last executing test programs: 27m5.835486565s ago: executing program 32 (id=1640): perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1d, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1ff, 0x80000001}, 0x0, 0x8, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0xc002a0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e24, 0x3, @empty, 0x3}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0xdb, @empty, 0x8}}, 0xffb, 0x203, 0xffff18b6, 0x6, 0x330, 0x80000005, 0xdb}, 0x9c) sendmsg$inet6(r2, &(0x7f0000000540)={&(0x7f00000000c0)={0xa, 0x4e24, 0x8004, @loopback, 0x7fff}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000100)="f0", 0x1}], 0x1}, 0x400d4) 25m29.314761551s ago: executing program 33 (id=2204): perf_event_open(&(0x7f0000001940)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_bp={0x0, 0x3}, 0x80, 0x10000, 0x0, 0x8, 0x10, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r0 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000032c0), 0x0, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000100)='a', 0xdd02}], 0xc, &(0x7f0000000000)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0xc}}], 0x30}], 0x1, 0x0) 25m25.83897811s ago: executing program 34 (id=2311): sched_setaffinity(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={r0}, 0x4) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x100000001}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20081, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffe, 0x0, 0x2, 0x80000011, 0x1, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) migrate_pages(0x0, 0xfc, &(0x7f0000000200)=0x7ffffffffffffffd, &(0x7f0000000240)=0x1) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x22d00, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x50, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r2, 0xf50f, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x21081e, &(0x7f00000000c0)={[{@grpquota}, {@nogrpid}, {@nomblk_io_submit}, {@nobh}]}, 0xfe, 0x51b, &(0x7f0000001000)="$eJzs3c9vI1cdAPDveOPEyaZNWnoABO3SFha0WufHtqtqD1BOCKFKiB5B2obEG0Wx4yh2ShP2sD1zRaISJzjyB3DuiTsXBDcu5YDEjwjUICExaMbj1Ju1s9FmY2fjz0cazXvzHH+/L9bMi1/seQGMrWsR8SAiJiPivYiYK44nxRZvd7bscZ8e3F89PLi/mkSavvuPJG/PjkXPz2SuFs9ZiYgffCfix8mjcVt7+5sr9Xptp6gvtBvbC629/ZsbjZX12nptK/vh24tv3Xpz+an19ZXGZFH68ie/f/CNn2ZpzRZHevvxJJJOl/sdj4jyUZzMRER87yzBLpArRX8mR50IT6QUES9GxKv5+T8XV/JXEwC4zNJ0LtK53joAcNmV8jmwpFQt5gJmo1SqVjtzeC/FTKnebLVv3Gvubq11/kyYj3Lp3ka9tljMFc5HOcnqS3n5s/pypz7Vrd+KiBci4udT03m9utqsr43yDx8AGGNXj43//57qjP8AwCVXGXUCAMDQGf8BYPwY/wFg/Bj/AWD8dMb/6VGnAQAM0Ynv/90PCAAuJfP/ADBWvv/OO9mWHhb3v157f293s/n+zbVaa7Pa2F2trjZ3tqvrzeZ6fs+exuOer95sbi+9EbsfzH9zu9VeaO3t3200d7fad/P7et+tlfNH9b1VNgAwJC+88vGfkmxEvjOdb9GzlkN5pJkB56006gSAkbky6gSAkTnTp3sqPhsEz7IzvMc3PQCXRJ8leh9S6fcFoTRN007pf+k55QWcn+tfMP8P46pn/t+ngGHMmP+H8WUGH8ZXmianXfM/TvtAAOBiM8cPDPj//4vF/jfFPwd+tHb8ER+dZ1YAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwsXXX/60Wa4HPRqlUrUY8FxHzUU7ubdRrixHxfET8cao8ldWXRpwzAHBWpb8mxfpf1+den32o6eWrR8XJiPjJL9/9xQcr7fbOHyImk39OdY+3PyqOLw8/ewDgZNl7/e44ne973sh/enB/tbsNM6e/fTsiKp34hweTcXgUfyIm8n0lyhEx86+kqHckPXMXZ/Hgw4j4fL/+JzGbz4F0Vj49Hj+L/dxQ45ceil/K2zr77HfxuaeQC4ybj7Prz9v9zr9SXMv3/c//Sn6FOrvi+pc91ephfg38LH73+ndlwPXv2mljvPG773ZK04+2fRjxxYmIbuzDnutPN34yIP7rp4z/5y+9/OqgtvRXEdfjTt/4vbEW2o3thdbe/s2Nxsp6bb22tbx8e+n24lu33lxeyOeoFwaPBn+/c+P5QW1Z/2eif/8rj+n/V0/Z/1//970ffuWE+F9/rV/8Urx0QvxsTPzaKeOvzPy2Mqgti782oP+Pe/1vnDL+J3/Zf2TZcABgdFp7+5sr9Xpt51kvzJY7Hboo+SicRyF7hS9AGn0L3xpWrMno3/Sz1zqnwLGmNH2iWIOuGE9j1g24CI5O+oj4z6iTAQAAAAAAAAAAAAAA+hrGN5ZG3UcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAur/8HAAD//5enzt4=") r3 = open(&(0x7f0000000040)='.\x00', 0x20000, 0x0) getdents64(r3, &(0x7f0000000fc0)=""/224, 0xe0) inotify_init1(0x80000) getdents64(r3, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 22m20.039653515s ago: executing program 35 (id=3301): r0 = syz_open_dev$loop(&(0x7f0000000140), 0x75f, 0xa382) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f0000000080)={0x0, 0x0}) syz_clone3(&(0x7f0000000080)={0x184801400, &(0x7f0000000100)=0xffffffffffffffff, 0x0, 0x0, {0x33}, 0x0, 0x0, 0x0, 0x0}, 0x58) pidfd_send_signal(r2, 0x21, 0x0, 0x0) process_madvise(r2, 0x0, 0x0, 0xd, 0x0) write(r1, &(0x7f00000004c0)='t8', 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000000)={0x1}) socket$inet6(0xa, 0x80002, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv4_getrule={0x1c, 0x22, 0x501, 0x70bd2a, 0x25dfdbfc, {0x2, 0x14, 0x0, 0x9, 0x6a}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048004}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@delnexthop={0x38, 0x69, 0xb, 0x0, 0x0, {}, [{0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}]}, 0x38}}, 0x4000000) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000002, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x87}, {0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0xfffffffffffffffb}, {0x0, 0x40000000000000, 0x200000000000000}, 0x2}}, 0xb8}, 0x1, 0x0, 0x0, 0x4000015}, 0x2c000010) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=@updpolicy={0xc4, 0x1b, 0x1, 0xfffffffe, 0x400000, {{@in=@multicast1=0xe0000002, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x87}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0xfffffffffffffffb}, {0x0, 0x0, 0x200000000000000}}, [@mark={0xc, 0x15, {0x35075a, 0xc0}}]}, 0xc4}, 0x1, 0x0, 0x0, 0x40100}, 0x2c000010) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f00000002c0)) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000001c0)=0xc0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) syz_open_dev$loop(&(0x7f0000000000), 0x8, 0x101203) syz_clone3(&(0x7f0000000680)={0x200020100, &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000300), {0x3a}, &(0x7f0000000380)=""/239, 0xef, &(0x7f0000000500)=""/172, &(0x7f00000005c0)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r7 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x69801}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0x2c}}]}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) 21m8.266035269s ago: executing program 36 (id=3583): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)=@newqdisc={0x70, 0x24, 0x4ee4e6a52ff56541, 0x1, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x40, 0x2, {{0x3, 0x3, 0x6361, 0x5, 0xffffffff, 0x3}, [@TCA_NETEM_ECN={0x8, 0x7, 0x1}, @TCA_NETEM_LOSS={0x1c, 0x5, 0x0, 0x1, [@NETEM_LOSS_GI={0x18, 0x1, {0x8001, 0x9, 0x7fffffff, 0xffffdf2d, 0x6}}]}]}}}]}, 0x70}, 0x1, 0x0, 0x0, 0x40088c1}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) sendto$packet(r4, &(0x7f0000000440)="b7", 0x1, 0x20000004, &(0x7f0000000140)={0x11, 0x88a8, r5, 0x1, 0xfd, 0x6, @multicast}, 0x14) 18m38.937716847s ago: executing program 6 (id=4329): sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x8810) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020d0000100000002f3144a8edffffff03000600ff18000002"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f00000000c0), 0x2c8, 0x0) (fail_nth: 4) 18m38.571311306s ago: executing program 6 (id=4332): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x2831060, &(0x7f0000000800)={[], [{@dont_appraise}, {@smackfstransmute={'smackfstransmute', 0x3d, ']ldP\xa5U\x9f\xdd\xc7\xeb\\\v\x96\xdc\xcf\xb9\x87f\xd1\xa7O\xfe\x87\xaa)\xba\x9f\x96\xb8\\\xa8\x7f\xbe\x85\xe6$\xab\xa3\x80\xf0\xe5\xceL;\x95\x8e\b\xea\xba\"H^\x0f\x1b\xe6\x05^\xe3\x80\xe1\xec\xe2\x94\xc0\xf3\x0f\xa8\xdb\xfa\a\xf2z-\xca\xb6l\xbd;\x198\"\x9e\r1]\xcc\x16\x86\x9dq\xbe8/\xf5C\x85\xce\xc1\x17\x12\xf6=\xa9\x89\x86\x92k\xc6(\x92mi\x8c\x99+\x18\xaa\xdf\x9f\xe9S.i\xcb\x93\xe1\x13\xa5\xceo\x89?9\xe5\x95\xb3\xf1\xb4<\x7f\xe9\x9e\x8cs\xe6\xb8b:/Ex\xbc\xd1H\xca\xd5.\x8a\xde\x8d\xfc\xde\x89\a\xd4\x9e\xd6\xc9L}\x86hA%\xeb\xf5*\xa8\x9ep\'lA+\xa6E'}}, {@subj_type={'subj_type', 0x3d, 'usrjquota='}}, {@subj_user={'subj_user', 0x3d, '$\x8c\x89`\x18\xe77i~\xd6W\xda\x16Y\xcf\xf5\x8e\xc74\xcf\x98\xd8wX\xdfJN\x99\xade3\xf4\xe1\x06\xeat\xf9\xe6\x10\x00\x00'}}, {@audit}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x0, 0x30, 0x35, 0x30, 0x37, 0x38, 0x30], 0x2d, [0x65, 0x33, 0x61, 0x61], 0x2d, [0x62, 0x61, 0x36, 0x35], 0x2d, [0x39, 0x35, 0x0, 0x38], 0x2d, [0x31, 0x7a, 0x39, 0x32, 0x61, 0x37, 0x65, 0x32]}}}]}, 0x1, 0x505, &(0x7f00000002c0)="$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") r0 = open(&(0x7f0000000040)='./bus\x00', 0x80242, 0x0) ftruncate(r0, 0x2007ffc) sendfile(r0, r0, 0x0, 0x2000000000006) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x89480, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x9, 0x3}, 0x0, 0xa88, 0x8406, 0x9, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x8, 0x2, 0x2, 0x3f, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000006c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xe, 0x4a718, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x100000000, 0xe}, 0x104b18, 0x6, 0x0, 0x9, 0x5, 0x4, 0xb, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000900), r3) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) process_mrelease(0xffffffffffffffff, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(r3, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000940)={0x2c, r4, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [@NL802154_ATTR_CHANNEL={0x5, 0x8, 0x7}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_PAGE={0x5}]}, 0x2c}}, 0x64000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000080)='cdg', 0x3) setsockopt$inet6_tcp_int(r5, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r5, &(0x7f0000000000)='\x00', 0x1, 0x24048845, &(0x7f0000000140)={0xa, 0x4001, 0xfffb, @loopback, 0xfffffffa}, 0x1c) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wpan3\x00', 0x0}) r8 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000003c0), r2) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r3, &(0x7f00000008c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r8, 0x4, 0x70bd27, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008840}, 0x4008840) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r2, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x74, r4, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x278436641eeb0f08}, @NL802154_ATTR_SEC_LEVEL={0x2c, 0x2d, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x9}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x1}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x74}, 0x1, 0x0, 0x0, 0x1}, 0x840) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="180000001800599c6d0e0000ded650492d"], 