe_newlink: failed to add lo [ 512.883197][T18050] netlink: 52 bytes leftover after parsing attributes in process `syz.9.4410'. [ 513.000191][T18053] usb usb8: usbfs: process 18053 (syz.2.4397) did not claim interface 0 before use [ 513.906111][T18052] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 513.914615][T18052] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 513.921991][T18052] vhci_hcd vhci_hcd.4: default hub control req: 230f v0004 i0000 l3 [ 514.948043][T18070] syzkaller0: entered promiscuous mode [ 514.953598][T18070] syzkaller0: entered allmulticast mode [ 515.060645][T18076] netlink: 52 bytes leftover after parsing attributes in process `syz.6.4422'. [ 516.285652][T18110] netlink: 52 bytes leftover after parsing attributes in process `syz.5.4437'. [ 516.320233][T18113] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 516.351953][T18113] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 516.439368][T18120] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4439'. [ 516.469595][T18120] netlink: 40 bytes leftover after parsing attributes in process `syz.2.4439'. [ 516.983904][ T28] kauditd_printk_skb: 23 callbacks suppressed [ 516.983926][ T28] audit: type=1326 audit(1777840538.489:8833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.5.4443" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f21de16cdd9 code=0x7ffc0000 [ 517.102581][ T28] audit: type=1326 audit(1777840538.489:8834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.5.4443" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f21de16cdd9 code=0x7ffc0000 [ 517.198618][ T28] audit: type=1326 audit(1777840538.489:8835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.5.4443" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f21de16cdd9 code=0x7ffc0000 [ 517.224380][ T28] audit: type=1326 audit(1777840538.489:8836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.5.4443" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f21de16cdd9 code=0x7ffc0000 [ 517.250282][ T28] audit: type=1326 audit(1777840538.489:8837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.5.4443" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f21de16cdd9 code=0x7ffc0000 [ 517.282708][ T28] audit: type=1326 audit(1777840538.499:8838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.5.4443" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=426 compat=0 ip=0x7f21de16cdd9 code=0x7ffc0000 [ 517.352611][ T28] audit: type=1326 audit(1777840538.569:8839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.5.4443" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f21de12d60e code=0x7ffc0000 [ 517.379896][ T28] audit: type=1326 audit(1777840538.569:8840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.5.4443" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f21de12d60e code=0x7ffc0000 [ 517.405950][T18142] netlink: 20 bytes leftover after parsing attributes in process `syz.5.4450'. [ 517.431316][ T28] audit: type=1326 audit(1777840538.579:8841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.5.4443" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f21de12d60e code=0x7ffc0000 [ 517.467411][ T28] audit: type=1326 audit(1777840538.579:8842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18124 comm="syz.5.4443" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f21de12d60e code=0x7ffc0000 [ 517.832189][T18180] netlink: 20 bytes leftover after parsing attributes in process `syz.2.4466'. [ 518.671353][T18190] netlink: 40 bytes leftover after parsing attributes in process `syz.5.4460'. [ 519.525819][T18207] rdma_rxe: rxe_newlink: failed to add lo [ 519.566472][T18209] netlink: 40 bytes leftover after parsing attributes in process `syz.5.4479'. [ 519.745649][T18219] IPVS: Error joining to the multicast group [ 519.777393][T18189] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 519.922697][T18238] netlink: 20 bytes leftover after parsing attributes in process `syz.6.4492'. [ 519.975750][T18242] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4487'. [ 520.022286][T18189] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 520.069869][T18189] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 520.073508][T18249] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 520.088141][T18249] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 520.098320][T18249] vhci_hcd vhci_hcd.4: default hub control req: 230f v0004 i0000 l3 [ 520.118568][T18189] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 520.180995][T13880] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 520.196761][T13880] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 520.208836][T13880] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 520.217596][T13880] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 520.285722][T18262] bond1: entered allmulticast mode [ 520.291249][T18262] 8021q: adding VLAN 0 to HW filter on device bond1 [ 520.309230][T18262] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 520.319216][T18262] bond1: (slave macvlan2): making interface the new active one [ 520.326966][T18262] macvlan2: entered allmulticast mode [ 520.332394][T18262] bond0: entered allmulticast mode [ 520.337718][T18262] bond_slave_0: entered allmulticast mode [ 520.343481][T18262] bond_slave_1: entered allmulticast mode [ 520.349440][T18262] bond_slave_0: entered promiscuous mode [ 520.355158][T18262] bond_slave_1: entered promiscuous mode [ 520.362635][T18262] bond1: (slave macvlan2): Enslaving as an active interface with an up link [ 520.379029][T18264] bond1: (slave ip6gretap1): Enslaving as an active interface with an up link [ 520.411139][T18266] netlink: 20 bytes leftover after parsing attributes in process `syz.5.4503'. [ 520.492825][T18272] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4506'. [ 520.771590][T18289] netlink: 20 bytes leftover after parsing attributes in process `syz.5.4514'. [ 520.799999][T18291] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4515'. [ 520.812651][T18291] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4515'. [ 520.822104][T18291] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4515'. [ 521.114915][T18326] syzkaller0: entered promiscuous mode [ 521.120827][T18326] syzkaller0: entered allmulticast mode [ 521.257459][T18333] bridge0: port 2(bridge_slave_1) entered disabled state [ 521.409387][T18342] sz1: rxe_newlink: already configured on lo [ 521.442002][T18344] loop5: detected capacity change from 0 to 1024 [ 521.473919][T18344] EXT4-fs: test_dummy_encryption option not supported [ 523.014296][T18386] ALSA: seq fatal error: cannot create timer (-19) [ 523.620107][T18403] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 523.665674][T18403] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 523.705602][T18403] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 523.755857][T18403] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 523.813353][T12201] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 523.821971][T12201] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 523.830633][T12201] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 523.839532][T12201] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 524.891807][ T28] kauditd_printk_skb: 59 callbacks suppressed [ 524.891852][ T28] audit: type=1400 audit(1777840546.429:8902): avc: denied { setopt } for pid=18440 comm="syz.3.4573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 525.132059][T18450] loop3: detected capacity change from 0 to 512 [ 525.169157][T18450] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 525.332429][T18460] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 525.406372][T18460] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 525.435607][T18460] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 525.475621][T18460] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 525.531119][T15251] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 525.542934][T15251] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 525.555428][T15251] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 525.567825][T12181] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 525.819755][T14278] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 526.061502][T18483] syzkaller0: entered promiscuous mode [ 526.067400][T18483] syzkaller0: entered allmulticast mode [ 526.357446][T18496] loop2: detected capacity change from 0 to 512 [ 526.369526][T18496] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 526.413392][T18507] rdma_rxe: rxe_newlink: failed to add lo [ 526.732932][T18520] lo speed is unknown, defaulting to 1000 [ 526.871430][T18520] bridge0: port 1(bridge_slave_0) entered blocking state [ 526.878656][T18520] bridge0: port 1(bridge_slave_0) entered disabled state [ 526.886036][T18520] bridge_slave_0: entered allmulticast mode [ 526.893039][T18520] bridge_slave_0: entered promiscuous mode [ 526.900323][T18520] bridge0: port 2(bridge_slave_1) entered blocking state [ 526.907608][T18520] bridge0: port 2(bridge_slave_1) entered disabled state [ 526.914980][T18520] bridge_slave_1: entered allmulticast mode [ 526.921595][T18520] bridge_slave_1: entered promiscuous mode [ 526.941225][T18520] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 