last executing test programs: 35m45.663232485s ago: executing program 32 (id=379): r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x26}}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x4e21, @empty}], 0x10) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$XFS_IOC_PATH_TO_FSHANDLE(r0, 0xc0385868, &(0x7f0000000280)={r0, &(0x7f0000000180)='cgroup.subtree_control\x00', 0xa0402, &(0x7f00000001c0)={@align=0xffffffffffffff80, {0x7, 0x8, 0x6, 0x8}}, 0xfffffff8, &(0x7f0000000200)={@_ha_fsid}, &(0x7f0000000240)=0x6}) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90224fc602f0000000a0c0100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 35m39.695494192s ago: executing program 33 (id=425): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, 0x0, 0x2a, 0x0, 0x1}, 0x28) unshare(0x60400) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x11000, 0x0, 0x2, 0x80000011, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ff0000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x5ab2, &(0x7f0000000040)={0x0, 0x100c8a2, 0xc000, 0x1, 0x18}) r1 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffd, {0x0, 0x0, 0x0, r2, {0x0, 0xfff3}, {0xffff, 0xffff}, {0xffe0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x4c840) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@newtfilter={0x44, 0x2c, 0xf3f, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0xb, 0xfff3}, {0x0, 0xfff3}, {0xd, 0x300}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_IPV4_DST={0x8, 0xc, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_FLOWER_KEY_IPV4_DST_MASK={0x8, 0xd, 0xffffff00}]}}]}, 0x44}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000500)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x100}, 0x204, 0x0, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xa, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) fstatfs(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x13, 0x21cd, 0x0, &(0x7f0000000680)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x76, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000280)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=')'], 0x50) io_uring_enter(r0, 0x221d, 0xcf75, 0x37, 0x0, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBMETA(r5, 0x4b3d, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000140)=ANY=[@ANYBLOB="e0000001ac1414"], 0x1c) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8c1}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xf9, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc0000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x528, 0x0, @perf_bp={0x0, 0x1}, 0x419, 0x40000000, 0x0, 0x4, 0x103fb, 0x1ff, 0x1ff, 0x0, 0x0, 0x0, 0x400000000000007}, 0x0, 0x1, 0xffffffffffffffff, 0xb) 31m40.622849523s ago: executing program 34 (id=2567): socket$can_raw(0x1d, 0x3, 0x1) r0 = socket(0x2, 0x80805, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x21, &(0x7f0000000140)=[@in={0x2, 0x0, @private=0xa010100}]}, &(0x7f0000000180)=0x10) socket(0x40000000015, 0x5, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCL_SETVESABLANK(r2, 0x560e, &(0x7f0000000140)) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x80002, 0x100) openat2(r3, &(0x7f0000000400)='./file0\x00', &(0x7f0000019440)={0x48000, 0x104, 0x1}, 0x18) unshare(0x64000600) perf_event_open(&(0x7f0000019480)={0x2, 0x80, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x510, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x106a00, 0x50004, 0x20db, 0x5, 0xe, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) 31m31.281330567s ago: executing program 35 (id=2630): fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x5, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x8006, 0x6}, 0x0, 0x10001, 0xda, 0x5, 0xc31bc7e, 0x20005, 0xa, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x3, 0x3b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3f8, 0xffffffff, 0xffffffff, 0x3f8, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'team_slave_0\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'bond_slave_1\x00', {0x41, 0x1ff, 0x6, 0xb0e2, 0x10001, 0x84e, 0xfffffffb, 0x18, 0x8}, {0x1}}}]}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @private0={0xfc, 0x0, '\x00', 0x1}, [], [0xff], 'erspan0\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'vcan0\x00', {0x3, 0x0, 0x41, 0x0, 0x2, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x4e0) 30m34.268196273s ago: executing program 36 (id=2923): bpf$ENABLE_STATS(0x20, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) move_pages(0x0, 0x1, &(0x7f00000012c0)=[&(0x7f0000ffe000/0x1000)=nil], &(0x7f0000001300)=[0x2], 0x0, 0x2) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4800) r2 = gettid() timer_create(0xb, &(0x7f00000000c0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe2(&(0x7f0000000580)={0xffffffffffffffff}, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0xc369d000) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000100000000000000020"], 0x24, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) 30m29.405242307s ago: executing program 37 (id=2937): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x652c0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x800000, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800"/16], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x0, 0xa, 0x0, 0x42000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0x48) 30m28.096416935s ago: executing program 38 (id=2943): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000500)={[{@i_version}, {@usrquota}, {@bh}]}, 0x1, 0x523, &(0x7f0000000c00)="$eJzs3c9vHFcdAPDvTLK2k7h1WnoABG1oCwFFWceb1qp6gHJCCFVC9AgiNfbGsrzrtbzrUptIuGeuSFTiBEf+AM49ceeC4MalHJD4YYFqJA5TzezY2di79qaJvZb385FG89688X7fizPvzbxd7wtgbN2IiJ2ImIiIdyNipjyelFu81d3y8z7ZfbC4t/tgMYkse+dfSVGeH4uen8ldK19zKiJ+8J2InyRH47a3tlcXGo36Rpmf7TTXZ9tb27dXmgvL9eX6Wq02Pzd/5427r9ceozVTx5a+1JwoU1/++I873/hZXq3p8khvO56mbtMrB3FylyPie6cRbAQule2ZGHVF+EzSiHg+Il4urv+ZuFT8NgGAiyzLZiKb6c0DABddWsyBJWm1nAuYjjStVrtzeC/E1bTRandu3W9tri1158quRyW9v9Ko3ynnCq9HJcnzc0X6Yb52KH83Ip6LiF9OXiny1cVWY2mUNz4AMMauHRr//zvZHf8BgAvu+I/NAAAXkfEfAMaP8R8Axo/xHwDGT3f8v/K4P5Zl2c9PozoAwBnw/A8A48f4DwBj5ftvv51v2V75/ddL721trrbeu71Ub69Wm5uL1cXWxnp1udVaLr6zp3nS6zVarfW512Lz/evfXG93Zttb2/earc21zr3ie73v1SvFWTtn0DIAYJDnXvroL0k+Ir95pdiiZy2HykhrBpy2dNQVAEbm0qgrAIyM1b5gfD18xn/sDwGYHoALos8SvY+Y6vcHQlmWZadXJeCU3fyC+X8YVz3z/z4FDGPmpPn/Ym1gbxLChWT+H8ZXliXDrvkfw54IAJxvx8zxXz/L+xBgdAa8//98uf9d+ebAj5YOn/HhadYKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAzrf99X+r5TK/05Gm1WrEM8UCQJXk/kqjficino2IP09WJvP83IjrDAA8qfTvSbn+182ZV6cfKXrx2kFyIiJ++ut3fvX+Qqez8aeIieTfk/vHOx+Wx2snBps6jRYAAMfbH6eLfc+D/Ce7Dxb3t7Oszz++3b0ryOPu7U7E3kH8y3G52E9FJSKu/icp811Jz9zFk9j5ICI+36/9SUwXcyDdW5bD8fPYz5xp/PSR+Gm5QHNa/lt87inUBcbNR3n/81a/6y+NG8W+//U/VfRQT67s//KXWtwr+sCH8ff7v0sD+r8bw8Z47Q/f7aauHC37IOKLlyP2Y+/19D/78ZMB8V8dMv5fv/Tiy4PKst9E3Iz+8XtjzXaa67Ptre3bK82F5fpyfa1Wm5+bv/PG3ddrs8Uc9ezg0eCfb956dlBZ3v6rA+JPndD+rw7Z/t/+/90ffuWY+F9/pV/8NF44Jn4+Jn5tyPgLV38/8Lk7j790tP3JML//W0PG//hv20eWDQcARqe9tb260GjUNyTGNPHjOBfVGC6R/5c9B9Xom/jWWcWaiP5Fv3ile00fKsqyzxRrUI/xNGbdgPPg4KKPiP+NujIAAAAAAAAAAAAAAEBfZ/EXS6NuIwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABfXpwEAAP//+E3TQw==") r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000500), r0) socket$kcm(0x10, 0x2, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000340)=0x2) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x92a6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xf5b67000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10004, 0xa9630, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10002, 0xa88, 0x8406, 0x9, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x3ef522ea}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) r4 = socket(0x1e, 0x4, 0x0) futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x2) futex(&(0x7f0000000080), 0xc, 0x80000000, 0x0, &(0x7f0000048000)=0x1, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0xdc6, 0x0, 0x80000006}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, &(0x7f00000005c0)={0x0, 0x989680}) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000000)='./file2\x00', 0x2010410, &(0x7f00000002c0)=ANY=[@ANYBLOB='nodots,dmask=00000000000000000000003,usefree,nodots,flush,dots,dots,gid=', @ANYRES32, @ANYBLOB], 0x1, 0x214, &(0x7f0000000840)="$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") r5 = openat$selinux_policy(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r2, &(0x7f0000000380)={0x80000011}) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x3e) mount$tmpfs(0x0, &(0x7f0000002040)='./file0\x00', &(0x7f0000002200), 0x1000000, &(0x7f0000000c40)=ANY=[@ANYBLOB='noswap,mpol=prefer']) mount$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2b00ad, &(0x7f0000000400)=ANY=[@ANYBLOB="6e646533322c08646505e2000000000000000000"]) sendmsg$NFC_CMD_SE_IO(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100), 0x208e24b) symlink(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') readlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000001200)=""/4096, 0x1000) 30m14.383711705s ago: executing program 39 (id=3002): r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f0000000880)={[{@nouid32}, {@nodioread_nolock}, {@noquota}, {@delalloc}, {@journal_dev={'journal_dev', 0x3d, 0x9}}, {@nodioread_nolock}]}, 0x1, 0x5a3, &(0x7f00000002c0)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x183042, 0x15) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x4, 0x2000000000000216, &(0x7f0000000440)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0xd, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000140)=ANY=[@ANYRESDEC=0x0, @ANYRESOCT=r2, @ANYBLOB="3a04cd0e", @ANYRES32=r0, @ANYRES16=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_secret(0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa, 0x11, r3, 0x0) ftruncate(r3, 0x51a9497) waitid(0x2, 0x0, &(0x7f0000001280), 0x8, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000100900010073797a300000000009000300020000000000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a380000001b0a03000000000000000000020000000900010073797a300000000009000300fff500006d0697540c0002"], 0x60}}, 0x0) r5 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x1000000009, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0xef, 0x3d27}, 0x400, 0x32, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/31], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) r7 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000980)=ANY=[@ANYBLOB="f800000010008900c989ee5c4169780660a845cb1d59634020748389473c0c7d9e1ff4", @ANYRES32=r9, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c000580050009000000000005000a00000000000500080000000000"], 0x54}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="300000001000010000000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}}, 0x0) r11 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x8000, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r12, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a03000000000000000000010000000900010073797a30000000000900020073797a30000000002c0003800800014000000000180003801400020000007468305f746f5f68737200000000080002"], 0xe8}, 0x1, 0x0, 0x0, 0x4014}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 'queue0\x00'}) r13 = socket$netlink(0x10, 0x3, 0x0) writev(r13, &(0x7f0000000180)=[{0x0}], 0x1) ioctl$XFS_IOC_COMMIT_RANGE(r11, 0x40585883, &(0x7f0000000900)={r2, 0x0, 0x1, 0x3, 0x4, 0x2, [0x6, 0x2, 0x100000001, 0x9, 0x1, 0x8]}) syz_open_dev$tty1(0xc, 0x4, 0x1) 30m11.58547618s ago: executing program 40 (id=3016): r0 = socket(0x22, 0x2, 0x3) bind$phonet(r0, 0x0, 0x600) 30m11.149603926s ago: executing program 41 (id=3023): socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='mountinfo\x00') unshare(0x6a040000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newnexthop={0x1c, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=@newnexthop={0x24, 0x68, 0x1, 0x2, 0x7ffffffc, {}, [@NHA_GROUP={0xc, 0x2, [{0x1, 0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x24008000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@ipv4_newroute={0x24, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x25dfdbfd, {0x2, 0x0, 0x10, 0x0, 0x0, 0x4, 0x0, 0x1, 0x20000000}, [@RTA_NH_ID={0x8, 0x1e, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4a044}, 0x4090) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv6_newnexthop={0x24, 0x68, 0x309, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}, @NHA_ID={0x8, 0x1, 0x1}]}, 0x24}}, 0x0) 30m9.365261143s ago: executing program 42 (id=3032): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) r5 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x18, r4, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x48c05}, 0x4040140) ftruncate(r2, 0x80000001) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r8, 0x1, 0x1f, 0xffffffffffffffff, &(0x7f0000000080)=0x81) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x26, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9805, 0x0, 0x7fc, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) fsopen(&(0x7f0000000100)='configfs\x00', 0x0) recvmsg$unix(r0, 0x0, 0x0) 29m51.955644716s ago: executing program 43 (id=3149): r0 = syz_open_dev$loop(&(0x7f00000003c0), 0xf, 0x402000) ioctl$BLKRASET(r0, 0x1262, &(0x7f0000000400)=0x4) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x650b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0xe}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000cfba0000000000000800000091df11b90000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) prctl$PR_GET_SPECULATION_CTRL(0x35, 0x0, 0x8) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x10102, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x80a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0x2a}, @printk={@lld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x72}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x100080, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r7, @ANYBLOB="00040000000140002400128009000108776f6e6400000000140002"], 0x44}, 0x1, 0x0, 0x0, 0x24001}, 0x810) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@getqdisc={0x28, 0x26, 0x800, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r7, {0x8, 0xf}, {0xffe0, 0xf}, {0x9, 0x3}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x24048881}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r9 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r10, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002b40)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r8) openat$ptmx(0xffffffffffffff9c, 0x0, 0x41, 0x0) perf_event_open(0x0, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) 29m43.340832593s ago: executing program 44 (id=3227): r0 = syz_open_dev$loop(&(0x7f0000000000), 0x3, 0x1c1100) r1 = socket$unix(0x1, 0x1, 0x0) close(0x3) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b000000b946716047c1f2466d431a30b6000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={r2, 0xffffffffffffffff}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x19, &(0x7f0000000240)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7aa}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1000000}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0xe, 0x0, &(0x7f00000003c0)="d2dcaafb519c2ec1800000002047", 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="380000001a00010028bd7000fedbdf24818080000000f4ffffffffff07000f"], 0x38}, 0x1, 0x0, 0x0, 0x4004880}, 0x884) socket$xdp(0x2c, 0x3, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = socket(0x400000000010, 0x3, 0x0) r8 = socket$unix(0x1, 0x5, 0x0) connect$pppoe(r7, &(0x7f0000000340)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'veth1\x00'}}, 0x1e) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r9, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x42}}}]}, 0x38}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newtfilter={0x70, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r12, {0x4, 0xf}, {}, {0x7, 0xd}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x40, 0x2, [@TCA_CGROUP_EMATCHES={0x3c, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x800, 0x7, 0x1}, {{0x0, 0x0, 0x1}, {0x3, 0x1, 0x1}}}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x3, 0x6e4, 0xc}, {0x8, 0x80000000, 0x3, 0x1, 0xf, 0x1}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xee4}}]}]}}]}, 0x70}, 0x1, 0x0, 0x0, 0x10}, 0x48804) accept4(r1, 0xfffffffffffffffd, 0x0, 0x800) ioctl$HDIO_GETGEO(r0, 0x301, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/201, 0xc9) 29m42.157076802s ago: executing program 45 (id=3240): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f0000000080), 0x1, 0x57a, &(0x7f0000001500)="$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") (async) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f0000000080), 0x1, 0x57a, &(0x7f0000001500)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x194) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x194) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000240)={0x17c04, 0xffffffffffffffff, 0x10001, 0x20000, 0x0, 0x1b}) socket(0x400000000010, 0x3, 0x0) (async) r1 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000191c0), r0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000019280)={&(0x7f00000192c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000019240)={&(0x7f0000019300)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00082dbd7000fddbdf250600000005002f0001000000050030000000000008000300", @ANYRES32=r2, @ANYBLOB="5af8c1a095e0d239beaefa494d4f9fbc95986602e23e5ae4f2d253073165002417e6871f5d50a9bd23c681b4d7a1065dfe52c164cd722def2c9591dd3baa4f074d94ea08838616f76126f2e58863ccca07d78109b0aa45a73081fc106db197683ccfe11de7d3b64c56d84e378b0da42055663b9b217d31f7ba306439af4691613a61c8daa9ade4c7af1b9ca65d958158933cc00adff255264185fff2dda54bba531d54386724476233588ed3eea1dd8bbbc49c11a89314546298d7c57a64ba7356057b7086148ed8878a9436b584"], 0x2c}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000000) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000019280)={&(0x7f00000192c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000019240)={&(0x7f0000019300)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00082dbd7000fddbdf250600000005002f0001000000050030000000000008000300", @ANYRES32=r2, @ANYBLOB="5af8c1a095e0d239beaefa494d4f9fbc95986602e23e5ae4f2d253073165002417e6871f5d50a9bd23c681b4d7a1065dfe52c164cd722def2c9591dd3baa4f074d94ea08838616f76126f2e58863ccca07d78109b0aa45a73081fc106db197683ccfe11de7d3b64c56d84e378b0da42055663b9b217d31f7ba306439af4691613a61c8daa9ade4c7af1b9ca65d958158933cc00adff255264185fff2dda54bba531d54386724476233588ed3eea1dd8bbbc49c11a89314546298d7c57a64ba7356057b7086148ed8878a9436b584"], 0x2c}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000000) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2c, 0xfffffffd, {0x0, 0x0, 0x0, r2, {0x0, 0x1}, {0xffff, 0xffff}, {0xffe0, 0xffe0}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x66, 0x2, @TCA_HFSC_USC={0x10, 0x3, {0x8, 0x7, 0x7fffffff}}}}]}, 0x44}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x20, &(0x7f00000000c0)={&(0x7f00000004c0)=""/232, 0xe8, 0x0, &(0x7f0000000140)=""/93, 0x5d}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x28, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000019140)={&(0x7f00000190c0)=""/102, 0x66, 0x3, 0x5}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) r7 = open(&(0x7f0000000000)='./file1\x00', 0x143142, 0x80) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f0000000040)={[{@mblk_io_submit}, {@nodioread_nolock}, {@noquota}, {@delalloc}, {@journal_dev={'journal_dev', 0x3d, 0x8}}, {@grpjquota}]}, 0x1, 0x5b7, &(0x7f0000001380)="$eJzs3U1oHNcdAPD/zGot2ZYrF1poiw+mLbhgvPqw3bo9yddSg8GHQi+tWK2F0UprtKvWEoLKdxPiQ0iCL84tOeSYkEMOIZccc80lH+eAiUUClg/Jhv2SZXnlrGTtbqz9/WC0783M7v//duY9zQwzbAAD63TtTxrx24i4mkSMbVs2FM2FpxvrbW6s5R9vrOWTqFavfZNEEhGPNtbyrfWT5uvxiFiPiN9ExMfZiLPp1kceaRXKK6vzM8ViYalZH68s3Bwvr6yeu7EwM1eYKyye/8tfL166cHFyanJ7uo+r22vZvbX1zhd3X7nz6d/v333n3VPr+ddmkpiO0eay7e04SI3vJBvTO+Zf6EawPkr6nQD7kmn281pX+nWMRabZ69upbh8chnuSHtBF1eGI6pZtRWAAJC/Q6VuDCPAyah0H1M5/W1Mvjz8eXG6cgNTibm6s5f8frfhDjWsTMVI/Nzn2bfLUmUntfPNkLxPlUFq/HRETQ0PP7v9Jc//bv4mDSJCu+uhyY0M9u/3TrfEn2ow/o61rpy+oNf5tNse/zTbxM7uMf1c7jPH9v756c9f4t4fjd23jJ1vxkzbx04j4T4fx7/3zg0u7Lau+FXEm2sdvSZ5/fXj8+o1iYaLxt22MD8+c+tvu7Y84tkv8xjXbkXoi29t/pJlT2mH73//kvd+vPyf+n/7w/O3f7vs/GhGvdhj/l4/e/sduyx7cTh7WjgL2uv2TyMb9DuP/efr0582iq4YAAAAAAAAAAHCA0vq9bEma2yqnaS7XeIb3V3EsLZbKlbPXS8uLs4173k5GNm3daTXWqCe1+mTzftxWfWpH/XymGTBztF7P5UvF2T63HQAAAAAAAAAAAAAAAAAAAH4uju94/v+7TP35/+mIqRP9zg3ogd1/8hs47PR/GFxP9/+kb3kAvef/Pwysqv4Pg0v/h8Gl/8Pg0v9hcLXt/0d7nwfQe8/0/5H+5AH0nuN/AAAAAAAAAAAAAAAAAAAAAAAAAADoiqtXrtSm6uONtXytPju0sjxf+u+52UJ5PrewnM/lS0s3c3Ol0lyxkMuXFn7q85JS6eZELC7fGq8UypXx8srqvxdKy4ut3xQtZLveIgAAAAAAAAAAAAAAAAAAAHj5jNanJM1FZBv1NM3lIk5ExMkkkus3ioWJiPhFRHyWyQ7X6pP9ThoAAAAAAAAAAAAAAAAAAAAOmfLK6vxMsVhY6l5hqBmqs3d9WelqPkN7WTki1g82jdon7vld2eYXWJ8z0vXtdbgLmQ73w4Ev9HFQAgAAAAAAAAAAAAAAAACAAfXkod9O3/FDdxMCAAAAAAAAAAAAAAAAAACAgZR+nUREbToz9sfRnUuPJJuZ+mtE/O/etddvzVQqS5O1+Q+35lfeaM6f6kf+QKda/TSNiFo/BgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJ4or6zOzxSLhaV9FoY7WKffbQQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADYjx8DAAD//95Mx5c=") syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') (async) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') pread64(r8, &(0x7f00000000c0)=""/102379, 0x18feb, 0x94d) (async) pread64(r8, &(0x7f00000000c0)=""/102379, 0x18feb, 0x94d) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x38}, [@ldst={0x6, 0x3}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x3c) r9 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000c40), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r8, &(0x7f0000000d00)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000c80)={0x34, r9, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) (async) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r8, &(0x7f0000000d00)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000c80)={0x34, r9, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r10 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105842, 0x0) writev(r10, &(0x7f0000000a40)=[{0x0}, {&(0x7f0000000e00)='t', 0x1}], 0x2) ftruncate(r7, 0x2007ffb) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x42718, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x6, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x42718, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x6, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) rt_sigprocmask(0x2, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) sendfile(r7, r7, 0x0, 0x1000000201008) 29m22.489569391s ago: executing program 46 (id=3459): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000008000000000000005000100070000000900020073797a30000000001400078008001240000000000500150004000000050005000000000005000400000000000d000300686173683a6d6163"], 0x5c}}, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000740)=ANY=[@ANYBLOB="44000000090605000000000000000000010000050900020073797a30000006000500010007000000080009400000000114000880100007800a001100b4"], 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x44000) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'veth0_macvtap\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=ANY=[@ANYBLOB="680000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000400012800c0001006d6163766c616e00300002800800010010000000100005800a000400aaaaaaaaaabb000008000300030000000a000400aaaaaaaab1aa000008000500", @ANYRES32=r3], 0x68}, 0x1, 0x0, 0x0, 0x4048000}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x839, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x1, 0x2}, {0xe, 0x10}, {0x1, 0x10}}}, 0x24}, 0x1, 0x0, 0x0, 0x845}, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000004c0)=0x0, &(0x7f0000000500)=0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000580)={'geneve1\x00', 0x0}) r6 = socket(0x10, 0x80003, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}, {0xe}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0xf, "0000000000000f00000100000e00"}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) r9 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000780)={'vxcan1\x00', 0x0}) bind$can_j1939(r9, &(0x7f0000000040)={0x1d, r10, 0x3}, 0x18) r11 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r11, 0x107, 0xf, &(0x7f0000000100)=0x207, 0x4) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) sendto$packet(r11, &(0x7f00000002c0)="05031400d3fc1c0000004788031c09102c28", 0xfce0, 0x4, &(0x7f0000000140)={0x11, 0x0, r12, 0x1, 0x0, 0x6, @multicast}, 0x14) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r14) getsockname$packet(r14, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r13, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x34, 0x2c, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r15, {}, {0xfff2, 0xffff}, {0xffff, 0x5}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008854}, 0x4010) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000780)={&(0x7f00000005c0)={0x168, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x20005000}, 0x48004) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000030605000000000000000000000000000500010007"], 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20008050) r16 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r16, 0x1, r1, &(0x7f0000000140)={0x20000004}) 29m11.065570301s ago: executing program 47 (id=3563): openat$sysfs(0xffffffffffffff9c, &(0x7f0000002180)='/sys/power/sync_on_suspend', 0xa82, 0x0) syz_open_procfs$pagemap(0x0, &(0x7f0000001080)) r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000480)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x0, {0x1, 0x1, 0x4}, 