0xfe33) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./bus\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1, 0x2c9, &(0x7f00000005c0)="$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") r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000000c0)=@newtfilter={0x24, 0x11, 0xd27, 0x100, 0x0, {0x0, 0x0, 0x74, r10, {0x1, 0x4}, {}, {0xa}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4044051}, 0x0) lseek(r0, 0x8, 0x4) 18m33.186297754s ago: executing program 6 (id=4343): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) (async) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x22, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x2}) (async) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) (async) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800001100000000000000000000000000d2a41a", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) (async) openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r2 = open(0x0, 0x143142, 0x80) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x48241, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) (async) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f00000005c0)={&(0x7f0000175000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/24, 0x18, 0x1, &(0x7f00000004c0)=""/210, 0x4e}, &(0x7f0000000600)=0x40) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) (async) write$tun(r3, &(0x7f0000000440)=ANY=[], 0xfdef) (async) pipe(&(0x7f0000000040)={0xffffffffffffffff}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x2}) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r7, 0x0, 0x8, 0x4) (async) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000340)='./file1\x00', 0x200000, &(0x7f0000000180), 0x3, 0x566, &(0x7f00000015c0)="$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") (async) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="05000000100020004000000003000000c5000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES8=r6, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000100010000"], 0x50) (async) r8 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_DISCONNECT_CLAIM(r8, 0x8108551b, &(0x7f0000000000)={0x0, 0x0, "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"}) (async) ioctl$USBDEVFS_CONTROL(r8, 0xc0185500, &(0x7f00000006c0)={0x1f, 0x5, 0x4, 0x10, 0x0, 0x20081, 0x0}) (async) r9 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f0000000480)={'syztnl1\x00', 0x0, 0x7800, 0x80, 0x10000, 0x5, {{0x5, 0x4, 0x3, 0x34, 0x14, 0x64, 0x0, 0x5, 0x4, 0x0, @remote, @multicast2}}}}) (async) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)=0x1) 18m30.783785919s ago: executing program 6 (id=4348): syz_clone(0xb44040, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x40, &(0x7f00000001c0)={[{@nouid32}, {@errors_remount}, {@grpjquota}, {@nodiscard}, {@dioread_nolock}]}, 0x1, 0x4f7, &(0x7f0000000cc0)="$eJzs3c9vI1cdAPDvTOJNmqZNCpUKCOhSCgtarZ1426jqqVxAqKqEqDhxSEPijaLYcRQ7pQkrNfkfkKjEAcGJMwckDpV64ojgBre9LAekBVagDRIHo/GPbHZjJ2HXsVX785FGM2/eeL7vrTXveb9J/AIYW1cj4iAirkTEexEx1z6ftLd4q7Vl1z24f3v16P7t1SQajXf/kTTrs3Nx4jWZZ9v3nI6I738n4kfJ6bi1vf3NlXK5tNMuF+qV7UJtb//GRmVlvbRe2ioWlxaXFt64+Xqxb319ufKbe9/eePsHH//uS3f/dPDNn2TNmm3XnexHP7W6njuOk5mMiLcvI9gQTLT7c2XYDeGJpBHxmYh4pfn8z8VE8928mC6PNQDwKdBozEVj7mQZABh1aTMHlqT5di5gNtI0n2/l8F6MmbRcrdWv36rubq21cmXzkUtvbZRLC+1c4Xzkkqy8+GF2/LBcjEfLNyPihYj46dQzzXJ+9eJ5BgCgv559bP7/91Rr/gcARtz0eRcsD6YdAMDgnDv/AwAjx/wPAOPH/A8A48f8DwDjx/wPAOPmTmf+nxh2SwCAgfjeO+9kW+Oo/f3Xa+/v7W5W37+xVqpt5iu7q/nV6s52fr1aXS+X8qvVynn3K1er24uvxe4HhXqpVi/U9vaXK9Xdrfpy83u9l0u5gfQKADjLCy9/8pckIg7efKa5xYm1HMzVMNrSYTcAGBo5fxhfvoUbxpf/4wPnreXZ81eEP3qCYI0Pn+BFQL9d+7z8P4wr+X8YX/L/ML7k/2F8NRpJrzX/0+NLAICRIscPDPTn/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAiZpvb/IlymubzEc9FxHzkklsb5dJCRDwfEX+eyk1l5cWhthgAeHrp35L2+l/X5l6dfbz2SvKfqeY+In7883d/9sFKvb6zmJ3/5/H5+kft88VhtB8AOE9nnu7M4x0P7t9e7WyDbM+9b7UWF83iHrW3Vs1kTGa7P05HLiJm/pW0ym3Z55WJPsQ/OIyIz3Xrf9LMjcy3Vz59PH4W+7mBxk8fiZ8261r77N/is6fuPNUz5nlrvcK4+CQbf97q9vylcbW5n+66+PF0c4R6ep3x7+jU+Nd53qebY0238e/qRWO89vvv9qw7jPjCZLf4yXH8pEf8Vy8Y/84Xv/xKr7rGLyOuRff4J2MV6pXtQm1v/8ZGZWW9tF7aKhaXFpcW3rj5erHQzFEXOpnq0/7+5vXne/b/1xEzPeJPn9P/r53Z68bxAPyr/773w6/0in8Y8Y2vdn//XzwjfjYnfv3M+A+tzPy25/LdWfy1Vv8P/9/3//oF49/96/7aBS8FAAagtre/uVIul3b6epCLPt/wxEFySW12MOIH2efxp73PS+2UWddr/vCLj1/KKofe074cDHlgAi7dw4d+2C0BAAAAAAAAAAAAAAB6ufQ/J0qH3UMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABG2f8CAAD//zwQyy8=") r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x42000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000, 0x0, 0x0, 0x1ff}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r1) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(r2, &(0x7f00000001c0)='stack\x00') pread64(r3, &(0x7f0000000500)=""/31, 0x1f, 0x6677) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='freezer.self_freezing\x00', 0x275a, 0x0) lseek(r4, 0xfe, 0x4) 18m27.322175818s ago: executing program 6 (id=4353): r0 = socket(0x2, 0x3, 0xff) r1 = socket(0x2, 0x80805, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$OCFS2_IOC_REFLINK(r1, 0x40186f04, &(0x7f0000000380)={&(0x7f0000000300)='wrr\x00', &(0x7f0000000340)='wrr\x00', 0x6}) r2 = socket$inet_sctp(0x2, 0x1, 0x84) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r1, 0x0, 0xfca2238337819a4d) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x84, @dev={0xac, 0x14, 0x14, 0x2d}, 0x4e20, 0x3, 'wrr\x00', 0x1, 0x2, 0x6e}, 0x2c) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="09000000020000006d0500000300000002"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600), &(0x7f0000001f80), 0xfffffffb, r5}, 0x38) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200), &(0x7f00000004c0), 0x1000, r5}, 0x38) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x3) ioctl$FIONREAD(r7, 0x541b, &(0x7f0000000080)) sendmsg$nl_route_sched(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002000)=@newtaction={0x4c, 0x30, 0xb, 0x0, 0x0, {}, [{0x38, 0x1, [@m_pedit={0x34, 0x2, 0x0, 0x0, {{0xa}, {0x8, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x4}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x4c}}, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000580)={{0x84, @broadcast, 0x4e23, 0x3, 'lc\x00', 0x3, 0x4, 0x7b}, {@private=0xa010102, 0x4e22, 0x0, 0xc9, 0x80012d58, 0x12d5c}}, 0x44) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2, 0x4e27, @multicast1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4c880}, 0x48800) 18m21.886866669s ago: executing program 6 (id=4365): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_setup(0x7b, &(0x7f0000000540)={0x0, 0x203bce, 0x10100, 0x3, 0x100}, 0x0, &(0x7f0000000100), 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000980)}, 0x4000000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x80000, 0x1) open_by_handle_at(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="08000001020000000b00000000080003"], 0xfffffffffffff002) io_uring_enter(r4, 0x36b9, 0x3f4e, 0x2, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0x4, &(0x7f0000000080)=0x100, 0x4) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40000) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80552, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}, 0x102260, 0x10000, 0x0, 0x1, 0x8, 0xfffffffb, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000804000000000000"], 0x0, 0x26}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000040)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r6, 0x8, 0x0, 0x0, 0x30, &(0x7f0000000140)={0x0, 0xfffffffc, 0xf}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffdfc}, 0x94) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x1008490, &(0x7f00000000c0)={[{@grpid}, {@grpquota}, {@resuid}]}, 0x4, 0x4eb, &(0x7f0000000a80)="$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") renameat2(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x4) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/devices.allow\x00', 0x0, 0x48) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=@newlink={0x34, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x90646}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x690}, 0x20048040) 18m21.776707705s ago: executing program 37 (id=4365): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_setup(0x7b, &(0x7f0000000540)={0x0, 0x203bce, 0x10100, 0x3, 0x100}, 0x0, &(0x7f0000000100), 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000980)}, 0x4000000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x80000, 0x1) open_by_handle_at(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="08000001020000000b00000000080003"], 0xfffffffffffff002) io_uring_enter(r4, 0x36b9, 0x3f4e, 0x2, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0x4, &(0x7f0000000080)=0x100, 0x4) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40000) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80552, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}, 0x102260, 0x10000, 0x0, 0x1, 0x8, 0xfffffffb, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000804000000000000"], 0x0, 0x26}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000040)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r6, 0x8, 0x0, 0x0, 0x30, &(0x7f0000000140)={0x0, 0xfffffffc, 0xf}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffdfc}, 0x94) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x1008490, &(0x7f00000000c0)={[{@grpid}, {@grpquota}, {@resuid}]}, 0x4, 0x4eb, &(0x7f0000000a80)="$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") renameat2(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x4) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/devices.allow\x00', 0x0, 0x48) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=@newlink={0x34, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x90646}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x690}, 0x20048040) 15m29.911853089s ago: executing program 8 (id=4937): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x3, 0x2, 0x3, 0x0, 0xffffffffffffffff, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0xfffe, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000e0ff00000000000000bd0000000000000000000000e4ec010000000040000000000000000000000000000000000000013da51fd47aa2e2f70000000000000000000000000000000000000000000000000000000000000067ff0000000000000005"], 0x310) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000ec0)={0x1, {{0xa, 0x3, 0x0, @mcast1}}}, 0x90) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x4, 0x1, 