last executing test programs: 9m16.747963275s ago: executing program 32 (id=1448): prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16], 0x3c}}, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./bus\x00', 0x4000, &(0x7f0000000300)=ANY=[], 0x3, 0x2cb, &(0x7f0000000ac0)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file3\x00', 0x1c0) rmdir(0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x1, @broadcast, 'ip6gre0\x00'}}, 0x1e) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), r0) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="bc020000", @ANYRES16=r3, @ANYBLOB="020028bd7000fbdbdf25060000009c00068004000500040005003f00040067636d286165732900000000000000000000000000000000000000000000000017000000a2af63428db0c4850dc3e35c1a8f97a635a0605959cd30000400020008000100020000003d00040067636d2861657329000000000000000000000000000000000000000000000000150000000be77e24a252ea1fbb511990f12a71fd14e405154700020004000200100006800400020008000100813d0000f40004801300010062726f6164636173742d6c696e6b0000240007800800040006000000080001001e000000080002000d000000080003000b0000003c000780080002000000000008000300070000000800020007000000080002000800000008000400e083000008000300e38b000008000100110000000900010073797a30000000000900010073797a30000000001300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00000900010073797a31000000002400078008000200ff00000008000300000000000800040009000000080001000c0000000900010073797a3000000000680002802c00038008000100800000000800010085030000080002000900000008000200090000000800010001000000080001000200000008000200050000000c000380080002008100000008000100d20000000c00038008000100ff7f000008000200fbffffffa000068004000200950003006c3716a2f851feec624cfb646e1459751668fa62f37bb6c45fc3c5768a87689e79d2577e2328f26d7746faefa0e0a8443aea6f1b3aadd6bc79324803813070dfc23ef55d4e424c3184b37044445ca019b687b816ae2b76eca566bc9b8d6bf5544b5c8fa2f606823945b5d0102a5780e0fdbd4b788fbd3dd08f70fcfc97f6f8582247c983edd4c5ddc975090f8fbce3a7db000000cbd32f7effc9b7cace18755085ef2b3d56de070caad7616399"], 0x2bc}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) sendmsg$inet(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000200)="6e17", 0x2}], 0x2}, 0x4000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002b80), 0x41000004, &(0x7f0000000040)) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000076000d0b00000000fbdbdf25030000000000000008000a00010000000800010001000000"], 0x28}}, 0x0) fchmodat(r1, &(0x7f00000001c0)='./bus\x00', 0x150) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newqdisc={0x44, 0x24, 0x100, 0x70bd28, 0x0, {0x60, 0x0, 0x0, 0x0, {0x5, 0xfff2}, {0xc, 0xffff}, {0x4, 0x4}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x14, 0x2, [@TCA_CAKE_WASH={0x8, 0xd, 0x1}, @TCA_CAKE_MPU={0x8, 0xe, 0xc3}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32=0x0, @ANYBLOB="0000000000008000280012800a00010076786c616e"], 0x50}}, 0x4000000) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RATE_SET(r6, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={0x34, 0x0, 0x1, 0x70bd2c, 0x0, {0x2c}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000c80)=ANY=[@ANYBLOB="94010000100031082bbd700800000000ac1414aa000000000000000000000000ac1414bb0000000000000000000000000000ecdf000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x194}, 0x1, 0x0, 0x0, 0x88000}, 0x0) 8m9.255995807s ago: executing program 33 (id=2326): syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x808080, &(0x7f0000000000), 0x2c, 0x525, &(0x7f0000000100)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0xa041, 0xd) fcntl$setlease(r0, 0x400, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x0) 8m8.991104385s ago: executing program 34 (id=2328): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xe8001, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0xba98575a95aeb70d) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000080)={'caif0\x00', @multicast}) 7m26.567448222s ago: executing program 35 (id=2614): r0 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0xd}, @NFTA_SET_EXPRESSIONS={0x18, 0x12, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @last={{0x9}, @val={0x4}}}]}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x130}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x84}, 0x1, 0x0, 0x0, 0x4044040}, 0x40) 6m49.379113172s ago: executing program 36 (id=3131): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x6000000, &(0x7f00000001c0)={[{@data_err_ignore}, {@dioread_nolock}, {@delalloc}, {@errors_remount}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3a}}, {@min_batch_time={'min_batch_time', 0x3d, 0x3}}]}, 0xfe, 0x47a, &(0x7f00000006c0)="$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") r0 = open(&(0x7f0000000040)='.\x00', 0x20000, 0x0) getdents64(r0, 0x0, 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x8000, 0x0) fsync(r1) 6m38.512968994s ago: executing program 37 (id=3379): syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)={[{@sb}, {@init_itable_val={'init_itable', 0x3d, 0x4}}, {@mblk_io_submit}, {@minixdf}, {@data_writeback}, {@usrjquota, 0x2e}], [], 0x2e}, 0x84, 0x459, &(0x7f0000001680)="$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") timer_create(0x2, 0x0, &(0x7f0000bbdffc)=0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getpeername$inet(r1, &(0x7f0000000080)={0x2, 0x0, @private}, &(0x7f00000000c0)=0x10) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_gettime(r0, &(0x7f0000000000)) 6m8.810290894s ago: executing program 38 (id=3709): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_dev$usbfs(0x0, 0x9, 0x5293c3) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x8, 0x3, 0x4c8, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3f8, 0xffffffff, 0xffffffff, 0x3f8, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'bridge0\x00'}, 0x0, 0x148, 0x170, 0x0, {}, [@common=@unspec=@helper={{0x48}}, @common=@inet=@hashlimit1={{0x58}, {'bond_slave_1\x00', {0x41, 0x1ff, 0x6, 0xb0e2, 0x10001, 0x84e, 0xfffffffb, 0x18, 0x8}, {0x1}}}]}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'erspan0\x00', 'netdevsim0\x00', {0xff}, {}, 0x0, 0x0, 0x0, 0x4b}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'vcan0\x00', {0x3, 0x0, 0x41, 0xfffffffe, 0x2, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0xfc}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x528) socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000440)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x4, 0x0, 0x0, {[@sack_perm={0x4, 0x2}]}}}}}}}}, 0x0) 6m2.369830404s ago: executing program 39 (id=3765): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f00000002c0)={[{@test_dummy_encryption_v1}, {@usrjquota}, {@auto_da_alloc}, {@init_itable}, {@nodioread_nolock}, {@journal_checksum}, {@max_batch_time={'max_batch_time', 0x3d, 0x5}}]}, 0x1, 0x587, &(0x7f0000000940)="$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") socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x26, 0x0, 0x0, 0x0, 0x40000000}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r7, &(0x7f0000000100)={0xa, 0x0, 0x7, @ipv4={'\x00', '\xff\xff', @local}, 0x1}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r7, 0x29, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r7, 0x6, 0x14, &(0x7f0000000400)=0x1, 0x4) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000001640)=""/139, &(0x7f0000000100)=0x480) fchown(0xffffffffffffffff, 0x0, 0xee01) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_DELOBJ={0x6c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x1}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_USERDATA={0x26, 0x8, "0644a2d956f6127360e32e65ca9e3d439b90495f20d23d605cdbd6e1fc66f361857e"}, @NFTA_OBJ_USERDATA={0x24, 0x8, "6aac2629cf308cd7062fd572a5bec7370466b458cd93eae762ea442e7c70643f"}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x94}, 0x1, 0x0, 0x0, 0x4040071}, 0x8000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'team0\x00'}) 5m45.894857481s ago: executing program 40 (id=3944): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x2125099, 0x0) umount2(&(0x7f00000001c0)='./file0/file0/../file0\x00', 0x2) 5m45.861087113s ago: executing program 41 (id=3946): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x1c9500) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000440)={0x53, 0xfffffffffffffffb, 0x6, 0x80, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000140)="4a5e657de447", 0x0, 0x366, 0x10002, 0xffffffffffffffff, 0x0}) 5m39.16520896s ago: executing program 42 (id=3990): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=@getqdisc={0x24, 0x26, 0x705, 0x70bd2b, 0x5, {0x0, 0x0, 0x0, 0x0, {0x1, 0xffe0}, {0x10, 0x8}, {0xfff2, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, 0x0, &(0x7f0000000140)) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_SET(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000019c0)=[{{0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001c00)=""/4106, 0x100a}, {&(0x7f0000000d00)=""/63, 0x3f}, {&(0x7f0000000340)=""/259, 0x103}, {&(0x7f00000000c0)=""/251, 0xfb}, {0x0}, {0x0}, {&(0x7f0000001740)=""/254, 0xfe}, {&(0x7f0000001840)=""/224, 0xe0}], 0x8}, 0x6}], 0x1, 0x10102, 0x0) 5m38.896681438s ago: executing program 43 (id=3993): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xe, 0x42718, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7, 0x40}, 0x104b18, 0x6, 0x0, 0x1, 0x8, 0x4, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="380000005400e50100000000fdffffff07040000", @ANYRES32=r2, @ANYBLOB="20000100", @ANYRES32=r4, @ANYBLOB="010101007f00000100000000000000000000000086dd0000"], 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) 5m20.903749558s ago: executing program 44 (id=4155): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001", @ANYBLOB], 0x48) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x38, 0x39, 0x9, 0x0, 0x0, {0x1}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x6, 0x0, 0x0, 0x0, @str='\x05G'}]}, @typed={0x12, 0x2, 0x0, 0x0, @binary="5eddc49329c010370b651f8355fd"}]}, 0x38}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0x18, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000005000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b705000008000000850000007300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x10, 0x38, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000680)=@newsa={0xfffffffffffffda1, 0x10, 0x633, 0x0, 0x0, {{@in6=@private0, @in=@broadcast, 0xffff, 0x4000, 0x4e22, 0x8001, 0x0, 0x80}, {@in=@dev={0xac, 0x14, 0x14, 0xb}, 0x0, 0x32}, @in6=@dev={0xfe, 0x80, '\x00', 0xb}, {0x323, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, {}, {0x3}, 0x70bd29, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'pcbc(fcrypt)\x00'}}}, @encap={0x1c, 0x20, {0x0, 0x4e1e, 0x0, @in6=@private2}}, @encap={0x1c, 0x4, {0xfffffffffffffffe, 0x4e21}}]}, 0x170}}, 0x0) 4m34.801054729s ago: executing program 45 (id=4767): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x7}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) ioperm(0x9, 0x200, 0x567) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe69, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x80001000, 0x0, 0x0, 0x0, 0x0, 0x0) 4m21.980611335s ago: executing program 3 (id=4918): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f0000000000), 0x4, 0x523, &(0x7f0000000b80)="$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") socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x15) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x880) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f0000001240)='./file0\x00', 0x2004000, &(0x7f0000000180)=ANY=[@ANYRES64=0x0], 0xfe, 0x122e, &(0x7f0000001280)="$eJzs3E1rXFUYB/DHSdrExLyotVpBerAb3VySLNwoSJAUpANK2witINyaiQ65zoTcITAiRldu3fgB3IpLd4K4001c+BncZePShXqlM+lL7GjQau8Qfr/NPMy5f3jO3OHAGebcg5c+fW9rs8w28140Hno5GtsRk7+lSNGIWz6K51/87vtnrly7fmm12Vy7nNLF1avLL6SU5s9/8+YHXz77bW/2ja/mv56K/cW3Dn5e+Wn/7P65g9+vvtsuU7tMnW4v5elGt9vLbxSttNEut7KUXi9aedlK7U7Z2jkyvll0t7f7Ke9szM1s77TKMuWdftpq9VOvm3o7/ZS/k7c7KcuyNDcT3I/1L36pqiqiqk7F6aiqqno4ZqIRj8RczMdCLMaj8Vg8HmfiiTgbT8ZTcW5wVd19AwAAAAAAAAAAAAAAAAAAwMky6vz/7D3n/z+LGHX+/3zNzQMAAAAAAAAAAAAAAAAAAMAJceXa9Uurzeba5ZSmI4pPdtd314evw/HVzWhHEa1YioX4NQan/4eG9elori2lgcX4uNg7zO/trk8czS8PHidwT/7iq8215WE+Hc1Pxczd+ZVYiDOj8yt/yl8Y5KfjuQt35bNYiB/fjm4UsRE3s3fyHy6n9Mprzdv5H/aHc9+o8b4AAADAfylLt43cv2fZX40P88f9PnBzf710Z38eixGH+cl4erLeuRNR9t/fyouitVN7cauj4Tt7ETEmjf3rohERY9DG3xSnjr1mtobGPp+NuI/4xJEv0lh8zmNeTI8aOm7lmPhf1yUejMObPlV3HwAAAAAAAAAAAPwzD+IPhnXPEQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/mAHjgUAAAAAhPlbp9GxAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXwUAAP//3m/GvA==") setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1a, &(0x7f0000000100)=0x8001, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.kill\x00', 0x275a, 0x0) 4m20.841383784s ago: executing program 3 (id=4929): close(0x3) r0 = socket(0x2, 0x80805, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) close(0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7a, &(0x7f0000000340)={r2, @in6={{0xa, 0x3, 0x3, @mcast1}}}, &(0x7f0000000040)=0x84) sendmmsg$inet_sctp(r0, &(0x7f00000032c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="30000000000000008400000001000000000000017c"], 0x30}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r3, 0x0, 0x5}, 0xc) 4m20.693066894s ago: executing program 3 (id=4932): openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f064eb", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x10000, 0x1, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, 0x0, 0x20000800) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xfff1}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}}, 0x0) 4m20.59889755s ago: executing program 3 (id=4935): mkdir(&(0x7f0000001a80)='./file0\x00', 0x1cb) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000200)='.\x00', 0x0, 0x8b7840, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) mkdir(&(0x7f0000000140)='./file0/../file0\x00', 0x190) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x2042, 0x0) mount$cgroup(0x0, &(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x80000, 0x0) 4m20.562932082s ago: executing program 3 (id=4936): bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="09000000060000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffbfffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000800)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r3, r1, 0x25, 0x0, @void}, 0x10) syz_emit_ethernet(0xfdef, &(0x7f00000005c0)=ANY=[], 0x0) 4m19.956262783s ago: executing program 3 (id=4941): r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x100000000, 0x2000) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[], 0xff2e) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x40, 0x3, 0x7, 0x16, "b0bf2ebb48c849ac0000000003000018bfff40"}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000000)=0xff) pipe2(0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r1, 0x0, 0x4000040) 4m19.956113814s ago: executing program 46 (id=4941): r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x100000000, 0x2000) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[], 0xff2e) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x40, 0x3, 0x7, 0x16, "b0bf2ebb48c849ac0000000003000018bfff40"}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000000)=0xff) pipe2(0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r1, 0x0, 0x4000040) 4m18.600219007s ago: executing program 9 (id=4958): unshare(0x60000600) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0xaa000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'pim6reg1\x00', {0x2, 0x4c24, @local}}) r2 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e23, @local}}) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000100)="290000002000190f00003fffffffda060200000000e80001dd0000040d000300ea1120000005000000", 0x29}], 0x1) 4m18.268152339s ago: executing program 9 (id=4961): unshare(0x400) r0 = fsopen(&(0x7f0000000080)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x8) syz_open_dev$MSR(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0xfffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, 0x0, 0x0, 0x0) 4m17.348345452s ago: executing program 9 (id=4966): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) set_mempolicy(0x3, &(0x7f0000000000)=0x4000000ffb, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000280)={'batadv_slave_1\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000140)=0x1, 0x4) bind$xdp(r2, &(0x7f0000000100)={0x2c, 0x8, r1}, 0x10) 4m16.674052538s ago: executing program 9 (id=4970): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x800714, &(0x7f00000000c0), 0xff, 0x4df, &(0x7f0000010a80)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040), 0x208e24b) open(&(0x7f0000000040)='./bus\x00', 0x400141042, 0x0) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x8000, 0xa0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x8005, 0x0, 0x0, 0x3, 0xd, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c67808cf338674bd9bffbcafd468e306d7b4af07ec3ad71e14dc00000000c2ab00c60e0000000000000800000901000038fabe8279c2f1d600", "f28359738e229a4c66810000000000d300e6d6020000d2000000000000000001", [0x9, 0x40000000000000]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) open(&(0x7f0000000000)='.\x00', 0x181000, 0x0) 4m14.5860273s ago: executing program 9 (id=4998): tgkill(0x0, 0x0, 0x13) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x8080, &(0x7f0000000040)=ANY=[@ANYBLOB="636865636b3d7374726963742c757466383d312c757466383d302c757466383d312c6e66732c6572726f72733d72656d6f756e742d726f2c73686f72746e616d653d77696e6e742c00043518f9aad8a4f2c1cdb3e993cf0444d9d2d40bb509d4da042c2c85e3650de97db42c38cafa7a9d7503c3c985486cf7fdb62fb1fc80515e9bef7e9e56fb346de370b3eb3ecbc59d343c36bf04efc3d68033308b0014b0c677ae5ef2932cc05f566112668fa4f6844dcf823618a2993da771384e8fc12467a56b33e3b00030dbfd82ea2f8ddbeb1d04bac86815ebe0b9d084d60edf56b15e74589892dce80700000000000000b738dddfd38d20b443570197dc795020ecf541601ef9a5618869febf769dd50261849a47e170ba166b97e76a0261d0dc1fb3e2646595f1c8b49057d94f10f7b5e35ead0a38", @ANYRES8], 0x3, 0x232, &(0x7f00000002c0)="$eJzs2r+LHGUYB/BnzsSLFy574i8SEF+0UJshd7VFDklAXFA0K0RBMvFmddlx99hZDlbEbKWtf4K1WNoJktLmGv8CC7trrkwhjmz21GzYFEHNJfHzaeaBd77M+zLvvDzFHLz29af9bp13i3GsZFmsXIhp3MxiI1biT9N49eUrPz3/7pX339xuty++k9Kl7cubWymlMy/8+MHn3714Y3z6ve/P/LAa+xsfHhxu/br/7P7Zg98vf9KrU69Og+E4FenacDgurlVl2unV/Tylt6uyqMvUG9TlaGG8Ww13dyepGOysr+2OyrpOxWCS+uUkjYdpPJqk4uOiN0h5nqf1teCf6Hx7s2nisDl5NZqmeeKbOH0j1n+JVmRPpuypC9kzV7PnptnZw6ZpHfdU+U94//9vtx3qpyKqr/Y6e535dT6+3Y1eVFHG+WjFbzHbJkfm9aU32hfPp1s24svq+lH++l7nscX8ZrRiY3l+c55Pi/nVWIs4GXGU34pWPL08v7U0fypeeem25+fRip8/imFUsROz7N/5LzZTev2t9h35c7fuAwB41OTpL0v7tzy/2/g8fw/94R391Yk4d+J4105EPfmsX1RVOXpki9kqH4BpKP7NYjXuKZVFTGf74IGY/OMPx6d3rMcS98niOQkAAAAAAAAAAMDD4n79gQsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHA3fwQAAP//rHDMJg==") syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000280)='./bus\x00', 0x389c93, 0x0, 0x0, 0x0, &(0x7f0000000100)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./bus\x00') syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000180)='./bus\x00', 0xe, &(0x7f00000005c0)={[{@barrier_val={'barrier', 0x3d, 0x101}}, {@errors_remount}]}, 0x1, 0x445, &(0x7f0000000b00)="$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") mkdir(&(0x7f0000000080)='./bus\x00', 0x4) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./bus\x00', r0, &(0x7f00000004c0)='./file0\x00', 0x2) 4m14.530910645s ago: executing program 6 (id=4999): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'bridge0\x00'}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x107200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = socket(0x10, 0x2, 0x0) sendto$inet6(r1, &(0x7f0000000000)="7800000018002507b9409b14ffff00000204be04020506050e0204094300080004000000040010000d0068d0bf46d32345653600648d0a0012000200000049935ade4a460c89b6ec0cff3959547f509058ba86c902000000004a32000400160018000a0000000000e000e218d1ddf66ed538f25232500000", 0x78, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r2) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01000000000000000000040000001400050003030000000a0000005dc00000000001080002000500000014000600ff01000a00f2f3f31f000a0000000001060001"], 0x4c}}, 0x4040000) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f0000000180)) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x24008000}, 0x4040000) 4m12.1065674s ago: executing program 6 (id=5000): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000001c0)=0x2, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000140)=0x4000, 0x4) bind$xdp(r0, &(0x7f0000000100)={0x2c, 0x0, r2}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r3, &(0x7f0000000140)=[{&(0x7f0000000240)="480000001400190d09004beafd0d8c562c84ed7a80ffe05e959126dda8900db462060f000000000000a2bc5603ca00000f7f8900000ec00000000101ff0000000309ff5bffff00c7", 0x48}], 0x1) 4m12.017786846s ago: executing program 6 (id=5004): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[], 0xffdd) 4m11.911992144s ago: executing program 6 (id=5009): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x800714, &(0x7f00000000c0), 0xff, 0x4df, &(0x7f0000010a80)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040), 0x208e24b) open(&(0x7f0000000040)='./bus\x00', 0x400141042, 0x0) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x8000, 0xa0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x8005, 0x0, 0x0, 0x3, 0xd, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c67808cf338674bd9bffbcafd468e306d7b4af07ec3ad71e14dc00000000c2ab00c60e0000000000000800000901000038fabe8279c2f1d600", "f28359738e229a4c66810000000000d300e6d6020000d2000000000000000001", [0x9, 0x40000000000000]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) open(&(0x7f0000000000)='.