0x1}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x1d, r1, 0x0, {0x1, 0x1, 0x4}, 0x1}, 0x18, &(0x7f00000001c0)={&(0x7f0000000180)="5ab37158946b88213a", 0x9}, 0x1, 0x0, 0x0, 0x20008840}, 0x4000000) readv(r0, &(0x7f0000000080)=[{&(0x7f0000001880)=""/4096, 0x1000}], 0x1) 29m4.807205707s ago: executing program 48 (id=3618): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffc}, [@call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 29m4.509557747s ago: executing program 49 (id=3620): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) 28m55.592935513s ago: executing program 50 (id=3699): r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x304}, "f64e40992f79ecf0", "53c272d8b763f690b35605dff8a4a8d2", "3da2d199", "72392a24199b5903"}, 0x28) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000080)=ANY=[@ANYBLOB="0206000000000000"], 0x40) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) connect$inet6(r0, &(0x7f0000001940)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 25m9.438565309s ago: executing program 51 (id=6039): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f00000004c0)=0x77, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000680)={0x6, &(0x7f0000000580)=[{0x7450, 0x40, 0x2, 0xfffffffa}, {0x2, 0x6, 0x9, 0x2}, {0x9, 0x4, 0x6, 0x8000}, {0xc4d6, 0x7, 0x4, 0xfffffffb}, {0x24, 0x7, 0x8, 0x4}, {0x3, 0xf8, 0x7, 0xdf57}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x80000001, 0x3d}, 0x106200, 0x1000, 0x6, 0x0, 0xa, 0x3, 0xb, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r1, &(0x7f0000000040)={0x23, 0x0, 0x0, 0x1}, 0x10) ioctl$SIOCPNENABLEPIPE(r1, 0x89ed, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f00000002c0)="f6eb094549002060009b8538a4ba", 0x0, 0x806, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000800000000000070000000900010073797a30000000007c000000090a010400000000000000000700000008000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d38001280140001800c000100636f756e7465720004000280200001800e000100636f6e6e6c696d69740000000c000280080001400000000808000340000001"], 0xc4}}, 0x20050890) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0xb2, 0x830d}, 0x4c10, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r6 = syz_io_uring_setup(0x1104, &(0x7f0000000300)={0x0, 0x0, 0x80, 0x0, 0x8000021e}, &(0x7f00000001c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x27, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a2d, 0x0, 0x7fc, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e00000000eb15000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000180100002020692500000000002060207b1a"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r9}, 0xc) syz_io_uring_submit(r7, r8, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200, 0x0, 0x1}) io_uring_enter(r6, 0x47fa, 0x0, 0x0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000140)="91f8a9849519def28691bbc4173c3d6f357d0272b7319130feaab952ac4703cad04be68907e50e997fc26e4c91ea4feb931647fc5393de25000000000000000000", 0x41}, {&(0x7f0000000e80)="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", 0x122}, {&(0x7f00000003c0)="641a6a2b863c0dd898013a3f97a834ebb75a925ab48c844221841a232932fc2e37e327de21450df098c113e179a0", 0x2e}, {&(0x7f00000001c0)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c443ce93d82e931eb9918e6c0827686e59209d2e02c9210fd8048f04ad6c48b3072092c483271361816bf21afb8473a064f1988536d4b5888807b3aaafa", 0x91}], 0x4}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000b80)="f77d2b5dd5f7d74f0748cf3d2cf218d644566a14103b1c7dd35fd2951bd022f10f2dc7f4ce0d8ac5f4abaca4b97b706153756913b7dd48248b5bfb10460019248bf238743fa2aeb5bef21ce832db670920dc5e911ef2ad63e849901d1001129dbacbfd4924d7545517fd18b5d29978f32a5b5c81755cb89cc0490958ba3211eb99df5cdbbc0f9c941aaa1495893dada02d8188acd26b5afd7476413f322c8f79de769debb56343f3eded2dca93ed6641e50fe595e1e0dbe84ed0f70abb4ed2dfb6648df7dbbd18fa5533a6b0acc138c81a8acbcb2fb79a7d7857d41bca238e0548c5e955d74bbb106fe965274cbb3a29b895df0b4e028b6d65c115b81328e0b660253f1c9a359dde67917fa232e2f566483ddbb93ff9b103c1cac356c9f0f6ab5fe77ea4610f71ec6dc988fddf29b8d0b6aaa82752580b62b5f51800d10077f07319b6ffeff06e4dea184fd7a0a0f4d441763e30d1bc475502a1de1ffbc0", 0x15e}, {&(0x7f0000000d00)="31cef842d9c50636f60fc0cfdac56c75f1687f0c56287423f5eed69f117e766bdbad0c2171ad6227e1173ab6efa2fcb1c420a51a0917861009000000f049c606ccab7cda1f0e3490fbe385ea382294882839a22674037b8910bd8a1420e33eb1be6f10cfb24eb7cccdf1528ef33b34ab07cdb0909a9ba9547e1e343b451d9025c4e153612d4674b9411fb4de295599abbcb388d291aa839ab0954e6a8dfc19c3c1533a11d81e03a4879bd736f1caacc2bbf1194598a652677efb930a5b6ee292c57402e0cc07a9a26ee794e46e604a9aec550d12af09f782e1f6a996f0756604847689d37ee3047e61531a", 0xeb}], 0x2}}], 0x2, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) 25m8.5614312s ago: executing program 52 (id=6047): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) recvfrom$inet(r0, &(0x7f0000000180)=""/159, 0x9f, 0x10002, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000120000007f00000001"], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@func={0x2, 0x0, 0x0, 0xc, 0x2}, @func_proto]}, {0x0, [0x5f]}}, 0x0, 0x33}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001740)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000140)="e891f5", 0x3}, {&(0x7f0000000700)="4490137c227c56ee66c372f3105eb186dd8062fad2d5b5bfb0ba068e74a8d026bd209da8ffa6a26e3b3f8075704a9d0ef9afda48e71255a747b6d030b05cf8db24609f02d34e76992c9df9fe6888c6c9a4820ca35bc3508b115c6223be6ac54536025af1dea54e527c68b0ff250261953f2da79a78104c2d9e7b16ed86b124945aa9ab7581ebd385fb61210c410d799168ffc4b64677af924affd442035db81e18c2d2462d0bb25fff9d3b1ce903597992b2a4d54161", 0xb6}], 0x2}}, {{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000003c0)="f77d2bf7d70f0748cf3d2cf218d644566af10f2dc7f4ce0d8ac5f4abaca4b97b706153756913b7dd48248b5bfb10460019248bf238743fa2aeb5bef21ce832db670920dc5e911ef2ad63e849901d1001129dbacbfd4924d7545517fd18b5d29978f32a5b5c81755cb89cc04909", 0x6d}], 0x1}}], 0x2, 0x4004000) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x40) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) shutdown(r0, 0x1) sendto(r0, 0x0, 0x0, 0x24048800, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, 0x0, &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0xc}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) 25m7.437022579s ago: executing program 53 (id=6059): socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x24, 0x0, 0x0) 25m4.332359331s ago: executing program 54 (id=6068): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x7f, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x10000, 0x0, 0x5, 0x2, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000300)={'tunl0\x00', &(0x7f0000000200)={'erspan0\x00', 0x0, 0x80, 0x80, 0xf, 0xfffffff9, {{0xb, 0x4, 0x1, 0x2f, 0x2c, 0x68, 0x0, 0x8f, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x3a}, @private=0xa010101, {[@lsrr={0x83, 0x17, 0xa4, [@initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @multicast2, @broadcast, @rand_addr=0x64010100]}]}}}}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x2, 0x38c6, 0x101, 0x4001, r1, 0x7, '\x00', r2, 0xffffffffffffffff, 0x1, 0x2, 0x1, 0xf}, 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r3, &(0x7f0000000080), 0x0}, 0x20) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) io_setup(0x823e, &(0x7f0000000000)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x1a0) write$binfmt_aout(r5, &(0x7f00000000c0)=ANY=[], 0x20) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x12, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x400, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 24m57.405078205s ago: executing program 55 (id=6082): write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x111, 0x6}}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940), 0x2, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) (fail_nth: 5) 21m58.193387556s ago: executing program 56 (id=8764): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_USC={0x10, 0x3, {0x7, 0x8, 0xd401}}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r6) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r7 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newtfilter={0x8c, 0x2c, 0xd27, 0x70bd26, 0x25dfdc00, {0x0, 0x0, 0x0, r8, {0x0, 0x4}, {}, {0x8, 0xfff2}}, [@filter_kind_options=@f_matchall={{0xd}, {0x58, 0x2, [@TCA_MATCHALL_ACT={0x54, 0x2, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x7cff, 0xbd, 0x8, 0x6, 0x1ff}, 0x2}}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}]}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000000600), 0x56) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f0000000380)=@xdp={0x2c, 0x0, r9, 0x3e}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)="27030200000214000e00002fb96dffff1144ee163cddcb0000008000008276000000", 0x22}, {&(0x7f0000000780)="f058050000007f8f", 0x8}], 0x2}, 0x5) 21m1.573470664s ago: executing program 57 (id=9501): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002500)={&(0x7f00000002c0)={0x2c, r1, 0x1, 0x70bd29, 0x2, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4048091}, 0x40) 19m38.279655355s ago: executing program 58 (id=10187): r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x4a100, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, 0x0) 19m36.381532435s ago: executing program 59 (id=10200): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0xfb, 0x7fff0000}]}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) rename(&(0x7f0000000380)='./cgroup\x00', &(0x7f0000000400)='./file1/file4/file5\x00') eventfd(0x0) r0 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x3c00, 0x2, 0xbfdffffc}, &(0x7f0000000000)=0x0, &(0x7f00000000c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1223}}) io_uring_enter(r0, 0x47f6, 0x0, 0x0, 0x0, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) 18m22.612131458s ago: executing program 60 (id=10799): r0 = syz_io_uring_setup(0x110, &(0x7f0000000140)={0x0, 0xfec9}, &(0x7f0000000240)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0xb, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {}, 0x1}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x48, &(0x7f0000000100), 0x120) io_uring_enter(r0, 0xdb4, 0xfffffffd, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_SYNC_CANCEL(r0, 0x18, &(0x7f0000000000)={0x6, 0xffffffffffffffff, 0x21, {0x4, 0x1}, 0x6}, 0x1) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x10) r3 = memfd_secret(0x80000) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) write$evdev(r3, &(0x7f0000000300)=[{{r4, r5/1000+10000}, 0x18, 0x6, 0xc332}, {{}, 0x14, 0xccb, 0x7}, {{r6, r7/1000+60000}, 0x1, 0x5, 0x2}, {{0x77359400}, 0x12, 0x7fff, 0x8}], 0x60) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x52d, 0x12) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffff000) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) 17m45.269060554s ago: executing program 61 (id=11090): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f00000004c0)={0x38, 0x1403, 0x1, 0x70bd2d, 0x0, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) prlimit64(r0, 0xc, &(0x7f0000000180)={0x8, 0x6}, &(0x7f0000000f80)) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r3, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x24, 0x4, 0x8, 0x201, 0x0, 0x0, {0xa, 0x0, 0x7}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8}]}, 0x24}}, 0x4) 17m29.468963391s ago: executing program 62 (id=11199): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f00000004c0)={0x38, 0x1403, 0x1, 0x70bd2d, 0x0, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) prlimit64(r0, 0xc, &(0x7f0000000180)={0x8, 0x6}, &(0x7f0000000f80)) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r3, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x24, 0x4, 0x8, 0x201, 0x0, 0x0, {0xa, 0x0, 0x7}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8}]}, 0x24}}, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file0\x00'}) syz_emit_ethernet(0x4e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd604dd70800180600fe80000000000002c897f01d232f2e92c86000"/58, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="60c200009078000003039600"], 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0xfe, &(0x7f0000000500)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10, 0x1000}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0xff}}]}}}]}, 0x48}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000280)='./file0\x00', 0x180c8, &(0x7f00000006c0)=ANY=[@ANYBLOB="6e66732c646f74732c636865636b3d7374726963742c646f74732c6572726f72733d72656d6f756e742d726f2c00fc403bb14281bbfb9b8213bd6284536d64789a24dd73b98b3e33cb47fed8a736464bb62e9e891aa832722dfc28bfa4489b3a127a503e72326b737d0f67c97be6f37ef46154dec39ef8718946ffc8cd4d735a0b101c1722477bbe2f923577ea51f7116f17c3ddf5c497fba2d0bb3272d123b31e9461d4e2d65a42e1174fa269de92e463fc1ca202650fe2628e15341e45dce6c0de2367bdb50cc5b2b462e1d45fc3265f1a88561ab6afb1b73a3b340b5c73055fc6e601843a59f3cdeb36991cfa985453287d4c9d2d6e21adddc57a607369c682e821b20dc0efd51d12f386f3f8e53c05e696e50c7c3f79b1b0bd7e5cfaf3f63d8949c8dd2fd94aa0f259a4cb9412c30c45f9d4d63d267d2a43f03a47fa56b3"], 0x1, 0x242, &(0x7f0000000300)="$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") syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000280)='./bus\x00', 0x2901401, 0x0, 0x0, 0x0, &(0x7f000009de00)) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000a00)='./bus/file0\x00') syz_genetlink_get_family_id$ethtool(&(0x7f0000000380), 0xffffffffffffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) 17m15.317745311s ago: executing program 63 (id=11251): r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='.\x00', 0x40) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x27, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a2d, 0x0, 0x7fe, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[], 0x50) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0xe22, 0x400, @empty}, 0x1c) socket$pppl2tp(0x18, 0x1, 0x1) dup(0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0000}]}) unshare(0x20000680) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380), 0x40180, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x1, @mcast1, 0x4}, 0x1c) r4 = socket$inet_udp(0x2, 0x2, 0x0) syz_usb_connect(0x0, 0x10b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x5, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x270, 0x0, 0xa, 0x148, 0x0, 0x10, 0x330, 0x2a8, 0x2a8, 0x330, 0x2a8, 0x3, 0x0, {[{{@ip={@rand_addr, @multicast1, 0x0, 0x0, 'bridge0\x00', 'rose0\x00'}, 0x0, 0x70, 0xe0, 0x0, {0x200003ae, 0x7f00}}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f2f7b90ad2b60c45cb4ea6e7bf902bdc2ff8a9304d9f655c746adc0bdc773506378bc0d27efd6abb05175089830cc46186074d7de46d5af300"}}}, {{@ip={@empty, @local, 0x0, 0x0, 'ip6erspan0\x00', 'veth0_to_team\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x2, 0x7, [0x0, 0x10, 0x1b, 0x2b, 0x37, 0x2e, 0x2b, 0x18, 0x2b, 0x34, 0xd, 0x0, 0x3d, 0x1, 0x32, 0x37], 0x1, 0x6, 0x1570000000000}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x2d0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000000)=0x28, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001ec0), 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000009c0)='ext4\x00', &(0x7f0000000540)='./file0\x00', 0x800718, &(0x7f0000000200)={[{@nodioread_nolock}, {@journal_dev={'journal_dev', 0x3d, 0x40000ff}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@nouid32}, {@resgid}, {@acl}, {@init_itable_val={'init_itable', 0x3d, 0x8d55}}]}, 0x0, 0x48d, &(0x7f0000000a00)="$eJzs281rHOUfAPDvTLKb9teX5FfrS2vVaBGCYtKkVXvwolQQqSjooR5jsi2h20aaKLYWm4p4EqSgZ/Eo+hd4E0HUk+DVkycpFO2lrafITGaSTbp5odlk0+7nAzP7PDPP7Dzfnbdnn2c3gI7Vn82SiJ0R8UdE9M5lFxfon3u5ef3i2K3rF8eSmJ198+8kL3fj+sWxsmi53Y4iM5BGpJ8kxU4Wmzp/4fRovV47V+SHps+8OzR1/sIz758ZPVU7VTs7cvTokcPDzz838mxL4sziurH/o8kD+155+8prYyeuvPPLd1l9dxbrG+Nolf4s8H9mc0vXPdnqnbXZrnzek8+T7jZXhjXriojscFXy6783umLh4PXGyx+3tXLAhsqeTT3Lr56ZBe5hSay1ZKXhngHc/coHffb9t5w2odmxZVx7ce4LUBb3zWKaW9MdaVGmMv/9tvX6I+LEzL9fZVNsUD8EAECjz8a+PF6Nnvjw1revZm2P3vk1aTyQv/6Zz3cXYyh9EfH/iNgTEfdFxN6IuD8iL/tgRDy0zvrc3v5Jr67zLVeUtf9eKMa2Frf/ytZf9HUVuV15/JXk5ES9dqj4TAai0pPlh1fYxw/Hfv98uXWN7b9syvZftgWLelztXtJBNz46PRqV9US94NrliP3dzeJP5kcCkojYFxH757da0wDP7jIx8dQ3B5YrtHr8K2jBONPs11l4M1n8M7Ek/lLSOD45cdv45NC2qNcODZVnxe1+/e3TN5bb/7rib4FrtbnXhuO/tEhf0jheO9Xa/d/h+Z9Wk7fyceZqMeb4wej09LnhiGpyPM9Xi7L58pGFbct8WT47/wcONr/+9xTbZPE/HBHZSfxIRDwaEY8VdX88Ip6IiIMrxPjzS6vHH2mbjv/liPGm97/583/J8T9/4XR5a1xYsmKi6/RP3y+3/7Ud/yN5aqBYkt//VtGsOt1NqnynnxsAAADcTdL8N/BJOjifTtPBwbnf8O+N/6X1yanpp09Ovnd2fO638n1RScuert6iP7Q+Ua8NJzPFO1aSY1GvjRR9xWV/6eGi3/iLru15fnBssj7e5tih0+1Y5vrP/NXV7toBG2x706Uj1U2vCNAGS8fR08XZS6+HmwHcq/xfGzrXKtd/uln1ADaf5z90rmbX/6UleWMBcG/y/IfO5fqHDpX+2O4aAG3k+Q8dadU/77cnsa1xSXXlwtUtUueWJbbqQckTEWUi3RL1kdigRLvvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAK3xXwAAAP//uIXZzg==") getsockopt$inet_mptcp_buf(r3, 0x6, 0x1e, 0xfffffffffffffffd, &(0x7f0000000000)=0x2000000) bind$rxrpc(r2, 0x0, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x3000009, 0x46031, 0xffffffffffffffff, 0x0) 16m59.286319054s ago: executing program 64 (id=11395): syz_usb_control_io$uac1(0xffffffffffffffff, 0x0, &(0x7f0000000440)={0x44, &(0x7f0000000200)=ANY=[@ANYBLOB="000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000014c0)={0x2, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="0218000014000000000000000000000005000500000000000a00ffff00000000fe8000000000000000000000000000aa0000000000000000080012000000000003000000000000002600000000000000000000000000000002ff8002000000000000000000000000fc010000000000000000000000000000050006006c0000000a"], 0xa0}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x4e20, 0xffffffff, @empty, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/rt_acct\x00') perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7f, 0x2, @perf_config_ext={0x800000, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r2, &(0x7f00000014c0)=[{&(0x7f0000000000)=""/22, 0x16}], 0x1) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) pread64(r3, &(0x7f0000000240)=""/218, 0xda, 0x6494d7af) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) r4 = socket$inet6_icmp(0xa, 0x2, 0x3a) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x7, @loopback={0xff00000000000000}, 0x4}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000000)=0x34e, 0xffe8) syz_emit_ethernet(0x7e, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa8000aaaaaabb86dd6a00000000481100fe8000000000000000000000000000aafe8000000000000000000000000000aa4e1d4e20"], 0x0) 7m18.894054555s ago: executing program 65 (id=15545): connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240), 0x4000095, 0x0) 3m51.846442788s ago: executing program 66 (id=17166): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x70, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2, 0x0, 0x6}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2=0xe0000001}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x2c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x70}}, 0x0) 3m51.4814498s ago: executing program 67 (id=17289): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket(0xa, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x1ff, 0x7ffffffc, 0x400, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x3}, 0x6000, 0x0, 0x4, 0x6, 0x0, 0x2000000a, 0xfffc, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0xd) socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet_sctp(r0, 0x0, 0x24000052) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x5}, 0x38) openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0xb0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r4, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000009c0)=@newqdisc={0x64, 0x24, 0xf0b, 0x70bd29, 0x0, {0x0, 0x0, 0x12, r5, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_etf={{0x8}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x6}}}}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x2, 0x9, 0x5, 0x9, 0x1, 0xfffffffc, 0x2}}, {0x66}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x8004001}, 0x0) socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) 3m50.420262111s ago: executing program 68 (id=17181): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe2f, 0xffffff99, &(0x7f0000000100)="b9ff03316844268cb89e14f086dd65e0ffff00122c00631177fbac14030a44079f03fe8000ff80000000000000000008ffff3a050b038da1880b251810a59d943be3f4aed50ea5a6b8686731cb89ef77523c899b699eeaa0eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000380)="b101000000353b", &(0x7f0000000000), 0x0, 0x700}, 0x2c) 3m42.775637538s ago: executing program 69 (id=17267): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x10, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@call={0x85, 0x0, 0x0, 0xa0}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0xa, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x6, 0x8, &(0x7f00000002c0)="b80000050000", &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3m40.290420103s ago: executing program 70 (id=17277): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWRULE={0x34, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x2}]}], {0x14}}, 0x5c}, 0x1, 0x0, 0x0, 0x4000041}, 0x0) 3m38.809237848s ago: executing program 71 (id=17299): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x50, &(0x7f0000000000)={&(0x7f00000084c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020025642532000000000900010073797a30000000000800054000000002"], 0x40c4}}, 0x0) 3m15.248113128s ago: executing program 72 (id=17441): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000100)=@framed={{0x18, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @initr0, @generic={0x65}, @initr0, @exit, @alu={0x4, 0x0, 0x3, 0x3}]}, &(0x7f0000000000)='GPL\x00'}, 0x94) 3m14.207319942s ago: executing program 73 (id=17475): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008, 0x8000008}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000004900010000000000000000000a0007000000000000000000140001800d2a79075827af5aa534d6815c2e93f10c0002"], 0x3c}}, 0x0) 3m14.179968668s ago: executing program 74 (id=17458): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='b '], 0xc) 3m13.117011759s ago: executing program 75 (id=17488): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x800000}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x14}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3m11.084087896s ago: executing program 76 (id=17499): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c00028005000100000000000800074000000001"], 0x64}}, 0x2000884c) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="4c00000000010104000000000000000002000000240001801400018008000100e000000108000200e00000010c0002800500010000000000140016"], 0x4c}}, 0x0) 2m48.169276699s ago: executing program 77 (id=17924): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a44000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40000000010800034000000014480000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a31000000001c0003801800008008000340000000020c0004400000000000000c7f14000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_MSG_GETSETELEM(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="540300000d0a010800000000000000000a0000010900020073797a31000000000900010073797a31000000002803038024030080040001801c030180520001"], 0x354}, 0x1, 0x0, 0x0, 0x4004001}, 0x8000) 2m45.634173056s ago: executing program 78 (id=17933): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4004000) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a90000000060a010400000000000000000a0000010900010073797a310000000064000480500001800b0001007461726765740000400002802c0003007339f2f10455afb9fdd672bad09dfb78c7699c74e891a0c700"/120], 0xb8}, 0x1, 0x0, 0x0, 0x4000850}, 0x20040040) 2m38.004737504s ago: executing program 79 (id=17849): r0 = socket$kcm(0x15, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000059) r1 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000340), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) r2 = getpid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x0, 0x2, 0xfffffffe, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x80) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, 0x0, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r5, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)={0x60, 0x3, 0x1, 0x301, 0x0, 0x0, {0x3, 0x0, 0x8}, [@CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x90}]}, @CTA_TUPLE_MASTER={0x34, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @private=0xa010101}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_LABELS_MASK={0xc, 0x17, [0x1c8, 0xe870]}]}, 0x60}, 0x1, 0x0, 0x0, 0x80}, 0x800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d80)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="76ea090000000000009ba56a88ca", 0x0, 0x6400, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2405, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0xd) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r6) socket$can_bcm(0x1d, 0x2, 0x2) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r7, 0x401054d5, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r8, 0x0, 0x8010) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x10, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x40}, @exit], &(0x7f0000000280)='GPL\x00'}, 0x94) sendmsg$IPSET_CMD_GET_BYNAME(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20020}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0xffffffffffffff38, 0xe, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x20000090) recvmsg(r0, &(0x7f0000000140)={0x0, 0xffffffffffffff7b, 0x0}, 0x0) 2m37.904462489s ago: executing program 80 (id=17945): r0 = socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$inet(r0, &(0x7f00000029c0)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0x10, 