0x7, 0xff, 0x0, 0x1c00, 0x1, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xfffffffffffffffb, 0x5}, 0x1000, 0x7f, 0x5, 0x1, 0xa04, 0xffff, 0x1a, 0x0, 0x401, 0x0, 0xffffffffffffd633}, 0x0, 0xd, r0, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xff, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000000)=@framed={{0x6, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0xa}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0xb, 0x510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0, 0x5}, 0x105902, 0x10003, 0x33f8, 0x1, 0x8, 0x20007, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0x9, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000200)=0x474c, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r2, 0x0, 0xc, &(0x7f0000000000)=0xcd, 0x4) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@init={0x18, 0x84, 0x0, {0x6, 0x101, 0x2a, 0x6}}], 0x18, 0x40}, 0x6008045) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000040)=0xc8, 0x4) recvmmsg(r2, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x10e, &(0x7f0000000780)={[{@bsdgroups}, {@nodelalloc}, {@nombcache}, {@stripe={'stripe', 0x3d, 0x5}}, {@jqfmt_vfsv0}, {@quota}]}, 0x3, 0x458, &(0x7f0000000300)="$eJzs27tvHEUcAODfrh8hL2xCeOQBGALC4mHHToAUFIBAogAJiSaUJnaiECdGsZFIhEhAKJQoEhUNokTiL6CCBgEVEi30CCmCNERUh/Z21/fIPYi584Xc90nrm9nHzczNzN3MjjeAoTWV/UkidkTELxExkUcbT5jKX65drVzId1Yqr/+RVM/76+p7x8pTy+u2F5HpNCL9KIl9LdJdPXf+1MLy8tLZIj67dvrt2dVz5588eXrhxNKJpTPzR44cPjT3zNPzT/WknHdked37/sr+PS+/cfnVY0cvv/nDV0lZ/qZy9MhUp4OPVCo9Tm6wdtaFk9EBZoQbMhIRWXWNVfv/RIxErfIm4qUPB5o5oK8qhTaHL1aAW1gS9bHxGFxOgM1V/tBn899y27zRx+BdeT6fAGXlvlZs+ZHRSCOfGGVzo37N1qci4ujFvz/PtujPfQgAgAbfZOOfJxrHf39Wj6Rxd915txdrQ5PFWsquiLgzInZHxF0R1XPviYh7m94/7ZJ+8yLJ9eOftK+rCdn479nq2lbz+G8955MjRWxnNTKWHD+5vHSw+EymY2xLFp/rkMa3L/78Sbtj9eO/bMvSL8eCRT5+H93SeM3iwtrCfylzvSsfROwdbVX+ZH0lIImIPRGxd4NpnHzsy/3tjjWXv5J0eqfnGqM9aBmVLyIezev/YjSVv5R0Xp+cvS2Wlw7Olq3iej/+dOm1dul3r//+yup/W8v2v17+yaR+vXb1xtO49OvHbec0Mxtq/7Ud48Xruwtra2fnIsaTV/JM1++fr11bxsvzs/JPH2jd/3dF7ZPYFxFZI74vIu6PiAeKunswIh6KiAMdyv/9Cw+/1e7YzVD/i031P9l4SlP91wLj0byndWDk1HdfN75jLfjvvv8OV0PTxZ5u339lm+iWr421ZgAAAPj/SSNiRyTpzHo4TWdm8v/h3x3b0uWV1bXHj6+8c2Yxf0ZgMsbS8k5Xfj84vx86V0zry/h8U/xQcd/405Gt1fjMsZXlxUEXHobc9jb9P/PbyKBzB/Sd57VgeOn/MLz0fxhe+j8Mrxb9f2uXS8b6lRdgc7X6/b9QC1YmNjMzwKZq6v+W/WCImP/D8NL/YXjV9/+Oz98Dt5LVrdH9IXkBgesCkd4U2ehNIKn1gs+iD0nsGHQBbzww6G8mAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA3vgnAAD//2Gb4I4=") ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r3, 0xffffffffffffffff, 0x0) 15m27.282531505s ago: executing program 8 (id=4944): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x3, 0x1, 0x7fff0001}]}) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0}, 0x204, 0x0, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200c}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0)={0x4, 0x0}, 0x8) r3 = syz_io_uring_setup(0xf00, &(0x7f0000000080)={0x0, 0x0, 0xc00}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(r4, r5, r6, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x22, 0x1, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0x40000000, 0x0, {0x3}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x240008c4}, 0x20008004) io_uring_enter(r3, 0x1, 0x21, 0x1, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x6, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = socket(0x2, 0x80805, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r8, 0x8915, &(0x7f0000000040)={'pimreg1\x00'}) sendmsg$NFT_BATCH(r8, &(0x7f0000003a80)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000003a40)={&(0x7f0000001980)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x7}}, [@NFT_MSG_DELSETELEM={0x1a90, 0xe, 0xa, 0x201, 0x0, 0x0, {0xa, 0x0, 0xa}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x1a7c, 0x3, 0x0, 0x1, [{0x1168, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_DATA={0x10e4, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "27c33de4948e9db47c14446c8159dbb9ce2eed917ce972ee7ada399b3da7009d556a0009c78b07f487330208ed1a16c59afd83c3f02575fd77a9a61b916d7178b01dc80cb1278bea1238a0142323fa5010966268e6d87aa59ce2192ebf66fc38205381b0e9d950de1cd8a1919326b34a59d48922547d507bb81e989456de5f3c8e284c05e07c60a367e8ef9451672b0c4ebf591cb18fa7e73de8e10973a2757dac52987bfa1cb12656e6fcda956257dcad23b3768734bec0a14365da35c619b9e4e9fb742297c81e5bb6d94c6067c946844e2f12e99730ba24aa9ed2e4158e707409143b3bc447f7f7eed438a6f0ffdbfc327f54ae5adb507cc6e09df38fd1ef8f0aae8f45855c1879d8163af9e7da33a5360e974d1fe1280d8b2682d303a045609925e01468b574ec9f6d6807a068f142316ed6f9184b07303dfc33acea89df9f1d9a253687e6a6d75f92b65079e23815ffc2ef5ce6f7f0fe561ae37dc1ebc6b608415d5459b2b0b4376192d51e99109287617107720c9cc30810ee9b2799fae9938b7c08f9ea0ad3e0bfaea5194ebf3af9dc109b8232d409a52881cf3b4ae9de4c174f52ce5a18ef9202de9f0e030dda960d537f779d881ad33643fc55e043193f138c9d0e6281f51e91313ca72840366dafa25efde77d157b83baafb8504e1b984a03e4ecede43e2121892a6c54140ab427b0495a32493ac58338e7acfaa5e0bb0a4532ca7bbccc3103a33af75e379302672dfd5eb9e504313963451a3c2ecc2ea67d2791a478ba1fbb728d6b6454b9151c9e730c7916d4c5b5e2be39b2313e2edeb24faefb6a0a533c5a92bc9afcecd1fd4f0eecbcd8d4644d26a2083b09fb52e4577ef99b730442c29b3c587bb9f5a39abe47c7482d8bedd39e39d5bbef7b939028fd0e6693d0c510fe08b1ed34f86c567ca27ef661b47afc501b1792fedd02058d38276c450daab94ca5c98b5b7f40b5fd27cc73f6fa09c1c1449c4724615c46f72dcf56b960bb65c969afa03917a3616809ed891b9f8eb3e7109be3b66883728f1fbfa04e660410d421dac49f0d75b5fb938cd32bcd1f2a952b9fea0066a32f21ccfb81892f369f189a3f89a8c89331917af08b1cff310b386953b142218e7789c4c67c149bdd7d9aca0f61c17dfc419015574cc82258f2a0881bdbd95ece515762bb047004a8fe5cd2bd14af63bd828d0d2bff7831ebf12fea63ac29069a6042d46a0435b1eb9e470d7d3ce0400ae932765f22a8ff2bc5959fdd9edb521a84af26fc3b35ccf855da3fa2c6fe20e9698a41481696d1cdf9bde892918c5192928d048824cec046314dcafd4fa7fe9ff261742f176b9b278e370d90904164c19e0957da7c272e5b9b97dfdeadd9abc2ce4e6a396c19c271a900f103aa89cca31f6a61f3f85dfb5f3d58005f5b1eb044930e115294aaf48e85e00f6cc4a2ec24c407caeda4c2bdcffdc9a32fadc59774f7ae996a849b5c65799c6e7a83a2e7dc20cf9fdc71813a916348df9193e8b0d131d586ac4492901e972c521b5d7d5ac700267c033c8bea43e21c0ddc2fe68d857f9bb295043e3688e0e609cd62f56b6e02b45888e7cbaa348e2b27499b3f2c6dc75ea08d4f0966ea4ee4614aac080ee68711c41ad8ddc8bb9d5201033157f16eb8f7bba0120ffb82da1414f1d4042cff9bb9383db321ea0d278b79828e7d5e4ee1a07ac061f8320d6cd45505074bfae2f6715b0fa31cae5dc3ca8f884985e4ff7fe5d09f07071501fad56c9bce286c3cebcb5dd0cd3cdfd370b2b2df37a2f62320c2e85855acd7f8b0596f935e3821b5d2cb357e97a155adda2baa9ac843e3a122ebd33de49fcb7f914265ea530e21dd6b247ef024e457c22fe34c0eb49b4648442abc29f71110ed7874e4c348fc6b2260509526fbaa96a1f3b90716ba6af20fc393b24f2e0aaa14d80dbbf7dd9589bda74c96331e3375d6a07b2592752b899dff7ca5e4a4e7fdb56cf87fd88bbdcda3f78c251da2ebe6e38418f3c30b290550769d6911e3fa36ba5b266ddddc8f2642c61bb3c01117b7f9deadd229a138c2af8ca9e437b6e40ddc3d12ef25ac9518bf90b60b7ff512e4d1557a5191e64755e3156dd17eb8a34773f362a82d649ca068aea6e10bd5d4006bdc3978339aee11d6c72c1474679e09d8905944436c893488b1244b0c2716f308457a56bf3a5cd8131646fb4de932c8e3e4e8bb3adc2c0582aa79c6506513fb6716712112c4ffd0f02cd55dea0ae65600c220e7f698813e65b2a61eb486f3714e4679d33fe1f840ff3172a229d1ef391c810325cbb9a78fb6168d815712ecd9a8de7c3c68bc7409806c41b61acf7b99ef720ff6a8355c07a96c9f591766df7861fe4b8a12c13b8eff797d3969af330a7e10d634504065f10576f3a0a69ccd3e18d768029dc36a14a5dd78b1b7ff479f98dfe77b341e0ca6c564e531cb0360189c07645b8b64d802e01d31445b885cfd32b6b6c4fe9af52edcf5d988a95b815ee5c5f566d985560a58606a47f41bd056db7ff12b4c38c6eead90006ac89651ac31640adcd2c1cad816292be5ac055a2460dc9b805e0a353fce8572569f6a97908cae747104c0c02b85677b19cd587b14f53c830def3a313bbbbb89a62a27e9bac7b375ff1e988ea45f289bfe74615eec21a7b60c317802ae13cb66f03aca279c14472b9eed0f9c48b2a2eacb66f6de6b6beb43679076de5275a5ea31daff273dc9d2be1eaa437ba54bd328c9512876cdf0d5e20fd30e2c5eef500ea4341446d5fd3718edefbb3275b4982943ceb047e21725925fe0334d27bcf274accfeb741e4014057af160a7a9a64209c9d6b300168594873de749327cf96d434fe7466e40824ba979d0289f45a57a5eea6ba3913bb90c33d24368ac98d174132a580bd3c93589511acc84fa767a56743720aca32de944542f8967da8968cc35abdbbfe92c79da2e2d66a65f18543c56f10f42b20a84ee56a2d6a06029da2b4987eea158e6f12eb5b6a7de4c0803e8d0fe0dc930c24a20f7b96ba8cd17568373a7258a5466319cfe75478e5016c559c6b4d96c930a81fc03667a1a151ef32c683b3179f24582dd0c562b9047ce7e4b03d53bc15628ffeabab5b62b82e158f1f2dd50459ac4136aa921f1cc4f2b8f62f33775234d6357005ce4a6964ae98b411a8155ba8aefc09362fa1b553dce94fda88f7c4b8563914f0aadaf4d675115459b212fb52b6114d11f99fe23d832f577a6adff1a51ec51597ffaba3619a5bc981a058639e2aa12210fd096ad7d52764a25cb2aa0ab6ba91d048639d82bc0da5f87403b80c53f354e9fdf94626abaa79a11903337bd1be2309f2dc85bd43c0e2dc4ff4c90a198cf79542f282cabb88a44733da2bff83465e35901ef6eccf998035298945f75622654fcc97a3680e44182691fad7fafb543cd1d5c807ccd1f9c37b0661f71fd1fb8f66d07263b469a866f453593ac8ee78206eafb915dcb038a08f22efc247b1ddb75ead94d44d0e209f3f0663eae31bc6cc977da9af47a62f7f6522d029cc061ab829e4af443dffd8b760d80783326f5da04fbf371faa7b2737e2e838ea3884e36506eb5f12bf3b3243e0fed4aa6821c37f6e0f3a82b81c882031bdac146f04e2469466eb5ecabcd3ee6dbe9b5cd1bf9d0a581ef04e4d53944eaf6f5b69ebeec7fae97f5e6e181d102e4295ef33b964ad4bc8c8729c7de6427eaeaf8d7a2773f678baa6f5568a179b66d182fa3decb5aa4034c9798d5c47c2d9e6fcb4975892ebdb7fe2586eae4474f0c3a7345378d5fa67a84853154bfe9b1762d44df96ac288f72fa8403e095225bf228bfa9d17b810d0f9843a8866420c6cff634d7ec93801537bd91d9dd65cfeb5a0700f72de7c63ed22e55811b5c26657c9b16f0931563596a3fbe69ea0a3fbcbeab2c9995a7425eaee919640961d329f4b13ef96a79a9d2e75a2783b8c826fe77546944e5cb8838f00524e1740c4ca5161b5f32e46b9686e018d1bff757112a753b91fe0fa9474f804ded0500d6370f586731a43fbddc8d32a09d4441b26936ec7973403b01503c8a5c47434d3297169d0558141e9daa1bf4568aaa01fad3dbce97e913288fc898e68664a66f0d5d12d1729f698588de7cb3d4e24515273ac75269996bf4e0324bc13d37feb1aabfa7d74d76f30a77c3ad465a19e79b0f6683c207617b9cb28e592f9fc3dfd81ca44f1ff175504a6a4bfb623ec070533fef65390d98f3cf20f8636f39acffa6d7fdd23ef39b606d8f0d1a3b9ba88c01ff9da9ce9c4996a048593076c7bf3b360aa6776d24ca9d97b56038ccb50f54aba3e8426e2944eb8851fcafbce2ec844fbb522ff0a5518ec003a6fd22c95269b1561540957c5a0e63a0d75ffebbb2c53a594e077ca23e2ebf7055caeecb4230e4fd62ad1dd8df64cb3598e088261197ecf426e865700817c88937a0aa3f4e72360156d5258b4ffe963ad4a1fce7feb62cc97cd7f6a959300377b332df553b51513c4b43edba276d847f5983fda3d8c61a4f6b25be4720382ae060e1e3b724188082aca4d03540b189554b8039cd83e1c6ff36516ebade04f3dc191a039ff42b8152d311684f95541ca50e4e47