526.952014][T18520] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 526.972909][T18520] team0: Port device team_slave_0 added [ 526.980055][T18520] team0: Port device team_slave_1 added [ 526.998427][T18520] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 527.007138][T18520] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 527.033200][T18520] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 527.044708][T18520] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 527.051804][T18520] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 527.078244][T18520] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 527.103955][T14148] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 527.154721][T18520] hsr_slave_0: entered promiscuous mode [ 527.169846][T18520] hsr_slave_1: entered promiscuous mode [ 527.180271][T18520] debugfs: 'hsr0' already exists in 'hsr' [ 527.186190][T18520] Cannot create hsr debugfs directory [ 527.197283][T18542] syzkaller0: entered promiscuous mode [ 527.203041][T18542] syzkaller0: entered allmulticast mode [ 527.341341][ T28] audit: type=1400 audit(1777840548.879:8903): avc: denied { write } for pid=18545 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 527.382137][ T28] audit: type=1400 audit(1777840548.919:8904): avc: denied { write } for pid=18558 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 527.559839][ T28] audit: type=1400 audit(1777840549.099:8905): avc: denied { write } for pid=18562 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 527.627387][T18520] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 527.640002][ T28] audit: type=1400 audit(1777840549.179:8906): avc: denied { write } for pid=18586 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 527.665495][T18520] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 527.674024][T18520] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 527.683340][T18520] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 527.691520][T18520] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 527.708846][T18520] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 527.719992][T18520] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 527.732584][T18595] __nla_validate_parse: 7 callbacks suppressed [ 527.732607][T18595] netlink: 40 bytes leftover after parsing attributes in process `syz.3.4623'. [ 527.755013][T18520] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 527.826727][T18520] 8021q: adding VLAN 0 to HW filter on device bond0 [ 527.850868][T18520] 8021q: adding VLAN 0 to HW filter on device team0 [ 527.864108][ T28] audit: type=1400 audit(1777840549.399:8907): avc: denied { write } for pid=18592 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 527.892577][T12201] bridge0: port 1(bridge_slave_0) entered blocking state [ 527.899902][T12201] bridge0: port 1(bridge_slave_0) entered forwarding state [ 527.910499][T12201] bridge0: port 2(bridge_slave_1) entered blocking state [ 527.917721][T12201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 527.929705][T18585] lo speed is unknown, defaulting to 1000 [ 527.932628][ T28] audit: type=1400 audit(1777840549.469:8908): avc: denied { write } for pid=18615 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 528.045191][T18619] bond1: entered allmulticast mode [ 528.050825][T18619] 8021q: adding VLAN 0 to HW filter on device bond1 [ 528.168564][ T28] audit: type=1400 audit(1777840549.709:8909): avc: denied { write } for pid=18617 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 528.250897][ T28] audit: type=1400 audit(1777840549.769:8910): avc: denied { write } for pid=18645 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 528.291172][T18520] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 528.327329][T18585] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.345258][T18585] bridge0: port 1(bridge_slave_0) entered disabled state [ 528.353116][T18585] bridge_slave_0: entered allmulticast mode [ 528.362108][T18585] bridge_slave_0: entered promiscuous mode [ 528.369640][T18585] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.385255][T18585] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.392636][T18585] bridge_slave_1: entered allmulticast mode [ 528.402054][T18585] bridge_slave_1: entered promiscuous mode [ 528.420558][T18662] rdma_rxe: rxe_newlink: failed to add lo [ 528.460221][T18585] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 528.502904][T18585] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 528.555995][ T28] audit: type=1400 audit(1777840550.099:8911): avc: denied { write } for pid=18655 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 528.617195][T18585] team0: Port device team_slave_0 added [ 528.652859][T18585] team0: Port device team_slave_1 added [ 528.694646][T18585] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 528.710593][T18585] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 528.775601][T18700] rdma_rxe: rxe_newlink: failed to add lo [ 528.781466][T18585] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 528.826273][T18585] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 528.836503][T18585] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 528.871249][T18585] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 528.915591][T18712] bond1: entered allmulticast mode [ 528.921057][T18712] 8021q: adding VLAN 0 to HW filter on device bond1 [ 528.961069][T18520] veth0_vlan: entered promiscuous mode [ 529.023537][T18712] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 529.048485][T18712] bond1: (slave macvlan2): making interface the new active one [ 529.076005][T18712] macvlan2: entered allmulticast mode [ 529.084256][T18712] bond0: entered allmulticast mode [ 529.089527][T18712] bond_slave_0: entered allmulticast mode [ 529.095948][T18712] bond_slave_1: entered allmulticast mode [ 529.101870][T18712] bond_slave_0: entered promiscuous mode [ 529.107605][T18712] bond_slave_1: entered promiscuous mode [ 529.116747][T18712] bond1: (slave macvlan2): Enslaving as an active interface with an up link [ 529.176868][T18743] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 529.187154][T18743] bond1: (slave macvlan2): making interface the new active one [ 529.195356][T18743] macvlan2: entered allmulticast mode [ 529.201043][T18743] bond0: entered allmulticast mode [ 529.206638][T18743] bond_slave_0: entered allmulticast mode [ 529.212527][T18743] bond_slave_1: entered allmulticast mode [ 529.218701][T18743] bond_slave_0: entered promiscuous mode [ 529.224443][T18743] bond_slave_1: entered promiscuous mode [ 529.232166][T18743] bond1: (slave macvlan2): Enslaving as an active interface with an up link [ 529.251241][T18733] syzkaller0: entered promiscuous mode [ 529.256984][T18733] syzkaller0: entered allmulticast mode [ 529.277142][T18585] hsr_slave_0: entered promiscuous mode [ 529.283733][T18585] hsr_slave_1: entered promiscuous mode [ 529.290059][T18585] debugfs: 'hsr0' already exists in 'hsr' [ 529.296307][T18585] Cannot create hsr debugfs directory [ 529.332548][T18520] veth1_vlan: entered promiscuous mode [ 529.368716][T18757] loop5: detected capacity change from 0 to 1024 [ 529.393599][T18757] EXT4-fs: test_dummy_encryption option not supported [ 529.536670][T18520] veth0_macvtap: entered promiscuous mode [ 529.559420][T18520] veth1_macvtap: entered promiscuous mode [ 529.651685][T18520] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 529.679742][T18520] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 529.699628][T13880] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 529.715103][T13880] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 529.724342][T13880] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 529.734681][T13880] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 530.121320][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 530.121409][ T28] audit: type=1400 audit(1777840551.659:8919): avc: denied { write } for pid=18766 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 530.249391][ T28] audit: type=1400 audit(1777840551.789:8920): avc: denied { write } for pid=18784 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 530.275172][T18585] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 530.286619][T18585] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 530.307871][T18585] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 530.318012][T18585] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 530.328795][T18585] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 530.349727][T18585] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 530.369851][T18585] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 530.390059][T18585] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 530.449710][ T28] audit: type=1400 audit(1777840551.989:8921): avc: denied { write } for pid=18786 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 530.527504][ T28] audit: type=1400 audit(1777840552.069:8922): avc: denied { write } for pid=18803 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 530.574480][T18585] 8021q: adding VLAN 0 to HW filter on device bond0 [ 530.620969][T18585] 8021q: adding VLAN 