0x0}, 0x30000001) 2m37.679164173s ago: executing program 81 (id=17862): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x60, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x20, 0x5, 0x1, 0x0, 0x7}, @NFTA_SET_DATA_LEN={0x0, 0x7, 0x1, 0x0, 0x1f}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x2, 0x84}}}, 0xa8}, 0x1, 0x0, 0x0, 0x2806c8cd}, 0x0) 2m37.203639578s ago: executing program 82 (id=17874): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x110028, 0x0, 0x0, 0x2, 0x9, 0x800000, 0x4, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x6, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="19000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r1}, &(0x7f0000000080), &(0x7f0000000580)=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r1, &(0x7f0000000280), &(0x7f0000000000)=""/10, 0x2}, 0x20) 2m10.672959825s ago: executing program 83 (id=18018): r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x72, 0x0, 0x0) 2m10.629412989s ago: executing program 84 (id=18004): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001680)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x40001}, 0x4040850) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x810000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x14, 0x38, 0x2, 0x70bd28, 0x25dfdbfb, {0x18}}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a64000000030a0fdb00000000000000000a0000050900030073797a30000000000900010073797a31000000001400048008000240a04b3d02080001400000000308000540000000001c0008800c00014000000000000000090c000240000000000018ab6e14000000110001"], 0x8c}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) close(0x3) 2m10.156851243s ago: executing program 85 (id=18030): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={0x0, 0x84}, 0x1, 0x0, 0x0, 0x40008d0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x4, @perf_config_ext, 0x10210, 0xfa8, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xffffffff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x5, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r4, 0xfffff000, 0xe, 0x0, &(0x7f0000000300)="882f1242a03c3f98722780b605a7", 0x0, 0x990d, 0x7000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, 0x0, 0x4000000) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x10182) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)="8d26b87599671a802c3edd9e20", 0xd, 0x1}, 0x4000000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/27, 0x1b}, 0x10000) 2m9.166855136s ago: executing program 86 (id=18042): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x404f444) r1 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1d, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x1f, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1m40.515777797s ago: executing program 87 (id=18220): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x5}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x301, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x401, 0x0, 0x0, {0x5}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @fwd={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_FWD_SREG_DEV={0x8, 0x1, 0x1, 0x0, 0x11}, @NFTA_FWD_SREG_ADDR={0x8, 0x2, 0x1, 0x0, 0x10}, @NFTA_FWD_NFPROTO={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xbc}, 0x1, 0x0, 0x0, 0x2}, 0x0) 52.892748517s ago: executing program 6 (id=19603): r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x4001, @loopback}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x2000488c) recvmsg$kcm(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000002080)=""/174, 0xae}], 0x1}, 0x0) 40.196632281s ago: executing program 7 (id=19875): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x5, 0x0, 0x0) 40.038635446s ago: executing program 7 (id=19878): r0 = socket$igmp(0x2, 0x3, 0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000005000000000000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r1, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$inet(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000100)="0f024a3bb690944e3de505d3fced17aab3fc6219c223664b375536c43567b24217e7515b6bcc37c8ebc93e44706d388af11f89fff5df3f3c79372812dc95f7b1ca96c12eed232568f7f9b84cdbd6ababb6ca215ace17674ec1a8a30fc08a9a897aea8220c07207c0e46eaa8c6bdd844de199", 0x72}, {&(0x7f0000000a00)="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", 0x4bd}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="380000000000000000000000070000004424e6d3ac1414aa00000001ac1e000100000dcdffffffff00000057ac1414bb00000002940401001c000000000000000000000008000000", @ANYRES32=r2, @ANYBLOB="ac14143fac14140e00000000"], 0x58}, 0x0) 39.971454305s ago: executing program 7 (id=19881): r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c}}], 0x20}, 0x40012002) sendmsg$inet6(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="12000000000000001100000067"], 0x25}, 0x0) 39.831543153s ago: executing program 7 (id=19883): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, 0x0, 0x4000) 39.693496442s ago: executing program 7 (id=19884): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x31, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0xa418be, 0x0) 39.637277833s ago: executing program 7 (id=19886): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe327, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000009800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000380)={0x0, 0x1c, &(0x7f0000000400)=[{&(0x7f00000002c0)="d7", 0xffffff2a}], 0x1}, 0x20004001) close(r4) 39.081873964s ago: executing program 3 (id=19896): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000002c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffff8}, [@call={0x85, 0x0, 0x0, 0x36}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 38.937418301s ago: executing program 3 (id=19897): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x0}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x50}}, 0x0) 38.852988478s ago: executing program 3 (id=19899): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0xfc, 0x6, 0x41, 0x0, 0x0, 0x4, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext={0x7, 0x100000001}, 0x0, 0x4, 0x18000, 0x2, 0x6, 0x6aee, 0x2, 0x0, 0x1000000, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x6) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="4000000002"], 0x0, 0x100, 0x0, 0x0, 0x41100}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'team0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 38.710044305s ago: executing program 3 (id=19901): socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8931, &(0x7f0000000080)={'bridge0\x00'}) 38.648940916s ago: executing program 3 (id=19904): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x30f6, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2050061, &(0x7f0000000bc0)) 38.042478679s ago: executing program 3 (id=19913): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0xeba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB='\x00'/24], 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000780)=ANY=[@ANYBLOB="0a00000016", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x50) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="4b28eef5e465fd6b1314df91d4b8ffd7514b8c7212bbdf", 0x17}, {&(0x7f00000009c0)="0bed198cd72af550532cb1ee9946724f7aa06b816444b7dd9e3fb20a8e3505b5d4ce686f63c1097675e06cacd0fd8edf60a6507225233d3f2f1d645cc9ae037b43e34e6cf2a32f46291e3b4b76774ebd12aba11ee129b378742d72b6af8ebdcbf0d679d5c4d81e29a9b0dc2085acc948ce6bbd36cea562ee12aa7cf927dd2f311db992ddc891a969f1af41d972174b464eeb6917f59146f939bd7e5a5bf04b0a867bce312e7eb676f494b108b6dbf9bb3f6338117e1bfb5633eaf44d42fcb5616b6e9dad622946aa8d66f5d5e0aeb3055d23929bab7543e639bac4f4990517943fa8f53bd80f6fb455fb3a9fcc9b5bc971e700bd", 0xf4}], 0x2, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"/336, @ANYRES32], 0x160}, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r3, 0x0, 0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x2}, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xcfa4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x30}, 0x40010040) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="4d9bfab8320ea38a9bddc1a7373ddf17566d6e1a9ee93c6cc0e439f52e968dabdd48a362fc3942c5db5ad065e44034125cf9c5b3471c01d4953b52dfc140cd897838c512e61dc5e2872cbf798bc7a6173f6e6acb03280fe51e540dd27568731bb3a954aae26748e25d45bfc21b4c3d24c542651c54537c2e558f5160862d6614a24439c4"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0}, 0x24000000) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000200"/20, @ANYRES32, @ANYBLOB="0200000000000003"], 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x890b, &(0x7f0000000100)) 37.995356532s ago: executing program 2 (id=19914): socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8931, &(0x7f0000000080)={'bridge0\x00'}) 37.844241828s ago: executing program 88 (id=19603): r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x4001, @loopback}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x2000488c) recvmsg$kcm(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000002080)=""/174, 0xae}], 0x1}, 0x0) 37.832713716s ago: executing program 2 (id=19917): r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c}}], 0x20}, 0x40012002) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f00000005c0)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0, 0x0, 0x0, 0x25}, 0x0) 37.677284731s ago: executing program 2 (id=19919): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240"], 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000002000000a70000000060a0b0400000000000000000200000044000480200001800e000100636f6e6e6c696d69740000000c000280080001400000000010000180090001006c61737400000000100001800a00010072656469720000000900010073797a30000000000900020073797a320000000014000000110001"], 0x98}, 0x1, 0x0, 0x0, 0x4000}, 0x0) close(r0) 37.477244839s ago: executing program 2 (id=19922): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000040)=ANY=[@ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="2f000000b5711b1b0e"], 0x20) 37.366681412s ago: executing program 2 (id=19923): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x30f6, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2050061, &(0x7f0000000bc0)) 37.143481566s ago: executing program 2 (id=19925): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x90100, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1000, 0x2, @perf_config_ext={0x0, 0x2}, 0x1306, 0x2, 0x0, 0x2, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa8}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], &(0x7f00000002c0)='syzkaller\x00'}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, r3, 0x25, 0x0, @val=@kprobe_multi=@addrs={0x1, 0x0, 0x0, 0x0, 0x3}}, 0x30) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080)=r4, 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000340)=r5, 0x4) 36.317315056s ago: executing program 9 (id=19930): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000180)="b9ff03076804268c989e14f088a8", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x24) 36.262506447s ago: executing program 9 (id=19931): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff000000000200000009000100"], 0x7c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000002000000a70000000060a0b0400000000000000000200000044000480200001800e000100636f6e6e6c696d69740000000c000280080001400000000010000180090001006c61737400000000100001800a00010072656469720000000900010073797a30000000000900020073797a320000000014000000110001"], 0x98}, 0x1, 0x0, 0x0, 0x4000}, 0x0) close(r0) 36.152034679s ago: executing program 9 (id=19932): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f00000002c0), &(0x7f0000000240)=r1}, 0x20) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = getpid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000000100)=@qipcrtr={0x2a, 0xffffffffffffffff, 0x2}, 0x80, &(0x7f0000001300)=[{&(0x7f00000012c0)}], 0x1, &(0x7f0000001340)}, 0x4000040) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0xa, 0x40, 0x6, 0x8}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x9, r5, 0x4}, 0x38) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r6) r7 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r9, 0x0, 0x4080) sendmsg$NFNL_MSG_COMPAT_GET(r9, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000600)=ANY=[@ANYBLOB="3c000000000b020000000600000000000a010a00004000000003060001002e0000000800034000e9ffffff00000000ad39da219fe0d1e899575b96e49617639fd465835c1a637b196ef9f59db8ba500c5670755b26eb422182242f992e81d41037af6181275baf36ff5676eb89aefb3b4df916fc31fd0272ed92b7acf02c82ac6548f9"], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x4c800) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r8, r6}) sendmsg$NFT_BATCH(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$NFT_BATCH(r10, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000540)=ANY=[], 0xb0}, 0x1, 0x0, 0x0, 0x4000850}, 0x20040040) socket$kcm(0x2, 0x1, 0x84) fstat(r7, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) unlink(&(0x7f0000000200)='./cgroup\x00') socket$nl_generic(0x10, 0x3, 0x10) 35.959585739s ago: executing program 9 (id=19933): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) close(r0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x20008000) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r2, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) 35.833410619s ago: executing program 9 (id=19934): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x30f6, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2050061, &(0x7f0000000bc0)) 35.631533576s ago: executing program 9 (id=19935): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791048000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) close(r0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x20008000) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r2, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$kcm(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000300)=""/143, 0x8f}], 0x1}, 0x2) 27.929449054s ago: executing program 4 (id=19940): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000180)="b9ff03076804268c989e14f088a8", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x24) 27.861754203s ago: executing program 4 (id=19941): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001140)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000c00)={r2, r0}) socketpair(0x1, 0x1, 0x0, 0x0) 27.77899877s ago: executing program 4 (id=19942): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xa, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b7020000000000006f0000000000000085000000c40000009500000000000080"], &(0x7f0000003ff6)='GPL\x00', 0x8, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c}, 0x5c) r1 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2105, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x828, 0x0, 0x0, 0x6, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001800050027bd70d400fedbdf54"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x8040) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000340)={r0, r2}, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c00000002030500000000000000000001000009090002000000000001000000090002c46883c50717f58a0008000340000000070800010001"], 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x4004000) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x8040) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x40810) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x28, 0x40, 0x107, 0xfffffffb, 0x0, {0x1, 0x7c}, [@nested={0x4, 0x142}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x6, 0x6, 0x0, 0x0, @str='\x80\n'}]}, @nested={0x4, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x48815}, 0xc000) recvmsg$kcm(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000005c0)=""/107, 0x6b}, {&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f0000000200)=""/150, 0x96}, {&(0x7f00000004c0)=""/224, 0xe0}, {&(0x7f0000000640)=""/251, 0xfb}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f00000013c0)=""/4075, 0xfeb}, {&(0x7f0000000140)=""/144, 0x90}], 0x8}, 0x10100) r6 = socket$kcm(0x10, 0x2, 0x0) getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r2, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x4, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x3, 0x61, 0x11, 0x4c}, [@call={0x85, 0x0, 0x0, 0x56}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008108090f9becdb4cb92e264831371900000069bd6efb2502eaf60d002700020400bf050005001201", 0x2e}], 0x1}, 0x0) 27.27422081s ago: executing program 4 (id=19943): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x6, 0x4, 0x400}, 0x50) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000005c0)={r0, &(0x7f00000003c0), &(0x7f0000000580)=@tcp=r1}, 0x20) socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r0, &(0x7f0000000140), 0x0, 0x1}, 0x20) 27.109271803s ago: executing program 4 (id=19944): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x30f6, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2050061, &(0x7f0000000bc0)) 26.491374206s ago: executing program 4 (id=19945): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x1, 0xffffffff80000000}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000001480)={&(0x7f00000012c0)=@file={0xfd, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000001440)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000800)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000007c0)={@cgroup=r3, 0xffffffffffffffff, 0xc, 0x1000}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@cgroup=r0, r0, 0x34, 0x400c, 0x0, @void, @value=r0}, 0x20) sendmsg$nl_xfrm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f0000001580)=ANY=[@ANYBLOB="100000001d00010029bd7000fbdbdf25"], 0x10}, 0x1, 0x0, 0x0, 0xc004}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000500)=r0, 0x4) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60a84c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2012) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000c80)=""/230, 0xe6}, {&(0x7f0000000d80)=""/4050, 0xfd2}, {&(0x7f00000038c0)=""/4111, 0x100f}, {&(0x7f0000000240)=""/141, 0x8d}, {&(0x7f0000000580)=""/123, 0x7b}], 0x5}, 0x120) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x104101, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x1, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe, 0x66c}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x2, 0x2, 0x73) close(r4) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, 0x0, 0x0) 24.522899253s ago: executing program 89 (id=19886): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe327, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000009800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000380)={0x0, 0x1c, &(0x7f0000000400)=[{&(0x7f00000002c0)="d7", 0xffffff2a}], 0x1}, 0x20004001) close(r4) 22.534409237s ago: executing program 90 (id=19913): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0xeba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB='\x00'/24], 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000780)=ANY=[@ANYBLOB="0a00000016", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x50) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)="4b28eef5e465fd6b1314df91d4b8ffd7514b8c7212bbdf", 0x17}, {&(0x7f00000009c0)="0bed198cd72af550532cb1ee9946724f7aa06b816444b7dd9e3fb20a8e3505b5d4ce686f63c1097675e06cacd0fd8edf60a6507225233d3f2f1d645cc9ae037b43e34e6cf2a32f46291e3b4b76774ebd12aba11ee129b378742d72b6af8ebdcbf0d679d5c4d81e29a9b0dc2085acc948ce6bbd36cea562ee12aa7cf927dd2f311db992ddc891a969f1af41d972174b464eeb6917f59146f939bd7e5a5bf04b0a867bce312e7eb676f494b108b6dbf9bb3f6338117e1bfb5633eaf44d42fcb5616b6e9dad622946aa8d66f5d5e0aeb3055d23929bab7543e639bac4f4990517943fa8f53bd80f6fb455fb3a9fcc9b5bc971e700bd", 0xf4}], 0x2, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"/336, @ANYRES32], 0x160}, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r3, 0x0, 0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x2}, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xcfa4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x30}, 0x40010040) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="4d9bfab8320ea38a9bddc1a7373ddf17566d6e1a9ee93c6cc0e439f52e968dabdd48a362fc3942c5db5ad065e44034125cf9c5b3471c01d4953b52dfc140cd897838c512e61dc5e2872cbf798bc7a6173f6e6acb03280fe51e540dd27568731bb3a954aae26748e25d45bfc21b4c3d24c542651c54537c2e558f5160862d6614a24439c4"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0}, 0x24000000) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000200"/20, @ANYRES32, @ANYBLOB="0200000000000003"], 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x890b, &(0x7f0000000100)) 22.011773235s ago: executing program 91 (id=19925): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x90100, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1000, 0x2, @perf_config_ext={0x0, 0x2}, 0x1306, 0x2, 0x0, 0x2, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa8}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], &(0x7f00000002c0)='syzkaller\x00'}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, r3, 0x25, 0x0, @val=@kprobe_multi=@addrs={0x1, 0x0, 0x0, 0x0, 0x3}}, 0x30) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080)=r4, 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000340)=r5, 0x4) 20.53486143s ago: executing program 92 (id=19935): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791048000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) close(r0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x20008000) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r2, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$kcm(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000300)=""/143, 0x8f}], 0x1}, 0x2) 12.259931386s ago: executing program 1 (id=19946): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, 0x0) r2 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r2, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000780)="80005b020eaa4da2", 0xfdef}], 0x1, 0x0, 0x0, 0x900}, 0x0) 11.614814914s ago: executing program 1 (id=19950): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000002c0)="d8000000100081044e81f782db44b904021d006a0f000000e8fe55a1290015000600142603600e120900040044000000a80016000a0003402e60000000000000b94dcf5c0461c1d67f6f94007134cf6ee08021a0e408e8d8ef52a985162f7ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d3220a7c9f8775730d16a4803f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e970103966fdd61fa77acfc755cb8a3ad0c4114ce21a3edb40c0fe7273add33192def2a5b81f2c0fc32ad7d018b54458b05d835ec213b22f5bd89f1e498afe10f7c652c31a5ec0c6881a50d84453d7d3ea7690c6a4293c3f48fd638f5eb67d2deb5d29b1b69fe87f34abf5db169b404b4c7190bf2757d8b981de719f7d6c68372537a1b9cad0d86a9831ff7fd21bd900a5845ad360ed492002bf9d43b496c856d9c6a5fe85c99e17b9b17e00d46f92d18e75c8226c3d70901093dee01000000000000008fce8e55d79ab91fcb6ece7a8a59a89547fc30972ea487ecaf1c654c4b93b4d0b86cb7a744", 0x1be}], 0x1}, 0x60044084) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r0}, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r1) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r2, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000500)={r3, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) 11.495521115s ago: executing program 8 (id=19947): socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1c, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 11.34072617s ago: executing program 93 (id=19945): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x1, 0xffffffff80000000}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000001480)={&(0x7f00000012c0)=@file={0xfd, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000001440)=[@rights={{0x14, 0x1, 0x1, [r2]}}], 0x18}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000800)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000007c0)={@cgroup=r3, 0xffffffffffffffff, 0xc, 0x1000}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@cgroup=r0, r0, 0x34, 0x400c, 0x0, @void, @value=r0}, 0x20) sendmsg$nl_xfrm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f0000001580)=ANY=[@ANYBLOB="100000001d00010029bd7000fbdbdf25"], 0x10}, 0x1, 0x0, 0x0, 0xc004}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000500)=r0, 0x4) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60a84c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2012) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000c80)=""/230, 0xe6}, {&(0x7f0000000d80)=""/4050, 0xfd2}, {&(0x7f00000038c0)=""/4111, 0x100f}, {&(0x7f0000000240)=""/141, 0x8d}, {&(0x7f0000000580)=""/123, 0x7b}], 0x5}, 0x120) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x104101, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x1, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe, 0x66c}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x2, 0x2, 0x73) close(r4) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, 0x0, 0x0) 11.305509425s ago: executing program 1 (id=19952): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0xffffffff, 0x0, 0xb}, {0x10000002, 0x0, 0x4, 0x2}]}, 0x94) close(0x3) r1 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x64, &(0x7f0000000000)=r4, 0x10) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000140)=[{&(0x7f00000005c0)="df", 0x1}], 0x1}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000480)=ANY=[], 0xc0}, 0x1, 0x0, 0x0, 0x4000854}, 0x40) 11.297344003s ago: executing program 8 (id=19953): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xa, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b7020000000000006f0000000000000085000000c40000009500000000000080"], &(0x7f0000003ff6)='GPL\x00', 0x8, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c}, 0x5c) r1 