fad79534d06c8dd504560d7dfeddb06195bf96e4ed260a0db138d3edcc35889fc0cdfd4beab014d6137bdf42c9d8cb2bfacaa0d15866999f2ccd9c1918c36fd00f5d96b9cb6ab738a301317e0867336c4ebccae91ea7ad36f09d7f758641792b784a6ec5d8bc92dbab6ded23c6f9419fbd249dd079160cb2a83cd4d501ce03b307304b92b827565f5bd249de74077f3bafaac95f12f29d3dcfb4eee351c228a5ce20c37f83a66df185bd336a2dc1b5b9cea6f50d3df3f21287a768da4bc63480cd5b3c27894ca3ab1e5f672a610d8c249be71a798485589e31875b397a1ceb3e2bfa724a17994aa928495f4f34703fd6c47785db99da04e958ce0793bc7500a067456339de64a58307b91bddfa21c2232a3fecbd6f97bff76e704beeaf4a9fed98937040a394fe5783a5424ab17a7be2b8a8680db26e731b388e1892d022076aeedaa2bc75a8868b157d1706641326ae917fb1d6a830a3c4d097d152776bd66c194d62a1e7f0e6a0d1500a0f83a07c15d4044b6d63818b2e24420e367cf770085ff85aa777f083307d46d489353a9ab9c35cdbef7afa9680a4475a9bda24c4612734f985b241e3428e5d74f18a4ee4f1f837d21994c33cea4c9321d4418dbf706c94e14f5c44709550b667d92f15b500c2fd40398937697c8b832a9cc24196b23532d30e9f6ceac9a74950e5711ac62a8d9e3173a1edbfd5f927e09a24d66d27d57ba44f5870d1ad4288d27e47ef5456dcb897a08422525fab743d9b367e1f65fbf15a3b2994560617a69b2b4f912d5612b113f3ed47653398342f979631b44966996e674404dc2efa3c82f4acea25a65f1a5cf4908610d5206999bc15b35b208527b481423605a81ade14cf2f27cd6b2baf324fc8f1fd98d8a43ed7440b403de2d250361e77589eaa0484d70e48226bd2ffc9b30d1090b0fe195fec4ca50baa175915a75931323981d5c563020d91131df21d172c5f77d4df0dd3fb32037a5d3c66fdabd6269ee8583ab6e7ce822c7d9509645a6568f719d2248b68a833c9bc300d90f860df96c54fd4629fa4427d465cff92e6013daab97d952ca1a89abf954b501db41a0fdf44932d910d5cd98f3bcdca89e1424a835955ab621d457c6f21b118e020ed28ce71be139f9ea8c2a2ba4d156adfc18233878d73e015483ad0595184fc2b8c"}]}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_KEY={0x64, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x38, 0x1, "fc01cf3f69ac8b8debc2533b59350a188e3c4693ded7d6856071e52419022e741866ccc419cf1566ff9cf0d5e4c648813d1befef"}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}]}, {0x4c4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x10, 0x7, 0x0, 0x1, @masq={{0x9}, @void}}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x8}, @NFTA_SET_ELEM_DATA={0x2b0, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x74, 0x1, "33de3e8b8b75f0b1dc4be899745fa6aec1a343ec8c180cfc0af2f65f3a0da96f3cc369a3a57a55844427e4803817f286b6ef8c8bb8cd1d69b27756fa2bd7b401d39a1b4afccfaf1ae526b3e0d40fbc849133fa7d311ff252695757a559f5e9b061e03f74d8ed21240a4cac4bdad0de59"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0xaf, 0x1, "95b68dccd77c12fd3dd276bbad0eb86f08461bb4921c5647262717128fde1d49f9e0b66cb38621060a549254b2230780bf8dccafb7433f1fbc112ba26a4cc56c69bc10c6d235775b93d8c5df4b72f4dea411e1e52257639b44a65a93d05bf606abd8ee64c16162dcecfa20b2bef2d885ffffc8ae3d7f7b01a95e8b3fa3bfeddc98988ebf93fa66aeed04e62eb3563c2530e110d20d724a557cc197986db1a49fb95f46ebeeb9b969eac81e"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0x83, 0x1, "4e1dccb2f99a252cc5fcb7ad3fafeab249ee1df42e578854a35d85d1d77f072547f665c970fd7f01ecf0a5b0ad153611aef88fa017476bed82c9b2cba87d467d18fc6c4cdb1fecc5949de0b57f26a350012c1c54c92c6b803fb5b88be7e19a6e91ebf796b9fccada5626a177ab143d1c150ed777d83ad0bc5c2980cb40085d"}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}]}, @NFTA_DATA_VALUE={0x13, 0x1, "db4bc5ffdd422a9d76c4a4e8df4a63"}, @NFTA_DATA_VALUE={0x4f, 0x1, "50f22cf5a12eda68b9d6c27b0ee1530ed0b8105568e8922c59a75cc86fb189d0ba3cbadda9a9292a9e9e934bbe4702ff275bc42f0ac72f7dbcf6b36e8e78a872cd17c7ae68a8246755191a"}]}, @NFTA_SET_ELEM_KEY={0x1f4, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xfc, 0x1, "d07c095fb120c011cfffa7d18ffba8a686123d7a8e4cbfb38da5ac0bece61adcc6c874124efaeabb8398f9a3b3566723f98dd569e209325a0775317ad5d6086325728b0fb41ddff331f22b38573b6e188612c5d0d36dae4b2058aef8b9bcd47d696e7109caff844ca01956d22986fd1b1f3d54a664751a2da56827f723bde344f9e2dc79a3435651403d923e94446cbd45928c81e4fbef009310f81889e169f74409e6568f73778f6b5a701286937c6f7cd6430bc5a56655cdd9fe0fe5057aa12da317f7553e7cb840de4e7477fd32018021ececa2c3775db670fe6d92f602da8a39fcab10dea03a099a98950d69cec4277569aab06dd878"}, @NFTA_DATA_VALUE={0xa4, 0x1, "c4a6fb8af6f1e970cea2acccb68442b18afdabca172f8b761d77bf0eae9284d9eac59bb469c6ce32aa44856525b43134dc80a536c5f3143aeb906c31ae30b4614ff7c411d4415765d3e425aff277f8edd275b0019178d548babfa9b118cf8958688b6c503e3151122267d6083948674aa7cc14226a3be4212525c44b2e94ef3f95d592f8772463c09e9af8e57084ec90b29800887ecb9a930d02f915bb700116"}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x6}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}]}, {0x390, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x2c, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xf, 0x1, "875ba3a0184bc5350bd10d"}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}]}, @NFTA_SET_ELEM_DATA={0x27c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0xf3, 0x1, "3a52fd128d79ac44acc0eae43cfb0bfe622d7962a2b39403394875de1c09735f192bef48613199669f7256e429e6a3f1b9604298955a8abf5082a8cb31ffee9daacacc7d10c6b00c8314252e81266e948835b936cfdca9bebdeee1ea56628f6268625a2e951aa50f2a60465af5f3d80a8b9833e879873ff5254e13ac702e9b047b0fbd53e13d6929a2d674b7527b6d2a27c5828f16038c932981cf5fc4c3f241ac17180c39169ca34f0afd7155ae6a72ab68a65e843cadcb3b52ba12e088cc4754b0b46a6f1010d36d9c0fcc62dd6d34c114007effeb0ffb885d4bc888418a8de67d9f519a6e0c69c2a0a070069afb"}, @NFTA_DATA_VALUE={0xed, 0x1, "b092ff00f1fbc50bad1a3e16f114366f58de1746e6de5f71080c4cece562dbb3c88347dd41cd53b3002381670cdee63b1af35b41d0a015a2c304fd550b14601604de661c24b4076f27916e08e8ecb8b50c19996ee20681b5f79aa2077099fe27554b15323845590b02cca55a7c49f3215f49db6ceda342394e27a037aab9bf0279405502a159342d6aa3d99c036d7ba33930f00df4d76b15fb9bec42ac61d07648137262ea3dbe5f1e8f909563aaa3b53cc7d8c1bd700ff59956eab9d17ad8abd40e8214d3f68d23eeaef3f17602396c8736c387ac53d127d23e0b313be2a5b44003ee8e691a0ed11f"}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_KEY_END={0xe4, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x7, 0x1, "c8e6d4"}, @NFTA_DATA_VALUE={0xd8, 0x1, "9af8d61c1c825516012ed3d3dfeca6b5628224e1cbc04badae41cb26f21bf19ce0e0c75886821ad15c5d3ade9b03d62df88172b5c0096b039946b60f297197265597868819bfe4ceb218c64e9a79805efa84c7a3a8c77184fcbe4d140010f351e438e35a2eec81fcf93a8b245f7cc1ab7c5b119a59c3ffc3d6b91bef8ec3e31e69a6c402206c8a3f49baef6fe0beb9f70ce83f71c1e9b68dce4613598ad79ee57ae42940e768b84c091353eba05ede114394f9e0e0464f1908c9f9c2f0e133c4043bffadfe42a1f6d0a5dfbe776caa8e4f682c57"}]}]}, {0xbc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0x2f, 0x6, 0x1, 0x0, "26b61c6233e084fa64140461bd4637b64de6a9090cbcca6787f3b24f3fbe739a79c236c43c0f15d3ba57df"}, @NFTA_SET_ELEM_USERDATA={0xe, 0x6, 0x1, 0x0, "70cf827997683bb1b91a"}, @NFTA_SET_ELEM_KEY={0x78, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x72, 0x1, "8350aa034ce087081fd002fc047c60f5a9ac3f65462696510fefc666647937750006a6a0b6500d51c7e33c87cfcce224c1b1730d941042bbd9c93a66716ae5e2159924336807d3038a34a6e6da3c8e5b5725d5953df9a003b5f19c8a50e8066ebf9bb019667dbf050cf690cc9001"}]}]}]}]}, @NFT_MSG_NEWSET={0x160, 0x9, 0xa, 0x5, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x17}, @NFTA_SET_DESC={0x13c, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0xa4, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7d2}, @NFTA_SET_FIELD_LEN={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffffffb}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8d9a}]}, {0x54, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7ff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xf8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x81}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xa}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}]}]}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x800}, @NFTA_SET_DESC_CONCAT={0x64, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffffffc0}]}, {0x2c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xcc}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}]}]}, @NFTA_SET_DESC_CONCAT={0x20, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x10000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x10000}]}]}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x9}]}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x4}]}, @NFT_MSG_DELCHAIN={0x74, 0x5, 0xa, 0x201, 0x0, 0x0, {0x41dc93d90607830a, 0x0, 0x8}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x5}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffe}, @NFTA_CHAIN_COUNTERS={0x28, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x3}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_FLAGS={0x8}]}, @NFT_MSG_DELFLOWTABLE={0xd0, 0x18, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x8c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_to_team\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'nicvf0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x184, 0x3, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_CHAIN_HOOK={0x90, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'netdevsim0\x00'}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x6dcfdd83}, @NFTA_HOOK_DEV={0x14, 0x3, 'geneve0\x00'}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x3bd4a75c}, @NFTA_HOOK_DEV={0x14, 0x3, 'pimreg\x00'}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x420fe5cb}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x29262adc}, @NFTA_HOOK_DEV={0x14, 0x3, 'gre0\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'team0\x00'}]}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x6}, @NFTA_CHAIN_COUNTERS={0x58, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x1}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xfffffffffffffff8}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xfffffffffffffffa}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x5}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x2}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}]}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x5}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_COUNTERS={0x40, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x8000000000000001}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x200}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xffffffffffffffff}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x6}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x9}]}, @NFTA_CHAIN_COUNTERS={0x10, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x5}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x3}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}]}, @NFT_MSG_NEWTABLE={0x13c, 