0 to HW filter on device team0 [ 530.684831][T13880] bridge0: port 1(bridge_slave_0) entered blocking state [ 530.692192][T13880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 530.735384][T13880] bridge0: port 2(bridge_slave_1) entered blocking state [ 530.742539][T13880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 530.819420][T18825] netlink: 'syz.7.4651': attribute type 4 has an invalid length. [ 530.912564][T18829] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4655'. [ 531.039148][T18823] syzkaller0: entered promiscuous mode [ 531.052893][T18823] syzkaller0: entered allmulticast mode [ 531.093242][T18834] syzkaller0: entered promiscuous mode [ 531.119279][T18834] syzkaller0: entered allmulticast mode [ 531.327774][T18846] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4657'. [ 531.379430][T18846] netlink: 40 bytes leftover after parsing attributes in process `syz.2.4657'. [ 531.456019][T18585] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 531.532603][ T28] audit: type=1400 audit(1777840553.029:8923): avc: denied { write } for pid=18810 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 531.641791][ T28] audit: type=1400 audit(1777840553.179:8924): avc: denied { write } for pid=18868 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 531.746720][T18883] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4665'. [ 531.865505][ T28] audit: type=1400 audit(1777840553.409:8925): avc: denied { write } for pid=18879 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 531.897045][T18899] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4666'. [ 531.903499][T18585] veth0_vlan: entered promiscuous mode [ 531.922354][T18899] netlink: 40 bytes leftover after parsing attributes in process `syz.5.4666'. [ 531.936071][T18585] veth1_vlan: entered promiscuous mode [ 531.953985][ T28] audit: type=1400 audit(1777840553.489:8926): avc: denied { write } for pid=18901 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 531.984257][T18585] veth0_macvtap: entered promiscuous mode [ 531.999572][T18585] veth1_macvtap: entered promiscuous mode [ 532.019330][T18585] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 532.032811][T18585] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 532.053176][T13880] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 532.067213][T13880] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 532.079493][T13880] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 532.100939][T13880] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 532.197729][ T28] audit: type=1400 audit(1777840553.739:8927): avc: denied { write } for pid=18903 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 532.268655][ T28] audit: type=1400 audit(1777840553.809:8928): avc: denied { write } for pid=18920 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 532.364211][T18931] loop7: detected capacity change from 0 to 1024 [ 532.391602][T18931] EXT4-fs: test_dummy_encryption option not supported [ 532.406237][T18922] loop8: detected capacity change from 0 to 512 [ 532.483294][T18937] syzkaller0: entered promiscuous mode [ 532.555382][T18922] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 532.790378][T18944] usb usb8: usbfs: process 18944 (syz.7.4670) did not claim interface 0 before use [ 533.516752][T18585] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 533.620204][T18970] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4676'. [ 533.664854][T18974] rdma_rxe: rxe_newlink: failed to add lo [ 533.689509][T18976] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4677'. [ 533.725713][T18976] netlink: 40 bytes leftover after parsing attributes in process `syz.5.4677'. [ 534.076099][T18998] loop3: detected capacity change from 0 to 512 [ 534.120464][T18998] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 534.289542][T19002] tipc: Enabling of bearer rejected, failed to enable media [ 534.346840][T19002] syzkaller0: entered promiscuous mode [ 534.352669][T19002] syzkaller0: entered allmulticast mode [ 534.622856][T19027] tunl0: entered promiscuous mode [ 534.628273][T19031] rdma_rxe: rxe_newlink: failed to add lo [ 534.636960][T19027] netlink: 'syz.7.4688': attribute type 4 has an invalid length. [ 534.654161][T19027] netlink: 9 bytes leftover after parsing attributes in process `syz.7.4688'. [ 534.821550][T12181] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 534.877508][T14278] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 534.906147][T12181] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 534.951058][T19054] tipc: Enabling of bearer rejected, failed to enable media [ 534.968888][T19054] syzkaller0: entered promiscuous mode [ 534.981405][T19054] syzkaller0: entered allmulticast mode [ 535.003402][T12181] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 535.088029][T12181] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 535.112160][T19057] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 535.146236][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 535.146255][ T28] audit: type=1400 audit(1777840556.689:8940): avc: denied { write } for pid=19074 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 535.227969][T12181] bridge_slave_1: left promiscuous mode [ 535.249196][T12181] bridge0: port 2(bridge_slave_1) entered disabled state [ 535.265420][T12181] bridge_slave_0: left allmulticast mode [ 535.277812][T12181] bridge_slave_0: left promiscuous mode [ 535.303390][T12181] bridge0: port 1(bridge_slave_0) entered disabled state [ 535.317296][T12181] bond_slave_0: left promiscuous mode [ 535.323000][T12181] bond_slave_1: left promiscuous mode [ 535.348198][ T28] audit: type=1400 audit(1777840556.889:8941): avc: denied { write } for pid=19080 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 535.394440][ T28] audit: type=1400 audit(1777840556.939:8942): avc: denied { write } for pid=19097 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 535.521112][ T28] audit: type=1400 audit(1777840557.059:8943): avc: denied { write } for pid=19101 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 535.558774][ T28] audit: type=1400 audit(1777840557.099:8944): avc: denied { write } for pid=19116 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 535.582880][T12181] bond0 (unregistering): left allmulticast mode [ 535.589529][T12181] bond_slave_0: left allmulticast mode [ 535.595347][T12181] bond_slave_1: left allmulticast mode [ 535.609920][T12181] bond1 (unregistering): (slave macvlan2): Releasing active interface [ 535.621424][T12181] macvlan2 (unregistering): left allmulticast mode [ 535.634209][T12181] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 535.644943][T12181] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 535.663526][T12181] bond0 (unregistering): Released all slaves [ 535.674341][T12181] bond1 (unregistering): Released all slaves [ 535.691063][T19055] lo speed is unknown, defaulting to 1000 [ 535.698501][T19106] tunl0: entered promiscuous mode [ 535.700704][T19121] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4703'. [ 535.717525][T19106] netlink: 'syz.2.4702': attribute type 4 has an invalid length. [ 535.739549][T19106] netlink: 9 bytes leftover after parsing attributes in process `syz.2.4702'. [ 535.760290][T12181] tipc: Left network mode [ 535.771900][T12181] IPVS: stopping master sync thread 17125 ... [ 535.782850][T12181] IPVS: stopping backup sync thread 15365 ... [ 535.880041][ T28] audit: type=1400 audit(1777840557.419:8945): avc: denied { write } for pid=19118 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 535.908232][T12181] hsr_slave_0: left promiscuous mode [ 535.914838][T19138] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4705'. [ 535.923919][T12181] hsr_slave_1: left promiscuous mode [ 535.932041][T12181] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 535.942681][T12181] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 535.950707][T12181] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 535.965861][T12181] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 535.978089][T19142] netlink: 40 bytes leftover after parsing attributes in process `syz.2.4705'. [ 535.978941][ T28] audit: type=1400 audit(1777840557.519:8946): avc: denied { write } for pid=19139 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 536.016837][T12181] veth1_macvtap: left promiscuous mode [ 536.022416][T12181] veth0_macvtap: left promiscuous mode [ 536.033167][T12181] veth1_vlan: left promiscuous mode [ 536.039049][T12181] veth0_vlan: left promiscuous mode [ 536.119966][T12181] team0 (unregistering): Port device team_slave_1 removed [ 536.130619][T12181] team0 (unregistering): Port device team_slave_0 removed [ 536.179200][T19057] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 536.195101][T19148] tipc: Enabled bearer , priority 0 [ 536.205608][T19148] syzkaller0: entered promiscuous mode [ 536.211296][T19148] syzkaller0: entered allmulticast mode [ 536.233668][T19148] tipc: Resetting bearer [ 536.241667][T19147] tipc: Resetting bearer [ 536.251099][T19147] tipc: Disabling bearer [ 536.278304][T19057] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 536.316399][ T28] audit: type=1400 