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2105, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x828, 0x0, 0x0, 0x6, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001800050027bd70d400fedbdf54"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x8040) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000340)={r0, r2}, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c00000002030500000000000000000001000009090002000000000001000000090002c46883c50717f58a0008000340000000070800010001"], 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x4004000) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x8040) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x40810) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x28, 0x40, 0x107, 0xfffffffb, 0x0, {0x1, 0x7c}, [@nested={0x4, 0x142}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x6, 0x6, 0x0, 0x0, @str='\x80\n'}]}, @nested={0x4, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x48815}, 0xc000) recvmsg$kcm(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000005c0)=""/107, 0x6b}, {&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f0000000200)=""/150, 0x96}, {&(0x7f00000004c0)=""/224, 0xe0}, {&(0x7f0000000640)=""/251, 0xfb}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f00000013c0)=""/4075, 0xfeb}, {&(0x7f0000000140)=""/144, 0x90}], 0x8}, 0x10100) r6 = socket$kcm(0x10, 0x2, 0x0) getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r2, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x4, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x3, 0x61, 0x11, 0x4c}, [@call={0x85, 0x0, 0x0, 0x56}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008108090f9becdb4cb92e264831371900000069bd6efb2502eaf60d002700020400bf050005001201", 0x2e}], 0x1}, 0x0) 11.067640277s ago: executing program 1 (id=19954): r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000003a80)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}], 0x20}, 0x4008804) recvmsg$kcm(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x40010102) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x0, @local}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000100)="fb", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1}, 0x40010040) 10.939511666s ago: executing program 1 (id=19955): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x30f6, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2050061, &(0x7f0000000bc0)) 10.351779653s ago: executing program 1 (id=19956): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x43, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYRES16=r0], 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0x1, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}, {0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 10.177614366s ago: executing program 8 (id=19958): socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) clock_adjtime(0xffffffd3, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000100)=ANY=[@ANYRES32], 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x88031, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4ea4, 0x0, @local, 0x9}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, 0x0, 0x0, 0x2c}, 0x44004) 9.732661705s ago: executing program 8 (id=19962): r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000003a80)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}], 0x20}, 0x4008804) recvmsg$kcm(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x40010102) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x0, @local}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000100)="fb", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1}, 0x40010040) 9.5746383s ago: executing program 8 (id=19964): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x30f6, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2050061, &(0x7f0000000bc0)) 8.548169797s ago: executing program 8 (id=19967): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xa, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b7020000000000006f0000000000000085000000c40000009500000000000080"], &(0x7f0000003ff6)='GPL\x00', 0x8, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c}, 0x5c) r1 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2105, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x828, 0x0, 0x0, 0x6, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001800050027bd70d400fedbdf54"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x8040) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000340)={r0, r2}, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c00000002030500000000000000000001000009090002000000000001000000090002c46883c50717f58a0008000340000000070800010001"], 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x4004000) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x8040) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x40810) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x28, 0x40, 0x107, 0xfffffffb, 0x0, {0x1, 0x7c}, [@nested={0x4, 0x142}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x6, 0x6, 0x0, 0x0, @str='\x80\n'}]}, @nested={0x4, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x48815}, 0xc000) recvmsg$kcm(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000005c0)=""/107, 0x6b}, {&(0x7f0000000080)=""/27, 0x1b}, {&(0x7f0000000200)=""/150, 0x96}, {&(0x7f00000004c0)=""/224, 0xe0}, {&(0x7f0000000640)=""/251, 0xfb}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f00000013c0)=""/4075, 0xfeb}, {&(0x7f0000000140)=""/144, 0x90}], 0x8}, 0x10100) r6 = socket$kcm(0x10, 0x2, 0x0) getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r2, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x4, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x3, 0x61, 0x11, 0x4c}, [@call={0x85, 0x0, 0x0, 0x56}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008108090f9becdb4cb92e264831371900000069bd6efb2502eaf60d002700020400bf050005001201", 0x2e}], 0x1}, 0x0) 7.880008391s ago: executing program 0 (id=19971): socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) clock_adjtime(0xffffffd3, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000100)=ANY=[@ANYRES32], 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x88031, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4ea4, 0x0, @local, 0x9}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, 0x0, 0x0, 0x2c}, 0x44004) 7.468710806s ago: executing program 0 (id=19972): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x6, 0x4}, 0x102260, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$netlink(0x10, 0x3, 0x10) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) socket$unix(0x1, 0x1, 0x0) sendto$packet(r0, &(0x7f0000000100)="f257a8ea7bc273dfaeab96", 0xb, 0x0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) 7.31100215s ago: executing program 0 (id=19974): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=ANY=[], 0xa8}}, 0x0) 7.211861725s ago: executing program 0 (id=19975): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) socket(0x41503864490ca358, 0x6, 0xffffffff) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x2) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f00000014c0)=0x4d) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000880)={0x3ff, {{0x2, 0x4e23, @multicast2}}}, 0x90) socket$inet6(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r4, &(0x7f00000000c0)="b2", 0x1, 0x24008844, &(0x7f0000000040)={0xa, 0x2, 0x80398, @empty, 0xfffffffe}, 0x1c) shutdown(r4, 0x1) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000440)={&(0x7f000047b000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0}, &(0x7f0000000340)=0x40) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x2a, 0xe9, 0x0, 0x0, 0x0, 0x7, 0x80d10, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8006, 0x6}, 0x10c809, 0x400, 0xdb, 0x5, 0x3, 0x20005, 0xa, 0x0, 0x0, 0x0, 0x20000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet6_sctp(0xa, 0x5, 0x84) 6.258832044s ago: executing program 0 (id=19976): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2050061, &(0x7f0000000bc0)) 6.078915495s ago: executing program 0 (id=19977): r0 = socket$igmp(0x2, 0x3, 0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000005000000000000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r1, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$inet(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000100)="0f024a3bb690944e3de505d3fced17aab3fc6219c223664b375536c43567b24217e7515b6bcc37c8ebc93e44706d388af11f89fff5df3f3c79372812dc95f7b1ca96c12eed232568f7f9b84cdbd6ababb6ca215ace17674ec1a8a30fc08a9a897aea8220c07207c0e46eaa8c6bdd844de199c51e5083a17f977bed486827cba2971472aa5a2ccac93df1be76a576f791f9778e8342e35eea79baa2da394b8f0ae40682d3742748724a2d0d37a2c0b553f44ba8f211424765f8fc7ed0f78991b14b279f736883abe88d1ea836732a28bea1b3f719361b672e68a1839eedc67915707fcede", 0xe4}, {&(0x7f0000000a00)="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", 0x4bd}], 0x2, &(0x7f0000000840)=ANY=[@ANYBLOB="380000000000000000000000070000004424e6d3ac1414aa00000001ac1e000100000dcdffffffff00000057ac1414bb00000002940401001c000000000000000000000008000000", @ANYRES32=r2], 0x58}, 0x0) 4.612368092s ago: executing program 6 (id=19951): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000180)="b9ff03076804268c989e14f088a8", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x24) 4.541609451s ago: executing program 6 (id=19980): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000780)="80005b020eaa4da2", 0xfdef}], 0x1, 0x0, 0x0, 0x900}, 0x0) 4.359237562s ago: executing program 6 (id=19982): socketpair$unix(0x1, 0x3, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f00000015c0)=[{{&(0x7f0000001800)=@un=@abs, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000240)=""/30, 0x1e}, {&(0x7f0000000500)=""/239, 0xef}, {&(0x7f0000000440)=""/77, 0x4d}, {&(0x7f0000003700)=""/4096, 0x1000}, {0x0}], 0x5, &(0x7f0000000c00)=""/149, 0x95}}, {{&(0x7f0000000cc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d40)=""/63, 0x3f}, {&(0x7f0000000d80)=""/31, 0x1f}, {&(0x7f0000000dc0)=""/210, 0xd2}, {&(0x7f0000000ec0)=""/223, 0xdf}], 0x4, &(0x7f0000001700)=""/253, 0xfd}, 0x5}, {{&(0x7f0000001000)=@generic, 0x80, &(0x7f00000033c0)=[{&(0x7f0000002200)=""/25, 0x19}, {&(0x7f0000002240)=""/156, 0x9c}, {&(0x7f0000002300)=""/132, 0x84}, {&(0x7f0000005d40)=""/4106, 0x100a}], 0x4}, 0xfff}, {{&(0x7f0000003440)=@xdp, 0x80, &(0x7f0000003580)=[{&(0x7f00000034c0)=""/165, 0xa5}], 0x1, &(0x7f0000001240)=""/4, 0x4}, 0x886e}, {{&(0x7f00000010c0)=@phonet, 0x80, &(0x7f0000001480)=[{&(0x7f0000001880)=""/214, 0xd6}, {&(0x7f0000001140)=""/12, 0xc}, {&(0x7f00000003c0)=""/103, 0x67}, {&(0x7f0000001300)=""/181, 0xb5}, {&(0x7f00000013c0)=""/144, 0x90}], 0x5, &(0x7f0000001180)=""/153, 0x99}, 0x5d9}], 0x5, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x7c}}, 0x0) rseq(&(0x7f0000001080)={0x0, 0x0, 0x0, 0x1}, 0x20, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f00000002c0)=@v2={0x5, 0x2, 0x15, 0x55, 0xe6, "0fafb9b350844d5d9acd68bed01160d86e9ffbf1165454af54e08213c9947499e34df0b6f1f69e76a67e3b2f799553ba2b3b5fb4578033c2880e958d77c51c274d0018695a5c1e40868e8c82ed84e97ff4d30649eec6b63149c6f7dcd960315057ffad2db8adb09d498966d432c892469ac74ed2765de1d1ea4534f3dc75d95800a3e1dfc6f8c4ba476e2dcb4b86d186515c02245941b8db68456bb86390b9fa2776cc79896ef010232c9b7e28ee134be4122464c22ca6ef3fe000fe0c9d09c2af854b33bb94e86916a14a578f981ab5f05fa77d6b85b42e23342c7e18c0d421a1c564464fbb"}, 0xef, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c00000010004b0429bd7000faffffff7a000000", @ANYRES32=0x0, @ANYBLOB="08b0010006820000400012800b0001006272696467650000300002800c0022000000000400000000050024000100000006000800a8880000080005000100000005002b00050000000a0001"], 0x6c}, 0x1, 0x0, 0x0, 0x40001}, 0x20000000) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x1000) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x25dfdbfc, {{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x200000000000}, 0xffffffff, 0x0, 0x1}, [@tmpl={0x44, 0x5, [{{@in6=@empty, 0x2, 0x2b}, 0xa, @in6=@local, 0x0, 0x4}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x8, 0x4) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r2, &(0x7f0000004d00)=[{{0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x30000}}], 0x300, 0xf00) creat(&(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x803401, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000680)='./file0\x00', 0x1000001, &(0x7f0000000040)={[{@usrquota}, {@nojournal_checksum}]}, 0x21, 0x4bd, &(0x7f00000006c0)="$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") 3.351510712s ago: executing program 6 (id=19986): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2050061, &(0x7f0000000bc0)) 2.996622296s ago: executing program 6 (id=19988): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff0000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x56ab, &(0x7f0000000040)={0x0, 0xf4ff, 0xc000, 0x2c, 0xa0002f5}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0x1, 0x58, &(0x7f0000000640)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r3, 0x6, 0x8}, 0xc) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x324, r2, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x101}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER={0xe4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'pimreg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, '\x00', 0x26}}}, {0x14, 0x2, @in={0x2, 0x4e22, @local}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3b0c}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x98a}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK={0x1c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb}]}]}, @TIPC_NLA_NET={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x10000}]}, @TIPC_NLA_NODE={0xc8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_KEY={0x48, 0x4, {'gcm(aes)\x00', 0x20, "c07eb626e8e8f4080318dae8757d3d61f0e2b56c6ce0b714ee27ce89d747425f"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ID={0x1e, 0x3, "89909076202bc9c370070610d1eefb2094ecb69104786d824a70"}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_ID={0x44, 0x3, "99b852b638666ed79541182112e79d01abf99c2d8ae791d5e65cc14e9efa113de0888babac9d5896658728a0488ce21c253007661e833c67cf5c22466bf6d52e"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x3, @mcast2, 0x10}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xf4, @loopback, 0xd5bb}}}}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER={0x94, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x43}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa821}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x324}, 0x1, 0x0, 0x0, 0x4004800}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100), 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0xfffffffffffffda2, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f00000006c0)={0x4, 0x0, 0x0, 0x0, 0x132, 0x3}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x24, &(0x7f0000000000)=0xa, 0x4) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x42002) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000480)={0x6, 0x400000, 0x0, 'queue1\x00', 0x37fffe}) write$sndseq(r5, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @time={0x5d, 0x2}, {0x0, 0x10}, {}, @raw32={[0x0, 0x0, 0xb8]}}], 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f0000000140)={0x1e6, @tick=0x9}) syz_emit_ethernet(0x4a, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaa60086dd6000000000140600fe8000000000000000000000000000bb"], 0x0) io_uring_enter(r1, 0x2218, 0x7721, 0x16, 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="700000001e0021020000000000000000070000005c613a0a36bc7a9cf060106647004480"], 0x70}}, 0x4000080) sendmsg$inet(r0, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) 669.298946ms ago: executing program 5 (id=19993): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a3200"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB], 0x84}}, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000), 0x10) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f00000000c0), 0xf00) close(r0) 568.64692ms ago: executing program 5 (id=19994): bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x42202) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$XFS_IOC_RTGROUP_GEOMETRY(r0, 0xc0805841, &(0x7f00000005c0)={0x10b, 0x3, 0x101, 0x1, 0x13f}) write$sndseq(r0, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000180)={0x292, @time={0x8, 0xffffff}, 0x3, {0x1, 0xfc}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x2, @empty, 0xcac2d78a}}, 0x0, 0x0, 0x43, 0x0, "ee8b0e650926a96ecc136e7fb980e989db9e8bf9b93129488f651a8de213eb94cd46e19d9c65a018444a131f4da55a02ddbe2665dca1029607462029add09240005c6776267517308a3d40aa1c788df6"}, 0xd8) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x0, 0xd}, 0x2000, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0x1, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f00000001c0)=@gcm_256={{0x304}, "6ae04425ace3f60c", "acba84f0a6731f234db1cc7f3f382ad796bd667cb12ea99509873931d2873103", "0f9dafb4", "ec3fff9afd96e6c0"}, 0x38) writev(r1, &(0x7f0000000580)=[{&(0x7f0000000200)="0d1ba67e5bc60f6c4f3fc4d4232f2e5865ded6d2ae8cb810912ebb596c048dcbbb7c935eee0befd1b5be1138bf0a4a93e8f653adacede9bb61f3ebfc79fd9261e151053139a274bc052f2d96b3302868b07011d05a4338a625b247b2687f0138c773a912fd", 0x65}, {&(0x7f0000000100)="c39e15bfbe7bd93524deb282bbccdaf51a89aab850773a8410da", 0x1a}, {&(0x7f0000000400)="231ed232e4b5d4c5ee96bf298c2c8c2c0e279744949e8660decdaaf08f63e0", 0x1f}, {&(0x7f0000000440)="6eaba4145af8e38bc956a48a324df3f4998d4e838bd4d3e537dcc3d703cce0fd515b63f21510d452f0902784a6a8700159cb0befc6d48a3eb311b13690a3c1469dffeddc73d67e1931a88ab7efcdc0acec574e2d2cb716da34b0054614a63bb020040eb395482458cd60455a6037b44d3f35cf326f5d3ac7017664550d9a979ec4d313c2978357147821b9246e5bb0821e77e8ee49918c7642c3d96cd646fde7a7ab1ccf27e6d39481ad64b386980b4351349e6718ef15f22daf9dadd1ae9c9bb2b2b3315ae669a739de59e5bfc520bafb44e07d45d7fbbe21646a8bb666ffa4299cf3859c0ce8714154a9505c4dadd9b59882a367d979595fa64c10", 0xfc}], 0x4) 390.196902ms ago: executing program 5 (id=19995): sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000400)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) 229.451416ms ago: executing program 5 (id=19996): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000072"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x20008000) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYRES32=r2, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) 150.441584ms ago: executing program 5 (id=19997): socket$kcm(0x2a, 0x2, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x5, 0x84) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x61, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73772cc9f1ba1f848430000005e1406ca000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) 0s ago: executing program 5 (id=19998): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2050061, &(0x7f0000000bc0)) kernel console output (not intermixed with test programs): ace batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2095.958608][ T549] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2095.979780][ T532] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2095.996785][ T572] bridge0: port 2(bridge_slave_1) entered blocking state [ 2096.007529][ T572] bridge0: port 2(bridge_slave_1) entered disabled state [ 2096.014832][ T572] bridge_slave_1: entered allmulticast mode [ 2096.038774][ T572] bridge_slave_1: entered promiscuous mode [ 2096.114693][ T572] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2096.129230][ T549] hsr_slave_0: entered promiscuous mode [ 2096.135454][ T549] hsr_slave_1: entered promiscuous mode [ 2096.158278][ T549] debugfs: 'hsr0' already exists in 'hsr' [ 2096.164030][ T549] Cannot create hsr debugfs directory [ 2096.185769][ T529] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2096.205842][ T572] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2096.244856][T13251] bridge_slave_1: left allmulticast mode [ 2096.252160][T13251] bridge_slave_1: left promiscuous mode [ 2096.267564][T13251] bridge0: port 2(bridge_slave_1) entered disabled state [ 2096.288133][T13251] bridge_slave_0: left allmulticast mode [ 2096.293797][T13251] bridge_slave_0: left promiscuous mode [ 2096.307449][T13251] bridge0: port 1(bridge_slave_0) entered disabled state [ 2096.328234][T13251] bridge_slave_1: left allmulticast mode [ 2096.333911][T13251] bridge_slave_1: left promiscuous mode [ 2096.347491][T13251] bridge0: port 2(bridge_slave_1) entered disabled state [ 2096.368567][T13251] bridge_slave_0: left allmulticast mode [ 2096.374230][T13251] bridge_slave_0: left promiscuous mode [ 2096.389052][T13251] bridge0: port 1(bridge_slave_0) entered disabled state [ 2096.690331][T13251] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2096.700747][T13251] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2096.712191][T13251] bond0 (unregistering): Released all slaves [ 2096.780647][T13251] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2096.798621][T13251] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2096.819835][T13251] bond0 (unregistering): Released all slaves [ 2096.838882][ T572] team0: Port device team_slave_0 added [ 2096.852367][ T529] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2096.882797][ T572] team0: Port device team_slave_1 added [ 2096.943293][ T529] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2097.040447][T13251] hsr_slave_0: left promiscuous mode [ 2097.060393][T13251] hsr_slave_1: left promiscuous mode [ 2097.066125][T13251] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2097.087522][T13251] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2097.098869][T13251] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2097.108941][T13251] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2097.130685][T13251] hsr_slave_0: left promiscuous mode [ 2097.157903][T13251] hsr_slave_1: left promiscuous mode [ 2097.163620][T13251] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2097.188520][T13251] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2097.199000][T13251] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2097.206386][T13251] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2097.259483][T13251] veth1_macvtap: left promiscuous mode [ 2097.265003][T13251] veth0_macvtap: left promiscuous mode [ 2097.288826][T13251] veth1_vlan: left promiscuous mode [ 2097.294174][T13251] veth0_vlan: left promiscuous mode [ 2097.318616][T13251] veth1_macvtap: left promiscuous mode [ 2097.324116][T13251] veth0_macvtap: left promiscuous mode [ 2097.337429][T13251] veth1_vlan: left promiscuous mode [ 2097.342724][T13251] veth0_vlan: left promiscuous mode [ 2097.557547][T13251] team0 (unregistering): Port device team_slave_1 removed [ 2097.569890][T13251] team0 (unregistering): Port device team_slave_0 removed [ 2097.641219][T13251] team0 (unregistering): Port device team_slave_1 removed [ 2097.654168][T13251] team0 (unregistering): Port device team_slave_0 removed [ 2097.696760][ T572] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2097.707074][ T572] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2097.733849][ T572] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2097.753816][ T529] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2097.773140][ T572] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2097.780486][ T572] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2097.808203][ T572] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2097.886899][ T572] hsr_slave_0: entered promiscuous mode [ 2097.893367][ T572] hsr_slave_1: entered promiscuous mode [ 2097.899314][ T572] debugfs: 'hsr0' already exists in 'hsr' [ 2097.905030][ T572] Cannot create hsr debugfs directory [ 2097.936519][ T532] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2097.970096][ T532] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2097.987513][ T532] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2098.012882][ T529] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 2098.023031][ T532] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2098.040636][ T529] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 2098.069443][ T529] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 2098.109348][ T529] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 2098.202058][ T532] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2098.232080][ T532] 8021q: adding VLAN 0 to HW filter on device team0 [ 2098.249214][ T9141] bridge0: port 1(bridge_slave_0) entered blocking state [ 2098.256311][ T9141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2098.272193][ T529] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2098.284420][ T529] 8021q: adding VLAN 0 to HW filter on device team0 [ 2098.295687][ T9141] bridge0: port 2(bridge_slave_1) entered blocking state [ 2098.302837][ T9141] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2098.368147][ T4180] bridge0: port 1(bridge_slave_0) entered blocking state [ 2098.375228][ T4180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2098.385336][ T4180] bridge0: port 2(bridge_slave_1) entered blocking state [ 2098.392444][ T4180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2098.431282][ T549] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2098.472795][ T549] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2098.499034][ T549] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2098.510421][ T549] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2098.641449][ T532] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2098.686107][ T529] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2098.751857][ T572] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 2098.774563][ T572] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 2098.806389][ T572] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 2098.826762][ T572] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 2098.940947][ T549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2098.975349][ T532] veth0_vlan: entered promiscuous mode [ 2098.987787][ T549] 8021q: adding VLAN 0 to HW filter on device team0 [ 2099.012534][ T532] veth1_vlan: entered promiscuous mode [ 2099.055129][ T4180] bridge0: port 1(bridge_slave_0) entered blocking state [ 2099.062262][ T4180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2099.074436][ T4180] bridge0: port 2(bridge_slave_1) entered blocking state [ 2099.081552][ T4180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2099.198308][ T532] veth0_macvtap: entered promiscuous mode [ 2099.209020][ T572] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2099.237259][ T532] veth1_macvtap: entered promiscuous mode [ 2099.303718][ T572] 8021q: adding VLAN 0 to HW filter on device team0 [ 2099.342395][ T529] veth0_vlan: entered promiscuous mode [ 2099.361478][T28324] bridge0: port 1(bridge_slave_0) entered blocking state [ 2099.368603][T28324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2099.397873][ T532] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2099.407057][T13251] bridge0: port 2(bridge_slave_1) entered blocking state [ 2099.414163][T13251] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2099.430973][ T529] veth1_vlan: entered promiscuous mode [ 2099.461897][ T532] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2099.509712][ T549] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2099.531062][ T529] veth0_macvtap: entered promiscuous mode [ 2099.541412][T13251] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2099.565896][T13251] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2099.575047][T13251] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2099.589032][ T529] veth1_macvtap: entered promiscuous mode [ 2099.606978][T13251] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2099.713486][ T529] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2099.772036][ T529] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2099.825449][ T4180] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2099.870428][ T4180] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2099.902050][ T4180] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2099.925270][ T4180] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2099.998952][ T28] kauditd_printk_skb: 523 callbacks suppressed [ 2099.998968][ T28] audit: type=1400 audit(1772597094.978:104901): avc: denied { recv } for pid=719 comm="syz.3.18084" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2100.041695][ T714] syzkaller0: entered promiscuous mode [ 2100.048890][ T28] audit: type=1400 audit(1772597094.978:104902): avc: denied { open } for pid=719 comm="syz.3.18084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2100.072457][ T714] syzkaller0: entered allmulticast mode [ 2100.081079][ T28] audit: type=1400 audit(1772597094.978:104903): avc: denied { perfmon } for pid=719 comm="syz.3.18084" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2100.130131][ T28] audit: type=1400 audit(1772597094.978:104904): avc: denied { kernel } for pid=719 comm="syz.3.18084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2100.171613][ T572] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2100.198089][ T28] audit: type=1400 audit(1772597094.978:104905): avc: denied { prog_load } for pid=711 comm="syz.5.18090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2100.323261][ T28] audit: type=1400 audit(1772597094.978:104906): avc: denied { bpf } for pid=711 comm="syz.5.18090" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2100.334277][ T549] veth0_vlan: entered promiscuous mode [ 2100.358240][ T28] audit: type=1400 audit(1772597095.018:104907): avc: denied { perfmon } for pid=719 comm="syz.3.18084" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2100.435419][ T735] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2100.440026][ T549] veth1_vlan: entered promiscuous mode [ 2100.443331][T32610] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2100.453987][T32610] audit: audit_lost=1272 audit_rate_limit=0 audit_backlog_limit=64 [ 2100.596402][ T549] veth0_macvtap: entered promiscuous mode [ 2100.652201][ T549] veth1_macvtap: entered promiscuous mode [ 2100.781245][ T549] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2100.831443][ T549] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2100.892986][T28324] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2100.909061][T28324] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2100.949671][T28324] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2100.967506][T28324] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2101.015451][ T572] veth0_vlan: entered promiscuous mode [ 2101.091531][ T572] veth1_vlan: entered promiscuous mode [ 2101.223101][ T572] veth0_macvtap: entered promiscuous mode [ 2101.273082][ T572] veth1_macvtap: entered promiscuous mode [ 2101.456096][ T761] syzkaller0: entered promiscuous mode [ 2101.462855][ T761] syzkaller0: entered allmulticast mode [ 2101.547533][ T572] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2101.596710][ T572] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2101.630301][ T9141] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2101.657428][ T9141] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2101.666225][ T9141] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2101.714716][ T9141] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2102.661801][ T832] syzkaller0: entered promiscuous mode [ 2102.687299][ T832] syzkaller0: entered allmulticast mode [ 2103.004865][ T865] netlink: 8 bytes leftover after parsing attributes in process `syz.7.18137'. [ 2103.054879][ T865] openvswitch: netlink: Flow key attr not present in new flow. [ 2103.429892][ T893] netlink: 60 bytes leftover after parsing attributes in process `syz.3.18150'. [ 2103.448697][ T893] netlink: 60 bytes leftover after parsing attributes in process `syz.3.18150'. [ 2103.469373][ T893] netlink: 60 bytes leftover after parsing attributes in process `syz.3.18150'. [ 2105.018792][ T28] kauditd_printk_skb: 1537 callbacks suppressed [ 2105.018807][ T28] audit: type=1400 audit(1772597099.998:106400): avc: denied { recv } for pid=2998 comm="udevd" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2105.045143][ T949] netlink: 'syz.9.18172': attribute type 21 has an invalid length. [ 2105.077211][ T28] audit: type=1400 audit(1772597099.998:106401): avc: denied { recv } for pid=529 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2105.104644][ T28] audit: type=1400 audit(1772597100.038:106402): avc: denied { read } for pid=944 comm="syz.5.18171" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 2105.141441][ T949] netlink: 128 bytes leftover after parsing attributes in process `syz.9.18172'. [ 2105.193639][ T949] netlink: 'syz.9.18172': attribute type 5 has an invalid length. [ 2105.208468][ T949] netlink: 3 bytes leftover after parsing attributes in process `syz.9.18172'. [ 2105.292014][ T956] netlink: 272 bytes leftover after parsing attributes in process `syz.3.18173'. [ 2105.650707][ T28] audit: type=1400 audit(1772597100.038:106403): avc: denied { open } for pid=944 comm="syz.5.18171" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 2105.674468][ T28] audit: type=1400 audit(1772597100.038:106404): avc: denied { ioctl } for pid=944 comm="syz.5.18171" path="/dev/ppp" dev="devtmpfs" ino=140 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 2105.700252][ T28] audit: type=1400 audit(1772597100.048:106405): avc: denied { read write } for pid=572 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2105.729139][ T961] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2105.735744][ T961] audit: audit_lost=1288 audit_rate_limit=0 audit_backlog_limit=64 [ 2105.743839][ T961] audit: backlog limit exceeded [ 2105.750772][ T961] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2106.984906][ T1045] sysfs: Unknown parameter 'obj_type' [ 2110.511639][ T28] kauditd_printk_skb: 1181 callbacks suppressed [ 2110.511655][ T28] audit: type=1400 audit(1772597105.488:107438): avc: denied { recv } for pid=1108 comm="syz.7.18246" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2110.870113][ T28] audit: type=1400 audit(1772597105.848:107439): avc: denied { egress } for pid=1108 comm="syz.7.18246" saddr=fe80::a8aa:aaff:feaa:aa1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2110.927611][ T28] audit: type=1400 audit(1772597105.848:107440): avc: denied { sendto } for pid=1108 comm="syz.7.18246" saddr=fe80::a8aa:aaff:feaa:aa1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 2111.136777][ T28] audit: type=1400 audit(1772597106.108:107441): avc: denied { recv } for pid=2998 comm="udevd" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2111.197455][ T28] audit: type=1400 audit(1772597106.118:107442): avc: denied { recv } for pid=2998 comm="udevd" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2111.274599][ T28] audit: type=1400 audit(1772597106.118:107443): avc: denied { read write } for pid=572 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2111.308848][ T28] audit: type=1400 audit(1772597106.118:107444): avc: denied { open } for pid=572 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2111.309490][ T1119] netlink: 'syz.9.18252': attribute type 33 has an invalid length. [ 2111.334944][ T28] audit: type=1400 audit(1772597106.118:107445): avc: denied { ioctl } for pid=572 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=107 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2111.369401][ T28] audit: type=1400 audit(1772597106.168:107446): avc: denied { prog_load } for pid=1116 comm="syz.7.18249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2111.408067][ T28] audit: type=1400 audit(1772597106.168:107447): avc: denied { bpf } for pid=1116 comm="syz.7.18249" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2111.429242][ T1119] netlink: 152 bytes leftover after parsing attributes in process `syz.9.18252'. [ 2111.468010][ T1124] netlink: 14 bytes leftover after parsing attributes in process `syz.9.18252'. [ 2111.734912][ T1139] netlink: 8 bytes leftover after parsing attributes in process `syz.7.18256'. [ 2115.517363][ T28] kauditd_printk_skb: 477 callbacks suppressed [ 2115.517379][ T28] audit: type=1400 audit(1772597110.488:107925): avc: denied { recv } for pid=3296 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2115.605125][ T28] audit: type=1400 audit(1772597110.498:107926): avc: denied { create } for pid=1179 comm="syz.2.18276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2115.691204][ T28] audit: type=1400 audit(1772597110.498:107927): avc: denied { setopt } for pid=1179 comm="syz.2.18276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2115.755526][ T28] audit: type=1400 audit(1772597110.498:107928): avc: denied { connect } for pid=1179 comm="syz.2.18276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2115.784086][ T1192] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2115.796954][ T1190] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2115.807523][ T1190] audit: audit_lost=1339 audit_rate_limit=0 audit_backlog_limit=64 [ 2115.818994][ T1192] audit: audit_lost=1340 audit_rate_limit=0 audit_backlog_limit=64 [ 2115.827940][ T1190] audit: backlog limit exceeded [ 2115.835579][ T1194] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2115.931245][ T1197] netlink: 8 bytes leftover after parsing attributes in process `syz.7.18283'. [ 2118.873410][ T1346] netlink: 8 bytes leftover after parsing attributes in process `syz.3.18346'. [ 2119.162887][ T1359] netlink: 'syz.7.18351': attribute type 2 has an invalid length. [ 2119.211391][ T1359] netlink: 132 bytes leftover after parsing attributes in process `syz.7.18351'. [ 2119.215246][ T1364] netlink: 'syz.7.18351': attribute type 2 has an invalid length. [ 2119.244884][ T1364] netlink: 132 bytes leftover after parsing attributes in process `syz.7.18351'. [ 2119.502213][ T1376] netlink: 8 bytes leftover after parsing attributes in process `syz.7.18359'. [ 2120.007187][ T1403] netlink: 8 bytes leftover after parsing attributes in process `syz.9.18372'. [ 2120.531537][ T28] kauditd_printk_skb: 1558 callbacks suppressed [ 2120.531552][ T28] audit: type=1400 audit(1772597115.508:109484): avc: denied { read write } for pid=549 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2120.591554][ T28] audit: type=1400 audit(1772597115.508:109485): avc: denied { open } for pid=549 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2120.652627][ T1435] netlink: 8 bytes leftover after parsing attributes in process `syz.9.18386'. [ 2120.656912][ T28] audit: type=1400 audit(1772597115.508:109486): avc: denied { ioctl } for pid=549 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=102 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2120.723838][ T28] audit: type=1400 audit(1772597115.548:109487): avc: denied { create } for pid=1430 comm="syz.2.18385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2120.787073][ T28] audit: type=1400 audit(1772597115.548:109488): avc: denied { open } for pid=1430 comm="syz.2.18385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2120.834332][ T1439] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2120.843549][ T28] audit: type=1400 audit(1772597115.548:109489): avc: denied { perfmon } for pid=1430 comm="syz.2.18385" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2120.849241][ T1440] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2120.872924][ T1442] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2120.880201][ T1443] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2122.442630][T13249] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2122.515919][T13249] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2122.578628][T13249] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2122.672448][T13249] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2122.800760][ T1469] lo speed is unknown, defaulting to 1000 [ 2122.806605][T13249] bridge_slave_1: left allmulticast mode [ 2122.822549][T13249] bridge_slave_1: left promiscuous mode [ 2122.833933][T13249] bridge0: port 2(bridge_slave_1) entered disabled state [ 2122.858416][T13249] bridge_slave_0: left allmulticast mode [ 2122.864081][T13249] bridge_slave_0: left promiscuous mode [ 2122.878262][T13249] bridge0: port 1(bridge_slave_0) entered disabled state [ 2123.041869][T13249] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2123.068293][T13249] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2123.087487][T13249] bond0 (unregistering): Released all slaves [ 2123.103768][ T1469] lo speed is unknown, defaulting to 1000 [ 2123.271468][T13249] hsr_slave_0: left promiscuous mode [ 2123.302915][T13249] hsr_slave_1: left promiscuous mode [ 2123.327744][T13249] veth1_macvtap: left promiscuous mode [ 2123.340939][T13249] veth0_macvtap: left promiscuous mode [ 2123.356601][T13249] veth1_vlan: left promiscuous mode [ 2123.366669][T13249] veth0_vlan: left promiscuous mode [ 2123.650635][T13249] team0 (unregistering): Port device team_slave_1 removed [ 2123.669250][T13249] team0 (unregistering): Port device team_slave_0 removed [ 2123.822068][ T1469] chnl_net:caif_netlink_parms(): no params data found [ 2123.825511][ T1566] netlink: 48 bytes leftover after parsing attributes in process `syz.3.18435'. [ 2123.976791][ T1469] bridge0: port 1(bridge_slave_0) entered blocking state [ 2124.017799][ T1469] bridge0: port 1(bridge_slave_0) entered disabled state [ 2124.047898][ T1469] bridge_slave_0: entered allmulticast mode [ 2124.054558][ T1469] bridge_slave_0: entered promiscuous mode [ 2124.066639][ T1469] bridge0: port 2(bridge_slave_1) entered blocking state [ 2124.077421][ T1469] bridge0: port 2(bridge_slave_1) entered disabled state [ 2124.084839][ T1469] bridge_slave_1: entered allmulticast mode [ 2124.092167][ T1469] bridge_slave_1: entered promiscuous mode [ 2124.169100][ T1469] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2124.218902][ T1469] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2124.278712][ T1589] netlink: 48 bytes leftover after parsing attributes in process `syz.3.18445'. [ 2124.296164][ T1469] team0: Port device team_slave_0 added [ 2124.316537][ T1469] team0: Port device team_slave_1 added [ 2124.379317][T13249] bridge_slave_1: left allmulticast mode [ 2124.384986][T13249] bridge_slave_1: left promiscuous mode [ 2124.400078][T13249] bridge0: port 2(bridge_slave_1) entered disabled state [ 2124.416838][T13249] bridge_slave_0: left allmulticast mode [ 2124.426824][T13249] bridge_slave_0: left promiscuous mode [ 2124.429237][ T1595] netlink: 'syz.3.18449': attribute type 10 has an invalid length. [ 2124.441720][T13249] bridge0: port 1(bridge_slave_0) entered disabled state [ 2124.621046][T13249] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2124.639642][T13249] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2124.650687][T13249] bond0 (unregistering): Released all slaves [ 2124.699868][ T1469] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2124.711967][ T1469] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2124.740320][ T1469] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2124.782861][ T1469] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2124.798807][ T1469] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2124.856815][ T1469] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2124.890763][ T1621] netlink: 48 bytes leftover after parsing attributes in process `syz.9.18458'. [ 2124.914822][T13249] hsr_slave_0: left promiscuous mode [ 2124.921523][T13249] hsr_slave_1: left promiscuous mode [ 2124.928920][T13249] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2124.946610][T13249] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2124.966034][T13249] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2124.980876][T13249] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2125.001768][T13249] veth1_macvtap: left promiscuous mode [ 2125.008763][T13249] veth0_macvtap: left promiscuous mode [ 2125.014355][T13249] veth1_vlan: left promiscuous mode [ 2125.023596][T13249] veth0_vlan: left promiscuous mode [ 2125.130477][T13249] team0 (unregistering): Port device team_slave_1 removed [ 2125.146386][T13249] team0 (unregistering): Port device team_slave_0 removed [ 2125.322507][ T1469] hsr_slave_0: entered promiscuous mode [ 2125.338685][ T1469] hsr_slave_1: entered promiscuous mode [ 2125.468981][ T1649] netlink: 16 bytes leftover after parsing attributes in process `syz.9.18469'. [ 2125.541791][ T28] kauditd_printk_skb: 1138 callbacks suppressed [ 2125.541807][ T28] audit: type=1400 audit(1772597120.518:110620): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2125.604969][ T28] audit: type=1400 audit(1772597120.518:110621): avc: denied { recv } for pid=13249 comm="kworker/u8:20" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2125.690372][ T28] audit: type=1400 audit(1772597120.518:110622): avc: denied { read write } for pid=529 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2125.728312][ T1469] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2125.745855][ T28] audit: type=1400 audit(1772597120.518:110623): avc: denied { open } for pid=529 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2125.800898][ T28] audit: type=1400 audit(1772597120.518:110624): avc: denied { ioctl } for pid=529 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2125.834859][ T1668] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2125.845261][ T1670] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2125.853419][ T28] audit: type=1400 audit(1772597120.558:110625): avc: denied { prog_load } for pid=1654 comm="syz.7.18473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2125.872740][ T1668] audit: audit_lost=1346 audit_rate_limit=0 audit_backlog_limit=64 [ 2125.872773][ T1668] audit: backlog limit exceeded [ 2125.887175][ T1469] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2126.021199][ T1680] netlink: 16 bytes leftover after parsing attributes in process `syz.9.18483'. [ 2126.031354][ T1469] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2126.096541][ T1469] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2126.235299][ T1469] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 2126.277974][ T1469] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 2126.304410][ T1469] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 2126.318968][ T1469] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 2126.579564][ T1713] netlink: 8 bytes leftover after parsing attributes in process `syz.2.18495'. [ 2126.602522][ T1469] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2126.664071][ T1469] 8021q: adding VLAN 0 to HW filter on device team0 [ 2126.690937][T28324] bridge0: port 1(bridge_slave_0) entered blocking state [ 2126.698128][T28324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2126.710617][ T1720] netlink: 16 bytes leftover after parsing attributes in process `syz.7.18497'. [ 2126.729652][T13238] bridge0: port 2(bridge_slave_1) entered blocking state [ 2126.736816][T13238] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2126.854510][ T1727] netlink: 16 bytes leftover after parsing attributes in process `syz.7.18509'. [ 2127.206037][ T1469] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2127.402711][ T1764] netlink: 16 bytes leftover after parsing attributes in process `syz.7.18514'. [ 2127.841066][ T1469] veth0_vlan: entered promiscuous mode [ 2127.885102][ T1469] veth1_vlan: entered promiscuous mode [ 2127.975591][ T1469] veth0_macvtap: entered promiscuous mode [ 2127.993822][ T1801] netlink: 16 bytes leftover after parsing attributes in process `syz.3.18526'. [ 2128.012858][ T1469] veth1_macvtap: entered promiscuous mode [ 2128.063019][ T1469] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2128.094016][ T1469] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2128.221743][T13249] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2128.248442][T13249] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2128.274186][T13249] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2128.324709][T13249] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2128.657607][ T1831] netlink: 8 bytes leftover after parsing attributes in process `syz.6.18398'. [ 2128.807046][T28324] bridge_slave_1: left allmulticast mode [ 2128.825983][T28324] bridge_slave_1: left promiscuous mode [ 2128.842910][T28324] bridge0: port 2(bridge_slave_1) entered disabled state [ 2128.879763][T28324] bridge_slave_0: left allmulticast mode [ 2128.904601][T28324] bridge_slave_0: left promiscuous mode [ 2128.912171][T28324] bridge0: port 1(bridge_slave_0) entered disabled state [ 2129.133322][T28324] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2129.165743][T28324] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2129.198026][T28324] bond0 (unregistering): Released all slaves [ 2129.396494][T28324] hsr_slave_0: left promiscuous mode [ 2129.410559][T28324] hsr_slave_1: left promiscuous mode [ 2129.431620][T28324] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2129.454028][T28324] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2129.475439][T28324] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2129.498094][T28324] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2129.701707][T28324] veth1_macvtap: left promiscuous mode [ 2129.710309][T28324] veth0_macvtap: left promiscuous mode [ 2129.728837][T28324] veth1_vlan: left promiscuous mode [ 2129.741129][T28324] veth0_vlan: left promiscuous mode [ 2129.907945][T28324] team0 (unregistering): Port device team_slave_1 removed [ 2129.925449][T28324] team0 (unregistering): Port device team_slave_0 removed [ 2130.554920][ T28] kauditd_printk_skb: 1576 callbacks suppressed [ 2130.554933][ T28] audit: type=1400 audit(1772597125.528:112167): avc: denied { create } for pid=1932 comm="syz.9.18582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2130.594456][ T28] audit: type=1400 audit(1772597125.568:112168): avc: denied { open } for pid=1932 comm="syz.9.18582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2130.642144][ T28] audit: type=1400 audit(1772597125.568:112169): avc: denied { perfmon } for pid=1932 comm="syz.9.18582" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2130.691085][ T28] audit: type=1400 audit(1772597125.568:112170): avc: denied { kernel } for pid=1932 comm="syz.9.18582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2130.736409][ T28] audit: type=1400 audit(1772597125.568:112171): avc: denied { perfmon } for pid=1932 comm="syz.9.18582" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2130.760173][ T28] audit: type=1400 audit(1772597125.608:112172): avc: denied { prog_load } for pid=1932 comm="syz.9.18582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2130.788818][ T28] audit: type=1400 audit(1772597125.608:112173): avc: denied { recv } for pid=3296 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2130.847016][ T1941] __nla_validate_parse: 1 callbacks suppressed [ 2130.847028][ T1941] netlink: 8 bytes leftover after parsing attributes in process `syz.9.18585'. [ 2130.878485][ T28] audit: type=1400 audit(1772597125.608:112174): avc: denied { recv } for pid=3296 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2130.918439][ T1469] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2130.940827][ T1469] audit: audit_lost=1359 audit_rate_limit=0 audit_backlog_limit=64 [ 2132.823896][ T2059] netlink: 24 bytes leftover after parsing attributes in process `syz.6.18647'. [ 2133.330528][ T2089] netlink: 24 bytes leftover after parsing attributes in process `syz.2.18651'. [ 2133.368038][ T2094] netlink: 'syz.7.18650': attribute type 29 has an invalid length. [ 2133.911194][ T2128] netlink: 24 bytes leftover after parsing attributes in process `syz.9.18670'. [ 2134.293340][ T2154] netlink: 24 bytes leftover after parsing attributes in process `syz.9.18682'. [ 2135.557389][ T28] kauditd_printk_skb: 1704 callbacks suppressed [ 2135.557404][ T28] audit: type=1400 audit(1772597130.538:113875): avc: denied { create } for pid=2254 comm="syz.3.18729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2135.616690][ T28] audit: type=1400 audit(1772597130.538:113876): avc: denied { recv } for pid=28 comm="kauditd" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2135.694293][ T28] audit: type=1400 audit(1772597130.538:113877): avc: denied { map_create } for pid=2250 comm="syz.7.18727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2135.726720][ T2255] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2135.739409][ T2263] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2135.747379][ T28] audit: type=1400 audit(1772597130.538:113878): avc: denied { read write } for pid=1469 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2135.756014][ T2263] audit: audit_lost=1361 audit_rate_limit=0 audit_backlog_limit=64 [ 2135.782892][ T2266] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2135.787366][ T2255] audit: audit_lost=1362 audit_rate_limit=0 audit_backlog_limit=64 [ 2135.790265][ T2266] audit: audit_lost=1363 audit_rate_limit=0 audit_backlog_limit=64 [ 2136.398536][ T2295] netlink: 'syz.6.18746': attribute type 29 has an invalid length. [ 2136.856242][ T2337] netlink: 'syz.3.18766': attribute type 29 has an invalid length. [ 2136.952098][ T2341] netlink: 'syz.6.18765': attribute type 10 has an invalid length. [ 2137.286453][ T2365] netlink: 'syz.6.18779': attribute type 29 has an invalid length. [ 2137.407125][ T2374] xt_NFQUEUE: number of queues (65297) out of range (got 111634) [ 2137.576135][ T2384] netlink: 60 bytes leftover after parsing attributes in process `syz.6.18787'. [ 2137.586411][ T2384] netlink: 60 bytes leftover after parsing attributes in process `syz.6.18787'. [ 2137.807058][ T2400] netlink: 'syz.6.18793': attribute type 29 has an invalid length. [ 2139.147544][ T2483] netlink: 60 bytes leftover after parsing attributes in process `syz.9.18833'. [ 2139.188623][ T2483] netlink: 60 bytes leftover after parsing attributes in process `syz.9.18833'. [ 2139.550477][ T2502] delete_channel: no stack [ 2139.684920][ T2518] netlink: 60 bytes leftover after parsing attributes in process `syz.3.18847'. [ 2139.709181][ T2518] netlink: 60 bytes leftover after parsing attributes in process `syz.3.18847'. [ 2140.272405][ T2554] netlink: 60 bytes leftover after parsing attributes in process `syz.7.18863'. [ 2140.309533][ T2554] netlink: 60 bytes leftover after parsing attributes in process `syz.7.18863'. [ 2140.582023][ T28] kauditd_printk_skb: 1794 callbacks suppressed [ 2140.582036][ T28] audit: type=1400 audit(1772597135.558:115625): avc: denied { read write } for pid=549 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2140.649004][ T28] audit: type=1400 audit(1772597135.598:115626): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2140.731204][ T28] audit: type=1400 audit(1772597135.598:115627): avc: denied { recv } for pid=2568 comm="modprobe" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2140.821602][ T2581] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2140.828315][ T28] audit: type=1400 audit(1772597135.598:115628): avc: denied { prog_load } for pid=2567 comm="syz.9.18869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2140.831860][ T2582] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2140.852952][ T2581] audit: audit_lost=1379 audit_rate_limit=0 audit_backlog_limit=64 [ 2140.855029][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2140.855046][ C1] audit: audit_lost=1380 audit_rate_limit=0 audit_backlog_limit=64 [ 2140.855061][ C1] audit: backlog limit exceeded [ 2140.966484][ T2585] ref_ctr_offset mismatch. inode: 0x4f offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x6 [ 2141.795818][ T2635] netlink: 36 bytes leftover after parsing attributes in process `syz.3.18897'. [ 2141.797155][ T2632] syzkaller0: entered promiscuous mode [ 2141.877417][ T2632] syzkaller0: entered allmulticast mode [ 2142.217174][ T2658] netlink: 'syz.3.18907': attribute type 10 has an invalid length. [ 2142.256753][ T2658] geneve1: entered promiscuous mode [ 2142.322282][ T2658] bond0: (slave geneve1): Enslaving as an active interface with an up link [ 2142.788627][ T2691] ref_ctr_offset mismatch. inode: 0x169 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x6 [ 2143.343231][ T2734] netlink: 60 bytes leftover after parsing attributes in process `syz.3.18942'. [ 2143.378942][ T2734] netlink: 60 bytes leftover after parsing attributes in process `syz.3.18942'. [ 2143.426873][ T2734] netlink: 60 bytes leftover after parsing attributes in process `syz.3.18942'. [ 2143.516799][ T2744] netlink: 'syz.7.18945': attribute type 29 has an invalid length. [ 2143.876852][ T2767] netlink: 60 bytes leftover after parsing attributes in process `syz.3.18959'. [ 2143.909277][ T2767] netlink: 60 bytes leftover after parsing attributes in process `syz.3.18959'. [ 2143.945775][ T2767] netlink: 60 bytes leftover after parsing attributes in process `syz.3.18959'. [ 2144.083679][ T2775] netlink: 'syz.7.18961': attribute type 29 has an invalid length. [ 2144.388101][ T2798] netlink: 'syz.3.18967': attribute type 1 has an invalid length. [ 2144.580087][ T2808] netlink: 'syz.9.18976': attribute type 29 has an invalid length. [ 2144.965818][ T2828] netlink: 56 bytes leftover after parsing attributes in process `syz.3.18984'. [ 2145.192425][ T2845] netlink: 36 bytes leftover after parsing attributes in process `syz.9.18993'. [ 2145.445589][ T2859] netlink: 56 bytes leftover after parsing attributes in process `syz.3.18998'. [ 2145.587654][ T28] kauditd_printk_skb: 1791 callbacks suppressed [ 2145.587722][ T28] audit: type=1400 audit(1772597140.568:117396): avc: denied { recv } for pid=532 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2145.674265][ T2877] netlink: 36 bytes leftover after parsing attributes in process `syz.2.19006'. [ 2145.689660][ T28] audit: type=1400 audit(1772597140.568:117397): avc: denied { read write } for pid=549 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2145.719570][ T28] audit: type=1400 audit(1772597140.568:117398): avc: denied { open } for pid=549 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2145.745930][ T28] audit: type=1400 audit(1772597140.568:117399): avc: denied { ioctl } for pid=549 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=102 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2145.802055][ T28] audit: type=1400 audit(1772597140.598:117400): avc: denied { recv } for pid=2865 comm="syz.3.19002" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2145.870319][ T2887] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2145.873618][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2145.883437][ C0] audit: audit_lost=1389 audit_rate_limit=0 audit_backlog_limit=64 [ 2145.885347][ T2887] audit: audit_lost=1390 audit_rate_limit=0 audit_backlog_limit=64 [ 2145.891389][ C0] audit: backlog limit exceeded [ 2146.142006][ T2903] Dead loop on virtual device ip6_vti0, fix it urgently! [ 2148.506296][ T3070] netlink: 'syz.9.19085': attribute type 2 has an invalid length. [ 2148.517830][ T3070] __nla_validate_parse: 3 callbacks suppressed [ 2148.517847][ T3070] netlink: 36 bytes leftover after parsing attributes in process `syz.9.19085'. [ 2148.709921][ T3074] syzkaller0: entered promiscuous mode [ 2148.729661][ T3074] syzkaller0: entered allmulticast mode [ 2149.215087][ T3110] netlink: 20 bytes leftover after parsing attributes in process `syz.7.19101'. [ 2150.119859][ T3167] netlink: 'syz.6.19121': attribute type 2 has an invalid length. [ 2150.120320][ T3165] netlink: 'syz.3.19122': attribute type 29 has an invalid length. [ 2150.136206][ T3167] netlink: 'syz.6.19121': attribute type 8 has an invalid length. [ 2150.218994][ T3167] netlink: 132 bytes leftover after parsing attributes in process `syz.6.19121'. [ 2150.598359][ T28] kauditd_printk_skb: 1681 callbacks suppressed [ 2150.598375][ T28] audit: type=1400 audit(1772597145.578:119054): avc: denied { prog_load } for pid=3181 comm="syz.7.19128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2150.724007][ T28] audit: type=1400 audit(1772597145.598:119055): avc: denied { bpf } for pid=3181 comm="syz.7.19128" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2150.824668][ T28] audit: type=1400 audit(1772597145.608:119056): avc: denied { prog_load } for pid=3183 comm="syz.3.19129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2150.847828][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2150.854371][ C1] audit: audit_lost=1400 audit_rate_limit=0 audit_backlog_limit=64 [ 2150.862309][ C1] audit: backlog limit exceeded [ 2150.874838][ T28] audit: type=1400 audit(1772597145.608:119057): avc: denied { bpf } for pid=3183 comm="syz.3.19129" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2150.878767][ T3192] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2150.903607][ T3195] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2150.903994][ T3193] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2151.003066][ T3202] netlink: 60 bytes leftover after parsing attributes in process `syz.6.19136'. [ 2151.060411][ T3205] netlink: 60 bytes leftover after parsing attributes in process `syz.6.19136'. [ 2151.099061][ T3202] netlink: 60 bytes leftover after parsing attributes in process `syz.6.19136'. [ 2151.877448][ T3251] netlink: 28 bytes leftover after parsing attributes in process `syz.6.19156'. [ 2151.896645][ T3251] netlink: 28 bytes leftover after parsing attributes in process `syz.6.19156'. [ 2152.036027][ T3266] netlink: 'syz.3.19164': attribute type 1 has an invalid length. [ 2152.341565][ T3282] netlink: 8 bytes leftover after parsing attributes in process `syz.7.19170'. [ 2152.571660][ T3293] netlink: 'syz.7.19174': attribute type 29 has an invalid length. [ 2152.846774][ T3316] netlink: 8 bytes leftover after parsing attributes in process `syz.7.19184'. [ 2153.124608][ T3328] netlink: 'syz.3.19189': attribute type 29 has an invalid length. [ 2153.663421][ T3367] netlink: 'syz.3.19207': attribute type 29 has an invalid length. [ 2153.867811][ T3388] netlink: 'syz.3.19217': attribute type 2 has an invalid length. [ 2153.868269][ T3387] netlink: 'syz.2.19216': attribute type 1 has an invalid length. [ 2153.899733][ T3388] netlink: 'syz.3.19217': attribute type 1 has an invalid length. [ 2153.910088][ T3387] netlink: 'syz.2.19216': attribute type 2 has an invalid length. [ 2154.108641][ T3402] netlink: 'syz.3.19224': attribute type 29 has an invalid length. [ 2154.426057][ T3428] veth1_macvtap: left promiscuous mode [ 2154.454688][ T3428] macsec0: entered allmulticast mode [ 2154.474734][ T3428] veth1_macvtap: entered promiscuous mode [ 2154.494606][ T3428] veth1_macvtap: entered allmulticast mode [ 2154.505920][ T3428] macsec0: entered promiscuous mode [ 2154.634633][ T3443] netlink: 'syz.9.19242': attribute type 29 has an invalid length. [ 2154.861705][ T3460] xt_policy: too many policy elements [ 2155.113865][ T3472] netlink: 'syz.3.19256': attribute type 29 has an invalid length. [ 2155.200015][ T3478] lo speed is unknown, defaulting to 1000 [ 2155.215578][ T3478] lo speed is unknown, defaulting to 1000 [ 2155.482622][ T3498] netlink: 12 bytes leftover after parsing attributes in process `syz.7.19268'. [ 2155.609067][ T28] kauditd_printk_skb: 1770 callbacks suppressed [ 2155.609083][ T28] audit: type=1400 audit(1772597150.588:120807): avc: denied { map_create } for pid=3506 comm="syz.3.19271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2155.690511][ T28] audit: type=1400 audit(1772597150.588:120808): avc: denied { bpf } for pid=3506 comm="syz.3.19271" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2155.758012][ T28] audit: type=1400 audit(1772597150.588:120809): avc: denied { map_read map_write } for pid=3506 comm="syz.3.19271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2155.807596][ T3521] netlink: 60 bytes leftover after parsing attributes in process `syz.2.19277'. [ 2155.834429][ T3522] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2155.835168][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2155.847542][ C1] audit: audit_lost=1409 audit_rate_limit=0 audit_backlog_limit=64 [ 2155.855470][ C1] audit: backlog limit exceeded [ 2155.858883][ T3522] audit: audit_lost=1410 audit_rate_limit=0 audit_backlog_limit=64 [ 2155.860406][ T28] audit: type=1400 audit(1772597150.618:120810): avc: denied { prog_load } for pid=3506 comm="syz.3.19271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2155.901843][ T3521] netlink: 60 bytes leftover after parsing attributes in process `syz.2.19277'. [ 2155.911707][ T3522] audit: backlog limit exceeded [ 2155.938354][ T3523] netlink: 60 bytes leftover after parsing attributes in process `syz.2.19277'. [ 2157.231973][ T3582] netlink: 60 bytes leftover after parsing attributes in process `syz.2.19305'. [ 2157.278718][ T3582] netlink: 60 bytes leftover after parsing attributes in process `syz.2.19305'. [ 2157.311822][ T3582] netlink: 60 bytes leftover after parsing attributes in process `syz.2.19305'. [ 2157.992376][ T3617] netlink: 60 bytes leftover after parsing attributes in process `syz.9.19320'. [ 2158.003248][ T3617] netlink: 60 bytes leftover after parsing attributes in process `syz.9.19320'. [ 2158.014436][ T3617] netlink: 60 bytes leftover after parsing attributes in process `syz.9.19320'. [ 2159.364073][ T3683] Cannot find add_set index 46338 as target [ 2159.678332][T13251] bridge_slave_1: left allmulticast mode [ 2159.686032][T13251] bridge_slave_1: left promiscuous mode [ 2159.696490][T13251] bridge0: port 2(bridge_slave_1) entered disabled state [ 2159.721223][T13251] bridge_slave_0: left allmulticast mode [ 2159.730778][T13251] bridge_slave_0: left promiscuous mode [ 2159.746162][T13251] bridge0: port 1(bridge_slave_0) entered disabled state [ 2159.950786][T13251] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2159.982605][T13251] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2160.014229][T13251] bond0 (unregistering): Released all slaves [ 2160.039506][ T3719] lo speed is unknown, defaulting to 1000 [ 2160.058909][ T3719] lo speed is unknown, defaulting to 1000 [ 2160.081404][ T3719] lo speed is unknown, defaulting to 1000 [ 2160.101016][ T3719] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 2160.165051][ T3719] lo speed is unknown, defaulting to 1000 [ 2160.208771][ T3719] lo speed is unknown, defaulting to 1000 [ 2160.215008][ T3719] lo speed is unknown, defaulting to 1000 [ 2160.266083][T13251] hsr_slave_0: left promiscuous mode [ 2160.287048][T13251] hsr_slave_1: left promiscuous mode [ 2160.298082][T13251] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2160.316415][T13251] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2160.331749][T13251] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2160.352894][T13251] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2160.383495][T13251] veth1_macvtap: left promiscuous mode [ 2160.404828][T13251] veth0_macvtap: left promiscuous mode [ 2160.419628][T13251] veth1_vlan: left promiscuous mode [ 2160.433037][T13251] veth0_vlan: left promiscuous mode [ 2160.619264][ T28] kauditd_printk_skb: 1301 callbacks suppressed [ 2160.619278][ T28] audit: type=1400 audit(1772597155.598:121986): avc: denied { open } for pid=3747 comm="syz.7.19379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2161.388383][ T28] audit: type=1400 audit(1772597155.628:121987): avc: denied { perfmon } for pid=3747 comm="syz.7.19379" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2161.409704][ T28] audit: type=1400 audit(1772597155.628:121988): avc: denied { kernel } for pid=3747 comm="syz.7.19379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2161.455795][ T28] audit: type=1400 audit(1772597155.648:121989): avc: denied { recv } for pid=3743 comm="syz.9.19378" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2161.492735][T13251] team0 (unregistering): Port device team_slave_1 removed [ 2161.516603][ T28] audit: type=1400 audit(1772597155.648:121990): avc: denied { recv } for pid=3743 comm="syz.9.19378" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2161.552594][ T28] audit: type=1400 audit(1772597155.668:121991): avc: denied { read write } for pid=572 comm="syz-executor" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2161.578822][ T28] audit: type=1400 audit(1772597155.668:121992): avc: denied { open } for pid=572 comm="syz-executor" path="/dev/loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2161.604327][T13251] team0 (unregistering): Port device team_slave_0 removed [ 2161.616844][ T3770] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2161.616868][ T3773] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2161.623518][ T3770] audit: audit_lost=1453 audit_rate_limit=0 audit_backlog_limit=64 [ 2161.734823][ T3719] lo speed is unknown, defaulting to 1000 [ 2161.735080][ T3749] __nla_validate_parse: 9 callbacks suppressed [ 2161.735093][ T3749] netlink: 60 bytes leftover after parsing attributes in process `syz.3.19380'. [ 2161.806208][ T3719] lo speed is unknown, defaulting to 1000 [ 2161.829657][ T3719] lo speed is unknown, defaulting to 1000 [ 2161.835940][ T3719] lo speed is unknown, defaulting to 1000 [ 2161.863156][ T3719] lo speed is unknown, defaulting to 1000 [ 2161.875929][ T3719] lo speed is unknown, defaulting to 1000 [ 2161.897683][ T3719] lo speed is unknown, defaulting to 1000 [ 2162.024957][ T3794] Cannot find add_set index 46338 as target [ 2163.431860][ T3874] netlink: 60 bytes leftover after parsing attributes in process `syz.6.19433'. [ 2163.459708][ T3874] netlink: 60 bytes leftover after parsing attributes in process `syz.6.19433'. [ 2163.487395][ T3874] netlink: 60 bytes leftover after parsing attributes in process `syz.6.19433'. [ 2164.523093][ T3934] netlink: 'syz.2.19463': attribute type 1 has an invalid length. [ 2164.640006][T13251] bridge_slave_1: left allmulticast mode [ 2164.651090][T13251] bridge_slave_1: left promiscuous mode [ 2164.656765][T13251] bridge0: port 2(bridge_slave_1) entered disabled state [ 2164.739269][T13251] geneve0: left allmulticast mode [ 2164.744345][T13251] geneve0: left promiscuous mode [ 2164.777882][T13251] : port 1(geneve0) entered disabled state [ 2165.019340][T13251] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2165.045647][T13251] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2165.091782][T13251] bond0 (unregistering): Released all slaves [ 2165.203782][ T3990] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3990 comm=syz.3.19485 [ 2165.247368][ T3990] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=3990 comm=syz.3.19485 [ 2165.385921][T13251] hsr_slave_0: left promiscuous mode [ 2165.410812][T13251] hsr_slave_1: left promiscuous mode [ 2165.416662][T13251] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2165.442864][T13251] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2165.478369][T13251] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2165.485775][T13251] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2165.548265][T13251] veth1_macvtap: left promiscuous mode [ 2165.553859][T13251] veth0_macvtap: left promiscuous mode [ 2165.628349][ T28] kauditd_printk_skb: 1570 callbacks suppressed [ 2165.628363][ T28] audit: type=1400 audit(1772597160.608:123560): avc: denied { open } for pid=4021 comm="syz.9.19503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2165.704728][ T28] audit: type=1400 audit(1772597160.638:123561): avc: denied { recv } for pid=4010 comm="syz.6.19497" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2165.736943][ T28] audit: type=1400 audit(1772597160.638:123562): avc: denied { recv } for pid=28324 comm="kworker/u8:0" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2165.866772][ T4033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2165.868945][ T4036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2165.879544][ T4035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2165.879994][ T28] audit: type=1400 audit(1772597160.638:123563): avc: denied { recv } for pid=28324 comm="kworker/u8:0" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2165.897340][ T4035] audit: audit_lost=1455 audit_rate_limit=0 audit_backlog_limit=64 [ 2165.913723][ T4036] audit: audit_lost=1456 audit_rate_limit=0 audit_backlog_limit=64 [ 2165.927054][T13251] team0 (unregistering): Port device team_slave_1 removed [ 2165.930318][ T4036] audit: backlog limit exceeded [ 2165.959014][T13251] team0 (unregistering): Port device team_slave_0 removed [ 2165.976955][T28324] smc: removing ib device !yz! [ 2166.432725][T13251] bridge_slave_1: left allmulticast mode [ 2166.453164][T13251] bridge_slave_1: left promiscuous mode [ 2166.480181][T13251] bridge0: port 2(bridge_slave_1) entered disabled state [ 2166.496529][T13251] bridge_slave_0: left allmulticast mode [ 2166.503344][T13251] bridge_slave_0: left promiscuous mode [ 2166.513472][T13251] bridge0: port 1(bridge_slave_0) entered disabled state [ 2166.846318][T13251] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2166.877581][T13251] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2166.909621][T13251] bond0 (unregistering): Released all slaves [ 2166.969316][T13251] hsr_slave_0: left promiscuous mode [ 2167.004774][T13251] hsr_slave_1: left promiscuous mode [ 2167.017878][T13251] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2167.029960][T13251] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2167.050558][T13251] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2167.064110][T13251] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2167.092625][T13251] veth1_macvtap: left promiscuous mode [ 2167.100916][T13251] veth0_macvtap: left promiscuous mode [ 2167.116642][T13251] veth1_vlan: left promiscuous mode [ 2167.125519][T13251] veth0_vlan: left promiscuous mode [ 2167.321265][T13251] team0 (unregistering): Port device team_slave_1 removed [ 2167.351538][T13251] team0 (unregistering): Port device team_slave_0 removed [ 2167.440577][ T4096] netlink: 60 bytes leftover after parsing attributes in process `syz.9.19538'. [ 2167.467557][ T4101] netlink: 60 bytes leftover after parsing attributes in process `syz.9.19538'. [ 2167.494576][ T4104] netlink: 60 bytes leftover after parsing attributes in process `syz.9.19538'. [ 2167.736490][ T4137] netlink: 'syz.7.19556': attribute type 29 has an invalid length. [ 2167.982684][ T4152] netlink: 60 bytes leftover after parsing attributes in process `syz.2.19563'. [ 2168.012839][ T4152] netlink: 60 bytes leftover after parsing attributes in process `syz.2.19563'. [ 2168.045076][ T4152] netlink: 60 bytes leftover after parsing attributes in process `syz.2.19563'. [ 2168.191723][ T4164] netlink: 'syz.3.19569': attribute type 29 has an invalid length. [ 2168.424018][ T4183] netlink: 60 bytes leftover after parsing attributes in process `syz.2.19578'. [ 2168.457567][ T4183] netlink: 60 bytes leftover after parsing attributes in process `syz.2.19578'. [ 2168.497909][ T4183] netlink: 60 bytes leftover after parsing attributes in process `syz.2.19578'. [ 2168.637708][ T4193] netlink: 'syz.6.19582': attribute type 29 has an invalid length. [ 2168.962434][ T4219] netlink: 60 bytes leftover after parsing attributes in process `syz.7.19595'. [ 2170.293310][ T4265] sctp: [Deprecated]: syz.2.19617 (pid 4265) Use of int in max_burst socket option deprecated. [ 2170.293310][ T4265] Use struct sctp_assoc_value instead [ 2170.645894][ T28] kauditd_printk_skb: 1544 callbacks suppressed [ 2170.645987][ T28] audit: type=1400 audit(1772597165.618:125105): avc: denied { map_create } for pid=4283 comm="syz.7.19627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2170.712529][ T28] audit: type=1400 audit(1772597165.618:125106): avc: denied { map_create } for pid=4283 comm="syz.7.19627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2170.780009][ T28] audit: type=1400 audit(1772597165.618:125107): avc: denied { map_read map_write } for pid=4283 comm="syz.7.19627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2170.844706][ T4290] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2170.851588][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2170.858115][ C1] audit: audit_lost=1458 audit_rate_limit=0 audit_backlog_limit=64 [ 2170.866004][ C1] audit: backlog limit exceeded [ 2170.871054][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2170.877569][ C1] audit: audit_lost=1459 audit_rate_limit=0 audit_backlog_limit=64 [ 2170.878111][ T4290] audit: audit_lost=1460 audit_rate_limit=0 audit_backlog_limit=64 [ 2170.927050][ T4292] netlink: 'syz.9.19631': attribute type 10 has an invalid length. [ 2172.738845][ T4388] netlink: 'syz.9.19678': attribute type 10 has an invalid length. [ 2172.753681][ T4388] bridge0: port 2(bridge_slave_1) entered disabled state [ 2172.781855][ T4388] bridge_slave_1: left allmulticast mode [ 2172.805511][ T4388] bridge_slave_1: left promiscuous mode [ 2172.842769][ T4388] bridge0: port 2(bridge_slave_1) entered disabled state [ 2172.864175][ T4388] bond0: (slave bridge_slave_1): Enslaving as