0x0, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_USERDATA={0xc2, 0x6, "02d37537e27c4e47886056adb4c1c1a9a649e819948634fe6b7bc32c8c83cae0ee5ea3fd495b902536e8dd4f9d2117b50ddea7b26a4b67f91d6c551376277d8ea9b5c4bf2f9f75267ea478f194ef1aeb0bd1deb6c851cad0d16b44e8c8f61ea625a6e4b38beeac8b9171ea879e6112d89056f960ef11699e1da33d61d227af6023c7639d8f6791b9fa6fe310c70822fc1795e8a82340943f47f12a31a2030223de7250ffc6c9a7dc680a49b0e461db09fc188c21eff331cc5dfa88855778"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_USERDATA={0x4a, 0x6, "23eda558b3569422c69b681f637b2cf62c4ee5e8be5056995a1d2839ab2f92912d42887a3d5fdbef0c0fc60d50477b3b75ce1bc00b4bee32601cda11cf99f8d4da03bc9114ed"}]}, @NFT_MSG_DELRULE={0x74, 0x8, 0xa, 0x801, 0x0, 0x0, {0x7, 0x0, 0x1}, [@NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x2}, @NFTA_RULE_COMPAT={0x14, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x2b}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x11}]}, @NFTA_RULE_CHAIN_ID={0x8, 0xb, 0x1, 0x0, 0x2}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_RULE_COMPAT={0x14, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x10}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x88ca}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x1}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x5}}}, 0x2090}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) r9 = socket$inet(0x2, 0xf, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r10 = fcntl$dupfd(r9, 0x406, r9) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) r12 = socket(0x2c, 0x3, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x11, 0x4, 0x4, 0xff}, 0x50) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r13, &(0x7f0000000140), &(0x7f0000000080)=@udp6=r12}, 0x20) close_range(r11, 0xffffffffffffffff, 0x80000000000) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0xfd, 0x0, 0x7}]}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x200047fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[], 0x1194}, 0x1, 0x0, 0x0, 0x4048000}, 0x4000880) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r7) flistxattr(r0, 0x0, 0xdeff) 15m25.376842394s ago: executing program 8 (id=4952): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c010000190001000000000000000000e0000001000000000000000000000000fe8000000000000000000000000000aa4e220000000000000a00000000000000", @ANYRESOCT=r0, @ANYRES32=0x0, @ANYBLOB="00000000000000000104000000000000feffffffffffffff030000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000008400050020010000000000000000000000000000000000002b00000000000000000000000000000000000000000500000000000002000700000000000000000000000000e00000020000000000000000000000004000000033"], 0x13c}}, 0x0) r1 = socket$kcm(0xa, 0x3, 0x87) sendmsg$kcm(r1, &(0x7f0000000580)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x7, @mcast2, 0x0, 0x20000000}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000340)="ffa8", 0x2}, {&(0x7f0000000400)="3cd9", 0x2}], 0x2}, 0x40810) syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080), 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0xa6, 0x0, 0x0, 0x5}, 0x28) r2 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000800)='./file0\x00', 0x2204806, &(0x7f0000000540)=ANY=[@ANYBLOB="636865636b3d7374726963742c636865636b3d72656c61786564006d6f64653d3078303030303030303030303030303030312c6d61703d6f66662c73657373696f6e3d3036322c696f3fb261727365743d6d6163677265656b416d61703d61636f726e2c696f636861727365743d69736f383835392d322c73657373303030303030303035382c73686f776173736f632c6d6f64653d3078666666666666666666666666666666652c636865636b3d7374726963742c6673636f6e746578743d73797374656d5f752c7065726d69745f646972656374696f2c00"/233], 0xfa, 0x69f, &(0x7f0000000f00)="$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") syz_clone3(0x0, 0x0) socket$netlink(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x4}, 0x100000, 0x0, 0x0, 0x7, 0x2, 0x8, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) timer_create(0xfffffffffffffffd, 0x0, &(0x7f0000000380)=0x0) timer_settime(r3, 0x1, &(0x7f00000001c0)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="d40000001b00010027bd7000fedbdf2500000000000000000000000000000000e00000010000000000000000000000004e2400054e2300020a0020003a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="090000000000000005000000000000007d0c0000000000000c000000000000000000000000000000480d00000000000001000080000000000300000000000000cd6200000000000003000000000000000800000000000000040000000000000010000000b76b6e00010000020000000001000000000000000a0010"], 0xd4}}, 0x0) timer_create(0xfffffffffffffffd, 0x0, &(0x7f0000000440)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f00000001c0)={'gretap0\x00', &(0x7f0000000100)=@ethtool_stats={0x18}}) timer_settime(r4, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) open_by_handle_at(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="20000000020000001d"], 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000180)=ANY=[], 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x1000}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="b7020000030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b}, 0x94) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r7, &(0x7f0000000300)=ANY=[], 0xff2e) ioctl$TCSETS(r7, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x3, 0x7fff, 0x16, "b0bf2ebb48c849ac0000000003000018bfff40"}) r8 = syz_open_pts(r7, 0x0) dup3(r8, r7, 0x0) 15m24.018923954s ago: executing program 8 (id=4956): r0 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1d, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x1008a, &(0x7f0000000200)={[{@nomblk_io_submit}, {@usrjquota, 0x22}, {@errors_continue}, {@noload}, {@mblk_io_submit}, {@grpjquota, 0x22}, {@journal_checksum}, {@errors_remount}, {@jqfmt_vfsv1}]}, 0xfe, 0x455, &(0x7f0000000fc0)="$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") socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000e27f00000400000000000000", @ANYRES32, @ANYBLOB="00f8ffffffffffffff000000eec20abf044b5d6544"], 0x50) ioctl$EXT4_IOC_GET_ES_CACHE(r2, 0xc020660b, &(0x7f0000000c00)={0x7, 0xfffffffffffffffd, 0x4, 0xb}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f00000001c0)={0x7, 'wg0\x00', {0x80}, 0x4}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x3, 0x80, 0x2, 0x5, 0x0, 0x10, 0x0, 0x7, 0x150102, 0x9, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000280), 0x6}, 0x9032, 0x800, 0x1, 0x1, 0x8, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x71}) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x9, 0xffffffff, 0x4e, 0x567}, 0x13) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000004c0)={'vcan0\x00', 0x0}) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)='M', 0x1}], 0x1}, 0x1) r5 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace$setregs(0xd, r5, 0x20000000002, &(0x7f0000000040)) ptrace$cont(0x21, r5, 0x80000001, 0x4) connect$can_bcm(r3, &(0x7f00000000c0)={0x1d, r4}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) eventfd2(0x6, 0x80800) sendmsg$can_bcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000740)=ANY=[@ANYBLOB="01000000320400"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="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"], 0x48}}, 0x0) 15m23.183086587s ago: executing program 8 (id=4959): r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0xfffffffd}}, 0x10) r1 = socket$tipc(0x1e, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000040000000000000000000000850000002c000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007500000095"], 0x0, 0x5, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0xc, &(0x7f0000000140)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x5, 0xe, 0x0, &(0x7f0000000140)="259a00f271a76d1708fff74588a8", 0x0, 0xd11, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1c, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x400}) kexec_load(0x7fffffffffffffff, 0x0, &(0x7f0000000540), 0x1) r3 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) exit(0x100000000000035) tkill(r3, 0x12) waitid(0x0, 0x0, 0x0, 0x1000008, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1e00"/20, @ANYRES32, @ANYBLOB="0000fb00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000f00"/28], 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000565000/0x1000)=nil, 0x1000, 0x9) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="020000000400000006000000aa0b000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000005c0)=""/249, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r5}, 0x38) recvfrom$inet(r4, &(0x7f0000000640)=""/148, 0x94, 0x0, &(0x7f0000000700)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10) fallocate(0xffffffffffffffff, 0x20, 0x1, 0x2) r6 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r6, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x4, 0x4}}, 0xfffffe03) bind$tipc(r6, &(0x7f0000000140)=@name={0x1e, 0x2, 0x0, {{0x42, 0x2}}}, 0x10) bind$tipc(r1, &(0x7f0000000440)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x2, 0x3}}, 0x10) bind$tipc(r1, &(0x7f00000001c0)=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x1, 0x3}}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r7, 0x0, 0x1, 0x0) 15m21.055890697s ago: executing program 8 (id=4969): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES64=0x0], &(0x7f0000003ff6)='GPL\x00', 0x9, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x891c, &(0x7f0000000000)={'vcan0\x00', {0x2, 0x0, @broadcast}}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$unix(0x1, 0x2, 0x0) bind$unix(r4, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40080}}], 0x1, 0x0) close(0x3) connect$unix(r3, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e23}, 0x6e) close(0xffffffffffffffff) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002500)=ANY=[@ANYRES64=0x0], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x146, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a00)={0x0}, &(0x7f0000000a40)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000a80)={0x0}, &(0x7f0000000ac0)=0xc) r8 = getpid() process_vm_readv(r8, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}, {&(0x7f0000001980)=""/4089, 0x1000}], 0x3, &(0x7f0000008640)=[{&(0x7f00000003c0)=""/95, 0xffffff1a}], 0x1, 0x0) r9 = getpid() sched_setscheduler(r9, 0x2, &(0x7f0000000200)=0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) r11 