audit(1777840557.859:8947): avc: denied { write } for pid=19150 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 536.377088][T19057] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 536.391970][ T28] audit: type=1400 audit(1777840557.929:8948): avc: denied { write } for pid=19170 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 536.416829][T19055] bridge0: port 1(bridge_slave_0) entered blocking state [ 536.425251][T19055] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.432675][T19055] bridge_slave_0: entered allmulticast mode [ 536.440052][T19055] bridge_slave_0: entered promiscuous mode [ 536.447286][T19055] bridge0: port 2(bridge_slave_1) entered blocking state [ 536.454773][T19055] bridge0: port 2(bridge_slave_1) entered disabled state [ 536.462259][T19055] bridge_slave_1: entered allmulticast mode [ 536.469109][T19055] bridge_slave_1: entered promiscuous mode [ 536.489805][T12201] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 536.510252][T19055] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 536.522106][T19055] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 536.542630][T12201] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 536.564798][T19055] team0: Port device team_slave_0 added [ 536.570681][T12201] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 536.587330][T12181] IPVS: stop unused estimator thread 0... [ 536.595539][T19055] team0: Port device team_slave_1 added [ 536.602693][ T28] audit: type=1400 audit(1777840558.139:8949): avc: denied { write } for pid=19174 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 536.627575][T12201] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 536.660431][T19055] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 536.672046][T19055] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 536.706578][T19055] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 536.716019][T19188] netlink: 35 bytes leftover after parsing attributes in process `syz.2.4712'. [ 536.720921][T19055] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 536.733736][T19055] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 536.761743][T19055] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 536.839010][T19055] hsr_slave_0: entered promiscuous mode [ 536.845726][T19055] hsr_slave_1: entered promiscuous mode [ 536.854523][T19055] debugfs: 'hsr0' already exists in 'hsr' [ 536.860547][T19055] Cannot create hsr debugfs directory [ 537.101655][T19224] syzkaller0: entered promiscuous mode [ 537.113944][T19224] syzkaller0: entered allmulticast mode [ 537.302064][ T3023] 8021q: adding VLAN 0 to HW filter on device eth4 [ 537.339893][T19055] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 537.354979][T19055] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 537.377679][T19055] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 537.399597][T19055] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 537.422839][T19055] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 537.438441][T19263] netlink: 'syz.7.4733': attribute type 4 has an invalid length. [ 537.447621][T19055] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 537.458319][T19055] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 537.476920][T19055] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 537.559557][T19055] 8021q: adding VLAN 0 to HW filter on device bond0 [ 537.582589][T19055] 8021q: adding VLAN 0 to HW filter on device team0 [ 537.600640][T13880] bridge0: port 1(bridge_slave_0) entered blocking state [ 537.607891][T13880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 537.631349][T12201] bridge0: port 2(bridge_slave_1) entered blocking state [ 537.638536][T12201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 537.737196][ T3023] 8021q: adding VLAN 0 to HW filter on device eth5 [ 537.944705][T19055] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 538.036505][T19337] netlink: 'syz.8.4745': attribute type 4 has an invalid length. [ 538.051839][ T3023] 8021q: adding VLAN 0 to HW filter on device eth6 [ 538.137155][T19349] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 538.164664][T19349] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 538.196225][T19349] vhci_hcd vhci_hcd.4: default hub control req: 230f v0004 i0000 l3 [ 538.208335][T19055] veth0_vlan: entered promiscuous mode [ 538.235396][T19055] veth1_vlan: entered promiscuous mode [ 538.291613][T19055] veth0_macvtap: entered promiscuous mode [ 538.309254][T19055] veth1_macvtap: entered promiscuous mode [ 538.360154][T19055] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 538.408230][ T3023] 8021q: adding VLAN 0 to HW filter on device eth9 [ 538.467587][T19055] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 538.493674][T15105] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 538.512802][T15105] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 538.584641][T15105] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 539.576957][T15105] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 539.813762][T19455] loop0: detected capacity change from 0 to 1024 [ 539.835049][T19457] netlink: 28 bytes leftover after parsing attributes in process `syz.8.4769'. [ 539.846454][T19455] EXT4-fs: test_dummy_encryption option not supported [ 540.889799][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 540.889815][ T28] audit: type=1400 audit(1777840562.429:8967): avc: denied { write } for pid=19438 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 541.088584][ T28] audit: type=1400 audit(1777840562.629:8968): avc: denied { write } for pid=19478 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 541.371885][T19497] syzkaller0: entered promiscuous mode [ 541.407605][T19497] syzkaller0: entered allmulticast mode [ 541.579541][T19470] lo speed is unknown, defaulting to 1000 [ 541.620563][ T28] audit: type=1400 audit(1777840563.159:8969): avc: denied { write } for pid=19489 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 541.772434][ T28] audit: type=1400 audit(1777840563.309:8970): avc: denied { write } for pid=19523 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 541.993319][T19532] syzkaller0: entered promiscuous mode [ 542.006569][T19532] syzkaller0: entered allmulticast mode [ 542.127334][T19542] netlink: 4 bytes leftover after parsing attributes in process `syz.8.4793'. [ 542.144848][T19542] netlink: 40 bytes leftover after parsing attributes in process `syz.8.4793'. [ 542.203926][T19548] rdma_rxe: rxe_newlink: failed to add lo [ 542.446795][T19562] loop8: detected capacity change from 0 to 1024 [ 542.474274][T19562] EXT4-fs: test_dummy_encryption option not supported [ 542.658630][T19470] bridge0: port 1(bridge_slave_0) entered blocking state [ 542.688751][T19470] bridge0: port 1(bridge_slave_0) entered disabled state [ 542.980382][T19470] bridge_slave_0: entered allmulticast mode [ 543.000307][T19470] bridge_slave_0: entered promiscuous mode [ 543.549988][T19567] usb usb8: usbfs: process 19567 (syz.8.4800) did not claim interface 0 before use [ 543.972580][T19470] bridge0: port 2(bridge_slave_1) entered blocking state [ 543.979902][T19470] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.987230][T19470] bridge_slave_1: entered allmulticast mode [ 543.994005][T19470] bridge_slave_1: entered promiscuous mode [ 544.135054][T19470] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 544.297707][T19470] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 544.333900][ T28] audit: type=1400 audit(1777840565.869:8971): avc: denied { write } for pid=19529 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 544.365561][T19470] team0: Port device team_slave_0 added [ 544.378612][T19470] team0: Port device team_slave_1 added [ 544.403118][T19470] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 544.417947][ T28] audit: type=1400 audit(1777840565.949:8972): avc: denied { write } for pid=19577 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 544.445319][T19470] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 544.479359][T19470] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 544.491187][T19470] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 544.498443][T19470] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 544.524657][T19470] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 544.597615][T19470] hsr_slave_0: entered promiscuous mode [ 544.609934][T19470] hsr_slave_1: entered promiscuous mode [ 544.624430][T19470] debugfs: 'hsr0' already exists in 'hsr' [ 544.637278][T19470] Cannot create hsr debugfs directory [ 544.668655][ T28] audit: type=1400 audit(1777840566.209:8973): avc: denied { write } for pid=19579 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 544.714194][ T28] audit: type=1400 audit(1777840566.259:8974): avc: denied { write } for pid=19590 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 544.821484][ T28] audit: type=1400 audit(1777840566.359:8975): avc: denied { write } for pid=19592 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 544.866069][ T28] audit: type=1400 audit(1777840566.409:8976): avc: denied { write } for pid=19603 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 545.273464][T19620] bridge0: port 