\x00', 0x181000, 0x0) 4m11.710747097s ago: executing program 9 (id=5012): openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r0 = io_uring_setup(0x1b7b, &(0x7f0000000040)={0x0, 0xc89c, 0xc000, 0x2, 0x6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xe, 0xfff0}, {0xe, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 4m11.563449387s ago: executing program 47 (id=5012): openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r0 = io_uring_setup(0x1b7b, &(0x7f0000000040)={0x0, 0xc89c, 0xc000, 0x2, 0x6}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xe, 0xfff0}, {0xe, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 4m10.347573811s ago: executing program 6 (id=5018): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x8, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x800001, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000010c0)=""/225, 0xe1}], 0x1, 0x4007, 0x20000000) 4m9.4722437s ago: executing program 6 (id=5029): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') recvmsg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)=""/164, 0xa4}], 0x1}, 0x0) close(r3) 4m9.47209666s ago: executing program 48 (id=5029): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') recvmsg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)=""/164, 0xa4}], 0x1}, 0x0) close(r3) 4m7.099706183s ago: executing program 4 (id=5051): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=@newqdisc={0x88, 0x24, 0xf0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x1, [], 0x0, [0x1, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c4, 0x8000, 0x0, 0x0, 0x3dc], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}]}, 0x88}}, 0x20000000) r4 = socket(0x400000000010, 0x3, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x70bd27, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x1}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x1c, 0x2, [@TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x18, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x86}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x2}]}]}]}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8004}, 0x0) 4m6.816418592s ago: executing program 4 (id=5055): r0 = socket(0x28, 0x5, 0x0) r1 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r1, &(0x7f0000000040), 0x10) listen(r1, 0x4) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xffffffc2, &(0x7f00000000c0)=[{&(0x7f0000000000)="1b", 0x40000}], 0x1}}], 0x51, 0x0) r2 = accept4$unix(r1, 0x0, 0x0, 0x800) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) syz_init_net_socket$x25(0x9, 0x5, 0x0) recvfrom$unix(r2, &(0x7f0000000140)=""/248, 0x1ffd4, 0x12, 0x0, 0x0) 4m6.732649257s ago: executing program 4 (id=5056): socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r0 = io_uring_setup(0x1bc2, &(0x7f0000000040)={0x0, 0xc89f, 0xc000, 0x7, 0x20002f9}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000240), 0x0, 0x501, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x50) r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{0x0, 0x10}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000300)=0x8) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="10", 0x1}], 0x1, 0x0, 0x0, 0x2c}, 0x4020845) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 4m6.711425949s ago: executing program 4 (id=5057): socket$nl_generic(0x10, 0x3, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x80, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000, 0x0) mount$bind(&(0x7f0000000040)='.\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x2a05004, 0x0) 4m6.688693131s ago: executing program 4 (id=5058): getgroups(0x2, &(0x7f0000000280)=[0x0, 0xffffffffffffffff]) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000000c0)={0xcf47, 0x3, 0xffff, 0x9dff, 0x1a, "8003e3ffff072000"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x4004000, 0x0, 0x3, 0x7fff, 0x16, "b0bf2ebb48c849ac0000000003000018bfff40"}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, r0, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0xff) 4m6.076232172s ago: executing program 4 (id=5064): socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffe, 0x7, 0x2, 0x80000011, 0x26, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) recvmmsg(r0, &(0x7f0000001740)=[{{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000400)=""/4096, 0x10c4}], 0x1}}], 0x4000210, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[], 0x48}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat(0xffffffffffffff9c, 0x0, 0x109342, 0x0) 4m6.074762842s ago: executing program 49 (id=5064): socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffe, 0x7, 0x2, 0x80000011, 0x26, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) recvmmsg(r0, &(0x7f0000001740)=[{{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000400)=""/4096, 0x10c4}], 0x1}}], 0x4000210, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[], 0x48}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat(0xffffffffffffff9c, 0x0, 0x109342, 0x0) 23.99940816s ago: executing program 7 (id=7964): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x4e23, 0x0, @loopback, 0x3}, 0x7e) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0xe0, &(0x7f000005ffe4)={0xa, 0x4e23, 0xff, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={r1, 0x7f}, &(0x7f0000000100)=0x8) 23.951290404s ago: executing program 7 (id=7965): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000840}, 0x2000a800) 23.929087715s ago: executing program 7 (id=7967): openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x27) pipe(0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000f4b000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00007fd000/0x800000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r0 = io_uring_setup(0x2ddf, &(0x7f0000000040)={0x0, 0x100aeb9, 0xd000, 0x20000a, 0x60}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x800, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {0x10}, {0xe, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x40005}, 0x4008000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000), 0x560c89bb) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x20) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x8000, 0x0) 23.800269163s ago: executing program 7 (id=7968): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000024c0)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x401, 0x70bd2a, 0xfffffffe, {0x0, 0x0, 0x0, 0x0, 0x4982, 0x701ca}}, 0x20}, 0x1, 0x0, 0x0, 0xc10}, 0x8000) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x83) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40086602, &(0x7f0000000000)) linkat(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file7\x00', 0x1000) renameat2(0xffffffffffffff9c, &(0x7f0000000780)='./file7\x00', 0xffffffffffffff9c, &(0x7f00000007c0)='./file1\x00', 0x0) 23.794478984s ago: executing program 7 (id=7969): r0 = socket$kcm(0xa, 0x3, 0x3a) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x40001}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a54000000030a0fdb00000000000000000a0060050900030073797a30000000000900010073797a310000000014000480080002403cb140bb08000140000000030a000700726f757465000000080005400000000014000000110001"], 0x7c}}, 0x24008050) sendmsg$kcm(r0, &(0x7f00000005c0)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000080), 0x1}, 0x0) 23.250459361s ago: executing program 7 (id=7975): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x207, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) sendto$packet(r1, &(0x7f00000002c0)="05031400d3fc1c0000004788031c09102c28", 0xfce0, 0x4, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) 23.221065893s ago: executing program 50 (id=7975): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x207, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) sendto$packet(r1, &(0x7f00000002c0)="05031400d3fc1c0000004788031c09102c28", 0xfce0, 0x4, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) 2.362048299s ago: executing program 2 (id=8345): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e20, @empty}], 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x85, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @empty}}, 0xff, 0x3}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x48241, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(r3) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000840)={r1, @in6={{0xa, 0x4e20, 0x3ae, @empty, 0x129}}, 0x2, 0x2, 0x614, 0x1, 0xb5, 0x7, 0x4}, 0x9c) 2.069455099s ago: executing program 8 (id=8349): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x20000}}, {{0xa, 0x0, 0x40000, @dev={0xfe, 0x80, '\x00', 0x26}}}}, 0x108) close(r0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x4, 0x0, @mcast1={0xff, 0x7}, 0x8a4}}, {{0xa, 0x4e20, 0xfe, @remote}}}, 0x108) r2 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000440)={'syz_tun\x00', 0x101}) 1.878258682s ago: executing program 8 (id=8351): ioperm(0x40, 0x9, 0x9) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f00000002c0)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) io_setup(0x202, 0x0) fsmount(0xffffffffffffffff, 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2711, 0x0, &(0x7f0000000000)) 1.840848385s ago: executing program 1 (id=8353): setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={0x0, 0x11, 0x6, @random="08d32bfb45c9"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000400)={r5, r4, 0x25, 0x0, @val=@tcx={@void, @value=r0}}, 0x1c) syz_emit_ethernet(0xd84, &(0x7f0000000f00)={@link_local={0x3}, @multicast, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x1, 0x3d, 0xd76, 0x66, 0x0, 0x7b, 0x2, 0x0, @multicast1, @multicast1}, {0x22, 0xff, 0x0, @remote, "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"}}}}}, 0x0) 1.712222623s ago: executing program 1 (id=8355): pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fsopen(&(0x7f0000000080)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000005c0)='fd', 0x0, r0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x2) fchdir(r2) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setpgid(r3, 0x0) setpgid(0x0, r3) syz_read_part_table(0x1054, &(0x7f0000000000)="$eJzsz0ERwjAQBdANbWl7AQvI4IYKFCCkgx1MYKCelgnpAQXA4b3DJj+T/JkEP9WVOvpzichl146irv1w31IM7epa5u1RjnVOLTxrQx5LXLrps3mNzIhD3t5pjCixr7tTmfvWssT18Z1fAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMB/ewUAAP//AE0NTA==") 1.523927936s ago: executing program 2 (id=8358): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r2, &(0x7f0000000140)={@val={0x3, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x8016, 0x1400, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x11, 0x0, @local, @loopback}}}}, 0xfdef) 1.408037734s ago: executing program 2 (id=8360): r0 = socket$netlink(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4c0000001000010400000000feffffff00000000", @ANYRES32=0x0, @ANYBLOB="10100000200800001c0012800e00010069703665727370616e00000008000280040012"], 0x4c}, 0x1, 0x0, 0x0, 0x8080}, 0xd0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)={0x90, r2, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r4}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}]}, 0x90}, 0x1, 0x1000000, 0x0, 0x24004000}, 0x24040840) 1.371281767s ago: executing program 2 (id=8362): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket(0x2, 0x80805, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) close(r1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x7a, &(0x7f0000000340)={r3, @in={{0x2, 0x4e21, @remote}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000700)={r4, 0xff84, 0x30, 0xffffffffffffffff, 0x4a}, &(0x7f0000000180)=0x18) 1.366073097s ago: executing program 1 (id=8363): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0x4d, 0xfffffffb, 0x7fffffff}}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) sendmsg$nl_route_sched(r2, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001740)=@newqdisc={0x838, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdf8, {0x0, 0x0, 0x0, r4, {0x10}, {}, {0xa, 0x3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x80c, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x1, 0xfffffffd, 0x9, 0x8000, 0x3, 0x5, 0x5, 0xb762, 0x6, 0x7, 0x8, 0xf, 0x2, 0x80000001, 0x400, 0x7fc, 0xffff8000, 0x6, 0x401, 0x9, 0xb89, 0xffffe4f5, 0xd6, 0x4, 0xffff, 0x7, 0x0, 0x2, 0x101, 0x1, 0xfffffffc, 0x4, 0x1, 0x1, 0x9, 0xc, 0x20001000, 0x4, 0x2, 0x7, 0x4, 0x99, 0x9, 0x5, 0x6, 0x7, 0xfffffff7, 0x1, 0x2, 0x9, 0x9, 0x44, 0x8, 0x8, 0x1, 0x4, 0x7ff, 0x8, 0x7, 0x80000001, 0x400, 0x8, 0xfffffa72, 0xcd, 0xffffff80, 0x80000000, 0xc, 0x4, 0x65, 0x91, 0x659, 0x9, 0xf, 0x9, 0xc28, 0x9, 0x7, 0x3, 0x401, 0x3, 0x2, 0xfffffffa, 0x1, 0x10001, 0x3, 0x1, 0x4, 0x8, 0x8, 0x7, 0x1, 0x1, 0x1, 0x7, 0x40, 0x7, 0x12, 0x8000, 0x1, 0x4dc, 0x80, 0x3, 0x7fffffff, 0xff, 0x9, 0xa7, 0xf, 0x2, 0x0, 0x3, 0x1000, 0x4, 0x401, 0x7, 0x80000000, 0xffff, 0x6, 0x5, 0x4, 0xffffffff, 0x80000000, 0x1966f9ab, 0x200, 0x20200, 0xed5, 0xfffffc00, 0x6, 0x4, 0x8, 0x485e, 0xa85, 0x80000040, 0x2, 0x7, 0x7, 0x102, 0x2d5421e8, 0x7, 0x10000, 0xffffffff, 0x6, 0x3ff, 0xf04, 0x0, 0x2, 0x5, 0xfffffc00, 0x5, 0x8d, 0x4, 0x401, 0x4, 0x9, 0x3, 0xfffffffb, 0x1, 0x0, 0x0, 0x2, 0x5, 0x8, 0x3, 0x0, 0x800, 0x2, 0x8, 0x7ff, 0x1, 0x9, 0x6, 0x5, 0x5, 0x4d15, 0x1ff, 0xfffff060, 0x3, 0x469, 0x3, 0x0, 0x200, 0x10000005, 0x7, 0x1, 0x8, 0x42ba, 0x4, 0x9, 0x3, 0x8, 0x8, 0x53, 0x6, 0x4, 0x400, 0x8000, 0x0, 0x2c310b18, 0xfff, 0x0, 0x3, 0xcd34, 0x9, 0x81, 0xdf3, 0x2, 0x7, 0x8, 0xfff, 0x1ff, 0x8000, 0x3, 0x8, 0x3, 0x9, 0x9a6, 0xe4cb, 0x402, 0x1, 0x1ff, 0x3e, 0x9b4, 0x1, 0x8, 0x0, 0x8, 0x0, 0x9, 0x7f, 0x4, 0x10, 0x901, 0x5, 0x2, 0x7b, 0xfffffeff, 0x6, 0x6, 0xc, 0x1000, 0x9, 0x9, 0xe6, 0xab, 0x400, 0x7fffffff, 0xed, 0x7ff, 0xd83, 0x68, 0x80000001, 0x4, 0x1, 0x6, 0x200, 0x2]}, @TCA_TBF_PTAB={0x404, 0x3, [0x8, 0x0, 0xd, 0x400, 0x0, 0x3, 0x5, 0x10000, 0x7, 0x4, 0x81, 0x9, 0x8, 0x0, 0x9, 0x5, 0xc0000, 0x8001, 0x1, 0x2000, 0x1, 0x8da5, 0x1, 0x4, 0x2, 0x6, 0x58, 0x7, 0x6f, 0x8, 0x3, 0x4, 0x9, 0x1000, 0x4, 0x9, 0x6, 0x80000001, 0x3, 0x1, 0xd4, 0x100, 0xa, 0xfff, 0x8, 0x9, 0x7, 0x7fffffff, 0xf4b3, 0x1, 0x0, 0x8, 0x8, 0x6, 0xd815, 0xfffffff9, 0x2, 0x401, 0x9, 0x36, 0xf, 0x74, 0xbbc, 0x9, 0x0, 0x6, 0x8, 0x5, 0x6, 0xb, 0x5, 0x5, 0x4e3, 0x200, 0x0, 0x9, 0x8001, 0x2, 0x1000, 0x7fffffff, 0x46a3, 0x6, 0x2, 0x1dd50645, 0x401, 0x5, 0x101, 0xbf, 0x0, 0x9, 0x3, 0x65, 0xffffff13, 0x2, 0x30, 0x1a3f, 0x2, 0x389c, 0x4, 0x3, 0x3ff, 0x4, 0x4, 0x6, 0xf3bb, 0x1ff, 0x8, 0xf, 0x8, 0x401, 0x4, 0x1000, 0x1, 0x8, 0x1, 0x7ff, 0x7fff, 0x8, 0xd, 0x3ff, 0x4, 0x1, 0xffff, 0x7fff, 0x2, 0x9, 0x9, 0xfff, 0x0, 0xfffffffe, 0x4, 0x0, 0x101, 0x78f0, 0xf, 0x7, 0x0, 0x3, 0xf1c7, 0x100, 0x3, 0x4, 0xfffffffe, 0xffffff7f, 0x3, 0x8, 0x6, 0xd, 0x3, 0xa, 0xd0, 0x200, 0x0, 0x400, 0x9, 0x6, 0x132f, 0xaba3, 0x1, 0x3, 0x1, 0x5, 0x6f788000, 0xc, 0x1ff, 0x40, 0x8, 0x3, 0x2, 0x1, 0x0, 0x71, 0xb13, 0x4, 0x1, 0x0, 0x7, 0xffff, 0x100, 0x7b58, 0x1, 0x807, 0x1ff, 0x3, 0x400, 0x80000000, 0x1040, 0x3, 0xfffffffa, 0x9a5, 0x8, 0x5, 0x1, 0x9, 0x3, 0x9, 0x7, 0x3, 0x1, 0x101, 0x2, 0x6, 0x598f, 0x5, 0x8e, 0x0, 0xa, 0x9, 0x1000, 0x8, 0xd00f, 0x2, 0x1, 0x6, 0x2a, 0x7, 0x100, 0x24e, 0xbd, 0x2, 0x2800000, 0x807, 0x0, 0x401, 0x6, 0x2, 0x9, 0x7039, 0x4, 0x1, 0x9, 0x1, 0xb18, 0x2, 0xfffffffe, 0x26e, 0x6, 0x5c, 0x8, 0x100, 0x3ff, 0x1, 0x0, 0xb, 0x10000, 0x8, 0x6, 0x2, 0x6, 0x7, 0x2, 0x7ff, 0x1, 0x4, 0x8001, 0x3]}]}}]}, 0x838}, 0x1, 0x0, 0x0, 0x40098}, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) 1.288075612s ago: executing program 2 (id=8364): openat$tun(0xffffffffffffff9c, 0x0, 0xa2f01, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newqdisc={0xa0, 0x24, 0x4ee4e6a52ff56541, 0x2000000, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x70, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x2000, 0x7}, [@TCA_NETEM_LOSS={0x54, 0x5, 0x0, 0x1, [@NETEM_LOSS_GE={0x14, 0x2, {0x0, 0x40, 0x8001, 0x6}}, @NETEM_LOSS_GE={0x14, 0x2, {0x53f, 0x5, 0x1, 0x3}}, @NETEM_LOSS_GE={0x14, 0x2, {0xa202, 0x0, 0x3, 0x5f7f}}, @NETEM_LOSS_GE={0x14, 0x2, {0xfffffe00, 0xffffffff, 0xffffd119, 0x5}}]}]}}}]}, 0xa0}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) 1.287710302s ago: executing program 1 (id=8365): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r0 = io_uring_setup(0x1bc2, &(0x7f0000000040)={0x0, 0xc89f, 0xc000, 0x7, 0x20002f9}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x501, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x50) r1 = socket$inet(0x2, 0x80001, 0x84) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x20008040) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000300)=0x8) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0, 0x0, 0x2c}, 0x4000845) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 1.275462213s ago: executing program 1 (id=8366): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f0000000080), 0x1, 0x5a8, &(0x7f0000001340)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x101042, 0x0) socket$igmp(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r2 = socket(0x11, 0x2, 0x0) setsockopt(r2, 0x107, 0x1, &(0x7f0000000000)="110000000000060000071a80010061cc", 0x10) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008188040f46ecdb4cb9cca7480e1211000000e3bd012a128748b429021627e305dd2b7a146efb4400", 0x2e}], 0x1}, 0x4048004) fsetxattr(r0, &(0x7f00000001c0)=@known='trusted.overlay.metacopy\x00', &(0x7f00000002c0)='}{^\x00', 0x1, 0x0) 1.228288246s ago: executing program 8 (id=8368): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[], 0xa4}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3000001, 