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp\x00') pread64(r11, &(0x7f00000002c0)=""/118, 0x76, 0x22) syz_clone3(&(0x7f0000000c00)={0x1880a0100, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580), {0x36}, &(0x7f00000005c0)=""/109, 0x6d, &(0x7f0000000640), &(0x7f0000000bc0)=[0x0, 0x0, 0x0, r6, r7, 0x0, r8, r9, r10], 0x9, {r11}}, 0x58) syz_emit_ethernet(0x1e, &(0x7f0000000380)={@multicast, @broadcast, @void, {@can={0xc, {{0x3, 0x0, 0x1}, 0x2, 0x2, 0x0, 0x0, "fdb5c5ac88fda2ce"}}}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r12, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000000000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x44000) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="1c00000007060500000000000000000001000002050001000700000070c319eca4ca93d3c9cf4bcd716d387a1b5ff38dba57a7ffe95b886d09686d59ae69750d6894a6f81d88ab42349091beea495453fd7e0129e4d980435e06a2e31fe948c41741bf4140ab5ccea28105af9eb43f7f6562e5399a4b761d3e3a32a77454102d8a770fb70c98b085a9424224df912978af0fdfb6715a4c02e54d04ceba126dd14623bd91468675321be913eba596a06b49be1c6a7176df803f3c9917d892074ae4019bff8804f1157a36158c0caf8fce20d0ed9e00774d1aea15827223a911dc168a719ec57d"], 0x1c}, 0x1, 0x0, 0x0, 0x20004080}, 0x48810) 15m21.047839948s ago: executing program 38 (id=4969): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="b4000000000000006111100000000000c6000000000000009500000000000000208a17289f5cb173e472a32f2a0be752ddd9f8aa995a9de13ed38485d9148811d7f61b0e6c66ba8ad8f8a70d3c217303026a9e4b3dbd5f883b6fd71eaf9431b47920125506b03f01c5c56b105eb0e95aaa69ce270a78cc057c7b56fc652a91e4225dc832d639ebb5a742f0fcb02588a9e9ef442b39beef7f637324998912bf85ea7129c802c9c298945a04b98c3b5c5776f581edc7113f5090f764c30fa6b1be45309f0d32ea3c391323755d26fd7e7d28d7e2112a227f00bd6b61d2ef11e2752fb864382c9dae7bcf1997b2083874096eda61d1547732903d64d3d0b908000000000000", @ANYRES64=0x0], &(0x7f0000003ff6)='GPL\x00', 0x9, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x891c, &(0x7f0000000000)={'vcan0\x00', {0x2, 0x0, @broadcast}}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$unix(0x1, 0x2, 0x0) bind$unix(r4, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40080}}], 0x1, 0x0) close(0x3) connect$unix(r3, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e23}, 0x6e) close(0xffffffffffffffff) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002500)=ANY=[@ANYRES64=0x0], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x146, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a00)={0x0}, &(0x7f0000000a40)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000a80)={0x0}, &(0x7f0000000ac0)=0xc) r8 = getpid() process_vm_readv(r8, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}, {&(0x7f0000001980)=""/4089, 0x1000}], 0x3, &(0x7f0000008640)=[{&(0x7f00000003c0)=""/95, 0xffffff1a}], 0x1, 0x0) r9 = getpid() sched_setscheduler(r9, 0x2, &(0x7f0000000200)=0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) r11 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp\x00') pread64(r11, &(0x7f00000002c0)=""/118, 0x76, 0x22) syz_clone3(&(0x7f0000000c00)={0x1880a0100, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580), {0x36}, &(0x7f00000005c0)=""/109, 0x6d, &(0x7f0000000640), &(0x7f0000000bc0)=[0x0, 0x0, 0x0, r6, r7, 0x0, r8, r9, r10], 0x9, {r11}}, 0x58) syz_emit_ethernet(0x1e, &(0x7f0000000380)={@multicast, @broadcast, @void, {@can={0xc, {{0x3, 0x0, 0x1}, 0x2, 0x2, 0x0, 0x0, "fdb5c5ac88fda2ce"}}}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r12, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000000000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x44000) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="1c00000007060500000000000000000001000002050001000700000070c319eca4ca93d3c9cf4bcd716d387a1b5ff38dba57a7ffe95b886d09686d59ae69750d6894a6f81d88ab42349091beea495453fd7e0129e4d980435e06a2e31fe948c41741bf4140ab5ccea28105af9eb43f7f6562e5399a4b761d3e3a32a77454102d8a770fb70c98b085a9424224df912978af0fdfb6715a4c02e54d04ceba126dd14623bd91468675321be913eba596a06b49be1c6a7176df803f3c9917d892074ae4019bff8804f1157a36158c0caf8fce20d0ed9e00774d1aea15827223a911dc168a719ec57d"], 0x1c}, 0x1, 0x0, 0x0, 0x20004080}, 0x48810) 14m35.102512874s ago: executing program 9 (id=5140): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x4d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x62181) r4 = syz_io_uring_setup(0x32d9, &(0x7f0000000200)={0x0, 0x6272, 0x8, 0xffffffff, 0x3ffffd, 0x0, 0x0}, &(0x7f0000000300)=0x0, &(0x7f0000000140)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r5, r6, r7, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x4000, @fd_index=0x3, 0x8, 0x0}) io_uring_enter(r4, 0x6776, 0x7447, 0x3, 0x0, 0x0) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xdfffffffffbfffff, 0xffffffffffffffff, 0xb) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1c, 0x2000000000000216, &(0x7f0000000440)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x1e, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xc, &(0x7f0000000100)=ANY=[@ANYRESDEC=r2, @ANYRESOCT=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400020, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x800000000fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8001, 0x2, @perf_bp={0x0}, 0x802, 0x0, 0x0, 0x0, 0x6}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r13 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000000)={[{@max_batch_time={'max_batch_time', 0x3d, 0x101}}, {@debug}, {@journal_dev={'journal_dev', 0x3d, 0x7}}]}, 0x1, 0x5fd, &(0x7f00000006c0)="$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") ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'pim6reg1\x00', {0x2, 0x4e24, @multicast1}}) r14 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x4040, 0x0) r15 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) sendfile(r15, r14, 0x0, 0x3ffff) r16 = msgget$private(0x0, 0x790) msgsnd(r16, &(0x7f00000004c0)=ANY=[@ANYRES8=r10, @ANYRES8=r11, @ANYRES8=r3, @ANYRES8, @ANYRESHEX=r9, @ANYRESOCT=r13, @ANYRES8=r9, @ANYRES64=0x0, @ANYRES32=r10], 0x401, 0x800) 14m34.667214806s ago: executing program 9 (id=5143): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000780)={'pim6reg0\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101000, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x2}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xa8442, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000f80), 0x400, &(0x7f0000000080)={[{@mpol={'mpol', 0x3d, {'bind', '=static'}}}]}) close(r6) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000180)={'macsec0\x00', 0x600}) 14m30.285959242s ago: executing program 9 (id=5150): add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) unshare(0x22020600) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r0, 0x28, 0x6, &(0x7f0000001680)=""/59, &(0x7f0000000000)=0x3b) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xffffffff80000000) syz_clone(0x600, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r1) inotify_rm_watch(0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x342}, 0x3003, 0x0, 0x0, 0x0, 0x8, 0x20000000, 0x7, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={0x0, 0x0, 0xffffffffffffffff, 0x0, 0x80000}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000780)={0x0, 0x3, 0x0, [0x5, 0x3, 0x1, 0x7f7, 0x4], [0xfffffffffffffffc, 0x2, 0x5, 0x2000000000007, 0x29c67526, 0x7fffffff, 0x4, 0x3, 0xfffffffffffffffc, 0xe2, 0x5, 0x3, 0x3f27, 0xfffffffffffffff4, 0x4a, 0xfffffffffffffffe, 0xfe, 0xa, 0x400dc, 0x5, 0x7f, 0x3, 0xfffffffffffffff2, 0x34, 0x8, 0x8000000000008, 0x4, 0x2, 0xa53, 0xa, 0x6, 0x3, 0x1005, 0x2, 0x800085, 0xfd, 0x82, 0x1000000000931, 0x100000000101, 0x3, 0xffffffffffffff58, 0x40000000010000, 0x9, 0x3f, 0x8, 0x2000000008, 0x0, 0xe4, 0xeb56, 0xff, 0x1, 0x101, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x714b26de, 0x9, 0x3, 0x77, 0x5, 0x8001, 0x0, 0x1bc, 0x1, 0x1c, 0x1000, 0xfffffffb, 0x64, 0x8, 0x3, 0x6, 0x7, 0x7ff, 0x3, 0xe4, 0x800000000e, 0x6, 0x9, 0xdb, 0x1, 0x7fd, 0x0, 0x1, 0x49a, 0x1, 0x6, 0x7, 0x6, 0x3, 0x2000100000002, 0x93, 0x4, 0x200a, 0x10000000000007, 0x81, 0x5, 0x1, 0x9, 0x6, 0x68f, 0x0, 0x100000000a, 0x3, 0xc, 0x0, 0x6, 0x2, 0x1, 0x7, 0x3ff, 0x3, 0x7, 0x805, 0x4e, 0x40000000000001, 0x40, 0x7fffffff, 0x5f79, 0x2, 0xffffffdffffffffd]}) r2 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) write$char_usb(r2, &(0x7f0000000040)="e2", 0xff0f) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000940)=""/4096) 14m30.040447225s ago: executing program 9 (id=5152): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x10000, &(0x7f0000000080)={[{@quota}, {@delalloc}, {@acl}, {@journal_dev={'journal_dev', 0x3d, 0x11}}, {@usrjquota}, {@bsdgroups}]}, 0x1, 0x50a, &(0x7f0000001f40)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600040000000000000000000003003e00ebffffff940200120200000040000000000000007b02000000040000000000008100380015"], 0x78) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x1000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in6={0xa, 0x4e24, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}], 0x1c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x3, 0xac5) syz_clone3(&(0x7f0000000900)={0x23800000, &(0x7f0000000040)=0xffffffffffffffff, 0x0, 0x0, {0x27}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x4a7) io_submit(0x0, 0x1, &(0x7f0000001300)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x4006, r3, 0x0}]) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000003400)={0x0, 0x0, &(0x7f00000033c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="240000000d0a010100000000000000000a000005100003800c0000800800034000000005382944ee31f73d6b61b3e1c32f65b12c5db254995dbc6071fa013375c7d0d57f48d1d8923f74fe0b113b7b849db3bd579fc5278d5059d0fd8637bd745097754ca3f368652a6246986f8728a5564b0afe3721037a38736b"], 0x24}, 0x1, 0x0, 0x0, 0x24000894}, 0x10) 14m28.19327455s ago: executing program 9 (id=5154): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x5008, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x1, 0x1, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000000000000000000000060000959f0a47294042762c956bea1625de4ccccee9a0e4d9bcd7973728ccdbb1c40b6b4ac633a53a4f5aa9509c19c05e8ec1650811ff5001ba83328453d6e8d41d3abbc9b8df"], &(0x7f0000000280)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x40004) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x310) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x48) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x844}, 