2(bridge_slave_1) entered disabled state [ 545.311530][T19620] netlink: 12 bytes leftover after parsing attributes in process `syz.8.4801'. [ 545.738168][T19470] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 545.768188][T19470] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 545.806085][T19470] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 545.843649][T19643] netlink: 4 bytes leftover after parsing attributes in process `syz.8.4805'. [ 545.857160][T19470] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 545.885724][T19643] netlink: 40 bytes leftover after parsing attributes in process `syz.8.4805'. [ 545.895337][T19470] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 545.927053][T19470] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 545.967160][T19470] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 546.015344][T19470] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 546.075510][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 546.075526][ T28] audit: type=1400 audit(1777840567.619:8981): avc: denied { write } for pid=19642 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 546.151915][ T28] audit: type=1400 audit(1777840567.689:8982): avc: denied { write } for pid=19664 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 546.333231][ T28] audit: type=1400 audit(1777840567.869:8983): avc: denied { write } for pid=19666 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 546.402382][ T28] audit: type=1400 audit(1777840567.939:8984): avc: denied { write } for pid=19677 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 546.662928][T19470] 8021q: adding VLAN 0 to HW filter on device bond0 [ 546.741990][T19470] 8021q: adding VLAN 0 to HW filter on device team0 [ 546.779997][T15105] bridge0: port 1(bridge_slave_0) entered blocking state [ 546.787159][T15105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 546.810604][T19694] netlink: 12 bytes leftover after parsing attributes in process `syz.8.4811'. [ 546.824316][T15105] bridge0: port 2(bridge_slave_1) entered blocking state [ 546.831658][T15105] bridge0: port 2(bridge_slave_1) entered forwarding state [ 546.852217][ T28] audit: type=1400 audit(1777840568.389:8985): avc: denied { write } for pid=19679 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 546.947485][ T28] audit: type=1400 audit(1777840568.489:8986): avc: denied { write } for pid=19707 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 546.994370][T19710] tipc: Enabled bearer , priority 0 [ 547.190844][ T28] audit: type=1400 audit(1777840568.729:8987): avc: denied { write } for pid=19718 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 547.262706][ T28] audit: type=1400 audit(1777840568.799:8988): avc: denied { write } for pid=19734 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 547.393229][ T28] audit: type=1400 audit(1777840568.929:8989): avc: denied { write } for pid=19737 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 547.438282][ T28] audit: type=1400 audit(1777840568.979:8990): avc: denied { write } for pid=19748 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 547.486299][T19710] syzkaller0: entered promiscuous mode [ 547.492057][T19710] syzkaller0: entered allmulticast mode [ 547.510457][T19731] tipc: Resetting bearer [ 547.531757][T19709] tipc: Resetting bearer [ 547.544171][T19709] tipc: Disabling bearer [ 547.628302][T12197] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 547.728500][T12197] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 547.781277][T19765] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4822'. [ 547.803051][T19470] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 547.816483][T19765] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4822'. [ 547.841925][T12197] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 547.860597][T19765] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4822'. [ 547.951799][T12197] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 548.061705][T19784] rdma_rxe: rxe_newlink: failed to add lo [ 548.182366][T12197] bridge_slave_1: left allmulticast mode [ 548.213516][T12197] bridge_slave_1: left promiscuous mode [ 548.239647][T12197] bridge0: port 2(bridge_slave_1) entered disabled state [ 548.274985][T12197] bridge_slave_0: left allmulticast mode [ 548.284747][T12197] bridge_slave_0: left promiscuous mode [ 548.306530][T12197] bridge0: port 1(bridge_slave_0) entered disabled state [ 548.573259][T12197] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 548.597252][T19803] loop2: detected capacity change from 0 to 764 [ 548.603905][T12197] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 548.614420][T12197] bond0 (unregistering): Released all slaves [ 548.658404][T19470] veth0_vlan: entered promiscuous mode [ 548.673815][T19803] rock: directory entry would overflow storage [ 548.680165][T19803] rock: sig=0x4654, size=5, remaining=4 [ 548.737023][T19470] veth1_vlan: entered promiscuous mode [ 548.786345][T19777] lo speed is unknown, defaulting to 1000 [ 548.800050][T19470] veth0_macvtap: entered promiscuous mode [ 548.807947][T19470] veth1_macvtap: entered promiscuous mode [ 548.853395][T19470] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 548.866450][T19470] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 548.905497][T19724] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 548.936074][T15105] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 548.947736][T19834] tipc: Started in network mode [ 548.952876][T19834] tipc: Node identity 2a1e391aa843, cluster identity 4711 [ 548.962758][T19834] tipc: Enabled bearer , priority 0 [ 548.980521][T15105] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 548.990891][T19724] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 549.008854][T15105] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 549.018494][T15105] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 549.030874][T12197] hsr_slave_0: left promiscuous mode [ 549.037959][T12197] hsr_slave_1: left promiscuous mode [ 549.043978][T12197] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 549.051524][T12197] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 549.060106][T12197] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 549.067684][T12197] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 549.079949][T12197] veth1_macvtap: left promiscuous mode [ 549.085668][T12197] veth0_macvtap: left promiscuous mode [ 549.091296][T12197] veth1_vlan: left promiscuous mode [ 549.097208][T12197] veth0_vlan: left promiscuous mode [ 549.193293][T12197] team0 (unregistering): Port device team_slave_1 removed [ 549.204969][T12197] team0 (unregistering): Port device team_slave_0 removed [ 549.260910][T19724] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 549.280649][T19851] tipc: Resetting bearer [ 549.294908][T19832] tipc: Disabling bearer [ 549.330317][T19724] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 549.453250][T15105] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 549.516566][T19896] rdma_rxe: rxe_newlink: failed to add lo [ 549.535018][T19885] syzkaller0: entered promiscuous mode [ 549.544379][T15105] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 549.559052][T15105] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 549.620946][T12192] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 549.707954][T19777] bridge0: port 1(bridge_slave_0) entered blocking state [ 549.722578][T19777] bridge0: port 1(bridge_slave_0) entered disabled state [ 549.731385][T19777] bridge_slave_0: entered allmulticast mode [ 549.738389][T19777] bridge_slave_0: entered promiscuous mode [ 549.747683][T19777] bridge0: port 2(bridge_slave_1) entered blocking state [ 549.756174][T19777] bridge0: port 2(bridge_slave_1) entered disabled state [ 549.763476][T19777] bridge_slave_1: entered allmulticast mode [ 549.770778][T19777] bridge_slave_1: entered promiscuous mode [ 549.804447][T19777] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 549.818049][T19777] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 549.853003][T19777] team0: Port device team_slave_0 added [ 549.862438][T19777] team0: Port device team_slave_1 added [ 549.882285][T19777] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 549.904163][T19777] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 549.933591][T19777] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 549.945608][T19928] netlink: 'syz.0.4840': attribute type 4 has an invalid length. [ 549.975872][T19777] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 549.984530][T19777] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 550.015423][T19777] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 550.065691][T19941] rdma_rxe: rxe_newlink: failed to add lo [ 550.110089][T19777] hsr_slave_0: entered promiscuous mode [ 550.127148][T19777] hsr_slave_1: entered promiscuous mode [ 550.137135][T19777] debugfs: 'hsr0' already exists in 'hsr' [ 550.142992][T19777] Cannot create hsr debugfs directory [ 550.173245][T19954] netlink: 28 bytes leftover after parsing attributes in process `syz.2.4846'. [ 550.435342][T19978] lo speed is unknown, defaulting to 1000 [ 550.444491][ T3023] 8021q: adding VLAN 0 to HW filter on device eth1 [ 550.494774][T19777] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 550.520679][T19777] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 550.534646][T19777] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 550.551802][T19777] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 550.563246][T19777] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 550.573440][T19777] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 550.582308][T19777] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 550.592527][T19777] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 550.637342][T19984] loop0: detected capacity change from 0 to 512 [ 550.671227][T19984] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 550.725879][T19999] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=19999 comm=syz.1.4852 [ 550.800737][T19777] 8021q: adding VLAN 0 to HW filter on device bond0 [ 550.832392][T19777] 8021q: adding VLAN 0 to HW filter on device team0 [ 550.849199][T13880] bridge0: port 1(bridge_slave_0) entered blocking state [ 550.856352][T13880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 550.886200][T19055] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 550.901569][T20007] netlink: 4 bytes leftover after parsing attributes in process `syz.8.4853'. [ 550.927291][T13880] bridge0: port 2(bridge_slave_1) entered blocking state [ 550.934542][T13880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 550.968508][T20012] netlink: 40 bytes leftover after parsing attributes in process `syz.8.4853'. [ 550.997309][T20016] netlink: 20 bytes leftover after parsing attributes in process `syz.0.4859'. [ 551.015831][T20014] tipc: Enabled bearer , priority 0 [ 551.040343][T20014] syzkaller0: entered promiscuous mode [ 551.048036][T20014] syzkaller0: entered allmulticast mode [ 551.068290][T20018] IPVS: Error joining to the multicast group [ 551.077443][T20018] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4860'. [ 551.086600][T20018] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4860'. [ 551.097525][T20018] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4860'. [ 551.108611][T20014] tipc: Resetting bearer [ 551.121720][T20013] tipc: Resetting bearer [ 551.130955][T20013] tipc: Disabling bearer [ 551.312585][ T28] kauditd_printk_skb: 24 callbacks suppressed [ 551.312603][ T28] audit: type=1400 audit(1777840572.849:9015): avc: denied { write } for pid=20025 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 551.377571][T19777] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 551.388170][ T28] audit: type=1400 audit(1777840572.929:9016): avc: denied { write } for pid=20048 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 551.549301][ T28] audit: type=1400 audit(1777840573.089:9017): avc: denied { write } for pid=20052 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 551.607502][ T28] audit: type=1400 audit(1777840573.149:9018): avc: denied { write } for pid=20071 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 551.707887][T19777] veth0_vlan: entered promiscuous mode [ 551.735440][T19777] veth1_vlan: entered promiscuous mode [ 551.765082][T19777] veth0_macvtap: entered promiscuous mode [ 551.774424][T19777] veth1_macvtap: entered promiscuous mode [ 551.789613][T19777] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 551.797377][T20089] netlink: 28 bytes leftover after parsing attributes in process `syz.8.4867'. [ 551.809946][T19777] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 551.848910][ T28] audit: type=1326 audit(1777840573.389:9019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20084 comm="syz.8.4867" exe="/root/ci2-upstream-kcsan-gce/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f44d2e9cdd9 code=0x0 [ 551.972466][T12197] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 551.994932][T12197] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 552.015888][ T28] audit: type=1400 audit(1777840573.559:9020): avc: denied { write } for pid=20078 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 552.064598][T12197] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 552.107379][T12197] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 552.122785][ T28] audit: type=1400 audit(1777840573.659:9021): avc: denied { write } for pid=20109 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 552.288195][ T28] audit: type=1400 audit(1777840573.829:9022): avc: denied { write } for pid=20113 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 552.365284][ T28] audit: type=1400 audit(1777840573.909:9023): avc: denied { write } for pid=20125 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 554.542698][ T28] audit: type=1400 audit(1777840576.079:9024): avc: denied { write } for pid=20129 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 554.930767][T20126] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 554.955871][T20151] tipc: Started in network mode [ 554.961070][T20151] tipc: Node identity 0ea850c9b355, cluster identity 4711 [ 554.997518][T20151] tipc: Enabled bearer , priority 0 [ 555.026236][T20171] tipc: Resetting bearer [ 555.051326][T20126] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 555.069389][T20137] tipc: Disabling bearer [ 555.120207][T20126] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 555.207251][T20126] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 555.325127][T12201] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 555.543753][T12201] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 555.552773][T12192] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 555.589496][T12192] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 555.919966][T20228] syzkaller0: entered promiscuous mode [ 555.925677][T20228] syzkaller0: entered allmulticast mode [ 555.952100][T20233] bridge0: port 2(bridge_slave_1) entered disabled state [ 555.968509][T20233] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4886'. [ 556.099528][T20247] rdma_rxe: rxe_newlink: failed to add lo [ 556.557500][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 556.557514][ T28] audit: type=1400 audit(1777840578.099:9034): avc: denied { write } for pid=20236 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 556.966689][ T28] audit: type=1400 audit(1777840578.499:9035): avc: denied { write } for pid=20263 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 557.204294][T20290] netlink: 4 bytes leftover after parsing attributes in process `syz.8.4895'. [ 557.220628][T20289] loop1: detected capacity change from 0 to 764 [ 557.250274][T20290] netlink: 40 bytes leftover after parsing attributes in process `syz.8.4895'. [ 557.265576][T20289] rock: directory entry would overflow storage [ 557.296442][T20289] rock: sig=0x4654, size=5, remaining=4 [ 557.997419][ T28] audit: type=1400 audit(1777840579.539:9036): avc: denied { write } for pid=20271 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 558.058101][ T28] audit: type=1400 audit(1777840579.599:9037): avc: denied { write } for pid=20302 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 558.101322][T20304] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4901'. [ 558.195501][ T28] audit: type=1400 audit(1777840579.719:9038): avc: denied { write } for pid=20305 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 558.239702][ T28] audit: type=1400 audit(1777840579.769:9039): avc: denied { write } for pid=20316 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 558.346351][ T3023] 8021q: adding VLAN 0 to HW filter on device eth2 [ 558.447479][T20325] rdma_rxe: rxe_newlink: failed to add lo [ 558.587437][T20334] syzkaller0: entered promiscuous mode [ 558.854892][T20332] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 558.935180][T20347] bridge0: port 2(bridge_slave_1) entered disabled state [ 558.946164][T20332] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 558.978095][T20347] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4910'. [ 559.049475][T20357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20357 comm=syz.8.4912 [ 559.092210][T20332] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 559.121396][ T28] audit: type=1400 audit(1777840580.659:9040): avc: denied { write } for pid=20339 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 559.188829][ T28] audit: type=1400 audit(1777840580.729:9041): avc: denied { write } for pid=20366 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 559.221784][T20372] netlink: 4 bytes leftover after parsing attributes in process `syz.8.4914'. [ 559.243380][T20332] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 559.258118][T20369] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4915'. [ 559.279327][T20372] netlink: 40 bytes leftover after parsing attributes in process `syz.8.4914'. [ 559.328409][T12181] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 559.359837][T13880] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 559.381783][T13880] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 559.422751][T13880] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 559.519432][T20402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20402 comm=syz.4.4924 [ 