0x11, r0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)={{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x96, 0x200}, 0x0, 0x0, 0x0, 0x80004, 0x0, 0x0, 0xffffffffffffffff}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x972, &(0x7f0000006680)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000850}, 0x40) io_setup(0x3, &(0x7f0000008240)) 1.143925283s ago: executing program 1 (id=8370): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2}, &(0x7f0000000300)=0x0) r1 = socket$netlink(0x10, 0x3, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000300), 0x4) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r1) mq_notify(0xffffffffffffffff, &(0x7f0000000000)={0x110c230000, 0x3, 0x2, @thr={0x0, 0x0}}) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x3ff}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x0, 0x3938700}}, 0x0) 1.008919501s ago: executing program 5 (id=8372): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB], 0x7c}}, 0xc4054) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000140)={0x18, 0x2, {0xffff, @loopback}}, 0x1e) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000002380)={0x0, 0x0, 0x0, 0x1, 0x8008, 0x0, 0x12, 0x19, 0x11, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cbf7966d61fdcf335263bd9bffbcc2542ded71038259ca171ce1a311ef54ec32d71e14ef3dc177e9b48b00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x8, 0x4]}) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x801, @loopback}}, 0x1e) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x40, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000680), 0x101402, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000040)=0x1) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)='na\f ', 0x4}], 0x1) 959.392865ms ago: executing program 8 (id=8373): sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x400}}], 0x18}}], 0x1, 0x4049880) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f93132", 0x39}], 0x1) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027f"], 0x57) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) 880.128341ms ago: executing program 5 (id=8375): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40840) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004001000ffff00000b"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000200), 0x2, r0}, 0x38) 879.771791ms ago: executing program 8 (id=8376): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x47) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) timer_create(0x3, &(0x7f0000533fa0)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'geneve1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x17b93}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_ICV_LEN={0x5, 0x3, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x44}, 0x1, 0x0, 0x0, 0x2004d808}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) 757.598679ms ago: executing program 0 (id=8377): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd25, 0x3, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x5, 0x8}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_USC={0x0, 0x3, {0x5, 0x2, 0x6}}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000880) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=@newtfilter={0x58, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r6, {0x4, 0xf}, {}, {0xffe0, 0xd}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x28, 0x2, [@TCA_CGROUP_EMATCHES={0x24, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x18, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x800, 0x7, 0x1}, {{0x0, 0x0, 0x1}, {0x3, 0x1, 0x1}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xee4}}]}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x0) 722.644171ms ago: executing program 8 (id=8378): openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x27) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000f4b000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00007fd000/0x800000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r2 = io_uring_setup(0x2ddf, &(0x7f0000000040)={0x0, 0x100aeb9, 0xd000, 0x20000a, 0x60}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x40005}, 0x4008000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r2, 0x2219, 0x7721, 0x16, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000), 0x560c89bb) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x20) splice(r0, 0x0, r4, 0x0, 0x8000, 0x0) 632.083517ms ago: executing program 0 (id=8379): syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x2800010, &(0x7f0000000300)=ANY=[], 0x3, 0x21f, &(0x7f0000000940)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x28000, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000c40), 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) writev(r2, &(0x7f0000000100)=[{&(0x7f00000006c0)='\f7.', 0x3}, {&(0x7f0000004900)}], 0x2) listen(r1, 0x1e9) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000004, 0x3b071, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000000040)=""/39, 0x27) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000f80)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 510.112436ms ago: executing program 2 (id=8380): r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000100)=0x1800, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x7}, 0x1c) listen(r1, 0xfffffffc) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10) 419.406932ms ago: executing program 5 (id=8381): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xb6ac, @local, 0x10}, 0x1c) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001b00)=@generic={0x0}, 0x18) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newrule={0x24, 0x20, 0x301, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1f}, [@FRA_GENERIC_POLICY=@FRA_IP_PROTO={0x5, 0x16, 0x11}]}, 0x24}}, 0x44004) 288.083791ms ago: executing program 0 (id=8382): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f00000002c0)='./file1\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYRES8, @ANYRES32=0x0, @ANYRESHEX, @ANYBLOB="a5e6efc35603e7564b7345d63ddd28921043052db1e8293a3cccdcbbfe66420d245c069405350a418630348ac28237dffd6396393abb1c54e8b62fa09afa9dd6143056389d59d83d642d9c199a7ee26b39bb83b6c59ab057c4cdda6edf7b8eac48ee1f2a5e0c4e0ccc25cf9b5449", @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYRESHEX, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRES8, @ANYRES32, @ANYRES64], 0x1, 0x5de, &(0x7f0000000a00)="$eJzs3E1v3MYZAOChJUVbBTUKBI0dx0AYJwf3YGV3VcsQ0oO3FCUx2V0uSCqQT4VRy6lQKS3iFmh886Vt0PbYc5FTgZ567J/KX6gK7oesL2ur+EMx8DyAzVny5cw7XGoGIjQMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECIktVmsxWFbtbf3IqfLVkt8t4Zxyf1/efI5oi5EMLsQbshRPW/0GiEq6NdV996Gvvj+r8b4cro05XQCCH8txEev/n2jz5+a/ZSfeJcFIUzEnolHn31+Nf3d3e3v7zoRF6A/ej856yn/azMs15nPY2zMo9XlpebH22slfFa1k3Le2WV9uKkSDtVXsQ3k7shhJWlOF28l2/211c73TS+mfwkbq2s3LnVbjaX408WB2mnKPP+R58slslG1u1m/fVhTH34Vvu9cKe+ET/NqrhKO704frizu700Lck6qHV8569OCWpPq6ndbLdbrXa7tXx75fadZrMxvlsPdsw2jwnHT5kd3bSTn4NzXm9eT2+Exl8Ovu7JGPfGixvF4bvZT6KLTgEAAAB4yaLhM/Zo+HT+6rC0lnXT5pGYfY8IAAAA4LU2/NX+yvgBQAhXQ3Ty938AAADg9fbno2vswtE1diGKQjmYjyZLVQZbH0Z7nbrU2ZsZ7Zo5XmO1di26PK5kuFmeHX9K0uvRO6OgdybR3443D6flERXFXPTk+RIIfw3XRjHXHoy2DyZHRq0srGXddDHJux+3Qqdz+VKVblW//2LnDyEUxf7M1/3e5Sg83NndXvzlb3YfDHN5UtfyZG/8FxIn/lDiaC7z4VAuvztY9zju8d2jPZ4bPoipe/11v7cwarc56M4e9P/S8Oz9E1/pGf3/Y3h3FPPuwmi7cLT/jbrN1uIpvT+cRWuw9eH8uLFxz+fOl8X1Ucz1mx/Umw9ujo/MHcqiPS2L9uHrP7oW4dKLyOLwtVg6I4v9sLO7vfScWQBclIfHZ6HRvBuezv8n5t3x8BYfr+qMUW7K7F5P4VNn9/kzW/n3Qj2ivz+Kef/a7NO5+NiI3pw2rzT/z3k9hNP7+q9w4x9/D2Ez3JgEP2uOrdv925FZNdr7pj7hmxPtTlaal912VH+Ymd/7bXj70VePb+3s3f98+/PtL9rtpeXmT5vN2+0wN+zGeGPuAeAUafFttFD9KSqKbPCL1spKq1NtpHGRJ5/GRba6nsZZv0qLZKPTX0/jQZFXeZJ368Jn2WpaxuXmYJAXVbyWF/EgL7Ot4Ztf4vGrX8q01+lXWVIOummnTOMk71edpIpXszKJB5s/72blRloMTy4HaZKtZUmnyvJ+XOabRZIuxnGZpocCs9W0X2VrWV3s/zMUWa9T3Is/y7ubvTReTcukyAZVPqpw0lbWX8uL3rDaxYu+2ADwPfEojN9gd/Aqu3MXQmNKzGntnnhGCgC8Msdn6fmLTggAAAAAAAAAAAAAADjh8HK9n40X5T33isAzC41wUAjhZTRx983TDr33krpznsLkdT73d3dDCLMvta2Zp209Rz31d3SRV+x7U2jUhUvhotOYO7R09rvUU9+Bzzj0g3G1218++mEd86pHIgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACY7n8BAAD//yDUhEw=") openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x80000, 0xd9) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x20000, &(0x7f0000000180)={&(0x7f00000026c0)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0x2}, {0xffff, 0xffff}, {0xfff2, 0x2}}, [@qdisc_kind_options=@q_cbs={{0x8}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18, 0x1, {0x0, '\x00', 0x1, 0x7, 0xb, 0x8}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f1, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f0000000140)=@ethtool_cmd={0x0, 0x80000000, 0x3, 0x9, 0xf, 0x3, 0x5, 0xfc, 0x0, 0xff, 0x0, 0x0, 0x6, 0xff, 0x0, 0x5}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000340)={'tunl0\x00', 0x0}) 279.119032ms ago: executing program 5 (id=8383): r0 = io_uring_setup(0x2fac, &(0x7f0000000500)={0x0, 0x9d1d, 0x2, 0x1007, 0x176}) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x8) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet(r2, &(0x7f00000002c0)="cc", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x3}, 0x10) sendto$inet6(r2, &(0x7f0000000200)='x', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x2}, 0x8) close_range(r0, 0xffffffffffffffff, 0x0) 227.420345ms ago: executing program 0 (id=8384): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) setns(r2, 0x24020000) r3 = syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_pidfd_open(r3, 0x0) setns(r4, 0x24020000) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) 156.07934ms ago: executing program 5 (id=8385): socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x2f90, &(0x7f0000000180)={0x0, 0x541e, 0x3010, 0x3, 0xf1}, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000005000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fea000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff3000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000ff6000/0x1000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r0 = io_uring_setup(0x2ddf, &(0x7f0000000040)={0x0, 0x100aeb9, 0xd000, 0x20000a, 0x60}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x800, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {0xd, 0xffe0}, {0xe, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x40005}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 155.74711ms ago: executing program 0 (id=8386): socket(0x2b, 0x1, 0x1) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r0 = io_uring_setup(0x1ca1, &(0x7f0000000040)={0x0, 0x7a22, 0xc000, 0x7, 0x337}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x800, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0xd}, {}, {0x9, 0xffff}}}, 0x24}}, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000300)=0x8) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)='9', 0x1}], 0x1, 0x0, 0x0, 0x2c}, 0x4000845) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 127.912082ms ago: executing program 5 (id=8387): socket(0x2, 0x80805, 0x0) socket$packet(0x11, 0x3, 0x300) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000280)={[{@max_batch_time={'max_batch_time', 0x3d, 0x4}}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@errors_remount}, {@nombcache}]}, 0x1, 0x42f, &(0x7f0000000940)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x9c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x12) write(r1, &(0x7f0000000a00)="c7", 0x1) sendfile(r1, r0, 0x0, 0x3ffff) sendfile(r1, r0, 0x0, 0x7ffff000) 0s ago: executing program 0 (id=8388): bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) preadv(0xffffffffffffffff, &(0x7f0000000a00)=[{&(0x7f00000004c0)=""/161, 0xa1}], 0x1, 0x3d1, 0x1ff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x4004000) recvmmsg(r2, &(0x7f0000004040)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x7}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80)=""/119, 0x77}, 0x6}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=""/255, 0xff}, 0x80}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=""/201, 0xc9}, 0x2}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001c40)=""/32, 0x20}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003f80)=""/144, 0x90}, 0x8000}], 0x4000000000002ba, 0x40000002, 0x0) kernel console output (not intermixed with test programs): acket_socket permissive=0 [ 527.566462][ T28] audit: type=1400 audit(1775464675.899:7563): avc: denied { prog_load } for pid=24442 comm="syz.7.6378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 528.519809][T24489] syzkaller0: entered promiscuous mode [ 528.528920][T24489] syzkaller0: entered allmulticast mode [ 528.697708][T24493] syzkaller0: entered promiscuous mode [ 528.704394][T24493] syzkaller0: entered allmulticast mode [ 528.727983][T24497] netlink: 'syz.1.6398': attribute type 10 has an invalid length. [ 528.737513][T24497] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 528.764178][T14614] Bluetooth: hci0: Frame reassembly failed (-84) [ 528.865520][T24505] syzkaller0: entered promiscuous mode [ 528.871538][T24505] syzkaller0: entered allmulticast mode [ 528.943174][T24507] netlink: 8 bytes leftover after parsing attributes in process `syz.7.6397'. [ 528.952370][T24507] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6397'. [ 530.654911][T24552] syzkaller0: entered promiscuous mode [ 530.660803][T24552] syzkaller0: entered allmulticast mode [ 530.829017][T17903] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 530.861464][T24558] __nla_validate_parse: 1 callbacks suppressed [ 530.861481][T24558] netlink: 24 bytes leftover after parsing attributes in process `syz.7.6417'. [ 531.159664][T24568] syzkaller0: entered promiscuous mode [ 531.165238][T24568] syzkaller0: entered allmulticast mode [ 531.458558][T24577] sch_tbf: burst 9 is lower than device syzkaller0 mtu (1514) ! [ 532.043829][T24584] syzkaller0: entered promiscuous mode [ 532.049632][T24584] syzkaller0: entered allmulticast mode [ 532.156336][ T28] kauditd_printk_skb: 249 callbacks suppressed [ 532.156353][ T28] audit: type=1400 audit(1775464680.769:7813): avc: denied { read write } for pid=20133 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 532.232940][ T28] audit: type=1400 audit(1775464680.839:7814): avc: denied { read write } for pid=15462 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 532.334902][ T28] audit: type=1400 audit(1775464680.929:7815): avc: denied { allowed } for pid=24586 comm="syz.8.6427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 532.364743][ T28] audit: type=1400 audit(1775464680.939:7816): avc: denied { allowed } for pid=24586 comm="syz.8.6427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 532.408845][ T28] audit: type=1400 audit(1775464680.939:7817): avc: denied { create } for pid=24586 comm="syz.8.6427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 532.462084][ T28] audit: type=1400 audit(1775464680.939:7818): avc: denied { read } for pid=24586 comm="syz.8.6427" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 532.529516][ T28] audit: type=1400 audit(1775464680.939:7819): avc: denied { module_request } for pid=24586 comm="syz.8.6427" kmod="bpf_preload" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 532.612945][ T28] audit: type=1400 audit(1775464680.939:7820): avc: denied { mount } for pid=24586 comm="syz.8.6427" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=0 [ 532.659000][ T28] audit: type=1400 audit(1775464680.939:7821): avc: denied { create } for pid=24586 comm="syz.8.6427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 532.708780][ T28] audit: type=1400 audit(1775464680.939:7822): avc: denied { map_create } for pid=24586 comm="syz.8.6427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 533.913546][T24625] syzkaller0: entered promiscuous mode [ 533.948433][T24625] syzkaller0: entered allmulticast mode [ 534.704707][T24636] blkio.reset_stats is deprecated [ 534.757828][T24640] netlink: 216 bytes leftover after parsing attributes in process `syz.2.6445'. [ 534.866369][T24645] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6448'. [ 534.912284][T24645] vlan2: entered promiscuous mode [ 534.931678][T24645] ip6gretap0: entered promiscuous mode [ 535.032609][T24647] syzkaller0: entered promiscuous mode [ 535.038230][T24647] syzkaller0: entered allmulticast mode [ 535.144897][T24656] syzkaller0: entered promiscuous mode [ 535.163641][T24656] syzkaller0: entered allmulticast mode [ 535.257336][T24662] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 535.275142][T24661] syzkaller0: entered promiscuous mode [ 535.280822][T24661] syzkaller0: entered allmulticast mode [ 535.299934][T24662] netlink: 'syz.1.6456': attribute type 8 has an invalid length. [ 535.328208][T24662] netlink: 'syz.1.6456': attribute type 1 has an invalid length. [ 535.379094][T24662] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6456'. [ 535.508022][T24668] IPVS: sed: UDP 224.0.0.2:0 - no destination available [ 535.519074][T15953] IPVS: starting estimator thread 0... [ 535.609137][T24672] IPVS: using max 3456 ests per chain, 172800 per kthread [ 535.789195][T24682] syzkaller0: entered promiscuous mode [ 535.794786][T24682] syzkaller0: entered allmulticast mode [ 537.593736][ T28] kauditd_printk_skb: 323 callbacks suppressed [ 537.593753][ T28] audit: type=1400 audit(1775464686.209:8146): avc: denied { read write } for pid=20133 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 537.644710][ T28] audit: type=1400 audit(1775464686.219:8147): avc: denied { execmem } for pid=24721 comm="syz.8.6476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 537.689827][ T28] audit: type=1400 audit(1775464686.259:8148): avc: denied { open } for pid=24721 comm="syz.8.6476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 537.727680][ T28] audit: type=1400 audit(1775464686.259:8149): avc: denied { open } for pid=24721 comm="syz.8.6476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 537.808044][ T28] audit: type=1400 audit(1775464686.259:8150): avc: denied { create } for pid=24721 comm="syz.8.6476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 537.846636][ T28] audit: type=1400 audit(1775464686.289:8151): avc: denied { create } for pid=24721 comm="syz.8.6476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 537.878506][ T28] audit: type=1400 audit(1775464686.369:8152): avc: denied { read write } for pid=20899 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 537.911704][T24728] syzkaller0: entered promiscuous mode [ 537.917282][ T28] audit: type=1400 audit(1775464686.459:8153): avc: denied { read write } for pid=20593 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 537.917320][ T28] audit: type=1400 audit(1775464686.529:8154): avc: denied { create } for pid=24727 comm="syz.2.6478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 537.964512][ T28] audit: type=1400 audit(1775464686.529:8155): avc: denied { create } for pid=24727 comm="syz.2.6478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 537.989092][T24728] syzkaller0: entered allmulticast mode [ 538.169671][T24733] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 539.562254][T24749] syzkaller0: entered promiscuous mode [ 539.567818][T24749] syzkaller0: entered allmulticast mode [ 540.155784][T24762] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6492'. [ 540.165130][T24762] 8021q: VLANs not supported on sit0 [ 540.503330][T24769] syzkaller0: entered promiscuous mode [ 540.519122][T24769] syzkaller0: entered allmulticast mode [ 542.658667][ T28] kauditd_printk_skb: 233 callbacks suppressed [ 542.658684][ T28] audit: type=1400 audit(1775464691.269:8389): avc: denied { create } for pid=24805 comm="syz.2.6508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 542.746605][ T28] audit: type=1400 audit(1775464691.309:8390): avc: denied { read } for pid=24805 comm="syz.2.6508" dev="nsfs" ino=4026532508 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 542.787560][ T28] audit: type=1400 audit(1775464691.309:8391): avc: denied { create } for pid=24805 comm="syz.2.6508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 542.836000][ T28] audit: type=1400 audit(1775464691.309:8392): avc: denied { execmem } for pid=24805 comm="syz.2.6508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 542.882684][ T28] audit: type=1400 audit(1775464691.309:8393): avc: denied { create } for pid=24805 comm="syz.2.6508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 542.948000][ T28] audit: type=1400 audit(1775464691.429:8394): avc: denied { map_create } for pid=24807 comm="syz.2.6509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 543.020509][ T28] audit: type=1400 audit(1775464691.429:8395): avc: denied { map_create } for pid=24807 comm="syz.2.6509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 543.054462][ T28] audit: type=1400 audit(1775464691.429:8396): avc: denied { create } for pid=24807 comm="syz.2.6509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 543.094534][ T28] audit: type=1400 audit(1775464691.429:8397): avc: denied { create } for pid=24807 comm="syz.2.6509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 543.138916][ T28] audit: type=1400 audit(1775464691.429:8398): avc: denied { prog_load } for pid=24807 comm="syz.2.6509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 543.139954][T24820] syzkaller0: entered promiscuous mode [ 543.174706][T24820] syzkaller0: entered allmulticast mode [ 543.335928][T24824] syzkaller0: entered promiscuous mode [ 543.360383][T24824] syzkaller0: entered allmulticast mode [ 545.666569][T24872] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6534'. [ 546.062117][T24884] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6533'. [ 546.071085][T24884] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6533'. [ 546.851338][T24907] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=24907 comm=syz.1.6545 [ 547.341252][T24913] netlink: 'syz.1.6549': attribute type 21 has an invalid length. [ 547.354245][T24913] netlink: 156 bytes leftover after parsing attributes in process `syz.1.6549'. [ 547.675012][ T28] kauditd_printk_skb: 258 callbacks suppressed [ 547.675033][ T28] audit: type=1326 audit(1775464696.289:8657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24924 comm="syz.0.6553" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fdd9b7bc819 code=0x0 [ 547.771486][ T28] audit: type=1400 audit(1775464696.339:8658): avc: denied { create } for pid=24924 comm="syz.0.6553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 547.844853][ T28] audit: type=1400 audit(1775464696.339:8659): avc: denied { create } for pid=24924 comm="syz.0.6553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 547.912560][ T28] audit: type=1400 audit(1775464696.339:8660): avc: denied { read write } for pid=24924 comm="syz.0.6553" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 547.937653][ T28] audit: type=1400 audit(1775464696.339:8661): avc: denied { create } for pid=24924 comm="syz.0.6553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 547.983335][ T28] audit: type=1400 audit(1775464696.339:8662): avc: denied { create } for pid=24924 comm="syz.0.6553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 548.095657][ T28] audit: type=1400 audit(1775464696.709:8663): avc: denied { read write } for pid=20899 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 548.096204][T24928] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6553'. [ 548.151967][ T28] audit: type=1400 audit(1775464696.769:8664): avc: denied { create } for pid=24924 comm="syz.0.6553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 548.152484][T24928] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6553'. [ 548.202625][T24931] IPVS: sed: UDP 224.0.0.2:0 - no destination available [ 548.246570][ T28] audit: type=1400 audit(1775464696.769:8665): avc: denied { create } for pid=24924 comm="syz.0.6553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 548.267510][ T28] audit: type=1400 audit(1775464696.769:8666): avc: denied { create } for pid=24924 comm="syz.0.6553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 550.169856][T24984] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6571'. [ 550.952255][T24996] netlink: 'syz.7.6575': attribute type 1 has an invalid length. [ 551.046039][T24996] bond1: (slave vxcan1): The slave device specified does not support setting the MAC address [ 551.087690][T24996] bond1: (slave vxcan1): Error -95 calling set_mac_address [ 551.138734][T24998] netlink: 28 bytes leftover after parsing attributes in process `syz.7.6575'. [ 551.265735][T24996] macvlan2: entered promiscuous mode [ 551.279101][T24996] macvlan2: entered allmulticast mode [ 551.289484][T24996] bond1: entered promiscuous mode [ 551.308322][T24996] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 551.341315][T24996] bond1: left promiscuous mode [ 551.742933][T25005] 8021q: adding VLAN 0 to HW filter on device team0 [ 551.769346][T25005] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 551.935909][T25008] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 551.966592][T25008] netlink: 'syz.2.6579': attribute type 1 has an invalid length. [ 552.067991][T25010] bond1: (slave vxcan3): The slave device specified does not support setting the MAC address [ 552.125899][T25010] bond1: (slave vxcan3): Error -95 calling set_mac_address [ 552.195787][T25008] bond1: (slave bridge1): Enslaving as an active interface with a down link [ 552.268380][T25008] macvlan2: entered promiscuous mode [ 552.290925][T25008] macvlan2: entered allmulticast mode [ 552.303599][T25008] bond1: entered promiscuous mode [ 552.339370][T25008] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 552.377913][T25008] bond1: left promiscuous mode [ 552.749585][ T28] kauditd_printk_skb: 176 callbacks suppressed [ 552.749606][ T28] audit: type=1400 audit(1775464701.369:8843): avc: denied { create } for pid=25022 comm="syz.2.6584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 553.082548][ T28] audit: type=1400 audit(1775464701.689:8844): avc: denied { read write } for pid=20899 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 553.159083][ T28] audit: type=1400 audit(1775464701.729:8845): avc: denied { prog_load } for pid=25027 comm="syz.1.6585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 553.234398][ T28] audit: type=1400 audit(1775464701.729:8846): avc: denied { prog_load } for pid=25027 comm="syz.1.6585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 553.274400][T25029] bond5: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 553.342639][T25029] bond5 (unregistering): Released all slaves [ 553.448987][ T28] audit: type=1400 audit(1775464701.829:8847): avc: denied { map_create } for pid=25027 comm="syz.1.6585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 553.498980][ T28] audit: type=1400 audit(1775464701.849:8848): avc: denied { open } for pid=25027 comm="syz.1.6585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 553.548982][ T28] audit: type=1400 audit(1775464701.849:8849): avc: denied { prog_load } for pid=25027 comm="syz.1.6585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 553.617278][ T28] audit: type=1400 audit(1775464701.969:8850): avc: denied { create } for pid=25027 comm="syz.1.6585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=0 [ 553.679002][ T28] audit: type=1400 audit(1775464702.049:8851): avc: denied { block_suspend } for pid=25027 comm="syz.1.6585" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 553.748987][ T28] audit: type=1400 audit(1775464702.049:8852): avc: denied { open } for pid=25027 comm="syz.1.6585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 555.603512][T25081] 8021q: adding VLAN 0 to HW filter on device bond0 [ 555.612387][T25081] 8021q: adding VLAN 0 to HW filter on device team0 [ 555.631448][T25081] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 557.789016][ T28] kauditd_printk_skb: 710 callbacks suppressed [ 557.789127][ T28] audit: type=1400 audit(1775464706.339:9563): avc: denied { prog_load } for pid=25102 comm="syz.1.6609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 557.892878][ T28] audit: type=1400 audit(1775464706.339:9564): avc: denied { prog_load } for pid=25102 comm="syz.1.6609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 558.037232][ T28] audit: type=1400 audit(1775464706.339:9565): avc: denied { open } for pid=25102 comm="syz.1.6609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 558.168375][ T28] audit: type=1400 audit(1775464706.339:9566): avc: denied { create } for pid=25102 comm="syz.1.6609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 558.268061][ T28] audit: type=1400 audit(1775464706.339:9567): avc: denied { create } for pid=25102 comm="syz.1.6609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 558.361073][ T28] audit: type=1400 audit(1775464706.489:9568): avc: denied { read write } for pid=20534 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 558.448416][ T28] audit: type=1400 audit(1775464706.589:9569): avc: denied { create } for pid=25106 comm="syz.0.6610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 558.509178][ T28] audit: type=1400 audit(1775464706.589:9570): avc: denied { create } for pid=25106 comm="syz.0.6610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 558.567353][ T28] audit: type=1400 audit(1775464706.589:9571): avc: denied { create } for pid=25106 comm="syz.0.6610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 558.628790][ T28] audit: type=1400 audit(1775464706.599:9572): avc: denied { prog_load } for pid=25106 comm="syz.0.6610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 559.265487][T25127] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 561.793308][T18391] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 561.851304][T18391] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 561.902441][T18391] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 561.981653][T18391] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 562.022465][T25165] ipip0: entered promiscuous mode [ 562.267251][T18391] bridge_slave_1: left allmulticast mode [ 562.284166][T18391] bridge_slave_1: left promiscuous mode [ 562.290979][T18391] bridge0: port 2(bridge_slave_1) entered disabled state [ 562.301495][T18391] bridge_slave_0: left allmulticast mode [ 562.328267][T18391] bridge_slave_0: left promiscuous mode [ 562.343342][T18391] bridge0: port 1(bridge_slave_0) entered disabled state [ 562.575336][T18391] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 562.586847][T18391] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 562.675024][T18391] bond0 (unregistering): Released all slaves [ 562.767884][T25188] netlink: 'syz.8.6635': attribute type 13 has an invalid length. [ 562.798235][T25188] netlink: 'syz.8.6635': attribute type 17 has an invalid length. [ 562.806312][ T28] kauditd_printk_skb: 1521 callbacks suppressed [ 562.806345][ T28] audit: type=1400 audit(1775464711.429:11094): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 562.820903][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 562.849780][T18391] hsr_slave_0: left promiscuous mode [ 562.866134][T18391] hsr_slave_1: left promiscuous mode [ 562.876058][T18391] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 562.885585][ T28] audit: type=1400 audit(1775464711.429:11095): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 562.929620][T18391] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 562.939988][T25187] audit: audit_backlog=65 > audit_backlog_limit=64 [ 562.942406][ T3039] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 562.946654][T25187] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 562.969512][T18391] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 562.977186][T18391] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 562.984527][ T28] audit: type=1400 audit(1775464711.429:11096): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 562.984645][ T3039] audit: backlog limit exceeded [ 563.037277][T25187] audit: backlog limit exceeded [ 563.052605][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 563.062848][T18391] veth1_macvtap: left promiscuous mode [ 563.072843][T18391] veth0_macvtap: left promiscuous mode [ 563.085440][T18391] veth1_vlan: left promiscuous mode [ 563.100668][T18391] veth0_vlan: left promiscuous mode [ 563.319939][T18391] team0 (unregistering): Port device team_slave_1 removed [ 563.342582][T18391] team0 (unregistering): Port device team_slave_0 removed [ 563.457370][T25188] 8021q: adding VLAN 0 to HW filter on device bond0 [ 563.488887][T25188] 8021q: adding VLAN 0 to HW filter on device team0 [ 563.513779][T25188] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 567.392843][T25221] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6647'. [ 567.691445][T25228] bridge_slave_1: left allmulticast mode [ 567.741631][T25228] bridge_slave_1: left promiscuous mode [ 567.769125][T25228] bridge0: port 2(bridge_slave_1) entered disabled state [ 567.799296][T25228] bond0: (slave bridge_slave_1): Enslaving as an active interface with an up link [ 567.809034][ T28] kauditd_printk_skb: 14087 callbacks suppressed [ 567.809052][ T28] audit: type=1400 audit(1775464716.429:24888): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 567.824096][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 567.869632][ T3039] audit: audit_lost=103 audit_rate_limit=0 audit_backlog_limit=64 [ 567.908013][ T3039] audit: backlog limit exceeded [ 567.913250][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 567.913965][ T28] audit: type=1400 audit(1775464716.429:24889): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 567.939053][ T3039] audit: audit_lost=104 audit_rate_limit=0 audit_backlog_limit=64 [ 567.948809][ T3039] audit: backlog limit exceeded [ 567.969148][T25233] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 567.981372][T25233] batadv_slave_0: entered promiscuous mode [ 567.984400][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 567.987377][ T28] audit: type=1400 audit(1775464716.429:24890): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 570.817415][T25270] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=25270 comm=syz.2.6661 [ 571.032313][T25274] netlink: 'syz.2.6663': attribute type 17 has an invalid length. [ 571.040399][T25274] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6663'. [ 571.049727][T25274] 8021q: adding VLAN 0 to HW filter on device bond0 [ 571.163799][T25278] lo: Caught tx_queue_len zero misconfig [ 572.483168][T14614] bridge_slave_1: left allmulticast mode [ 572.502055][T14614] bridge_slave_1: left promiscuous mode [ 572.529621][T14614] bridge0: port 2(bridge_slave_1) entered disabled state [ 572.550630][T14614] bridge_slave_0: left allmulticast mode [ 572.562146][T14614] bridge_slave_0: left promiscuous mode [ 572.573546][T14614] bridge0: port 1(bridge_slave_0) entered disabled state [ 572.818989][ T28] kauditd_printk_skb: 19305 callbacks suppressed [ 572.819007][ T28] audit: type=1400 audit(1775464721.429:38665): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 572.863025][T14614] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 572.883923][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 572.891339][ T3039] audit: audit_lost=1949 audit_rate_limit=0 audit_backlog_limit=64 [ 572.899580][ T3039] audit: backlog limit exceeded [ 572.905009][ T28] audit: type=1400 audit(1775464721.429:38666): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 572.949295][T14614] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 572.961463][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 572.963777][T25302] audit: audit_backlog=65 > audit_backlog_limit=64 [ 572.970154][ T3039] audit: audit_lost=1950 audit_rate_limit=0 audit_backlog_limit=64 [ 572.983218][T14614] bond0 (unregistering): Released all slaves [ 572.991945][ T28] audit: type=1400 audit(1775464721.429:38667): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 573.015098][T25302] audit: audit_lost=1951 audit_rate_limit=0 audit_backlog_limit=64 [ 573.040844][T14614] tipc: Left network mode [ 573.058500][T14614] hsr_slave_0: left promiscuous mode [ 573.068997][T14614] hsr_slave_1: left promiscuous mode [ 573.084845][T14614] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 573.101655][T14614] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 573.182053][T14614] team0 (unregistering): Port device team_slave_1 removed [ 573.217758][T14614] team0 (unregistering): Port device team_slave_0 removed [ 573.315750][T25303] bond2: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 573.330883][T25303] bond2 (unregistering): Released all slaves [ 573.572556][T25315] veth0_virt_wifi: entered allmulticast mode [ 573.588168][T14614] IPVS: stop unused estimator thread 0... [ 573.944233][T25314] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6675'. [ 573.999060][T15953] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 574.084516][T25319] bond2: option lacp_rate: mode dependency failed, not supported in mode balance-xor(2) [ 574.152060][T25319] bond2 (unregistering): Released all slaves [ 574.224843][T25321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 574.255054][T25321] 8021q: adding VLAN 0 to HW filter on device team0 [ 574.334249][T25321] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 574.591253][T25333] veth1: Caught tx_queue_len zero misconfig [ 574.642527][T25336] xt_CT: You must specify a L4 protocol and not use inversions on it [ 574.999207][T15953] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 575.229011][ C1] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 575.711626][T25361] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6693'. [ 575.966326][T25370] netlink: 32 bytes leftover after parsing attributes in process `syz.7.6695'. [ 576.537490][T25379] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6699'. [ 577.175813][T18383] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 577.276320][T18383] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 577.337780][T18383] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 577.418881][T18383] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 577.566636][T18383] bridge_slave_1: left allmulticast mode [ 577.591197][T18383] bridge_slave_1: left promiscuous mode [ 577.608601][T18383] bridge0: port 2(bridge_slave_1) entered disabled state [ 577.640143][T18383] bridge_slave_0: left allmulticast mode [ 577.658288][T18383] bridge_slave_0: left promiscuous mode [ 577.684330][T18383] bridge0: port 1(bridge_slave_0) entered disabled state [ 577.831859][ T28] kauditd_printk_skb: 18763 callbacks suppressed [ 577.831878][ T28] audit: type=1400 audit(1775464726.449:52398): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 577.855543][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 577.893151][ T3039] audit: audit_lost=3629 audit_rate_limit=0 audit_backlog_limit=64 [ 577.903718][T25407] audit: audit_backlog=65 > audit_backlog_limit=64 [ 577.918677][ T28] audit: type=1400 audit(1775464726.449:52399): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 577.949191][ T3039] audit: backlog limit exceeded [ 577.954433][T25407] audit: audit_lost=3630 audit_rate_limit=0 audit_backlog_limit=64 [ 577.963741][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 577.968966][ T28] audit: type=1400 audit(1775464726.449:52400): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 577.973595][ T3039] audit: audit_lost=3631 audit_rate_limit=0 audit_backlog_limit=64 [ 578.084536][T18383] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 578.103528][T18383] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 578.159675][T18383] bond0 (unregistering): Released all slaves [ 578.255964][T18383] hsr_slave_0: left promiscuous mode [ 578.280764][T18383] hsr_slave_1: left promiscuous mode [ 578.309971][T18383] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 578.345078][T18383] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 578.389635][T18383] veth1_macvtap: left promiscuous mode [ 578.406133][T18383] veth0_macvtap: left promiscuous mode [ 578.424907][T18383] veth1_vlan: left promiscuous mode [ 578.459265][T18383] veth0_vlan: left promiscuous mode [ 578.778337][T18383] team0 (unregistering): Port device team_slave_1 removed [ 578.809184][T18383] team0 (unregistering): Port device team_slave_0 removed [ 580.662468][T25451] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 580.678758][ T3407] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 580.785667][T25451] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6723'. [ 580.969092][ T3407] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 581.214891][T25460] netlink: 'syz.1.6725': attribute type 36 has an invalid length. [ 581.245695][T25460] bridge4: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 581.273467][T25461] netlink: 'syz.1.6725': attribute type 10 has an invalid length. [ 581.301992][T25460] bridge4: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 581.336627][T25461] macvlan1: entered allmulticast mode [ 581.364482][T25461] veth1_vlan: entered allmulticast mode [ 581.430535][T25461] team0: Port device macvlan1 added [ 581.953829][T25467] SET target dimension over the limit! [ 582.869849][ T28] kauditd_printk_skb: 18330 callbacks suppressed [ 582.869866][ T28] audit: type=1400 audit(1775464731.479:61909): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 582.920301][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 582.926853][ T3039] audit: audit_lost=6572 audit_rate_limit=0 audit_backlog_limit=64 [ 582.955149][ T28] audit: type=1400 audit(1775464731.479:61910): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 582.984508][ T3039] audit: backlog limit exceeded [ 582.989819][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 582.991473][T20899] audit: audit_backlog=65 > audit_backlog_limit=64 [ 583.010333][ T3039] audit: audit_lost=6573 audit_rate_limit=0 audit_backlog_limit=64 [ 583.018294][ T3039] audit: backlog limit exceeded [ 583.043481][T20899] audit: audit_lost=6574 audit_rate_limit=0 audit_backlog_limit=64 [ 587.779012][T25533] netlink: 12 bytes leftover after parsing attributes in process `syz.8.6750'. [ 587.806703][T25533] netlink: 28 bytes leftover after parsing attributes in process `syz.8.6750'. [ 587.832443][T25533] netlink: 12 bytes leftover after parsing attributes in process `syz.8.6750'. [ 587.879091][T25533] netlink: 28 bytes leftover after parsing attributes in process `syz.8.6750'. [ 587.888378][ T28] kauditd_printk_skb: 18615 callbacks suppressed [ 587.888393][ T28] audit: type=1400 audit(1775464736.499:72437): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 587.903660][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 587.930234][T25533] netlink: 'syz.8.6750': attribute type 6 has an invalid length. [ 587.954135][ T28] audit: type=1400 audit(1775464736.499:72438): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 587.957699][ T3039] audit: audit_lost=9271 audit_rate_limit=0 audit_backlog_limit=64 [ 588.018493][ T3039] audit: backlog limit exceeded [ 588.022450][ T28] audit: type=1400 audit(1775464736.499:72439): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 588.054720][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 588.061522][ T3039] audit: audit_lost=9272 audit_rate_limit=0 audit_backlog_limit=64 [ 588.085608][T15462] audit: audit_backlog=65 > audit_backlog_limit=64 [ 588.089001][ T28] audit: type=1400 audit(1775464736.499:72440): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 588.894725][T25552] netlink: 14 bytes leftover after parsing attributes in process `syz.2.6764'. [ 591.229020][ C1] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 592.750731][T25582] netlink: 'syz.2.6765': attribute type 6 has an invalid length. [ 592.891851][ T28] kauditd_printk_skb: 15533 callbacks suppressed [ 592.891868][ T28] audit: type=1400 audit(1775464741.499:87050): avc: denied { execmem } for pid=25583 comm="syz.2.6766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 593.076249][ T28] audit: type=1400 audit(1775464741.499:87051): avc: denied { prog_load } for pid=25583 comm="syz.2.6766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 593.096145][ T28] audit: type=1400 audit(1775464741.499:87052): avc: denied { prog_load } for pid=25583 comm="syz.2.6766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 593.115509][ T28] audit: type=1400 audit(1775464741.499:87053): avc: denied { open } for pid=25583 comm="syz.2.6766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 593.135072][ T28] audit: type=1400 audit(1775464741.499:87054): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 593.179109][T25587] bond2: entered allmulticast mode [ 593.209795][ T28] audit: type=1400 audit(1775464741.499:87055): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 593.281498][ T28] audit: type=1400 audit(1775464741.499:87056): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 593.321541][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 593.341222][ T3039] audit: audit_lost=9581 audit_rate_limit=0 audit_backlog_limit=64 [ 593.369048][ T3039] audit: backlog limit exceeded [ 594.322576][T25605] netlink: 'syz.7.6774': attribute type 17 has an invalid length. [ 594.330696][T25605] netlink: 8 bytes leftover after parsing attributes in process `syz.7.6774'. [ 594.407731][T25610] netlink: 'syz.7.6775': attribute type 1 has an invalid length. [ 594.432798][T25607] bond5: option lacp_rate: mode dependency failed, not supported in mode balance-xor(2) [ 594.696144][T25607] bond5 (unregistering): Released all slaves [ 595.033009][T25612] netlink: 'syz.7.6775': attribute type 46 has an invalid length. [ 595.210514][T25611] 8021q: adding VLAN 0 to HW filter on device bond0 [ 595.284374][T25611] 8021q: adding VLAN 0 to HW filter on device team0 [ 595.381425][T25611] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 595.475395][T25624] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.482638][T25624] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.623786][T25624] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 595.778804][T18385] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.799957][ T3407] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 595.808981][T18385] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.817953][T18385] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.840316][T18385] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.969041][ T3407] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 596.517623][T19617] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 597.128840][T25644] bridge0: entered allmulticast mode [ 597.557887][T18385] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 597.572581][T18385] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 597.609043][T15953] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 597.898956][ T28] kauditd_printk_skb: 10485 callbacks suppressed [ 597.898976][ T28] audit: type=1400 audit(1775464746.509:96864): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 597.970156][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 597.984944][ T28] audit: type=1400 audit(1775464746.539:96865): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 598.006523][ T3039] audit: audit_lost=9808 audit_rate_limit=0 audit_backlog_limit=64 [ 598.029036][ T3039] audit: backlog limit exceeded [ 598.034153][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 598.047344][ T3039] audit: audit_lost=9809 audit_rate_limit=0 audit_backlog_limit=64 [ 598.056518][ T28] audit: type=1400 audit(1775464746.539:96866): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 598.087836][ T3039] audit: backlog limit exceeded [ 598.098069][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 599.501833][T25667] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 601.627889][T25698] bond0: (slave bridge_slave_1): Enslaving as an active interface with an up link [ 601.789016][ C1] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 602.357138][T25713] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 602.382935][T25713] block device autoloading is deprecated and will be removed. [ 602.740659][T25717] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6809'. [ 602.909413][ T28] kauditd_printk_skb: 13396 callbacks suppressed [ 602.909431][ T28] audit: type=1400 audit(1775464751.499:108914): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 602.946243][ T28] audit: type=1400 audit(1775464751.529:108915): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 602.974069][ T28] audit: type=1400 audit(1775464751.529:108916): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 602.974793][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 602.999164][ T28] audit: type=1400 audit(1775464751.529:108917): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 603.042131][ T28] audit: type=1400 audit(1775464751.529:108918): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 603.061719][ T3039] audit: audit_lost=10260 audit_rate_limit=0 audit_backlog_limit=64 [ 603.080406][ T28] audit: type=1400 audit(1775464751.529:108919): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 603.088957][ T3039] audit: backlog limit exceeded [ 603.102856][ T28] audit: type=1400 audit(1775464751.529:108920): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 604.825225][T25746] netlink: 'syz.0.6819': attribute type 12 has an invalid length. [ 605.309012][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 605.674414][T25756] netlink: 'syz.8.6822': attribute type 36 has an invalid length. [ 605.694332][T25756] bridge0: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 605.728981][T25756] bridge0: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 605.747647][T25757] netlink: 'syz.8.6822': attribute type 10 has an invalid length. [ 605.809057][T25757] macvlan1: entered allmulticast mode [ 605.854590][T25757] veth1_vlan: entered allmulticast mode [ 605.880237][T25757] team0: Port device macvlan1 added [ 607.686446][T25782] bridge_slave_0: left allmulticast mode [ 607.726073][T25782] bridge_slave_0: left promiscuous mode [ 607.773439][T25782] bridge0: port 1(bridge_slave_0) entered disabled state [ 607.787594][T25784] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6832'. [ 607.843529][T25782] bridge_slave_1: left allmulticast mode [ 607.887199][T25782] bridge_slave_1: left promiscuous mode [ 607.919012][ T28] kauditd_printk_skb: 17067 callbacks suppressed [ 607.919032][ T28] audit: type=1400 audit(1775464756.529:122223): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 607.939949][T25782] bridge0: port 2(bridge_slave_1) entered disabled state [ 607.981082][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 607.996690][ T3039] audit: audit_lost=11516 audit_rate_limit=0 audit_backlog_limit=64 [ 608.014042][ T28] audit: type=1400 audit(1775464756.569:122224): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 608.036343][ T3039] audit: backlog limit exceeded [ 608.046971][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 608.062436][T25782] bond0: (slave bond_slave_0): Releasing backup interface [ 608.070712][ T3039] audit: audit_lost=11517 audit_rate_limit=0 audit_backlog_limit=64 [ 608.079493][ T3039] audit: backlog limit exceeded [ 608.084412][ T28] audit: type=1400 audit(1775464756.569:122225): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 608.116499][T25782] bond0: (slave bond_slave_1): Releasing backup interface [ 608.126612][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 608.154691][T25782] team0: Port device team_slave_0 removed [ 608.189742][T25782] team0: Port device team_slave_1 removed [ 608.211325][T25782] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 608.269396][T25782] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 608.280545][T25782] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 609.398971][T25809] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6842'. [ 610.429062][ C1] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 610.941154][T25832] bridge0: entered allmulticast mode [ 611.764550][T25853] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 611.772084][T25853] IPv6: NLM_F_CREATE should be set when creating new route [ 611.793842][T25853] serio: Serial port ttyS3 [ 612.069061][T25863] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6858'. [ 613.085726][ T28] kauditd_printk_skb: 15187 callbacks suppressed [ 613.085746][ T28] audit: type=1400 audit(1775464761.499:135855): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 613.109385][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 613.169006][ T3039] audit: audit_lost=12036 audit_rate_limit=0 audit_backlog_limit=64 [ 613.198963][ T28] audit: type=1400 audit(1775464761.689:135861): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 613.217640][ T3039] audit: backlog limit exceeded [ 613.237925][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 613.269071][ T28] audit: type=1400 audit(1775464761.689:135862): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 613.278303][ T3039] audit: audit_lost=12037 audit_rate_limit=0 audit_backlog_limit=64 [ 613.326838][ T28] audit: type=1400 audit(1775464761.689:135863): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 613.328797][ T3039] audit: backlog limit exceeded [ 613.386450][T25873] team_slave_1: Caught tx_queue_len zero misconfig [ 613.498045][T25874] netlink: 48 bytes leftover after parsing attributes in process `syz.7.6861'. [ 614.760208][T25892] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=57 sclass=netlink_route_socket pid=25892 comm=syz.2.6876 [ 614.826553][T25900] bond3: entered allmulticast mode [ 614.851461][T25903] bridge0: port 1(gretap0) entered blocking state [ 614.858082][T25903] bridge0: port 1(gretap0) entered disabled state [ 614.900751][T25903] gretap0: entered allmulticast mode [ 614.906861][T25903] gretap0: entered promiscuous mode [ 615.012535][T25903] bridge0: port 1(gretap0) entered blocking state [ 615.019247][T25903] bridge0: port 1(gretap0) entered forwarding state [ 615.823320][T25916] bond0: (slave bridge_slave_1): Enslaving as a backup interface with a down link [ 616.250687][T25927] 8021q: adding VLAN 0 to HW filter on device bond0 [ 616.297569][T25927] 8021q: adding VLAN 0 to HW filter on device team0 [ 616.321111][T25927] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 616.399278][T25929] netlink: 24 bytes leftover after parsing attributes in process `syz.1.6877'. [ 617.085123][T25937] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 617.092631][T25937] IPv6: NLM_F_CREATE should be set when creating new route [ 617.338425][T25942] ip6gre0: Caught tx_queue_len zero misconfig [ 617.994263][ T9949] IPVS: starting estimator thread 0... [ 618.088994][ T28] kauditd_printk_skb: 16647 callbacks suppressed [ 618.089027][ T28] audit: type=1400 audit(1775464766.699:150024): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 618.089043][T25958] IPVS: using max 2256 ests per chain, 112800 per kthread [ 618.107304][T25957] audit: audit_backlog=65 > audit_backlog_limit=64 [ 618.131038][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 618.137562][ T3039] audit: audit_lost=12867 audit_rate_limit=0 audit_backlog_limit=64 [ 618.153908][T25957] audit: audit_lost=12868 audit_rate_limit=0 audit_backlog_limit=64 [ 618.162325][ T3039] audit: backlog limit exceeded [ 618.167278][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 618.173448][ T28] audit: type=1400 audit(1775464766.699:150025): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 618.181488][T25957] audit: backlog limit exceeded [ 618.200172][ T3039] audit: audit_lost=12869 audit_rate_limit=0 audit_backlog_limit=64 [ 618.324494][ T3374] IPVS: starting estimator thread 0... [ 618.419009][T25962] IPVS: using max 2496 ests per chain, 124800 per kthread [ 618.674738][T25976] xt_TCPMSS: Only works on TCP SYN packets [ 619.700928][T25988] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27167 sclass=netlink_route_socket pid=25988 comm=syz.1.6898 [ 619.970789][T25996] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6901'. [ 620.254615][T26007] netlink: 28 bytes leftover after parsing attributes in process `syz.7.6905'. [ 621.308992][ C1] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 623.103877][ T28] kauditd_printk_skb: 24721 callbacks suppressed [ 623.103897][ T28] audit: type=1400 audit(1775464771.719:162482): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 623.153006][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 623.168875][ T28] audit: type=1400 audit(1775464771.719:162483): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 623.178978][ T3039] audit: audit_lost=16958 audit_rate_limit=0 audit_backlog_limit=64 [ 623.211124][ T28] audit: type=1400 audit(1775464771.719:162484): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 623.226115][ T3039] audit: backlog limit exceeded [ 623.249268][ T28] audit: type=1400 audit(1775464771.719:162485): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 623.250800][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 623.285580][ T28] audit: type=1400 audit(1775464771.719:162486): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 623.316353][ T3039] audit: audit_lost=16959 audit_rate_limit=0 audit_backlog_limit=64 [ 624.125757][T26072] netlink: 16 bytes leftover after parsing attributes in process `syz.0.6927'. [ 624.173390][T26072] netlink: 16 bytes leftover after parsing attributes in process `syz.0.6927'. [ 624.456940][T26077] netlink: 'syz.0.6928': attribute type 36 has an invalid length. [ 624.528080][T26078] netlink: 'syz.0.6928': attribute type 10 has an invalid length. [ 624.596003][T26077] bridge0: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 624.709147][T26077] bridge0: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 625.299060][T26092] netlink: 'syz.7.6930': attribute type 36 has an invalid length. [ 625.322484][T26092] bridge5: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 625.361226][T26097] netlink: 'syz.7.6930': attribute type 10 has an invalid length. [ 625.369175][T26092] bridge5: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 625.395205][T26097] macvlan1: entered allmulticast mode [ 625.417992][T26097] veth1_vlan: entered allmulticast mode [ 625.440172][T26097] team0: Port device macvlan1 added [ 626.429996][ C1] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 628.112633][ T3039] audit_log_start: 15159 callbacks suppressed [ 628.112651][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 628.147425][T26137] audit: audit_backlog=65 > audit_backlog_limit=64 [ 628.160711][ T28] audit: type=1400 audit(1775465289.411:172440): avc: denied { map } for pid=26131 comm="syz.7.6948" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=0 [ 628.188010][T26137] audit: audit_lost=18695 audit_rate_limit=0 audit_backlog_limit=64 [ 628.210890][ T3039] audit: audit_lost=18696 audit_rate_limit=0 audit_backlog_limit=64 [ 628.214395][ T28] audit: type=1400 audit(1775465289.411:172441): avc: denied { map } for pid=26131 comm="syz.7.6948" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=0 [ 628.242978][ T28] audit: type=1400 audit(1775465289.411:172442): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 628.251129][ T3039] audit: backlog limit exceeded [ 628.267351][T26139] audit: audit_backlog=65 > audit_backlog_limit=64 [ 628.276233][T26139] audit: audit_lost=18697 audit_rate_limit=0 audit_backlog_limit=64 [ 628.458211][T26148] netlink: 20 bytes leftover after parsing attributes in process `syz.8.6954'. [ 628.497255][T26148] ip6tnl1: entered allmulticast mode [ 628.587233][T26152] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6956'. [ 628.614679][T26154] ipt_REJECT: TCP_RESET invalid for non-tcp [ 628.621307][T26152] xt_policy: output policy not valid in PREROUTING and INPUT [ 628.666760][T26152] veth1_vlan: left allmulticast mode [ 628.678337][T26156] bond0: (slave bridge_slave_1): Releasing backup interface [ 629.321728][T26166] netlink: 48 bytes leftover after parsing attributes in process `syz.7.6961'. [ 630.138385][T26195] netlink: 28 bytes leftover after parsing attributes in process `syz.7.6973'. [ 630.582174][T26207] team0: Port device macvlan1 removed [ 631.218022][T26208] netlink: 'syz.8.6977': attribute type 12 has an invalid length. [ 631.619005][T26221] netlink: 48 bytes leftover after parsing attributes in process `syz.7.6980'. [ 633.133207][ T28] kauditd_printk_skb: 24573 callbacks suppressed [ 633.133225][ T28] audit: type=1400 audit(1775465294.729:184537): avc: denied { mounton } for pid=26246 comm="syz.7.6990" path="/file0" dev="tmpfs" ino=2770 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 633.142442][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 633.191914][T15462] audit: audit_backlog=65 > audit_backlog_limit=64 [ 633.210762][T15462] audit: audit_lost=22857 audit_rate_limit=0 audit_backlog_limit=64 [ 633.239289][T15462] audit: backlog limit exceeded [ 633.241558][ T28] audit: type=1400 audit(1775465294.739:184538): avc: denied { unmount } for pid=26246 comm="syz.7.6990" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 633.252698][ T3039] audit: audit_lost=22858 audit_rate_limit=0 audit_backlog_limit=64 [ 633.294990][T26249] audit: audit_backlog=65 > audit_backlog_limit=64 [ 633.301763][T26249] audit: audit_lost=22859 audit_rate_limit=0 audit_backlog_limit=64 [ 633.313292][ T28] audit: type=1400 audit(1775465294.739:184539): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 633.788835][T26254] netlink: 48 bytes leftover after parsing attributes in process `syz.7.6992'. [ 636.909776][T26266] netlink: 'syz.8.6995': attribute type 10 has an invalid length. [ 636.936871][T26266] team0: Port device xfrm0 added [ 636.954201][T26266] netlink: 60 bytes leftover after parsing attributes in process `syz.8.6995'. [ 638.145728][ T28] kauditd_printk_skb: 11110 callbacks suppressed [ 638.145748][ T28] audit: type=1400 audit(1775465299.756:193896): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 638.158579][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 638.176610][T20133] audit: audit_backlog=65 > audit_backlog_limit=64 [ 638.206622][T20133] audit: audit_lost=23444 audit_rate_limit=0 audit_backlog_limit=64 [ 638.214741][T20133] audit: backlog limit exceeded [ 638.235667][ T28] audit: type=1400 audit(1775465299.756:193897): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 638.235720][ T3039] audit: audit_lost=23445 audit_rate_limit=0 audit_backlog_limit=64 [ 638.235741][ T3039] audit: backlog limit exceeded [ 638.308725][T26276] audit: audit_backlog=65 > audit_backlog_limit=64 [ 638.315361][T26276] audit: audit_lost=23446 audit_rate_limit=0 audit_backlog_limit=64 [ 641.794204][T26337] netlink: 'syz.0.7017': attribute type 39 has an invalid length. [ 642.214898][T26337] hsr_slave_1 (unregistering): left promiscuous mode [ 642.707734][T26368] netlink: 'syz.0.7026': attribute type 4 has an invalid length. [ 642.736896][T26368] netlink: 'syz.0.7026': attribute type 4 has an invalid length. [ 642.771248][T26368] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7026'. [ 643.338789][ T28] kauditd_printk_skb: 14340 callbacks suppressed [ 643.338807][ T28] audit: type=1400 audit(1775465304.944:203695): avc: denied { read write } for pid=20133 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 643.416747][T26379] bridge0: entered allmulticast mode [ 643.443233][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 643.451369][ T3039] audit: audit_lost=24961 audit_rate_limit=0 audit_backlog_limit=64 [ 643.459637][ T3039] audit: backlog limit exceeded [ 643.464600][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 643.471333][ T3039] audit: audit_lost=24962 audit_rate_limit=0 audit_backlog_limit=64 [ 643.479536][ T3039] audit: backlog limit exceeded [ 643.484518][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 643.491294][ T3039] audit: audit_lost=24963 audit_rate_limit=0 audit_backlog_limit=64 [ 643.509568][ T3039] audit: backlog limit exceeded [ 643.768970][T26388] netlink: 24 bytes leftover after parsing attributes in process `syz.8.7031'. [ 644.290400][T26395] 8021q: adding VLAN 0 to HW filter on device bond0 [ 644.317537][T15953] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 644.428987][T26395] 8021q: adding VLAN 0 to HW filter on device team0 [ 644.451512][T26395] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 644.495675][T18400] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 644.508151][T18400] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 644.548940][T15953] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 644.579519][ T3374] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 648.316285][ T28] kauditd_printk_skb: 15412 callbacks suppressed [ 648.316310][ T28] audit: type=1400 audit(1775498083.965:218034): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 648.477379][ C0] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 648.496349][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 648.518382][T26568] audit: audit_backlog=65 > audit_backlog_limit=64 [ 648.525027][ T3039] audit: audit_lost=25322 audit_rate_limit=0 audit_backlog_limit=64 [ 648.533112][ T3039] audit: backlog limit exceeded [ 648.543954][T26568] audit: audit_lost=25323 audit_rate_limit=0 audit_backlog_limit=64 [ 648.552039][T26568] audit: backlog limit exceeded [ 648.558455][ T28] audit: type=1400 audit(1775498083.965:218035): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 648.594209][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 648.602938][ T3039] audit: audit_lost=25324 audit_rate_limit=0 audit_backlog_limit=64 [ 649.558649][T26576] netlink: 48 bytes leftover after parsing attributes in process `syz.2.7115'. [ 651.372440][T26605] netlink: 48 bytes leftover after parsing attributes in process `syz.8.7127'. [ 653.087343][ T28] kauditd_printk_skb: 12292 callbacks suppressed [ 653.087363][ T28] audit: type=1400 audit(1775498088.963:229330): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 653.181468][ T28] audit: type=1400 audit(1775498088.973:229332): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 653.271909][ T28] audit: type=1400 audit(1775498088.973:229333): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 653.365896][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 653.370605][ T28] audit: type=1400 audit(1775498088.973:229334): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 653.372514][ T3039] audit: audit_lost=25657 audit_rate_limit=0 audit_backlog_limit=64 [ 653.372533][ T3039] audit: backlog limit exceeded [ 653.372653][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 653.420570][T20899] audit: audit_backlog=65 > audit_backlog_limit=64 [ 653.434222][T20133] audit: audit_backlog=65 > audit_backlog_limit=64 [ 655.107123][T26824] netlink: 'syz.1.7226': attribute type 10 has an invalid length. [ 655.132047][T26824] team0: Device xfrm0 is of different type [ 655.195342][T26824] netlink: 60 bytes leftover after parsing attributes in process `syz.1.7226'. [ 656.097067][ C0] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 657.315852][ C1] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 657.858821][ T28] kauditd_printk_skb: 17447 callbacks suppressed [ 657.858849][ T28] audit: type=1400 audit(1775498093.971:236678): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 657.907555][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 657.916902][T20899] audit: audit_backlog=65 > audit_backlog_limit=64 [ 657.924929][ T3039] audit: audit_lost=29027 audit_rate_limit=0 audit_backlog_limit=64 [ 657.933201][T26973] audit: audit_backlog=65 > audit_backlog_limit=64 [ 657.935065][T26972] audit: audit_backlog=65 > audit_backlog_limit=64 [ 657.950106][T20899] audit: audit_lost=29028 audit_rate_limit=0 audit_backlog_limit=64 [ 657.960946][ T3039] audit: backlog limit exceeded [ 657.975744][ T28] audit: type=1400 audit(1775498093.971:236679): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 657.976305][T26973] audit: audit_lost=29029 audit_rate_limit=0 audit_backlog_limit=64 [ 659.276584][T27055] bond0: (slave dummy0): Releasing backup interface [ 659.661497][T27080] netlink: 28 bytes leftover after parsing attributes in process `syz.0.7346'. [ 660.151684][T27085] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7348'. [ 660.173657][T27085] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7348'. [ 660.204877][T27085] netlink: 'syz.1.7348': attribute type 13 has an invalid length. [ 660.253419][T27085] netlink: 'syz.1.7348': attribute type 14 has an invalid length. [ 661.433493][T27131] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7366'. [ 661.442492][T27131] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7366'. [ 661.451590][T27131] netlink: 'syz.1.7366': attribute type 13 has an invalid length. [ 661.463984][T27131] netlink: 'syz.1.7366': attribute type 14 has an invalid length. [ 662.062330][T27141] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 662.630812][ T28] kauditd_printk_skb: 14564 callbacks suppressed [ 662.630832][ T28] audit: type=1400 audit(1775498098.990:248960): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 662.646452][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 662.668490][T20899] audit: audit_backlog=65 > audit_backlog_limit=64 [ 662.686261][ T3039] audit: audit_lost=29791 audit_rate_limit=0 audit_backlog_limit=64 [ 662.694552][ T28] audit: type=1400 audit(1775498098.990:248961): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 662.697470][T20899] audit: audit_lost=29792 audit_rate_limit=0 audit_backlog_limit=64 [ 662.734861][ T3039] audit: backlog limit exceeded [ 662.744919][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 662.751463][ T3039] audit: audit_lost=29793 audit_rate_limit=0 audit_backlog_limit=64 [ 662.782883][ T28] audit: type=1400 audit(1775498098.990:248962): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 663.289225][T27159] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7380'. [ 663.298224][T27159] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7380'. [ 663.307446][T27159] netlink: 'syz.1.7380': attribute type 13 has an invalid length. [ 663.315518][T27159] netlink: 'syz.1.7380': attribute type 14 has an invalid length. [ 663.814918][T27165] IPv6: Can't replace route, no match found [ 664.928924][T27185] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7391'. [ 664.937887][T27185] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7391'. [ 664.947011][T27185] netlink: 'syz.1.7391': attribute type 13 has an invalid length. [ 664.955890][T27185] netlink: 'syz.1.7391': attribute type 14 has an invalid length. [ 666.163600][T27235] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7408'. [ 666.191790][T27235] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7408'. [ 666.201230][T27235] netlink: 'syz.1.7408': attribute type 13 has an invalid length. [ 666.209389][T27235] netlink: 'syz.1.7408': attribute type 14 has an invalid length. [ 666.839318][T27297] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=47 sclass=netlink_audit_socket pid=27297 comm=syz.7.7441 [ 667.402222][ T28] kauditd_printk_skb: 13976 callbacks suppressed [ 667.402240][ T28] audit: type=1400 audit(1775498103.998:261821): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 667.441922][ T28] audit: type=1400 audit(1775498104.029:261822): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 667.465769][ T28] audit: type=1400 audit(1775498104.029:261823): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 667.499832][ T28] audit: type=1400 audit(1775498104.029:261824): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 667.544030][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 667.545017][T27356] audit: audit_backlog=65 > audit_backlog_limit=64 [ 667.555083][T27357] audit: audit_backlog=65 > audit_backlog_limit=64 [ 667.564753][T15462] audit: audit_backlog=65 > audit_backlog_limit=64 [ 667.571320][ T3039] audit: audit_lost=30166 audit_rate_limit=0 audit_backlog_limit=64 [ 667.573919][T27356] audit: audit_lost=30167 audit_rate_limit=0 audit_backlog_limit=64 [ 667.598769][T27359] netlink: 'syz.7.7470': attribute type 6 has an invalid length. [ 668.329117][T27451] netlink: 'syz.8.7516': attribute type 2 has an invalid length. [ 668.356981][T27451] netlink: 20 bytes leftover after parsing attributes in process `syz.8.7516'. [ 668.379184][T27456] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7519'. [ 668.691466][T27494] A link change request failed with some changes committed already. Interface veth1_to_bond may have been left with an inconsistent configuration, please check. [ 670.557852][T27660] netlink: 40 bytes leftover after parsing attributes in process `syz.2.7618'. [ 671.301754][T27761] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7669'. [ 671.320907][T27761] netlink: 'syz.1.7669': attribute type 34 has an invalid length. [ 671.335698][ C0] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 671.372443][T27770] netlink: 'syz.7.7672': attribute type 39 has an invalid length. [ 671.404807][T27770] hsr_slave_1 (unregistering): left promiscuous mode [ 671.507182][ T3374] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 671.907345][ T3374] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 671.955569][T27851] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 672.174246][ T28] kauditd_printk_skb: 15220 callbacks suppressed [ 672.174264][ T28] audit: type=1400 audit(1775498109.016:276811): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 672.213779][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 672.216139][T27891] audit: audit_backlog=65 > audit_backlog_limit=64 [ 672.220339][ T3039] audit: audit_lost=30246 audit_rate_limit=0 audit_backlog_limit=64 [ 672.220359][ T3039] audit: backlog limit exceeded [ 672.220429][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 672.248072][T20133] audit: audit_backlog=65 > audit_backlog_limit=64 [ 672.250591][ T28] audit: type=1400 audit(1775498109.016:276812): avc: denied { read write } for pid=15462 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 672.280668][ T3039] audit: audit_lost=30247 audit_rate_limit=0 audit_backlog_limit=64 [ 672.288668][T20133] audit: audit_lost=30248 audit_rate_limit=0 audit_backlog_limit=64 [ 672.477578][T27925] netlink: 20 bytes leftover after parsing attributes in process `syz.0.7749'. [ 672.509244][T27931] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7752'. [ 672.860811][T27992] IPVS: set_ctl: invalid protocol: 1 172.20.20.170:20004 [ 673.062630][T28018] macvlan0: entered promiscuous mode [ 673.069413][T28018] netlink: 'syz.7.7795': attribute type 1 has an invalid length. [ 673.078439][T28018] netlink: 'syz.7.7795': attribute type 2 has an invalid length. [ 673.172176][T18385] bridge_slave_1: left allmulticast mode [ 673.193690][T18385] bridge_slave_1: left promiscuous mode [ 673.221047][T18385] bridge0: port 2(bridge_slave_1) entered disabled state [ 673.263334][T18385] bridge_slave_0: left allmulticast mode [ 673.282521][T18385] bridge_slave_0: left promiscuous mode [ 673.309484][T18385] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.490782][T18385] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 673.522804][T18385] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 673.563622][T18385] bond0 (unregistering): Released all slaves [ 673.658915][T18385] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 673.684621][T18385] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 673.731749][T18385] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 673.758560][T18385] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 673.801508][T18385] veth1_macvtap: left promiscuous mode [ 673.824509][T18385] veth0_macvtap: left promiscuous mode [ 673.845609][T18385] veth1_vlan: left promiscuous mode [ 673.865242][T18385] veth0_vlan: left promiscuous mode [ 673.881637][T28076] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 673.889136][T28076] IPv6: NLM_F_CREATE should be set when creating new route [ 673.896363][T28076] IPv6: NLM_F_CREATE should be set when creating new route [ 673.943351][T28076] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 674.165445][T28102] netlink: 'syz.0.7833': attribute type 4 has an invalid length. [ 674.173242][T28102] netlink: 152 bytes leftover after parsing attributes in process `syz.0.7833'. [ 674.207678][T28107] syz.7.7836: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 674.263968][T28110] loop8: detected capacity change from 0 to 512 [ 674.295908][T28107] CPU: 0 UID: 0 PID: 28107 Comm: syz.7.7836 Tainted: G W syzkaller #0 PREEMPT(full) [ 674.296006][T28107] Tainted: [W]=WARN [ 674.296015][T28107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 674.296031][T28107] Call Trace: [ 674.296114][T28107] [ 674.296122][T28107] __dump_stack+0x1d/0x30 [ 674.296207][T28107] dump_stack_lvl+0x95/0xd0 [ 674.296238][T28107] dump_stack+0x15/0x1b [ 674.296265][T28107] warn_alloc+0x145/0x1c0 [ 674.296296][T28107] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 674.296369][T28107] __vmalloc_node_range_noprof+0xa0/0x12b0 [ 674.296398][T28107] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 674.296428][T28107] ? slow_avc_audit+0x14c/0x190 [ 674.296458][T28107] ? should_fail_ex+0x30/0x280 [ 674.296528][T28107] ? xskq_create+0x36/0xe0 [ 674.296554][T28107] vmalloc_user_noprof+0x7d/0xb0 [ 674.296578][T28107] ? xskq_create+0x80/0xe0 [ 674.296691][T28107] xskq_create+0x80/0xe0 [ 674.296715][T28107] xsk_init_queue+0x70/0xb0 [ 674.296749][T28107] xsk_setsockopt+0x3f5/0x640 [ 674.296779][T28107] ? __pfx_xsk_setsockopt+0x10/0x10 [ 674.296823][T28107] __sys_setsockopt+0x184/0x200 [ 674.296854][T28107] __x64_sys_setsockopt+0x64/0x80 [ 674.296918][T28107] x64_sys_call+0x2327/0x3020 [ 674.296945][T28107] do_syscall_64+0x12c/0x370 [ 674.296970][T28107] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 674.297038][T28107] RIP: 0033:0x7fbc8495c819 [ 674.297057][T28107] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 674.297149][T28107] RSP: 002b:00007fbc833af028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 674.297175][T28107] RAX: ffffffffffffffda RBX: 00007fbc84bd5fa0 RCX: 00007fbc8495c819 [ 674.297193][T28107] RDX: 0000000000000006 RSI: 000000000000011b RDI: 0000000000000003 [ 674.297209][T28107] RBP: 00007fbc849f2c91 R08: 0000000000000004 R09: 0000000000000000 [ 674.297224][T28107] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000000 [ 674.297240][T28107] R13: 00007fbc84bd6038 R14: 00007fbc84bd5fa0 R15: 00007ffd1974d7f8 [ 674.297282][T28107] [ 674.297360][T28107] Mem-Info: [ 674.403565][T28102] .