0x40) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e23, @empty}], 0x30) r4 = socket(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x200, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x208, 0x1, @perf_bp={0x0}, 0xd234, 0x2, 0x8, 0x7, 0x8000, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8000, 0x0, 0x3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000010000305000000000000000000cf0000", @ANYRES32=0x0, @ANYBLOB="03000000000000002000128008000100677265001400028008000600ac14142e08000700e000030a08000a00"], 0x48}, 0x1, 0x0, 0x0, 0x24040000}, 0x2000800) sendmmsg(r4, &(0x7f0000000000), 0x4000000000001f2, 0x0) r5 = socket(0x2b, 0x1, 0x1) setsockopt$inet6_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x22) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x480, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0xe82, 0x722}, 0x106200, 0x10004, 0x20da, 0x9, 0x7, 0x24005, 0xb, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0xb) ppoll(&(0x7f0000000740)=[{0xffffffffffffffff, 0x104}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0xce20, 0x6, @empty, 0x2d}}, 0x7, 0x1, 0xf06, 0x3, 0xb4, 0x7f, 0x9}, 0x9c) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r7, &(0x7f0000000000)={0x7, 0x1b, 0x2}, 0xffffff9a) splice(r6, 0x0, r3, 0x0, 0x10003, 0x2) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) 14m24.803947925s ago: executing program 9 (id=5168): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'pimreg\x00', 0x5005}) r1 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001300)=@newtfilter={0x24, 0x2c, 0x1, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x6, 0xf}, {0xd, 0x2}, {0xfff2}}}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r3}, &(0x7f0000000140)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(0x0, 0x1, &(0x7f0000000040), 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x200000b, 0x132, 0xffffffffffffffff, 0xffffd000) socket(0x10, 0x803, 0x0) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0xfffffffffbfffff5]}, 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0xffffffffffffff2c}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r5 = io_uring_setup(0x4fee, &(0x7f00000003c0)={0x0, 0xc8df, 0xc000, 0x9, 0x20002f7, 0x0, r4}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x800, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {0x5}, {0xe, 0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x20040005}, 0x8800) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r5, 0x2219, 0x7721, 0x16, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') getdents(r7, &(0x7f0000000f40)=""/243, 0xf3) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x2f, 0x6, 0x7e, 0x9, 0x11, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8000, 0x7, 0x0, 0xc6}}) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="000400"/20, @ANYRES32=r8, @ANYRES32, @ANYBLOB="010000000400000000000000"], 0x50) sendmsg$nl_route(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000010024bd7000fc0ddf2500000000", @ANYRES32=0x0, @ANYBLOB="1b0b04000300000008001b", @ANYRESHEX=0x0], 0x28}, 0x1, 0x0, 0x0, 0x68010}, 0x0) ioctl$XFS_IOC_GETPARENTS(r9, 0xc028583e, &(0x7f0000000300)={{[0x7, 0x10, 0x188, 0xffffffff]}, 0x0, 0x2, 0x1, 0x0, &(0x7f00000002c0)=[{{@_ha_fsid={[0x6, 0x7]}, {0x5, 0xf9, 0x1, 0xc}}, 0x6, 0x0, ')*\'\x00'}]}) file_setattr(0xffffffffffffff9c, 0x0, &(0x7f0000000080)={0x3922, 0x1, 0x7, 0xffffffff, 0x9}, 0x18, 0x1000) r10 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r10, 0x107, 0x12, &(0x7f0000000040)={0x1, 0x9006}, 0x4) 14m24.688143521s ago: executing program 39 (id=5168): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'pimreg\x00', 0x5005}) r1 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001300)=@newtfilter={0x24, 0x2c, 0x1, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x6, 0xf}, {0xd, 0x2}, {0xfff2}}}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r3}, &(0x7f0000000140)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(0x0, 0x1, &(0x7f0000000040), 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x200000b, 0x132, 0xffffffffffffffff, 0xffffd000) socket(0x10, 0x803, 0x0) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0xfffffffffbfffff5]}, 0x8, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0xffffffffffffff2c}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r5 = io_uring_setup(0x4fee, &(0x7f00000003c0)={0x0, 0xc8df, 0xc000, 0x9, 0x20002f7, 0x0, r4}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x800, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {0x5}, {0xe, 0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x20040005}, 0x8800) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r5, 0x2219, 0x7721, 0x16, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') getdents(r7, &(0x7f0000000f40)=""/243, 0xf3) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x2f, 0x6, 0x7e, 0x9, 0x11, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8000, 0x7, 0x0, 0xc6}}) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="000400"/20, @ANYRES32=r8, @ANYRES32, @ANYBLOB="010000000400000000000000"], 0x50) sendmsg$nl_route(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000010024bd7000fc0ddf2500000000", @ANYRES32=0x0, @ANYBLOB="1b0b04000300000008001b", @ANYRESHEX=0x0], 0x28}, 0x1, 0x0, 0x0, 0x68010}, 0x0) ioctl$XFS_IOC_GETPARENTS(r9, 0xc028583e, &(0x7f0000000300)={{[0x7, 0x10, 0x188, 0xffffffff]}, 0x0, 0x2, 0x1, 0x0, &(0x7f00000002c0)=[{{@_ha_fsid={[0x6, 0x7]}, {0x5, 0xf9, 0x1, 0xc}}, 0x6, 0x0, ')*\'\x00'}]}) file_setattr(0xffffffffffffff9c, 0x0, &(0x7f0000000080)={0x3922, 0x1, 0x7, 0xffffffff, 0x9}, 0x18, 0x1000) r10 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r10, 0x107, 0x12, &(0x7f0000000040)={0x1, 0x9006}, 0x4) 12m2.229412964s ago: executing program 7 (id=5807): socket$pppl2tp(0x18, 0x1, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x7, @ipv4={'\x00', '\xff\xff', @local}, 0x1}, 0x1c) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x17440000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_open_procfs(0x0, &(0x7f0000000280)='fdinfo/4\x00') preadv(r4, &(0x7f0000001600)=[{&(0x7f0000000240)=""/41, 0x29}], 0x1, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa420, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) open(&(0x7f0000000100)='./bus\x00', 0x24040, 0x10) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000440)=@gcm_256={{0x303}, '\x00', "352bfc0f38345beb42380beb8a9b6220f956db553fc75817f69b4e4047aaa9e1", '\x00', '\x00\x00\x00@\x00'}, 0x38) 12m0.349716121s ago: executing program 7 (id=5817): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)={0x4c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) 11m59.902839674s ago: executing program 7 (id=5819): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2012, 0x32, 0x7, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r0, 0x84, 0x14, &(0x7f0000000040)="020000000980ffff", 0x8) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000180), r1) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x77, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x107220, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0x8, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) prctl$PR_MCE_KILL(0x4e, 0x1, 0x40000000) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x22, 0x0, 0x9, 0x4, 0x0, 0x9, 0xa1686, 0xa, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x4, 0xe}, 0x2090, 0x60, 0xffffffff, 0x7, 0x83, 0x9b9b, 0x26, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x3000003, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x20, &(0x7f0000000680)={&(0x7f0000000200)=""/193, 0xc1, 0x0, &(0x7f0000000580)=""/219, 0xdb}}, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010027bd7000fbd3df25020000000900010073797a3000000000090003"], 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 11m59.165414182s ago: executing program 7 (id=5824): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x21081e, &(0x7f0000000000)={[{@errors_remount}, {@noblock_validity}]}, 0x1, 0x4f9, &(0x7f0000001480)="$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") r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x89480, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x9, 0x3}, 0x0, 0xa88, 0x8406, 0x9, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, 0x0) perf_event_open(&(0x7f00000006c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xe, 0x4a718, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x100000000, 0xe}, 0x104b18, 0x6, 0x0, 0x1, 0x5, 0x4, 0xb, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(0x0, r3) sendmsg$NL802154_CMD_SET_CHANNEL(r3, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000940)={0x2c, r4, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [@NL802154_ATTR_CHANNEL={0x5, 0x8, 0x7}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_PAGE={0x5}]}, 0x2c}}, 0x64000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan1\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wpan3\x00'}) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r2, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x840) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000600)={@map, 0xffffffffffffffff, 0x79ac3597ce80c638, 0x2000}, 0x20) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="180000001800599c6d0e0000ded650492d"], 0xfe33) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000000c0)=@newtfilter={0x24, 0x11, 0xd27, 0x100, 0x0, {0x0, 0x0, 0x74, r6, {0x1, 0x4}, {}, {0xa}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4044051}, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) syz_clone(0x100111, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500), &(0x7f0000000540)=@md5={0x1, "a37c4063ef7ff35fe683d0d81c11ff8d"}, 0x11, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) 11m55.091995493s ago: executing program 7 (id=5833): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x4, 0x2}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x45, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xff, 0x4}, 0x12122, 0x10000, 0xfffffffe, 0x5, 0x8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = syz_io_uring_setup(0x4b5, &(0x7f0000000180)={0x0, 0x86e1, 0x40, 0x8, 0x3d6}, &(0x7f0000010080), &(0x7f0000000000), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000140)=[{0x0}, {0x0}], 0x2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x20000000ec072, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) syz_clone(0x80040000, 