559.567396][ T28] audit: type=1400 audit(1777840581.109:9042): avc: denied { write } for pid=20375 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 559.615382][ T28] audit: type=1400 audit(1777840581.159:9043): avc: denied { write } for pid=20407 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 559.655831][ T3023] 8021q: adding VLAN 0 to HW filter on device eth3 [ 559.799819][ T3023] 8021q: adding VLAN 0 to HW filter on device eth10 [ 560.059986][T20436] netlink: 4 bytes leftover after parsing attributes in process `syz.8.4926'. [ 560.069903][T20436] netlink: 40 bytes leftover after parsing attributes in process `syz.8.4926'. [ 561.010547][T13880] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 561.097325][T13880] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 561.188976][T13880] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 561.247703][T13880] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 561.327593][T20472] __nla_validate_parse: 3 callbacks suppressed [ 561.327615][T20472] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4940'. [ 561.387246][T13880] bridge_slave_1: left promiscuous mode [ 561.403415][T13880] bridge0: port 2(bridge_slave_1) entered disabled state [ 561.435127][T13880] bridge_slave_0: left allmulticast mode [ 561.448640][T13880] bridge_slave_0: left promiscuous mode [ 561.464094][T13880] bridge0: port 1(bridge_slave_0) entered disabled state [ 561.611049][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 561.611064][ T28] audit: type=1400 audit(1777840583.149:9046): avc: denied { write } for pid=20476 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 561.687033][T13880] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 561.711313][T13880] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 561.720379][ T28] audit: type=1400 audit(1777840583.249:9047): avc: denied { write } for pid=20499 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 561.760102][T13880] bond0 (unregistering): Released all slaves [ 561.783639][T20486] syzkaller0: entered promiscuous mode [ 561.789389][T20486] syzkaller0: entered allmulticast mode [ 561.813226][ T3023] 8021q: adding VLAN 0 to HW filter on device eth7 [ 561.867492][T20460] lo speed is unknown, defaulting to 1000 [ 561.918907][T13880] hsr_slave_0: left promiscuous mode [ 561.935430][T13880] hsr_slave_1: left promiscuous mode [ 561.947314][T13880] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 561.964007][T13880] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 561.984980][T13880] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 561.998718][T13880] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 562.031655][T13880] veth1_macvtap: left promiscuous mode [ 562.045384][T13880] veth0_macvtap: left promiscuous mode [ 562.057023][T13880] veth1_vlan: left promiscuous mode [ 562.062384][T13880] veth0_vlan: left promiscuous mode [ 562.130085][ T28] audit: type=1400 audit(1777840583.669:9048): avc: denied { write } for pid=20507 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 562.191190][ T28] audit: type=1400 audit(1777840583.729:9049): avc: denied { write } for pid=20520 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 562.217444][T13880] team0 (unregistering): Port device team_slave_1 removed [ 562.232360][T13880] team0 (unregistering): Port device team_slave_0 removed [ 562.288952][ T3023] 8021q: adding VLAN 0 to HW filter on device eth8 [ 562.552916][T20460] bridge0: port 1(bridge_slave_0) entered blocking state [ 562.569279][T20460] bridge0: port 1(bridge_slave_0) entered disabled state [ 562.584092][T20460] bridge_slave_0: entered allmulticast mode [ 562.597046][T20460] bridge_slave_0: entered promiscuous mode [ 562.609734][ T28] audit: type=1400 audit(1777840584.149:9050): avc: denied { write } for pid=20524 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 562.635090][T20460] bridge0: port 2(bridge_slave_1) entered blocking state [ 562.655839][T20460] bridge0: port 2(bridge_slave_1) entered disabled state [ 562.674635][T20460] bridge_slave_1: entered allmulticast mode [ 562.694984][T20460] bridge_slave_1: entered promiscuous mode [ 562.704368][ T28] audit: type=1400 audit(1777840584.249:9051): avc: denied { write } for pid=20544 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 562.744908][T20460] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 562.758372][T20460] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 562.775703][ T3023] 8021q: adding VLAN 0 to HW filter on device eth11 [ 562.792351][T20460] team0: Port device team_slave_0 added [ 562.801564][T20460] team0: Port device team_slave_1 added [ 562.858357][T20552] bridge0: port 2(bridge_slave_1) entered disabled state [ 562.880115][T20460] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 562.893562][T20460] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 562.898022][T20552] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4951'. [ 562.947233][T20460] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 562.975240][T20460] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 562.997005][T20460] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 563.039933][T20460] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 563.093150][T20460] hsr_slave_0: entered promiscuous mode [ 563.102719][T20460] hsr_slave_1: entered promiscuous mode [ 563.115487][T20460] debugfs: 'hsr0' already exists in 'hsr' [ 563.131675][T20460] Cannot create hsr debugfs directory [ 563.256572][T13880] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 563.410554][T20577] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 563.478934][T13880] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 563.542659][T20577] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 563.596608][T20549] lo speed is unknown, defaulting to 1000 [ 563.606745][T20577] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 563.716392][T20577] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 563.736941][T13880] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 563.986562][T12181] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 564.049643][T13880] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 564.175033][T12181] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 564.250064][T12181] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 564.315011][ T28] audit: type=1400 audit(1777840585.859:9052): avc: denied { write } for pid=20558 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 564.330626][T12181] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 564.365718][T20585] rdma_rxe: rxe_newlink: failed to add lo [ 564.663922][ T28] audit: type=1400 audit(1777840586.109:9053): avc: denied { write } for pid=20587 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 564.799179][T13880] bridge_slave_1: left promiscuous mode [ 564.818932][T13880] bridge0: port 2(bridge_slave_1) entered disabled state [ 564.849550][T13880] bridge_slave_0: left allmulticast mode [ 564.869760][T13880] bridge_slave_0: left promiscuous mode [ 564.890773][T13880] bridge0: port 1(bridge_slave_0) entered disabled state [ 565.200692][T13880] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 565.236332][T13880] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 565.271678][T13880] bond0 (unregistering): Released all slaves [ 565.309844][ T3023] 8021q: adding VLAN 0 to HW filter on device eth12 [ 565.716850][T13880] hsr_slave_0: left promiscuous mode [ 565.723533][T13880] hsr_slave_1: left promiscuous mode [ 565.730534][T13880] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 565.738289][T13880] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 565.746371][T13880] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 565.759271][T13880] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 565.785096][T13880] veth1_macvtap: left promiscuous mode [ 565.800799][T13880] veth0_macvtap: left promiscuous mode [ 565.807303][T13880] veth1_vlan: left promiscuous mode [ 565.812689][T13880] veth0_vlan: left promiscuous mode [ 565.835564][T20601] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4958'. [ 565.849860][T20597] loop2: detected capacity change from 0 to 764 [ 565.878636][T12201] ================================================================== [ 565.886787][T12201] BUG: KCSAN: data-race in atime_needs_update / touch_atime [ 565.894085][T12201] [ 565.896411][T12201] read to 0xffff88811bc5e3d8 of 4 bytes by task 12197 on cpu 0: [ 565.904037][T12201] atime_needs_update+0x25f/0x3e0 [ 565.909092][T12201] touch_atime+0x4a/0x330 [ 565.913431][T12201] shmem_file_read_iter+0x3f4/0x4b0 [ 565.918723][T12201] lo_rw_aio+0x67d/0x730 [ 565.922997][T12201] loop_process_work+0x56c/0xac0 [ 565.928037][T12201] loop_rootcg_workfn+0x22/0x30 [ 565.932946][T12201] process_scheduled_works+0x4f0/0x9c0 [ 565.938450][T12201] worker_thread+0x58a/0x780 [ 565.943095][T12201] kthread+0x22a/0x280 [ 565.947181][T12201] ret_from_fork+0x146/0x330 [ 565.951802][T12201] ret_from_fork_asm+0x1a/0x30 [ 565.956588][T12201] [ 565.958929][T12201] write to 0xffff88811bc5e3d8 of 4 bytes by task 12201 on cpu 1: [ 565.966672][T12201] touch_atime+0x1d7/0x330 [ 565.971118][T12201] shmem_file_read_iter+0x3f4/0x4b0 [ 