`: renamed from bond0 (while UP) [ 674.472831][T28107] active_anon:11564 inactive_anon:6 isolated_anon:0 [ 674.472831][T28107] active_file:11832 inactive_file:9142 isolated_file:0 [ 674.472831][T28107] unevictable:0 dirty:260 writeback:0 [ 674.472831][T28107] slab_reclaimable:4166 slab_unreclaimable:33570 [ 674.472831][T28107] mapped:30151 shmem:1375 pagetables:4672 [ 674.472831][T28107] sec_pagetables:0 bounce:0 [ 674.472831][T28107] kernel_misc_reclaimable:0 [ 674.472831][T28107] free:1849126 free_pcp:6368 free_cma:0 [ 674.592988][T28107] Node 0 active_anon:47764kB inactive_anon:24kB active_file:47328kB inactive_file:36568kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:121996kB dirty:1040kB writeback:0kB shmem:6776kB kernel_stack:4752kB pagetables:18688kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 674.655421][T28107] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 674.715012][T28107] lowmem_reserve[]: 0 2879 7857 7857 [ 674.757440][T28125] netlink: 72 bytes leftover after parsing attributes in process `syz.0.7842'. [ 674.790613][T28107] Node 0 DMA32 free:2947876kB boost:0kB min:4128kB low:7052kB high:9976kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2948128kB mlocked:0kB bounce:0kB free_pcp:252kB local_pcp:0kB free_cma:0kB [ 674.797059][T28125] netlink: 32 bytes leftover after parsing attributes in process `syz.0.7842'. [ 674.895514][T28107] lowmem_reserve[]: 0 0 4978 4978 [ 674.949940][T28107] Node 0 Normal free:4433804kB boost:0kB min:7188kB low:12284kB high:17380kB reserved_highatomic:0KB free_highatomic:0KB active_anon:54956kB inactive_anon:24kB active_file:47328kB inactive_file:36568kB unevictable:0kB writepending:1040kB zspages:0kB present:5242880kB managed:5098240kB mlocked:0kB bounce:0kB free_pcp:19132kB local_pcp:5096kB free_cma:0kB [ 675.048564][T28107] lowmem_reserve[]: 0 0 0 0 [ 675.085391][T28107] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 675.168471][T28161] loop8: detected capacity change from 0 to 128 [ 675.185642][T28107] Node 0 DMA32: 7*4kB (M) 3*8kB (M) 3*16kB (M) 2*32kB (M) 4*64kB (M) 3*128kB (M) 4*256kB (M) 4*512kB (M) 3*1024kB (M) 4*2048kB (M) 716*4096kB (UM) = 2947876kB [ 675.272826][T28107] Node 0 Normal: 3941*4kB (UM) 4081*8kB (UM) 1501*16kB (UME) 1411*32kB (UME) 940*64kB (UME) 696*128kB (UME) 376*256kB (UME) 268*512kB (UM) 227*1024kB (UME) 108*2048kB (UME) 849*4096kB (UM) = 4431436kB [ 675.340382][T28174] loop8: detected capacity change from 0 to 512 [ 675.353542][T28107] Node 0 hugepages_total=4 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 675.363360][T28167] loop0: detected capacity change from 0 to 512 [ 675.400054][T28107] 26756 total pagecache pages [ 675.408390][T28107] 28 pages in swap cache [ 675.412720][T28107] Free swap = 124420kB [ 675.417007][T28107] Total swap = 124996kB [ 675.421188][T28107] 2097051 pages RAM [ 675.425057][T28107] 0 pages HighMem/MovableOnly [ 675.429841][T28107] 81619 pages reserved [ 675.532658][T28184] bond0: entered promiscuous mode [ 675.545846][T28184] bridge_slave_1: entered promiscuous mode [ 675.690940][T28184] batadv0: entered promiscuous mode [ 675.872758][T28167] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 675.890768][T28184] hsr1: Slave B (batadv0) is not up; please bring it up to get a fully working HSR network [ 676.070090][T28167] ext4 filesystem being mounted at /470/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 676.124885][T28184] 8021q: adding VLAN 0 to HW filter on device hsr1 [ 676.231159][T28184] bond0: left promiscuous mode [ 676.236020][T28184] bridge_slave_1: left promiscuous mode [ 676.251223][T20534] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 676.316441][T28184] batadv0: left promiscuous mode [ 677.040030][ T28] kauditd_printk_skb: 5872 callbacks suppressed [ 677.040049][ T28] audit: type=1400 audit(1775498114.109:282342): avc: denied { read write } for pid=28208 comm="syz.0.7863" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 677.129747][T28217] loop0: detected capacity change from 0 to 512 [ 677.141543][T28218] netlink: 20 bytes leftover after parsing attributes in process `syz.2.7871'. [ 677.146898][ T28] audit: type=1400 audit(1775498114.109:282343): avc: denied { open } for pid=28208 comm="syz.0.7863" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 677.211866][T28217] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended [ 677.292202][T28217] EXT4-fs error (device loop0): ext4_mb_generate_buddy:1317: group 0, block bitmap and bg descriptor inconsistent: 48 vs 41 free clusters [ 677.307373][ C0] EXT4-fs (loop0): error count since last fsck: 1 [ 677.313899][ C0] EXT4-fs (loop0): initial error at time 1775498114: ext4_mb_generate_buddy:1317 [ 677.323093][ C0] EXT4-fs (loop0): last error at time 1775498114: ext4_mb_generate_buddy:1317 [ 677.384825][T28217] Quota error (device loop0): write_blk: dquota write failed [ 677.408853][ T28] audit: type=1400 audit(1775498114.497:282344): avc: denied { create } for pid=28233 comm="syz.8.7875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 677.429070][T28217] Quota error (device loop0): find_free_dqentry: Can't write quota data block 5 [ 677.430971][T28234] xt_hashlimit: size too large, truncated to 1048576 [ 677.449467][ T28] audit: type=1400 audit(1775498114.518:282345): avc: denied { connect } for pid=28233 comm="syz.8.7875" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 677.488180][T28217] Quota error (device loop0): write_blk: dquota write failed [ 677.488757][ T28] audit: type=1400 audit(1775498114.518:282346): avc: denied { setopt } for pid=28233 comm="syz.8.7875" laddr=fe80::a8aa:aaff:feaa:aa16 lport=60 faddr=ff02::1 fport=20131 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 677.555436][T28217] Quota error (device loop0): qtree_write_dquot: Error -28 occurred while creating quota [ 677.564993][ T28] audit: type=1400 audit(1775498114.623:282347): avc: denied { write } for pid=28233 comm="syz.8.7875" laddr=fe80::a8aa:aaff:feaa:aa16 lport=60 faddr=ff02::1 fport=20131 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 677.612372][T28217] EXT4-fs error (device loop0): ext4_acquire_dquot:7026: comm syz.0.7870: Failed to acquire dquot type 1 [ 677.669671][T28217] loop0: lost filesystem error report for type 5 error -28 [ 677.686710][T28217] EXT4-fs (loop0): 1 truncate cleaned up [ 677.724131][T28217] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 677.821738][T20534] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 678.092591][T28280] loop7: detected capacity change from 0 to 2048 [ 678.464456][T28293] loop0: detected capacity change from 0 to 256 [ 678.659960][ C1] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 679.004610][T28301] xt_hashlimit: size too large, truncated to 1048576 [ 679.961711][T28389] loop7: detected capacity change from 0 to 128 [ 680.002981][T28389] FAT-fs (loop7): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 680.105453][T28395] 9p: Bad value for 'rfdno' [ 680.394961][T28389] netlink: 8 bytes leftover after parsing attributes in process `syz.7.7912'. [ 680.404059][T28389] netlink: 4 bytes leftover after parsing attributes in process `syz.7.7912'. [ 680.413314][T28389] netlink: 'syz.7.7912': attribute type 13 has an invalid length. [ 680.421467][T28389] netlink: 'syz.7.7912': attribute type 14 has an invalid length. [ 680.625103][T28440] loop0: detected capacity change from 0 to 2048 [ 680.647916][T28446] netlink: 56 bytes leftover after parsing attributes in process `syz.2.7926'. [ 680.662512][T28446] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7926'. [ 680.687388][T28140] Alternate GPT is invalid, using primary GPT. [ 680.702081][T28454] loop8: detected capacity change from 0 to 512 [ 680.707986][T28140] loop0: p2 p3 p7 [ 680.737105][T28454] EXT4-fs: Ignoring removed mblk_io_submit option [ 680.763344][T28440] Alternate GPT is invalid, using primary GPT. [ 680.789423][T28440] loop0: p2 p3 p7 [ 680.961396][T28140] udevd[28140]: inotify_add_watch(7, /dev/loop0p3, 10) failed: No such file or directory [ 680.972851][T27333] udevd[27333]: inotify_add_watch(7, /dev/loop0p7, 10) failed: No such file or directory [ 680.984948][T28464] udevd[28464]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 680.995353][T18383] FAT-fs (loop7): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 681.038461][T28464] udevd[28464]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 681.049097][T27333] udevd[27333]: inotify_add_watch(7, /dev/loop0p3, 10) failed: No such file or directory [ 681.066642][T28481] udevd[28481]: inotify_add_watch(7, /dev/loop0p7, 10) failed: No such file or directory [ 681.115535][T28489] loop7: detected capacity change from 0 to 1024 [ 681.149887][T28489] EXT4-fs: Ignoring removed i_version option [ 681.185285][T28489] EXT4-fs: Ignoring removed bh option [ 681.213777][T28489] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 681.236043][T28489] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (56422!=35945) [ 681.257017][T28489] EXT4-fs (loop7): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 681.285170][T28489] EXT4-fs (loop7): orphan cleanup on readonly fs [ 681.306068][T28489] EXT4-fs warning (device loop7): ext4_enable_quotas:7261: Failed to enable quota tracking (type=0, err=-117, ino=3). Please run e2fsck to fix. [ 681.325886][T28501] dummy0: entered promiscuous mode [ 681.341163][T28489] EXT4-fs (loop7): Cannot turn on quotas: error -117 [ 681.346634][T28501] netdevsim netdevsim2 netdevsim0: entered promiscuous mode [ 681.348260][T28489] EXT4-fs error (device loop7): ext4_orphan_get:1423: comm syz.7.7935: bad orphan inode 11 [ 681.365503][T28489] loop7: lost filesystem error report for type 5 error -117 [ 681.373618][T28489] ext4_test_bit(bit=10, block=1) = 0 [ 681.381071][ C1] EXT4-fs (loop7): error count since last fsck: 1 [ 681.381098][ C1] EXT4-fs (loop7): initial error at time 1775498118: ext4_orphan_get:1423 [ 681.381124][ C1] EXT4-fs (loop7): last error at time 1775498118: ext4_orphan_get:1423 [ 681.413416][T28501] hsr1: Slave B (netdevsim0) is not up; please bring it up to get a fully working HSR network [ 681.418663][T28489] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 681.435216][T28501] hsr1: entered allmulticast mode [ 681.456067][T28501] dummy0: entered allmulticast mode [ 681.477222][T28501] netdevsim netdevsim2 netdevsim0: entered allmulticast mode [ 681.487624][T15462] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 681.545241][T28518] gretap0: entered promiscuous mode [ 681.576848][T28518] macsec1: entered promiscuous mode [ 681.583658][T28518] gretap0: left promiscuous mode [ 681.627647][T28528] loop8: detected capacity change from 0 to 128 [ 682.030883][T28564] netlink: 8 bytes leftover after parsing attributes in process `syz.8.7943'. [ 682.042628][T28564] netlink: 4 bytes leftover after parsing attributes in process `syz.8.7943'. [ 682.052526][T28564] netlink: 'syz.8.7943': attribute type 13 has an invalid length. [ 682.060891][T28564] netlink: 'syz.8.7943': attribute type 14 has an invalid length. [ 682.378963][T28584] xt_hashlimit: size too large, truncated to 1048576 [ 682.511165][T28593] netlink: 16 bytes leftover after parsing attributes in process `syz.8.7959'. [ 682.558210][ T28] kauditd_printk_skb: 236 callbacks suppressed [ 682.558227][ T28] audit: type=1400 audit(1775498119.915:282583): avc: denied { create } for pid=28594 comm="syz.8.7960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 682.608881][ T28] audit: type=1400 audit(1775498119.946:282584): avc: denied { read } for pid=28594 comm="syz.8.7960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 682.672961][ T28] audit: type=1400 audit(1775498119.988:282585): avc: denied { write } for pid=28594 comm="syz.8.7960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 682.759735][T28603] loop0: detected capacity change from 0 to 256 [ 682.821244][T28603] FAT-fs (loop0): codepage cp852 not found [ 682.851047][ T28] audit: type=1400 audit(1775498120.219:282586): avc: denied { mounton } for pid=28602 comm="syz.0.7962" path="/490/file0" dev="tmpfs" ino=2572 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 683.206615][ T28] audit: type=1400 audit(1775498120.587:282587): avc: denied { mount } for pid=28612 comm="syz.0.7966" name="/" dev="hugetlbfs" ino=91945 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 683.263411][ T28] audit: type=1400 audit(1775498120.639:282588): avc: denied { unmount } for pid=20534 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 683.332027][ T28] audit: type=1400 audit(1775498120.723:282589): avc: denied { mac_admin } for pid=28630 comm="syz.2.7974" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 683.332357][T28631] SELinux: Context #! ./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 683.429231][ T28] audit: type=1400 audit(1775498120.818:282590): avc: denied { create } for pid=28630 comm="syz.2.7974" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon=2321202E2F6367726F75702F66696C65306161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616 [ 683.521997][ T28] audit: type=1400 audit(1775498120.818:282591): avc: denied { associate } for pid=28630 comm="syz.2.7974" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon=2321202E2F6367726F75702F66696C65306161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616 [ 683.660431][ T28] audit: type=1400 audit(1775498121.049:282592): avc: denied { unlink } for pid=20593 comm="syz-executor" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=3202 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon=2321202E2F6367726F75702F66696C653061616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161 [ 684.229410][T28645] chnl_net:caif_netlink_parms(): no params data found [ 684.461210][T28645] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.468551][T28645] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.476230][T28645] bridge_slave_0: entered allmulticast mode [ 684.479097][T28687] program syz.8.7992 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 684.483055][T28645] bridge_slave_0: entered promiscuous mode [ 684.498588][T28645] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.505727][T28645] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.513246][T28645] bridge_slave_1: entered allmulticast mode [ 684.519899][T28645] bridge_slave_1: entered promiscuous mode [ 684.538220][T28645] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 684.556312][T28645] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 684.625560][T28645] team0: Port device team_slave_0 added [ 684.644986][T28645] team0: Port device team_slave_1 added [ 684.649057][T28695] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28695 comm=syz.8.7995 [ 684.689407][T28645] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 684.696391][T28645] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 684.770718][T28645] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 684.810779][T28645] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 684.817912][T28645] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 684.886424][T28645] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 685.049201][T28645] hsr_slave_0: entered promiscuous mode [ 685.057809][T28645] hsr_slave_1: entered promiscuous mode [ 685.071190][T28645] debugfs: 'hsr0' already exists in 'hsr' [ 685.082556][T28645] Cannot create hsr debugfs directory [ 685.163158][T28732] loop8: detected capacity change from 0 to 128 [ 685.628258][T28764] loop0: detected capacity change from 0 to 512 [ 685.643948][T28764] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 685.656701][T28764] ext4 filesystem being mounted at /505/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 685.852423][T20534] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 686.229948][T28794] loop1: detected capacity change from 0 to 1024 [ 686.299279][T28794] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 686.339756][T20899] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 686.416697][T28812] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8033'. [ 686.537971][T18381] bond0 (unregistering): Released all slaves [ 686.545441][T18381] bond1 (unregistering): Released all slaves [ 686.553976][T18381] bond2 (unregistering): Released all slaves [ 686.562379][T18381] bond3 (unregistering): Released all slaves [ 686.617143][T18381] hsr_slave_0: left promiscuous mode [ 686.628768][T18381] veth1_vlan: left allmulticast mode [ 686.649334][T18381] team0 (unregistering): Port device macvlan1 removed [ 686.805281][T28836] loop0: detected capacity change from 0 to 512 [ 686.851340][T28836] FAT-fs (loop0): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 686.976881][T28645] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 687.012080][T28645] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 687.032622][T28855] loop0: detected capacity change from 0 to 2048 [ 687.036229][T18381] IPVS: stop unused estimator thread 0... [ 687.045195][T28645] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 687.083266][T28855] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 687.098947][T28645] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 687.119764][T28855] ext4 filesystem being mounted at /516/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 687.247987][T20534] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 687.265917][T28645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 687.324816][T28645] 8021q: adding VLAN 0 to HW filter on device team0 [ 687.351455][T18383] bridge0: port 1(bridge_slave_0) entered blocking state [ 687.358777][T18383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 687.381001][ T28] kauditd_printk_skb: 66 callbacks suppressed [ 687.381022][ T28] audit: type=1326 audit(1775498124.976:282659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28877 comm="syz.1.8050" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f978bc819 code=0x7fc00000 [ 687.389944][T28886] loop0: detected capacity change from 0 to 2048 [ 687.414732][T28645] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 687.459187][T28645] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 687.512029][ T28] audit: type=1400 audit(1775498125.112:282660): avc: denied { ioctl } for pid=28892 comm="syz.8.8056" path="/dev/sg0" dev="devtmpfs" ino=137 ioctlcmd=0x2285 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 687.559739][T18383] bridge0: port 2(bridge_slave_1) entered blocking state [ 687.566943][T18383] bridge0: port 2(bridge_slave_1) entered forwarding state [ 687.579345][T28886] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 687.607145][T28886] ext4 filesystem being mounted at /517/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 687.619709][T28886] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz.0.8051: bg 0: block 345: padding at end of block bitmap is not set [ 687.686806][ T28] audit: type=1400 audit(1775498125.291:282661): avc: denied { remount } for pid=28883 comm="syz.0.8051" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 687.723575][T28645] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 687.746376][T28886] EXT4-fs (loop0): Remounting filesystem read-only [ 687.833296][T20534] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 688.046143][ T28] audit: type=1326 audit(1775498125.669:282662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28877 