an active interface with an up link [ 2174.264394][ T4456] __nla_validate_parse: 12 callbacks suppressed [ 2174.264473][ T4456] netlink: 16 bytes leftover after parsing attributes in process `syz.2.19712'. [ 2175.161825][ T4506] netlink: 8 bytes leftover after parsing attributes in process `syz.2.19734'. [ 2175.198907][ T4506] openvswitch: netlink: Flow key attr not present in new flow. [ 2175.567871][ T4523] netlink: 12 bytes leftover after parsing attributes in process `syz.2.19741'. [ 2175.649511][ T28] kauditd_printk_skb: 1466 callbacks suppressed [ 2175.649527][ T28] audit: type=1400 audit(1772597170.628:126569): avc: denied { recv } for pid=4490 comm="syz.7.19727" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2175.725681][ T28] audit: type=1400 audit(1772597170.628:126570): avc: denied { recv } for pid=4490 comm="syz.7.19727" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2175.793137][ T28] audit: type=1400 audit(1772597170.648:126571): avc: denied { recv } for pid=3296 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2175.854701][ T4535] netlink: 'syz.2.19748': attribute type 29 has an invalid length. [ 2175.907297][ T28] audit: type=1400 audit(1772597170.648:126572): avc: denied { recv } for pid=3296 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2175.999529][ T4539] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2176.006073][ T4539] audit: audit_lost=1462 audit_rate_limit=0 audit_backlog_limit=64 [ 2176.014858][ T28] audit: type=1400 audit(1772597170.648:126573): avc: denied { recv } for pid=3296 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2176.020756][ T549] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2176.050985][ T4541] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2176.051645][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2176.257064][ T4547] netlink: 12 bytes leftover after parsing attributes in process `syz.3.19754'. [ 2176.724078][ T4562] netlink: 'syz.2.19760': attribute type 29 has an invalid length. [ 2176.899169][ T4573] netlink: 12 bytes leftover after parsing attributes in process `syz.2.19766'. [ 2178.545936][ T4654] netlink: 12 bytes leftover after parsing attributes in process `syz.3.19795'. [ 2178.593044][ T4627] delete_channel: no stack [ 2179.031354][ T4679] netlink: 12 bytes leftover after parsing attributes in process `syz.3.19808'. [ 2179.179791][ T4682] netlink: 'syz.7.19809': attribute type 1 has an invalid length. [ 2179.197499][ T4682] netlink: 'syz.7.19809': attribute type 2 has an invalid length. [ 2179.241272][ T4682] netlink: 'syz.7.19809': attribute type 39 has an invalid length. [ 2179.720888][ T4708] netlink: 12 bytes leftover after parsing attributes in process `syz.3.19821'. [ 2179.951121][ T4715] netlink: 'syz.2.19824': attribute type 29 has an invalid length. [ 2180.224030][ T4728] netlink: 'syz.2.19831': attribute type 2 has an invalid length. [ 2180.247577][ T4728] netlink: 'syz.2.19831': attribute type 8 has an invalid length. [ 2180.255496][ T4728] netlink: 132 bytes leftover after parsing attributes in process `syz.2.19831'. [ 2180.260510][ T4730] netlink: 12 bytes leftover after parsing attributes in process `syz.3.19833'. [ 2180.428279][ T4736] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 2180.434680][ T4736] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 2180.622191][ T4745] netlink: 'syz.7.19839': attribute type 29 has an invalid length. [ 2180.662459][ T28] kauditd_printk_skb: 1443 callbacks suppressed [ 2180.662532][ T28] audit: type=1400 audit(1772597175.638:127944): avc: denied { recv } for pid=4746 comm="syz.9.19840" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2180.737377][ T28] audit: type=1400 audit(1772597175.638:127945): avc: denied { prog_load } for pid=4746 comm="syz.9.19840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2180.785164][ T28] audit: type=1400 audit(1772597175.638:127946): avc: denied { bpf } for pid=4746 comm="syz.9.19840" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2180.837302][ T28] audit: type=1400 audit(1772597175.648:127947): avc: denied { prog_load } for pid=4746 comm="syz.9.19840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2180.899326][ T28] audit: type=1400 audit(1772597175.648:127948): avc: denied { perfmon } for pid=4746 comm="syz.9.19840" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2180.957493][ T28] audit: type=1400 audit(1772597175.648:127949): avc: denied { bpf } for pid=4746 comm="syz.9.19840" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2181.007984][ T28] audit: type=1400 audit(1772597175.648:127950): avc: denied { prog_run } for pid=4746 comm="syz.9.19840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2181.057969][ T28] audit: type=1400 audit(1772597175.688:127951): avc: denied { recv } for pid=572 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2181.108537][ T28] audit: type=1400 audit(1772597175.688:127952): avc: denied { recv } for pid=572 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2181.141153][ T4767] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2181.361291][ T4776] netlink: 'syz.7.19853': attribute type 29 has an invalid length. [ 2181.654818][ T4791] netlink: 'syz.2.19859': attribute type 39 has an invalid length. [ 2182.112404][ T4812] bond0: (slave bond_slave_1): Error -28 calling ndo_bpf [ 2182.898000][ T4843] netlink: 48 bytes leftover after parsing attributes in process `syz.2.19880'. [ 2185.158758][ T4180] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2185.346186][ T4180] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2185.456017][ T4180] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2185.595602][ T4923] lo speed is unknown, defaulting to 1000 [ 2185.617184][ T4180] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2185.668265][ T4923] lo speed is unknown, defaulting to 1000 [ 2185.679805][ T4923] lo speed is unknown, defaulting to 1000 [ 2185.728404][ T28] kauditd_printk_skb: 1133 callbacks suppressed [ 2185.728481][ T28] audit: type=1400 audit(1772597180.708:129069): avc: denied { recv } for pid=13249 comm="kworker/u8:20" saddr=172.20.20.0 src=16385 daddr=172.20.20.10 dest=40610 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2185.786986][ T28] audit: type=1400 audit(1772597180.708:129070): avc: denied { unmount } for pid=549 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 2185.809454][ T28] audit: type=1400 audit(1772597180.748:129071): avc: denied { recv } for pid=13249 comm="kworker/u8:20" saddr=172.20.20.0 src=16385 daddr=172.20.20.10 dest=40610 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2185.835466][ T28] audit: type=1400 audit(1772597180.758:129072): avc: denied { read write } for pid=529 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2185.921701][ T28] audit: type=1400 audit(1772597180.758:129073): avc: denied { open } for pid=529 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2185.947231][ T28] audit: type=1400 audit(1772597180.758:129074): avc: denied { ioctl } for pid=529 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2186.007413][ T4180] bridge_slave_1: left allmulticast mode [ 2186.013159][ T4180] bridge_slave_1: left promiscuous mode [ 2186.037390][ T4180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2186.049011][ T28] audit: type=1400 audit(1772597180.788:129075): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2186.080410][ T28] audit: type=1400 audit(1772597180.788:129076): avc: denied { recv } for pid=9141 comm="kworker/u8:52" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2186.127440][ T28] audit: type=1400 audit(1772597180.878:129077): avc: denied { read write } for pid=529 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2186.127481][ T4180] bridge_slave_0: left allmulticast mode [ 2186.187322][ T28] audit: type=1400 audit(1772597180.878:129078): avc: denied { open } for pid=529 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2186.227572][ T4180] bridge_slave_0: left promiscuous mode [ 2186.233283][ T4180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2186.460976][ T4956] netlink: 12 bytes leftover after parsing attributes in process `syz.9.19931'. [ 2186.758659][ T4180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2186.798547][ T4180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2186.831749][ T4180] bond0 (unregistering): Released all slaves [ 2186.939119][ T4180] hsr_slave_0: left promiscuous mode [ 2186.977383][ T4180] hsr_slave_1: left promiscuous mode [ 2186.987747][ T4180] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2186.996016][ T4180] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2187.042811][ T4180] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2187.067474][ T4180] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2187.148193][ T4180] veth1_vlan: left promiscuous mode [ 2187.153498][ T4180] veth0_vlan: left promiscuous mode [ 2188.037587][ T4180] team0 (unregistering): Port device team_slave_1 removed [ 2188.127555][ T4180] team0 (unregistering): Port device team_slave_0 removed [ 2188.679233][ T8152] lo speed is unknown, defaulting to 1000 [ 2188.684994][ T8152] syz1: Port: 1 Link DOWN [ 2188.923804][ T4923] chnl_net:caif_netlink_parms(): no params data found [ 2189.260581][ T4923] bridge0: port 1(bridge_slave_0) entered blocking state [ 2189.307917][ T4923] bridge0: port 1(bridge_slave_0) entered disabled state [ 2189.315104][ T4923] bridge_slave_0: entered allmulticast mode [ 2189.478007][ T4923] bridge_slave_0: entered promiscuous mode [ 2189.509301][ T4923] bridge0: port 2(bridge_slave_1) entered blocking state [ 2189.516399][ T4923] bridge0: port 2(bridge_slave_1) entered disabled state [ 2189.547482][ T4923] bridge_slave_1: entered allmulticast mode [ 2189.608644][ T4923] bridge_slave_1: entered promiscuous mode [ 2189.878197][ T4923] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2189.900103][ T4923] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2190.162740][ T4923] team0: Port device team_slave_0 added [ 2190.201066][ T4923] team0: Port device team_slave_1 added [ 2190.408863][ T4923] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2190.416058][ T4923] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2190.487299][ T4923] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2190.550328][ T4923] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2190.567300][ T4923] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2190.647282][ T4923] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2190.915788][ T4923] hsr_slave_0: entered promiscuous mode [ 2190.957866][ T4923] hsr_slave_1: entered promiscuous mode [ 2191.091892][ T28] kauditd_printk_skb: 163 callbacks suppressed [ 2191.091943][ T28] audit: type=1400 audit(1772597186.068:129242): avc: denied { module_request } for pid=4923 comm="syz-executor" kmod="rtnl-link-virt_wifi" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2191.160440][ T28] audit: type=1400 audit(1772597186.108:129243): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2191.604554][ T28] audit: type=1400 audit(1772597186.578:129244): avc: denied { create } for pid=4923 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2191.678338][ T28] audit: type=1400 audit(1772597186.578:129245): avc: denied { write } for pid=4923 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2191.747926][ T28] audit: type=1400 audit(1772597186.578:129246): avc: denied { read } for pid=4923 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2191.813012][ T28] audit: type=1400 audit(1772597186.608:129247): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2191.893008][ T4923] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2191.927317][ T28] audit: type=1400 audit(1772597186.648:129248): avc: denied { read } for pid=4923 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2191.998437][ T28] audit: type=1400 audit(1772597186.648:129249): avc: denied { write } for pid=4923 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2192.033724][ T4923] 8021q: adding VLAN 0 to HW filter on device team0 [ 2192.082073][T13249] bridge0: port 1(bridge_slave_0) entered blocking state [ 2192.089247][T13249] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2192.097297][ T28] audit: type=1400 audit(1772597186.648:129250): avc: denied { read } for pid=4923 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2192.138092][ T9141] bridge0: port 2(bridge_slave_1) entered blocking state [ 2192.145221][ T9141] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2192.169000][ T28] audit: type=1400 audit(1772597186.648:129251): avc: denied { write } for pid=4923 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2192.225994][ T4923] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2192.258080][ T4923] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2192.440326][ T4923] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2192.930786][ T4923] veth0_vlan: entered promiscuous mode [ 2192.979717][ T4923] veth1_vlan: entered promiscuous mode [ 2193.093609][ T4923] veth0_macvtap: entered promiscuous mode [ 2193.125512][ T4923] veth1_macvtap: entered promiscuous mode [ 2193.192916][ T4923] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2193.232652][ T4923] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2194.990839][ T5011] netlink: 'syz.4.19942': attribute type 1 has an invalid length. [ 2195.028782][ T5011] netlink: 'syz.4.19942': attribute type 2 has an invalid length. [ 2195.078355][ T5011] netlink: 'syz.4.19942': attribute type 39 has an invalid length. [ 2195.388013][T13249] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2195.611599][T13249] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2195.751705][T13249] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2196.050183][T13249] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2196.111140][ T28] kauditd_printk_skb: 247 callbacks suppressed [ 2196.111154][ T28] audit: type=1400 audit(1772597191.088:129499): avc: denied { recv } for pid=529 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2196.182451][ T28] audit: type=1400 audit(1772597191.158:129500): avc: denied { recv } for pid=3296 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2196.209445][ T28] audit: type=1400 audit(1772597191.158:129501): avc: denied { recv } for pid=3296 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2196.259101][ T28] audit: type=1400 audit(1772597191.158:129502): avc: denied { unmount } for pid=4923 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 2196.281128][ T28] audit: type=1400 audit(1772597191.228:129503): avc: denied { unmount } for pid=4923 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 2196.468630][ T28] audit: type=1400 audit(1772597191.418:129504): avc: denied { unmount } for pid=4923 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 2196.597122][ T28] audit: type=1400 audit(1772597191.568:129505): avc: denied { unmount } for pid=4923 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 2196.650214][ T28] audit: type=1400 audit(1772597191.588:129506): avc: denied { recv } for pid=2998 comm="udevd" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2196.727610][ T28] audit: type=1400 audit(1772597191.668:129507): avc: denied { unmount } for pid=4923 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 2196.768344][ T28] audit: type=1400 audit(1772597191.688:129508): avc: denied { unmount } for pid=4923 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 2197.038242][T13249] bridge_slave_1: left allmulticast mode [ 2197.043908][T13249] bridge_slave_1: left promiscuous mode [ 2197.077612][T13249] bridge0: port 2(bridge_slave_1) entered disabled state [ 2197.147474][T13249] bridge_slave_0: left allmulticast mode [ 2197.153145][T13249] bridge_slave_0: left promiscuous mode [ 2197.187908][T13249] bridge0: port 1(bridge_slave_0) entered disabled state [ 2198.609531][T13249] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2198.697613][T13249] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2198.748514][T13249] bond0 (unregistering): Released all slaves [ 2199.078410][T13249] hsr_slave_0: left promiscuous mode [ 2199.087445][T13249] hsr_slave_1: left promiscuous mode [ 2199.107739][T13249] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2199.115136][T13249] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2199.189625][T13249] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2199.197083][T13249] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2199.230445][T13249] veth1_macvtap: left promiscuous mode [ 2199.235942][T13249] veth0_macvtap: left promiscuous mode [ 2199.267406][T13249] veth1_vlan: left promiscuous mode [ 2199.272698][T13249] veth0_vlan: left promiscuous mode [ 2200.119304][T13249] team0 (unregistering): Port device team_slave_1 removed [ 2200.187717][T13249] team0 (unregistering): Port device team_slave_0 removed [ 2200.841379][ T5017] lo speed is unknown, defaulting to 1000 [ 2200.870537][ T5017] lo speed is unknown, defaulting to 1000 [ 2201.000276][ T5023] lo speed is unknown, defaulting to 1000 [ 2201.034318][ T5023] lo speed is unknown, defaulting to 1000 [ 2201.155847][ T28] kauditd_printk_skb: 59 callbacks suppressed [ 2201.155864][ T28] audit: type=1400 audit(1772597196.128:129568): avc: denied { sys_module } for pid=5035 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2201.196479][ T5017] chnl_net:caif_netlink_parms(): no params data found [ 2201.237504][ T28] audit: type=1400 audit(1772597196.128:129569): avc: denied { module_request } for pid=5035 comm="syz-executor" kmod="rose0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2201.363718][T13249] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2201.421980][ T5035] lo speed is unknown, defaulting to 1000 [ 2201.432678][ T28] audit: type=1400 audit(1772597196.398:129570): avc: denied { module_request } for pid=5023 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2201.479782][ T5035] lo speed is unknown, defaulting to 1000 [ 2201.505345][T13249] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2201.582810][ T5023] chnl_net:caif_netlink_parms(): no params data found [ 2201.621734][ T28] audit: type=1400 audit(1772597196.598:129571): avc: denied { recv } for pid=2987 comm="klogd" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2201.693743][T13249] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2201.773581][ T5017] bridge0: port 1(bridge_slave_0) entered blocking state [ 2201.797334][ T5017] bridge0: port 1(bridge_slave_0) entered disabled state [ 2201.804557][ T5017] bridge_slave_0: entered allmulticast mode [ 2201.868167][ T5017] bridge_slave_0: entered promiscuous mode [ 2201.876814][ T5017] bridge0: port 2(bridge_slave_1) entered blocking state [ 2201.885228][ T5017] bridge0: port 2(bridge_slave_1) entered disabled state [ 2201.907437][ T5017] bridge_slave_1: entered allmulticast mode [ 2201.914330][ T5017] bridge_slave_1: entered promiscuous mode [ 2201.968485][T13249] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2201.978832][ T28] audit: type=1400 audit(1772597196.948:129572): avc: denied { unmount } for pid=529 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 2202.039686][ T28] audit: type=1400 audit(1772597197.018:129573): avc: denied { unmount } for pid=529 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 2202.138475][ T28] audit: type=1400 audit(1772597197.098:129574): avc: denied { recv } for pid=5023 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2202.190774][ T5017] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2202.250411][ T28] audit: type=1400 audit(1772597197.108:129575): avc: denied { recv } for pid=3296 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2202.298539][ T5017] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2202.350532][ T28] audit: type=1400 audit(1772597197.208:129576): avc: denied { execmem } for pid=5056 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2202.381638][ T28] audit: type=1400 audit(1772597197.358:129577): avc: denied { read } for pid=5057 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2202.449214][ T5023] bridge0: port 1(bridge_slave_0) entered blocking state [ 2202.465749][ T5023] bridge0: port 1(bridge_slave_0) entered disabled state [ 2202.477847][ T5023] bridge_slave_0: entered allmulticast mode [ 2202.517809][ T5023] bridge_slave_0: entered promiscuous mode [ 2202.543263][ T5017] team0: Port device team_slave_0 added [ 2202.557797][ T5023] bridge0: port 2(bridge_slave_1) entered blocking state [ 2202.564900][ T5023] bridge0: port 2(bridge_slave_1) entered disabled state [ 2202.587505][ T5023] bridge_slave_1: entered allmulticast mode [ 2202.594127][ T5023] bridge_slave_1: entered promiscuous mode [ 2202.643278][ T5017] team0: Port device team_slave_1 added [ 2202.723350][T13249] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2202.763040][ T5023] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2202.790784][ T5023] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2202.810781][ T5017] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2202.827307][ T5017] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2202.877407][ T5017] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2202.900753][T13249] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2202.930924][ T5035] chnl_net:caif_netlink_parms(): no params data found [ 2202.962562][ T5017] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2202.972029][ T5017] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2202.998728][ T5017] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2203.019455][T13249] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2203.062468][ T5023] team0: Port device team_slave_0 added [ 2203.120576][T13249] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2203.139177][ T5023] team0: Port device team_slave_1 added [ 2203.171316][ T5017] hsr_slave_0: entered promiscuous mode [ 2203.178346][ T5017] hsr_slave_1: entered promiscuous mode [ 2203.184442][ T5017] debugfs: 'hsr0' already exists in 'hsr' [ 2203.192163][ T5017] Cannot create hsr debugfs directory [ 2203.210509][ T5057] lo speed is unknown, defaulting to 1000 [ 2203.230097][ T5023] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2203.247297][ T5023] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2203.297290][ T5023] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2203.329746][ T5023] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2203.336702][ T5023] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2203.397279][ T5023] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2203.419398][ T5057] lo speed is unknown, defaulting to 1000 [ 2203.477398][ T5035] bridge0: port 1(bridge_slave_0) entered blocking state [ 2203.484633][ T5035] bridge0: port 1(bridge_slave_0) entered disabled state [ 2203.497517][ T5035] bridge_slave_0: entered allmulticast mode [ 2203.508003][ T5035] bridge_slave_0: entered promiscuous mode [ 2203.543898][ T5035] bridge0: port 2(bridge_slave_1) entered blocking state [ 2203.557365][ T5035] bridge0: port 2(bridge_slave_1) entered disabled state [ 2203.564607][ T5035] bridge_slave_1: entered allmulticast mode [ 2203.577896][ T5035] bridge_slave_1: entered promiscuous mode [ 2203.604907][ T5023] hsr_slave_0: entered promiscuous mode [ 2203.617950][ T5023] hsr_slave_1: entered promiscuous mode [ 2203.627978][ T5023] debugfs: 'hsr0' already exists in 'hsr' [ 2203.633707][ T5023] Cannot create hsr debugfs directory [ 2203.709091][ T5035] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2203.730723][T13249] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2203.821512][ T5035] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2203.869640][T13249] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2203.953931][T13249] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2203.992430][ T5035] team0: Port device team_slave_0 added [ 2204.010480][ T5035] team0: Port device team_slave_1 added [ 2204.080778][T13249] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2204.122522][ T5035] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2204.131906][ T5035] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2204.177333][ T5035] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2204.230871][ T5035] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2204.247979][ T5035] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2204.297292][ T5035] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2204.460847][ T5057] chnl_net:caif_netlink_parms(): no params data found [ 2204.485736][ T5035] hsr_slave_0: entered promiscuous mode [ 2204.497869][ T5035] hsr_slave_1: entered promiscuous mode [ 2204.508331][ T5035] debugfs: 'hsr0' already exists in 'hsr' [ 2204.514072][ T5035] Cannot create hsr debugfs directory [ 2204.562222][T13249] bridge_slave_1: left allmulticast mode [ 2204.577376][T13249] bridge_slave_1: left promiscuous mode [ 2204.583033][T13249] bridge0: port 2(bridge_slave_1) entered disabled state [ 2204.637958][T13249] bridge_slave_0: left allmulticast mode [ 2204.643655][T13249] bridge_slave_0: left promiscuous mode [ 2204.657424][T13249] bridge0: port 1(bridge_slave_0) entered disabled state [ 2204.669487][T13249] bridge_slave_1: left allmulticast mode [ 2204.675144][T13249] bridge_slave_1: left promiscuous mode [ 2204.698156][T13249] bridge0: port 2(bridge_slave_1) entered disabled state [ 2204.709602][T13249] bridge_slave_0: left allmulticast mode [ 2204.715437][T13249] bridge_slave_0: left promiscuous mode [ 2204.737350][T13249] bridge0: port 1(bridge_slave_0) entered disabled state [ 2204.748758][T13249] bridge_slave_1: left allmulticast mode [ 2204.754478][T13249] bridge_slave_1: left promiscuous mode [ 2204.777492][T13249] bridge0: port 2(bridge_slave_1) entered disabled state [ 2204.797363][T13249] bridge_slave_0: left allmulticast mode [ 2204.803028][T13249] bridge_slave_0: left promiscuous mode [ 2204.808892][T13249] bridge0: port 1(bridge_slave_0) entered disabled state [ 2204.989783][T13249] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2205.008725][T13249] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2205.032379][T13249] bond0 (unregistering): Released all slaves [ 2205.074877][T13249] bond0 (unregistering): (slave geneve1): Releasing backup interface [ 2205.149501][T13249] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2205.168847][T13249] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2205.188699][T13249] bond0 (unregistering): Released all slaves [ 2205.270739][T13249] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2205.298564][T13249] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2205.318284][T13249] bond0 (unregistering): Released all slaves [ 2205.458166][T13249] hsr_slave_0: left promiscuous mode [ 2205.468471][T13249] hsr_slave_1: left promiscuous mode [ 2205.474030][T13249] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2205.497942][T13249] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2205.509424][T13249] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2205.516965][T13249] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2205.539440][T13249] hsr_slave_0: left promiscuous mode [ 2205.558020][T13249] hsr_slave_1: left promiscuous mode [ 2205.563874][T13249] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2205.578475][T13249] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2205.598302][T13249] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2205.605773][T13249] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2205.626750][T13249] hsr_slave_0: left promiscuous mode [ 2205.637952][T13249] hsr_slave_1: left promiscuous mode [ 2205.657380][T13249] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2205.664775][T13249] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2205.688101][T13249] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2205.695526][T13249] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2205.726471][T13249] veth1_macvtap: left promiscuous mode [ 2205.747310][T13249] veth0_macvtap: left promiscuous mode [ 2205.752833][T13249] veth1_vlan: left promiscuous mode [ 2205.759139][T13249] veth0_vlan: left promiscuous mode [ 2205.768746][T13249] veth1_macvtap: left promiscuous mode [ 2205.774306][T13249] veth0_macvtap: left promiscuous mode [ 2205.787358][T13249] veth1_vlan: left promiscuous mode [ 2205.792668][T13249] veth0_vlan: left promiscuous mode [ 2205.808782][T13249] veth1_macvtap: left allmulticast mode [ 2205.814541][T13249] veth1_macvtap: left promiscuous mode [ 2205.821097][T13249] veth0_macvtap: left promiscuous mode [ 2205.826675][T13249] veth1_vlan: left promiscuous mode [ 2205.833860][T13249] veth0_vlan: left promiscuous mode [ 2206.108887][T13249] team0 (unregistering): Port device team_slave_1 removed [ 2206.128790][T13249] team0 (unregistering): Port device team_slave_0 removed [ 2206.229297][ T28] kauditd_printk_skb: 40 callbacks suppressed [ 2206.229311][ T28] audit: type=1400 audit(1772597201.208:129618): avc: denied { egress } for pid=22 comm="ksoftirqd/1" saddr=fe80::a8aa:aaff:feaa:aa1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2206.297853][ T28] audit: type=1400 audit(1772597201.208:129619): avc: denied { sendto } for pid=22 comm="ksoftirqd/1" saddr=fe80::a8aa:aaff:feaa:aa1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 2206.332381][T13249] team0 (unregistering): Port device team_slave_1 removed [ 2206.342563][T13249] team0 (unregistering): Port device team_slave_0 removed [ 2206.451095][T13249] team0 (unregistering): Port device team_slave_1 removed [ 2206.469982][T13249] team0 (unregistering): Port device team_slave_0 removed [ 2206.544354][ T5057] bridge0: port 1(bridge_slave_0) entered blocking state [ 2206.568275][ T5057] bridge0: port 1(bridge_slave_0) entered disabled state [ 2206.575565][ T5057] bridge_slave_0: entered allmulticast mode [ 2206.587978][ T5057] bridge_slave_0: entered promiscuous mode [ 2206.627486][ T5057] bridge0: port 2(bridge_slave_1) entered blocking state [ 2206.634558][ T5057] bridge0: port 2(bridge_slave_1) entered disabled state [ 2206.647430][ T5057] bridge_slave_1: entered allmulticast mode [ 2206.654063][ T5057] bridge_slave_1: entered promiscuous mode [ 2206.726946][ T5057] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2206.758527][ T5057] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2206.853972][ T28] audit: type=1400 audit(1772597201.828:129620): avc: denied { create } for pid=5035 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2206.895148][ T5057] team0: Port device team_slave_0 added [ 2206.908423][ T28] audit: type=1400 audit(1772597201.828:129621): avc: denied { write } for pid=5035 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2206.919155][ T5057] team0: Port device team_slave_1 added [ 2206.947441][ T28] audit: type=1400 audit(1772597201.828:129622): avc: denied { read } for pid=5035 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2206.951502][ T5017] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2206.987610][ T28] audit: type=1400 audit(1772597201.868:129623): avc: denied { read } for pid=5035 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2207.027862][ T28] audit: type=1400 audit(1772597201.868:129624): avc: denied { write } for pid=5035 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2207.069253][ T5057] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2207.076215][ T5057] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2207.077492][ T28] audit: type=1400 audit(1772597201.998:129625): avc: denied { read } for pid=5035 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2207.138000][ T5057] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2207.164568][ T5023] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2207.168399][ T28] audit: type=1400 audit(1772597201.998:129626): avc: denied { write } for pid=5035 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2207.181855][ T5057] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2207.217407][ T5057] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2207.227461][ T28] audit: type=1400 audit(1772597202.018:129627): avc: denied { read } for pid=5035 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2207.267432][ T5057] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2207.330270][ T5017] 8021q: adding VLAN 0 to HW filter on device team0 [ 2207.362964][ T5057] hsr_slave_0: entered promiscuous mode [ 2207.381357][ T5057] hsr_slave_1: entered promiscuous mode [ 2207.388803][ T5057] debugfs: 'hsr0' already exists in 'hsr' [ 2207.394533][ T5057] Cannot create hsr debugfs directory [ 2207.411662][ T5023] 8021q: adding VLAN 0 to HW filter on device team0 [ 2207.433417][T13251] bridge0: port 1(bridge_slave_0) entered blocking state [ 2207.440691][T13251] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2207.511877][T13251] bridge0: port 2(bridge_slave_1) entered blocking state [ 2207.519026][T13251] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2207.552081][T13251] bridge0: port 1(bridge_slave_0) entered blocking state [ 2207.559343][T13251] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2207.638876][T13251] bridge0: port 2(bridge_slave_1) entered blocking state [ 2207.646001][T13251] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2207.820798][ T5035] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2207.846853][ T5023] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2207.877386][ T5023] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2208.028637][T13249] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2208.074788][ T5035] 8021q: adding VLAN 0 to HW filter on device team0 [ 2208.122144][ T9141] bridge0: port 1(bridge_slave_0) entered blocking state [ 2208.129310][ T9141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2208.160104][T13249] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2208.195551][ T4180] bridge0: port 2(bridge_slave_1) entered blocking state [ 2208.202779][ T4180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2208.241918][T13249] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2208.259663][ T5017] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2208.314972][T13249] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2208.416253][ T5023] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2208.500245][ T5057] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2208.540805][T13249] bridge_slave_0: left allmulticast mode [ 2208.546505][T13249] bridge_slave_0: left promiscuous mode [ 2208.566284][T13249] bridge0: port 1(bridge_slave_0) entered disabled state [ 2208.709654][T13249] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2208.729677][T13249] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2208.748818][T13249] bond0 (unregistering): (slave bridge_slave_1): Releasing backup interface [ 2208.769439][T13249] bond0 (unregistering): Released all slaves [ 2208.887924][T13249] hsr_slave_0: left promiscuous mode [ 2208.898085][T13249] hsr_slave_1: left promiscuous mode [ 2208.903776][T13249] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2208.938666][T13249] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2208.958067][T13249] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2208.965505][T13249] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2208.990434][T13249] veth1_macvtap: left promiscuous mode [ 2208.995934][T13249] veth0_macvtap: left promiscuous mode [ 2209.017452][T13249] veth1_vlan: left promiscuous mode [ 2209.022704][T13249] veth0_vlan: left promiscuous mode [ 2209.130178][T13249] team0 (unregistering): Port device team_slave_1 removed [ 2209.160735][T13249] team0 (unregistering): Port device team_slave_0 removed [ 2209.264102][ T5057] 8021q: adding VLAN 0 to HW filter on device team0 [ 2209.371322][T13251] bridge0: port 1(bridge_slave_0) entered blocking state [ 2209.378410][T13251] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2209.418198][T13251] bridge0: port 2(bridge_slave_1) entered blocking state [ 2209.425285][T13251] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2209.476694][ T5057] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2209.514405][ T5035] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2209.623861][ T5017] veth0_vlan: entered promiscuous mode [ 2209.708883][ T5017] veth1_vlan: entered promiscuous mode [ 2209.860801][ T5057] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2209.893187][ T5017] veth0_macvtap: entered promiscuous mode [ 2209.933342][ T5017] veth1_macvtap: entered promiscuous mode [ 2210.006599][ T5017] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2210.049679][ T5023] veth0_vlan: entered promiscuous mode [ 2210.082036][ T5017] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2210.096399][ T5023] veth1_vlan: entered promiscuous mode [ 2210.243057][ T5023] veth0_macvtap: entered promiscuous mode [ 2210.271757][ T5035] veth0_vlan: entered promiscuous mode [ 2210.296931][ T5023] veth1_macvtap: entered promiscuous mode [ 2210.321833][ T5035] veth1_vlan: entered promiscuous mode [ 2210.393528][ T5023] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2210.450315][ T5023] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2210.531755][ T5035] veth0_macvtap: entered promiscuous mode [ 2210.573114][ T5035] veth1_macvtap: entered promiscuous mode [ 2211.109172][ T5172] netlink: 'syz.1.19950': attribute type 4 has an invalid length. [ 2211.111788][ T5035] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2211.137384][ T5172] netlink: 152 bytes leftover after parsing attributes in process `syz.1.19950'. [ 2211.178175][ T5057] veth0_vlan: entered promiscuous mode [ 2211.199396][ T5172] .`: renamed from bond0 (while UP) [ 2211.225450][ T5035] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2211.237281][ T28] kauditd_printk_skb: 291 callbacks suppressed [ 2211.237296][ T28] audit: type=1400 audit(1772597206.208:129919): avc: denied { prog_load } for pid=5175 comm="syz.8.19947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2211.286115][ T5057] veth1_vlan: entered promiscuous mode [ 2211.337456][ T28] audit: type=1400 audit(1772597206.208:129920): avc: denied { bpf } for pid=5175 comm="syz.8.19947" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2211.374722][ T28] audit: type=1400 audit(1772597206.208:129921): avc: denied { perfmon } for pid=5175 comm="syz.8.19947" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2211.437352][ T28] audit: type=1400 audit(1772597206.208:129922): avc: denied { prog_run } for pid=5175 comm="syz.8.19947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2211.474671][ T5057] veth0_macvtap: entered promiscuous mode [ 2211.496906][ T5181] netlink: 'syz.8.19953': attribute type 1 has an invalid length. [ 2211.504373][ T28] audit: type=1400 audit(1772597206.218:129923): avc: denied { open } for pid=5175 comm="syz.8.19947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2211.517322][ T5181] netlink: 'syz.8.19953': attribute type 2 has an invalid length. [ 2211.546408][ T28] audit: type=1400 audit(1772597206.218:129924): avc: denied { kernel } for pid=5175 comm="syz.8.19947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2211.578971][ T28] audit: type=1400 audit(1772597206.218:129925): avc: denied { write } for pid=5175 comm="syz.8.19947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2211.616074][ T5181] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2211.627794][ T5057] veth1_macvtap: entered promiscuous mode [ 2211.633709][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2211.640225][ C1] audit: audit_lost=1494 audit_rate_limit=0 audit_backlog_limit=64 [ 2211.655954][ T5181] netlink: 'syz.8.19953': attribute type 39 has an invalid length. [ 2211.656563][ T9141] bridge_slave_1: left allmulticast mode [ 2211.670619][ T9141] bridge_slave_1: left promiscuous mode [ 2211.676507][ T9141] bridge0: port 2(bridge_slave_1) entered disabled state [ 2211.685269][ T9141] bridge_slave_0: left allmulticast mode [ 2211.692048][ T9141] bridge_slave_0: left promiscuous mode [ 2211.697896][ T9141] bridge0: port 1(bridge_slave_0) entered disabled state [ 2211.811369][ T9141] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2211.834494][ T9141] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2211.851536][ T9141] bond0 (unregistering): Released all slaves [ 2211.973929][ T9141] hsr_slave_0: left promiscuous mode [ 2211.993186][ T9141] hsr_slave_1: left promiscuous mode [ 2212.012292][ T9141] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2212.034219][ T9141] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2212.050255][ T9141] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2212.060158][ T9141] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2212.081236][ T9141] veth1_macvtap: left promiscuous mode [ 2212.089188][ T9141] veth0_macvtap: left promiscuous mode [ 2212.101254][ T9141] veth1_vlan: left promiscuous mode [ 2212.113112][ T9141] veth0_vlan: left promiscuous mode [ 2212.257280][ T9141] team0 (unregistering): Port device team_slave_1 removed [ 2212.276667][ T9141] team0 (unregistering): Port device team_slave_0 removed [ 2212.332494][ T5057] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2212.392155][ T5057] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2212.453229][ T5182] lo speed is unknown, defaulting to 1000 [ 2212.496720][ T5182] lo speed is unknown, defaulting to 1000 [ 2212.617831][ T5206] netlink: 'syz.0.19959': attribute type 10 has an invalid length. [ 2212.749293][ T5182] chnl_net:caif_netlink_parms(): no params data found [ 2212.799961][ T5214] netlink: 'syz.0.19960': attribute type 4 has an invalid length. [ 2212.818562][ T5214] netlink: 152 bytes leftover after parsing attributes in process `syz.0.19960'. [ 2212.870508][ T5214] .`: renamed from bond0 (while UP) [ 2213.007044][ T5182] bridge0: port 1(bridge_slave_0) entered blocking state [ 2213.037471][ T5182] bridge0: port 1(bridge_slave_0) entered disabled state [ 2213.053915][ T5182] bridge_slave_0: entered allmulticast mode [ 2213.103285][ T5182] bridge_slave_0: entered promiscuous mode [ 2213.184947][ T5182] bridge0: port 2(bridge_slave_1) entered blocking state [ 2213.252404][ T5182] bridge0: port 2(bridge_slave_1) entered disabled state [ 2213.451017][ T5182] bridge_slave_1: entered allmulticast mode [ 2213.868043][ T5233] loop5: detected capacity change from 0 to 2048 [ 2214.248530][ T5182] bridge_slave_1: entered promiscuous mode [ 2214.424639][ T5182] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2214.472176][ T5182] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2214.593369][ T5182] team0: Port device team_slave_0 added [ 2214.605418][ T5182] team0: Port device team_slave_1 added [ 2214.631931][ T5246] loop5: detected capacity change from 0 to 512 [ 2214.689312][ T5182] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2214.696859][ T5182] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2214.723586][ T5182] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2214.737937][ T5246] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 2214.737982][ T5182] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2214.737996][ T5182] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2214.797886][ T5182] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2214.798677][ T5246] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2214.830846][ T5182] hsr_slave_0: entered promiscuous mode [ 2214.836979][ T5182] hsr_slave_1: entered promiscuous mode [ 2215.389963][ T5182] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2215.449377][ T5182] 8021q: adding VLAN 0 to HW filter on device team0 [ 2215.485833][T13249] bridge0: port 1(bridge_slave_0) entered blocking state [ 2215.493123][T13249] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2215.551438][T13249] bridge0: port 2(bridge_slave_1) entered blocking state [ 2215.558531][T13249] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2216.273485][ T5182] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2216.293915][ T28] kauditd_printk_skb: 511 callbacks suppressed [ 2216.293929][ T28] audit: type=1400 audit(1772597211.268:130428): avc: denied { module_request } for pid=5182 comm="syz-executor" kmod="netdev-netdevsim6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2216.387109][ T28] audit: type=1400 audit(1772597211.318:130429): avc: denied { egress } for pid=9144 comm="kworker/u8:55" daddr=ff02::1:ffaa:aa1c netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2216.447347][ T28] audit: type=1400 audit(1772597211.318:130430): avc: denied { sendto } for pid=9144 comm="kworker/u8:55" daddr=ff02::1:ffaa:aa1c netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 2216.527443][ T28] audit: type=1400 audit(1772597211.318:130431): avc: denied { read write } for pid=5035 comm="syz-executor" name="loop0" dev="devtmpfs" ino=2300 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2216.597320][ T28] audit: type=1400 audit(1772597211.318:130432): avc: denied { open } for pid=5035 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=2300 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2216.687394][ T28] audit: type=1400 audit(1772597211.318:130433): avc: denied { ioctl } for pid=5035 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=2300 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2216.777350][ T28] audit: type=1400 audit(1772597211.338:130434): avc: denied { create } for pid=5261 comm="syz.5.19973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2216.842309][ T28] audit: type=1400 audit(1772597211.338:130435): avc: denied { write } for pid=5261 comm="syz.5.19973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2216.897307][ T28] audit: type=1400 audit(1772597211.358:130436): avc: denied { sys_module } for pid=5182 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2216.977275][ T28] audit: type=1400 audit(1772597211.358:130437): avc: denied { module_request } for pid=5182 comm="syz-executor" kmod="netdevsim6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2217.061376][ T5182] veth0_vlan: entered promiscuous mode [ 2217.127980][ T5182] veth1_vlan: entered promiscuous mode [ 2217.227698][ T5182] veth0_macvtap: entered promiscuous mode [ 2217.248813][ T5182] veth1_macvtap: entered promiscuous mode [ 2217.408690][ T5182] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2217.432971][ T5182] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2217.609124][ T5296] loop5: detected capacity change from 0 to 2048 [ 2218.557472][ T5312] loop6: detected capacity change from 0 to 512 [ 2219.074055][ T5312] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 2219.131368][ T5312] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2221.442827][ T5331] loop5: detected capacity change from 0 to 2048 [ 2221.476630][ T28] kauditd_printk_skb: 319 callbacks suppressed [ 2221.476647][ T28] audit: type=1400 audit(1772597216.108:130757): avc: denied { prog_load } for pid=5328 comm="syz.5.19991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2221.523247][ T28] audit: type=1400 audit(1772597216.108:130758): avc: denied { bpf } for pid=5328 comm="syz.5.19991" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2221.591393][ T28] audit: type=1400 audit(1772597216.118:130759): avc: denied { prog_load } for pid=5328 comm="syz.5.19991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2221.657281][ T28] audit: type=1400 audit(1772597216.118:130760): avc: denied { perfmon } for pid=5328 comm="syz.5.19991" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2221.720478][ T28] audit: type=1400 audit(1772597216.118:130761): avc: denied { prog_run } for pid=5328 comm="syz.5.19991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2221.798842][ T28] audit: type=1400 audit(1772597216.118:130762): avc: denied { recv } for pid=5328 comm="syz.5.19991" saddr=10.128.0.163 src=30036 daddr=10.128.0.103 dest=46260 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2221.837670][ T28] audit: type=1400 audit(1772597216.118:130763): avc: denied { open } for pid=5328 comm="syz.5.19991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2221.918478][ T28] audit: type=1400 audit(1772597216.118:130764): avc: denied { perfmon } for pid=5328 comm="syz.5.19991" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2221.978077][ T28] audit: type=1400 audit(1772597216.118:130765): avc: denied { kernel } for pid=5328 comm="syz.5.19991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 2222.038131][ T28] audit: type=1400 audit(1772597216.118:130766): avc: denied { perfmon } for pid=5328 comm="syz.5.19991" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2222.592181][ T5344] netlink: 'syz.5.19997': attribute type 10 has an invalid length. [ 2222.796519][ T5023] ================================================================== [ 2222.804648][ T5023] BUG: KCSAN: data-race in lookup_fast / shrink_dentry_list [ 2222.812029][ T5023] [ 2222.814358][ T5023] read-write to 0xffff8881069449c0 of 4 bytes by task 5346 on cpu 1: [ 2222.822427][ T5023] shrink_dentry_list+0x22d/0x3c0 [ 2222.827461][ T5023] shrink_dcache_sb+0x15d/0x290 [ 2222.832317][ T5023] reconfigure_super+0x142/0x590 [ 2222.837260][ T5023] path_mount+0xaf7/0xbc0 [ 2222.841677][ T5023] __se_sys_mount+0x28c/0x2e0 [ 2222.846356][ T5023] __x64_sys_mount+0x67/0x80 [ 2222.850943][ T5023] x64_sys_call+0x2d61/0x3020 [ 2222.855622][ T5023] do_syscall_64+0x12c/0x370 [ 2222.860225][ T5023] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2222.866119][ T5023] [ 2222.868444][ T5023] read to 0xffff8881069449c0 of 4 bytes by task 5023 on cpu 0: [ 2222.875978][ T5023] lookup_fast+0x72/0x320 [ 2222.880319][ T5023] link_path_walk+0x51c/0xe30 [ 2222.885005][ T5023] path_lookupat+0x8c/0x500 [ 2222.889502][ T5023] filename_lookup+0x190/0x390 [ 2222.894254][ T5023] vfs_statx+0x96/0x170 [ 2222.898396][ T5023] vfs_fstatat+0x118/0x170 [ 2222.902797][ T5023] __se_sys_newfstatat+0x55/0x3e0 [ 2222.907808][ T5023] __x64_sys_newfstatat+0x55/0x70 [ 2222.912822][ T5023] x64_sys_call+0x2c64/0x3020 [ 2222.917493][ T5023] do_syscall_64+0x12c/0x370 [ 2222.922076][ T5023] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2222.927954][ T5023] [ 2222.930265][ T5023] value changed: 0x00140444 -> 0x00100044 [ 2222.935966][ T5023] [ 2222.938274][ T5023] Reported by Kernel Concurrency Sanitizer on: [ 2222.944422][ T5023] CPU: 0 UID: 0 PID: 5023 Comm: syz-executor Tainted: G W syzkaller #0 PREEMPT(full) [ 2222.955430][ T5023] Tainted: [W]=WARN [ 2222.959217][ T5023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2222.969257][ T5023] ================================================================== [ 2228.628018][ T28] kauditd_printk_skb: 115 callbacks suppressed [ 2228.628033][ T28] audit: type=1400 audit(1772597223.608:130882): avc: denied { egress } for pid=14 comm="ksoftirqd/0" saddr=fe80::a8aa:aaff:feaa:aa1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2228.747305][ T28] audit: type=1400 audit(1772597223.608:130883): avc: denied { sendto } for pid=14 comm="ksoftirqd/0" saddr=fe80::a8aa:aaff:feaa:aa1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 2229.269451][ T28] audit: type=1400 audit(1772597224.248:130884): avc: denied { egress } for pid=22 comm="ksoftirqd/1" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2229.367383][ T28] audit: type=1400 audit(1772597224.248:130885): avc: denied { sendto } for pid=22 comm="ksoftirqd/1" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1