565.976351][T12201] lo_rw_aio+0x67d/0x730 [ 565.980633][T12201] loop_process_work+0x56c/0xac0 [ 565.985609][T12201] loop_workfn+0x31/0x40 [ 565.989886][T12201] process_scheduled_works+0x4f0/0x9c0 [ 565.995374][T12201] worker_thread+0x58a/0x780 [ 565.999995][T12201] kthread+0x22a/0x280 [ 566.004080][T12201] ret_from_fork+0x146/0x330 [ 566.008711][T12201] ret_from_fork_asm+0x1a/0x30 [ 566.013508][T12201] [ 566.015848][T12201] value changed: 0x17cb96d5 -> 0x18fcc3d6 [ 566.021669][T12201] SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 566.024011][T12201] Reported by Kernel Concurrency Sanitizer on: [ 566.030182][T12201] CPU: 1 UID: 0 PID: 12201 Comm: kworker/u8:23 Not tainted syzkaller #0 PREEMPT(full) [ 566.039835][T12201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 566.049918][T12201] Workqueue: loop2 loop_workfn [ 566.054737][T12201] ================================================================== [ 566.075649][T20602] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4958'. [ 566.124968][T13880] team0 (unregistering): Port device team_slave_1 removed [ 566.147190][T20597] rock: directory entry would overflow storage [ 566.154374][T20597] rock: sig=0x4654, size=5, remaining=4 [ 566.195135][T13880] team0 (unregistering): Port device team_slave_0 removed [ 566.370493][ T28] audit: type=1400 audit(1777840587.909:9054): avc: denied { write } for pid=20604 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 566.403095][ T28] audit: type=1400 audit(1777840587.939:9055): avc: denied { write } for pid=20615 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 566.441398][ T3023] 8021q: adding VLAN 0 to HW filter on device eth13 [ 566.611636][ T3023] 8021q: adding VLAN 0 to HW filter on device eth14 [ 566.691826][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 566.691845][ T28] audit: type=1400 audit(1777840588.229:9058): avc: denied { write } for pid=20634 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 566.729435][ T28] audit: type=1400 audit(1777840588.269:9059): avc: denied { write } for pid=20645 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 566.763210][ T3023] 8021q: adding VLAN 0 to HW filter on device eth15 [ 566.846500][ T28] audit: type=1400 audit(1777840588.389:9060): avc: denied { write } for pid=20648 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 566.886831][ T28] audit: type=1400 audit(1777840588.429:9061): avc: denied { write } for pid=20659 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 566.922972][ T3023] 8021q: adding VLAN 0 to HW filter on device eth16 [ 566.974173][T13880] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 567.007488][T13880] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 567.057263][T13880] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 567.074733][ T28] audit: type=1400 audit(1777840588.619:9062): avc: denied { write } for pid=20664 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 567.108583][ T28] audit: type=1400 audit(1777840588.649:9063): avc: denied { write } for pid=20675 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 567.135773][T13880] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 567.151739][ T3023] 8021q: adding VLAN 0 to HW filter on device eth17 [ 567.227081][T13880] bridge_slave_1: left allmulticast mode [ 567.232885][T13880] bridge_slave_1: left promiscuous mode [ 567.239756][T13880] bridge0: port 2(bridge_slave_1) entered disabled state [ 567.247948][T13880] bridge_slave_0: left allmulticast mode [ 567.253646][T13880] bridge_slave_0: left promiscuous mode [ 567.259556][T13880] bridge0: port 1(bridge_slave_0) entered disabled state [ 567.269128][T13880] bridge_slave_1: left promiscuous mode [ 567.275049][T13880] bridge0: port 2(bridge_slave_1) entered disabled state [ 567.282883][T13880] bridge_slave_0: left allmulticast mode [ 567.288869][T13880] bridge_slave_0: left promiscuous mode [ 567.295014][T13880] bridge0: port 1(bridge_slave_0) entered disabled state [ 567.316199][ T28] audit: type=1400 audit(1777840588.859:9064): avc: denied { write } for pid=20679 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 567.362648][ T28] audit: type=1400 audit(1777840588.899:9065): avc: denied { write } for pid=20690 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 567.406086][T13880] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 567.416228][T13880] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 567.426183][T13880] bond0 (unregistering): Released all slaves [ 567.497807][T13880] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 567.508290][T13880] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 567.518476][T13880] bond0 (unregistering): Released all slaves [ 567.585627][T13880] bond0 (unregistering): Released all slaves [ 567.596560][ T3023] 8021q: adding VLAN 0 to HW filter on device eth18 [ 567.680053][T13880] tipc: Left network mode [ 567.684621][ T28] audit: type=1400 audit(1777840589.219:9066): avc: denied { write } for pid=20693 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 567.720080][ T28] audit: type=1400 audit(1777840589.259:9067): avc: denied { write } for pid=20704 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 567.750127][ T3023] 8021q: adding VLAN 0 to HW filter on device eth19 [ 567.815623][T13880] hsr_slave_0: left promiscuous mode [ 567.821684][T13880] hsr_slave_1: left promiscuous mode [ 567.828774][T13880] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 567.836828][T13880] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 567.848056][T13880] hsr_slave_0: left promiscuous mode [ 567.854144][T13880] hsr_slave_1: left promiscuous mode [ 567.860183][T13880] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 567.867782][T13880] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 567.875501][T13880] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 567.882979][T13880] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 567.896432][T13880] veth1_macvtap: left promiscuous mode [ 567.902013][T13880] veth0_macvtap: left promiscuous mode [ 567.907759][T13880] veth1_vlan: left promiscuous mode [ 567.913199][T13880] veth0_vlan: left promiscuous mode [ 567.988633][T13880] team0 (unregistering): Port device team_slave_1 removed [ 567.999089][T13880] team0 (unregistering): Port device team_slave_0 removed [ 568.064138][T13880] team0 (unregistering): Port device team_slave_1 removed [ 568.074892][T13880] team0 (unregistering): Port device team_slave_0 removed [ 568.116787][ T3023] 8021q: adding VLAN 0 to HW filter on device eth20 [ 568.230353][ T3023] 8021q: adding VLAN 0 to HW filter on device eth21 [ 568.349325][ T3023] 8021q: adding VLAN 0 to HW filter on device eth22 [ 568.469968][ T3023] 8021q: adding VLAN 0 to HW filter on device eth23 [ 568.620528][T13880] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 568.658529][ T3023] 8021q: adding VLAN 0 to HW filter on device eth24 [ 568.685757][T13880] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 568.736316][T13880] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 568.796089][T13880] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 568.875782][T13880] bridge_slave_1: left promiscuous mode [ 568.881487][T13880] bridge0: port 2(bridge_slave_1) entered disabled state [ 568.889527][T13880] bridge_slave_0: left allmulticast mode [ 568.895510][T13880] bridge_slave_0: left promiscuous mode [ 568.901207][T13880] bridge0: port 1(bridge_slave_0) entered disabled state [ 568.966418][T13880] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 568.977002][T13880] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 568.986733][T13880] bond0 (unregistering): Released all slaves [ 569.015889][T13880] tipc: Left network mode [ 569.050263][T13880] hsr_slave_0: left promiscuous mode [ 569.056603][T13880] hsr_slave_1: left promiscuous mode [ 569.062510][T13880] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 569.070325][T13880] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 569.078476][T13880] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 569.086131][T13880] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 569.098171][T13880] veth1_macvtap: left promiscuous mode [ 569.103869][T13880] veth0_macvtap: left promiscuous mode [ 569.109460][T13880] veth1_vlan: left promiscuous mode [ 569.115073][T13880] veth0_vlan: left promiscuous mode [ 569.193155][T13880] team0 (unregistering): Port device team_slave_1 removed [ 569.204449][T13880] team0 (unregistering): Port device team_slave_0 removed [ 569.241752][ T3023] 8021q: adding VLAN 0 to HW filter on device eth25 [ 569.371601][ T3023] 8021q: adding VLAN 0 to HW filter on device eth26 [ 569.489876][ T3023] 8021q: adding VLAN 0 to HW filter on device eth27 [ 569.607369][ T3023] 8021q: adding VLAN 0 to HW filter on device eth28 [ 571.766059][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 571.766075][ T28] audit: type=1400 audit(1777840593.309:9100): avc: denied { write } for pid=20967 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 571.803133][ T28] audit: type=1400 audit(1777840593.339:9101): avc: denied { write } for pid=20978 comm="rm" name="hook-state" dev="tmpfs" ino=486 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1