comm="syz.1.8050" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f978bc819 code=0x7fc00000 [ 688.151616][T28645] veth0_vlan: entered promiscuous mode [ 688.171356][T28645] veth1_vlan: entered promiscuous mode [ 688.219468][T28645] veth0_macvtap: entered promiscuous mode [ 688.268654][T28645] veth1_macvtap: entered promiscuous mode [ 688.291615][T28645] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 688.319520][T28645] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 688.384921][T19617] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 688.393848][T19617] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 688.509122][ T50] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 688.537256][ T50] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 688.602820][ T28] audit: type=1400 audit(1775498126.257:282663): avc: denied { mounton } for pid=28645 comm="syz-executor" path="/root/syzkaller.bbcCKk/syz-tmp" dev="sda1" ino=2085 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 688.684745][ T28] audit: type=1400 audit(1775498126.257:282664): avc: denied { mounton } for pid=28645 comm="syz-executor" path="/root/syzkaller.bbcCKk/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 688.744739][T28981] netlink: 176 bytes leftover after parsing attributes in process `syz.5.7977'. [ 688.808615][ T28] audit: type=1400 audit(1775498126.257:282665): avc: denied { mounton } for pid=28645 comm="syz-executor" path="/root/syzkaller.bbcCKk/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=92707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 688.814952][T28987] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8070'. [ 688.917688][ T28] audit: type=1400 audit(1775498126.309:282666): avc: denied { mounton } for pid=28645 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 688.930936][T28987] netlink: 12 bytes leftover after parsing attributes in process `syz.0.8070'. [ 688.989542][ T28] audit: type=1400 audit(1775498126.309:282667): avc: denied { mount } for pid=28645 comm="syz-executor" name="/" dev="gadgetfs" ino=4730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 689.051681][ T28] audit: type=1400 audit(1775498126.613:282668): avc: denied { map } for pid=28993 comm="syz.5.8071" path="socket:[92746]" dev="sockfs" ino=92746 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 689.120600][T29012] loop0: detected capacity change from 0 to 128 [ 690.550041][T29130] netlink: 'syz.1.8107': attribute type 10 has an invalid length. [ 690.686775][T29130] team0: Port device netdevsim1 added [ 691.465552][T29192] syz.1.8121 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 692.580583][ T28] kauditd_printk_skb: 27 callbacks suppressed [ 692.580603][ T28] audit: type=1400 audit(1775498130.435:282696): avc: denied { watch watch_reads } for pid=29265 comm="syz.2.8130" path="/640" dev="tmpfs" ino=3366 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 692.764140][ T28] audit: type=1400 audit(1775498130.624:282697): avc: denied { bind } for pid=29285 comm="syz.2.8135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 692.933648][ T28] audit: type=1400 audit(1775498130.782:282698): avc: denied { create } for pid=29298 comm="syz.5.8139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 693.018058][ T28] audit: type=1400 audit(1775498130.782:282699): avc: denied { write } for pid=29298 comm="syz.5.8139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 693.071764][T29312] netlink: 40 bytes leftover after parsing attributes in process `syz.1.8141'. [ 693.090617][T29312] netlink: 48 bytes leftover after parsing attributes in process `syz.1.8141'. [ 693.165881][ T28] audit: type=1400 audit(1775498130.782:282700): avc: denied { read } for pid=29298 comm="syz.5.8139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 693.266983][ T28] audit: type=1400 audit(1775498131.149:282701): avc: denied { mounton } for pid=29322 comm="syz.5.8145" path=2F31382FE91F7189591E9233614B dev="tmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 693.506858][ T28] audit: type=1400 audit(1775498131.401:282702): avc: denied { ioctl } for pid=29347 comm="syz.0.8151" path="socket:[94266]" dev="sockfs" ino=94266 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 694.197849][T29422] syz.2.8167: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 694.238660][T29422] CPU: 1 UID: 0 PID: 29422 Comm: syz.2.8167 Tainted: G W syzkaller #0 PREEMPT(full) [ 694.238702][T29422] Tainted: [W]=WARN [ 694.238711][T29422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 694.238725][T29422] Call Trace: [ 694.238734][T29422] [ 694.238744][T29422] __dump_stack+0x1d/0x30 [ 694.238834][T29422] dump_stack_lvl+0x95/0xd0 [ 694.238862][T29422] dump_stack+0x15/0x1b [ 694.238888][T29422] warn_alloc+0x145/0x1c0 [ 694.238989][T29422] ? __schedule+0x93c/0xd40 [ 694.239026][T29422] ? __rcu_read_unlock+0x4e/0x70 [ 694.239051][T29422] __vmalloc_node_range_noprof+0xa0/0x12b0 [ 694.239146][T29422] ? __futex_wait+0x1fd/0x260 [ 694.239171][T29422] ? __pfx_futex_wake_mark+0x10/0x10 [ 694.239195][T29422] ? __rcu_read_unlock+0x4e/0x70 [ 694.239221][T29422] ? avc_has_perm_noaudit+0xab/0x130 [ 694.239332][T29422] ? should_fail_ex+0x30/0x280 [ 694.239361][T29422] ? xskq_create+0x36/0xe0 [ 694.239446][T29422] vmalloc_user_noprof+0x7d/0xb0 [ 694.239476][T29422] ? xskq_create+0x80/0xe0 [ 694.239616][T29422] xskq_create+0x80/0xe0 [ 694.239646][T29422] xsk_init_queue+0x70/0xb0 [ 694.239672][T29422] xsk_setsockopt+0x477/0x640 [ 694.239771][T29422] ? __pfx_xsk_setsockopt+0x10/0x10 [ 694.239799][T29422] __sys_setsockopt+0x184/0x200 [ 694.239844][T29422] __x64_sys_setsockopt+0x64/0x80 [ 694.239894][T29422] x64_sys_call+0x2327/0x3020 [ 694.239924][T29422] do_syscall_64+0x12c/0x370 [ 694.239987][T29422] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 694.240009][T29422] RIP: 0033:0x7fec5fadc819 [ 694.240026][T29422] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 694.240072][T29422] RSP: 002b:00007fec5e52f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 694.240161][T29422] RAX: ffffffffffffffda RBX: 00007fec5fd55fa0 RCX: 00007fec5fadc819 [ 694.240179][T29422] RDX: 0000000000000002 RSI: 000000000000011b RDI: 0000000000000004 [ 694.240217][T29422] RBP: 00007fec5fb72c91 R08: 0000000000000004 R09: 0000000000000000 [ 694.240232][T29422] R10: 0000200000000900 R11: 0000000000000246 R12: 0000000000000000 [ 694.240292][T29422] R13: 00007fec5fd56038 R14: 00007fec5fd55fa0 R15: 00007ffe33f3c388 [ 694.240362][T29422] [ 694.240371][T29422] Mem-Info: [ 694.483242][T29422] active_anon:85303 inactive_anon:3243 isolated_anon:0 [ 694.483242][T29422] active_file:20271 inactive_file:7966 isolated_file:0 [ 694.483242][T29422] unevictable:3015 dirty:90 writeback:0 [ 694.483242][T29422] slab_reclaimable:4166 slab_unreclaimable:32161 [ 694.483242][T29422] mapped:41022 shmem:80065 pagetables:4864 [ 694.483242][T29422] sec_pagetables:0 bounce:0 [ 694.483242][T29422] kernel_misc_reclaimable:0 [ 694.483242][T29422] free:1744555 free_pcp:24787 free_cma:0 [ 694.634216][T29422] Node 0 active_anon:352812kB inactive_anon:12972kB active_file:81084kB inactive_file:31864kB unevictable:112kB isolated(anon):0kB isolated(file):0kB mapped:152604kB dirty:360kB writeback:0kB shmem:319448kB kernel_stack:4784kB pagetables:19340kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 694.719583][T29422] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 694.870739][T29422] lowmem_reserve[]: 0 2879 7857 7857 [ 694.876190][T29422] Node 0 DMA32 free:2947876kB boost:0kB min:4128kB low:7052kB high:9976kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2948128kB mlocked:0kB bounce:0kB free_pcp:252kB local_pcp:0kB free_cma:0kB [ 694.966319][T29422] lowmem_reserve[]: 0 0 4978 4978 [ 694.971555][T29422] Node 0 Normal free:4009880kB boost:0kB min:7188kB low:12284kB high:17380kB reserved_highatomic:0KB free_highatomic:0KB active_anon:340748kB inactive_anon:12972kB active_file:81084kB inactive_file:31864kB unevictable:112kB writepending:360kB zspages:0kB present:5242880kB managed:5098240kB mlocked:112kB bounce:0kB free_pcp:117072kB local_pcp:41224kB free_cma:0kB [ 695.116916][T29422] lowmem_reserve[]: 0 0 0 0 [ 695.129660][T29467] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 695.139950][T29422] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 695.201310][T29422] Node 0 DMA32: 7*4kB (M) 3*8kB (M) 3*16kB (M) 2*32kB (M) 4*64kB (M) 3*128kB (M) 4*256kB (M) 4*512kB (M) 3*1024kB (M) 4*2048kB (M) 716*4096kB (UM) = 2947876kB [ 695.220729][T29422] Node 0 Normal: 2180*4kB (U) 2115*8kB (UM) 374*16kB (UE) 387*32kB (UE) 424*64kB (UME) 313*128kB (UE) 257*256kB (UE) 226*512kB (UM) 222*1024kB (UME) 110*2048kB (UME) 797*4096kB (UM) = 4009832kB [ 695.258566][T29422] Node 0 hugepages_total=4 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 695.300788][T29422] 108961 total pagecache pages [ 695.322212][T29422] 50 pages in swap cache [ 695.331647][T29422] Free swap = 103920kB [ 695.340051][T29422] Total swap = 124996kB [ 695.351066][T29422] 2097051 pages RAM [ 695.386977][T29422] 0 pages HighMem/MovableOnly [ 695.402080][T29422] 81619 pages reserved [ 695.733150][T29503] netlink: 'syz.0.8188': attribute type 1 has an invalid length. [ 695.840238][T29503] 8021q: adding VLAN 0 to HW filter on device bond0 [ 695.990243][T29518] xt_hashlimit: size too large, truncated to 1048576 [ 696.053592][T29531] netlink: 'syz.0.8195': attribute type 1 has an invalid length. [ 696.141267][T29535] bond1: (slave geneve2): making interface the new active one [ 696.216223][T29535] bond1: (slave geneve2): Enslaving as an active interface with an up link [ 696.280063][T19617] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 20004 - 0 [ 696.316648][T19617] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 20004 - 0 [ 696.355357][T18400] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 20004 - 0 [ 696.403674][T18400] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 20004 - 0 [ 696.582995][ T28] audit: type=1400 audit(1775498134.635:282703): avc: denied { mount } for pid=29574 comm="syz.2.8203" name="/" dev="configfs" ino=1130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 696.670009][ T28] audit: type=1400 audit(1775498134.677:282704): avc: denied { search } for pid=29574 comm="syz.2.8203" name="/" dev="configfs" ino=1130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 696.727077][ T28] audit: type=1400 audit(1775498134.688:282705): avc: denied { search } for pid=29574 comm="syz.2.8203" name="/" dev="configfs" ino=1130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 697.835780][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 697.835798][ T28] audit: type=1400 audit(1775498135.947:282710): avc: denied { ioctl } for pid=29637 comm="syz.0.8219" path=2F7365637265746D656D202864656C6574656429 dev="secretmem" ino=95375 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 697.955394][T29653] 9p: Bad value for 'wfdno' [ 697.986255][ T28] audit: type=1400 audit(1775498136.010:282711): avc: denied { create } for pid=29643 comm="syz.2.8221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 698.054324][ T28] audit: type=1400 audit(1775498136.010:282712): avc: denied { bind } for pid=29643 comm="syz.2.8221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 698.135383][ T28] audit: type=1400 audit(1775498136.010:282713): avc: denied { listen } for pid=29643 comm="syz.2.8221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 698.169372][ T28] audit: type=1400 audit(1775498136.010:282714): avc: denied { connect } for pid=29643 comm="syz.2.8221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 698.291555][T29687] netlink: 'syz.8.8231': attribute type 1 has an invalid length. [ 698.313816][T29687] 8021q: adding VLAN 0 to HW filter on device bond3 [ 698.349414][T29687] bond3: (slave veth5): Enslaving as an active interface with a down link [ 698.402546][ T28] audit: type=1400 audit(1775498136.546:282715): avc: denied { mount } for pid=29691 comm="syz.5.8233" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 698.784291][ T28] audit: type=1400 audit(1775498136.945:282716): avc: denied { listen } for pid=29739 comm="syz.8.8242" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 699.393133][ T28] audit: type=1326 audit(1775498137.585:282717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29793 comm="syz.0.8259" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fdd9b7bc819 code=0x0 [ 699.466457][ T28] audit: type=1400 audit(1775498137.659:282718): avc: denied { create } for pid=29798 comm="syz.8.8260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 699.508664][T29799] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8260'. [ 699.517896][ T28] audit: type=1400 audit(1775498137.690:282719): avc: denied { setopt } for pid=29798 comm="syz.8.8260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 699.852159][T29815] netlink: 8 bytes leftover after parsing attributes in process `syz.0.8259'. [ 699.902013][T29815] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8259'. [ 699.954350][T29829] netlink: 164 bytes leftover after parsing attributes in process `syz.0.8259'. [ 699.963671][T29815] netlink: 'syz.0.8259': attribute type 13 has an invalid length. [ 699.973591][T29815] netlink: 'syz.0.8259': attribute type 14 has an invalid length. [ 700.604233][T29859] netlink: 'syz.5.8281': attribute type 4 has an invalid length. [ 700.644205][T29859] netlink: 'syz.5.8281': attribute type 4 has an invalid length. [ 700.775992][T29866] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 701.006019][T29874] netlink: 'syz.2.8288': attribute type 10 has an invalid length. [ 701.586605][T29913] netlink: 36 bytes leftover after parsing attributes in process `syz.2.8304'. [ 701.606827][T29913] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8304'. [ 702.706514][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 702.706538][ T28] audit: type=1400 audit(1775498141.061:282731): avc: denied { bind } for pid=29952 comm="syz.8.8320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 702.772675][ T28] audit: type=1400 audit(1775498141.134:282732): avc: denied { create } for pid=29960 comm="syz.0.8324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 702.826471][ T28] audit: type=1400 audit(1775498141.176:282733): avc: denied { read } for pid=29960 comm="syz.0.8324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 702.858364][T29966] netlink: 8 bytes leftover after parsing attributes in process `syz.0.8324'. [ 702.884042][ T28] audit: type=1400 audit(1775498141.176:282734): avc: denied { create } for pid=29962 comm="syz.1.8325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 702.933819][ T28] audit: type=1400 audit(1775498141.218:282735): avc: denied { write } for pid=29960 comm="syz.0.8324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 702.991480][ T28] audit: type=1400 audit(1775498141.281:282736): avc: denied { getopt } for pid=29964 comm="syz.1.8326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 703.559618][ T28] audit: type=1400 audit(1775498141.964:282737): avc: denied { read } for pid=29985 comm="syz.0.8335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 703.621521][ T28] audit: type=1400 audit(1775498142.016:282738): avc: denied { setopt } for pid=29985 comm="syz.0.8335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 703.702184][ T28] audit: type=1400 audit(1775498142.069:282739): avc: denied { firmware_load } for pid=29977 comm="syz.2.8331" path="/lib/firmware/regulatory.db" dev="sda1" ino=448 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 703.770845][T30002] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth0_to_bridge, syncid = 0, id = 0 [ 704.334620][T30017] netlink: 'syz.8.8342': attribute type 1 has an invalid length. [ 704.394460][T30017] bond4: entered promiscuous mode [ 704.421619][T30017] 8021q: adding VLAN 0 to HW filter on device bond4 [ 704.479900][T30017] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8342'. [ 704.489548][T30017] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8342'. [ 704.587883][T30017] bond4: (slave bridge0): making interface the new active one [ 704.613158][T30017] bridge0: entered promiscuous mode [ 704.630455][T30017] bond4: (slave bridge0): Enslaving as an active interface with an up link [ 704.860695][ T28] audit: type=1400 audit(1775498143.318:282740): avc: denied { ioctl } for pid=30039 comm="syz.8.8349" path="socket:[96003]" dev="sockfs" ino=96003 ioctlcmd=0x8922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 705.454856][T30074] netlink: 16 bytes leftover after parsing attributes in process `syz.2.8360'. [ 705.675800][T30093] netlink: 14 bytes leftover after parsing attributes in process `syz.1.8366'. [ 705.736613][T30099] netlink: 'syz.0.8369': attribute type 1 has an invalid length. [ 705.772675][T30099] netlink: 'syz.0.8369': attribute type 4 has an invalid length. [ 705.784482][T30099] netlink: 9462 bytes leftover after parsing attributes in process `syz.0.8369'. [ 705.919871][T30110] netlink: 'syz.8.8373': attribute type 4 has an invalid length. [ 705.963554][T30110] netlink: 'syz.8.8373': attribute type 4 has an invalid length. [ 706.003319][T30114] netlink: 12 bytes leftover after parsing attributes in process `syz.0.8374'. [ 706.027853][T30114] bridge2: port 1(veth0_to_bond) entered blocking state [ 706.041603][T30114] bridge2: port 1(veth0_to_bond) entered disabled state [ 706.059091][T30114] veth0_to_bond: entered allmulticast mode [ 706.080516][T30114] veth0_to_bond: entered promiscuous mode [ 706.102320][T30116] macsec2: entered promiscuous mode [ 706.114156][T30116] geneve1: entered promiscuous mode [ 706.130159][T30116] macsec2: entered allmulticast mode [ 706.143950][T30116] geneve1: entered allmulticast mode [ 706.705231][T30141] VFS: Mount too revealing [ 706.854238][T30149] ================================================================== [ 706.862409][T30149] BUG: KCSAN: data-race in shmem_file_splice_read / shmem_file_splice_read [ 706.871045][T30149] [ 706.873401][T30149] write to 0xffff888104c50d68 of 8 bytes by task 30148 on cpu 1: [ 706.881130][T30149] shmem_file_splice_read+0x470/0x600 [ 706.886547][T30149] splice_direct_to_actor+0x26e/0x670 [ 706.891957][T30149] do_splice_direct+0x119/0x1a0 [ 706.896846][T30149] do_sendfile+0x382/0x650 [ 706.901292][T30149] __x64_sys_sendfile64+0x105/0x150 [ 706.906618][T30149] x64_sys_call+0x2dc4/0x3020 [ 706.911320][T30149] do_syscall_64+0x12c/0x370 [ 706.915925][T30149] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 706.921874][T30149] [ 706.924207][T30149] write to 0xffff888104c50d68 of 8 bytes by task 30149 on cpu 0: [ 706.931930][T30149] shmem_file_splice_read+0x470/0x600 [ 706.937331][T30149] splice_direct_to_actor+0x26e/0x670 [ 706.942826][T30149] do_splice_direct+0x119/0x1a0 [ 706.947693][T30149] do_sendfile+0x382/0x650 [ 706.952121][T30149] __x64_sys_sendfile64+0x105/0x150 [ 706.957415][T30149] x64_sys_call+0x2dc4/0x3020 [ 706.962108][T30149] do_syscall_64+0x12c/0x370 [ 706.966710][T30149] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 706.972614][T30149] [ 706.974939][T30149] value changed: 0x00000000000004f7 -> 0x00000000000004fa [ 706.982223][T30149] [ 706.984568][T30149] Reported by Kernel Concurrency Sanitizer on: [ 706.990837][T30149] CPU: 0 UID: 0 PID: 30149 Comm: syz.5.8387 Tainted: G W syzkaller #0 PREEMPT(full) [ 707.001877][T30149] Tainted: [W]=WARN [ 707.005688][T30149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 707.015750][T30149] ==================================================================