0x0, 0x0, 0x0, 0x0, 0x0) 11m54.726989271s ago: executing program 7 (id=5837): socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)={0x6, 0x6, 0x2, 0x0, 0xffffffff, 0x2}) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2082) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40045304, &(0x7f0000000280)={{0x6, 0x81}, 'port1\x00', 0x59, 0x21000, 0x9, 0x9, 0x100, 0x0, 0x40, 0x0, 0x6, 0xff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x103, 0x0, &(0x7f0000001580)="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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfa1d}, 0x50) r2 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x28101) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000040)=0x85) r3 = socket(0x2, 0x80805, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) close(0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x7a, &(0x7f0000000340)={r5, @in6={{0xa, 0x3, 0x4, @mcast1}}}, &(0x7f0000000040)=0x84) sendmmsg$inet_sctp(r3, &(0x7f00000032c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="30000000000000008400000001000000000000017c"], 0x30, 0x180}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0xfd51) sendmsg$nl_route(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYRES64=r2, @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64"], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x881) socket$nl_route(0x10, 0x3, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f00001d8000/0x2000)=nil, 0x2000, 0x0, 0x4000010, r7, 0x0) write$cgroup_subtree(r7, &(0x7f0000000480)=ANY=[@ANYRESHEX, @ANYBLOB="b28dbdd56743103ca2ab346aae8ec70f400ca4bef2be4d89252b3777ebe0c21859c4", @ANYRESHEX=r6, @ANYRES8=r1, @ANYRES32=r7, @ANYRES8=r4, @ANYRES32=0x0, @ANYRES64=r0], 0x7) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x88661, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2000009, 0x200000006c832, 0xffffffffffffffff, 0x4000) r8 = socket$kcm(0x29, 0x5, 0x0) write$cgroup_pressure(r8, &(0x7f0000000140)={'full'}, 0xfffffdef) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 11m54.651725975s ago: executing program 40 (id=5837): socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000000)={0x6, 0x6, 0x2, 0x0, 0xffffffff, 0x2}) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2082) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40045304, &(0x7f0000000280)={{0x6, 0x81}, 'port1\x00', 0x59, 0x21000, 0x9, 0x9, 0x100, 0x0, 0x40, 0x0, 0x6, 0xff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x103, 0x0, &(0x7f0000001580)="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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfa1d}, 0x50) r2 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x28101) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000040)=0x85) r3 = socket(0x2, 0x80805, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) close(0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x7a, &(0x7f0000000340)={r5, @in6={{0xa, 0x3, 0x4, @mcast1}}}, &(0x7f0000000040)=0x84) sendmmsg$inet_sctp(r3, &(0x7f00000032c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="30000000000000008400000001000000000000017c"], 0x30, 0x180}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0xfd51) sendmsg$nl_route(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYRES64=r2, @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64"], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x881) socket$nl_route(0x10, 0x3, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f00001d8000/0x2000)=nil, 0x2000, 0x0, 0x4000010, r7, 0x0) write$cgroup_subtree(r7, &(0x7f0000000480)=ANY=[@ANYRESHEX, @ANYBLOB="b28dbdd56743103ca2ab346aae8ec70f400ca4bef2be4d89252b3777ebe0c21859c4", @ANYRESHEX=r6, @ANYRES8=r1, @ANYRES32=r7, @ANYRES8=r4, @ANYRES32=0x0, @ANYRES64=r0], 0x7) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x88661, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2000009, 0x200000006c832, 0xffffffffffffffff, 0x4000) r8 = socket$kcm(0x29, 0x5, 0x0) write$cgroup_pressure(r8, &(0x7f0000000140)={'full'}, 0xfffffdef) socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 11m6.763962237s ago: executing program 5 (id=6073): syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000980)='./file0\x00', 0x3000010, &(0x7f0000000100)={[{@errors_remount}, {@nobh}]}, 0x1, 0x519, &(0x7f00000009c0)="$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") open(&(0x7f0000000480)='./file0\x00', 0x48500, 0x20) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80552, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0xe}, 0x102260, 0x10004, 0x0, 0x1, 0x5, 0x1000, 0x1, 0x0, 0x0, 0x0, 0x2000000020000005}, 0x0, 0x1, 0xffffffffffffffff, 0x2) (async) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x20040841}, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@multicast, @random="8a0a63cdec59", @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x14}, @remote, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}, @remote}}}}, 0x0) (async) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) (async) r3 = socket$netlink(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9ff", @ANYRES16=r4, @ANYBLOB="010000010000fddbdf25250000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0x34}}, 0x6048810) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000120000007f00000001"], 0x48) (async) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), r3) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9c0bd700", @ANYRES16=r5, @ANYBLOB="00042abd7000ffdbdf2504000000080005002a3400000800040004000000080006000600000034000180080006006f7666000c000700190000003100000008000b00736970000c0007000800000004000000080008000100008008000500800000000800040002000000040003802c000280080007000000000008000500ff00000008000900ffffffff05000d005b00000006000e004e200000"], 0xa0}, 0x1, 0x0, 0x0, 0x90}, 0x20040000) (async) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000f00)={0x0, @in6={{0xa, 0x4e24, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x3}}, 0x5, 0x7, 0x800, 0x9, 0xa0, 0x4, 0x7f}, 0x9c) syz_usb_connect(0x2, 0x2d, &(0x7f0000000a00)=ANY=[], 0x0) syz_open_procfs(0x0, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, &(0x7f0000000180)) (async) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) sendmmsg$inet6(r6, &(0x7f00000008c0)=[{{&(0x7f0000000000)={0xa, 0x4e1f, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1}, 0x1c, &(0x7f0000001780)=[{&(0x7f0000000100)="e886", 0x2}], 0x1}}], 0x1, 0x0) (async) r7 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r7, 0x10c, 0x3, &(0x7f00000000c0)=0x400d, 0x4) (async) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f00000001c0)={0x5, 0x6, 0x5, 0xa, 0x7, 0x9, 0x0, 0xf2c}, &(0x7f0000000200)=0x20) (async) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) socket(0x400000000010, 0x3, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) (async) getpid() 11m6.201511155s ago: executing program 5 (id=6077): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x2, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0xc4}]}, &(0x7f0000003ff6)='GPL\x00', 0x8, 0xb579, &(0x7f000000cf3d)=""/195}, 0x23) socket$unix(0x1, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_clone3(&(0x7f00000004c0)={0x10012000, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300), {0x10}, &(0x7f0000000340)=""/112, 0x70, &(0x7f00000003c0)=""/182, &(0x7f0000000480)=[0xffffffffffffffff], 0x1}, 0x58) prlimit64(r1, 0xe, &(0x7f0000000540)={0x1000, 0x9}, &(0x7f0000000580)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x2c, r3, 0x1, 0x4070bd28, 0x1, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004081}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x4881) ioprio_set$uid(0x0, 0x0, 0x2000) read(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) sched_setaffinity(r5, 0x8, &(0x7f0000000240)=0x4) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER(r6, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r3, 0x800, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) r7 = accept4$x25(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x12, 0x80800) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'veth1\x00'}) 11m6.006253456s ago: executing program 5 (id=6080): bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) unshare(0x60000600) sync() sync() r1 = openat$sysfs(0xffffff9c, 0x0, 0x800, 0x188) preadv(r1, &(0x7f0000000180), 0x0, 0x0, 0x8800) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffe4, &(0x7f0000000ac0)=[{&(0x7f0000000b00)="b6bd7e4983a45b31f79d80060400000000000000a33734d88229acf96457ad59d0b87f8659b614043e3d21a7cacecab8bbd26251b93b28b4d83e618673f9c74d0a28a5146c5511549fa617e908352c87d8ddff2ce042a1e58eb7b63759cab3526dd8ae1566ddcfb5fa83e8b2940b3ed1b8", 0x71}, {&(0x7f0000000880)="3aa854", 0x3}, {&(0x7f0000000a40)="746b9120a32aaf78043a9b07000000000000003c44", 0xfffffe16}], 0x3}, 0xc854) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x8070bd2a, 0x0, {0x60, 0x0, 0x0, 0x0, {0x0, 0xc}, {0xffff, 0xffff}, {0x2, 0x6}}, [@qdisc_kind_options=@q_cake={{0x9}, {0xffffffffffffff4a}}]}, 0x34}, 0x1, 0x0, 0x0, 0x200080d5}, 0x20000800) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r4, 0x5403, &(0x7f00000000c0)={0xffffffff, 0x0, 0x8000, 0xbbd7, 0x85, "10120dfe0ef7f0220000ff490a0080002a0008"}) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') preadv(r6, &(0x7f0000000080)=[{&(0x7f0000000040)=""/46, 0x2e}], 0x1, 0x0, 0x0) sendmsg$nl_xfrm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYRES64=r6, @ANYBLOB="922ffae10fb443b3ca0b0ca2781f5255ce47086d1ac92d44de33dfdc648c5855e043922cecd923d2bf2bf147f3f3f689c8c5b3fc111ec2d8c5f108067490191b703dcc7797ca9de635c62ebe1affbad52d8879", @ANYRES64=r4, @ANYRES32, @ANYRES32=r4], 0x15c}, 0x1, 0x0, 0x0, 0x880}, 0x2014) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x20, &(0x7f0000000140)={&(0x7f0000000040)=""/2, 0x2, 0x0, &(0x7f0000000080)=""/175, 0xaf}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000286, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r6, r1, 0x1d, 0x0, @val=@tracing={r7, 0x9}}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x4}, &(0x7f0000bbdffc)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0xc369d000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) 11m3.926182103s ago: executing program 5 (id=6093): r0 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x2400c004) r1 = socket(0x2, 0x2, 0x1) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x9, @remote}, 0x10) bind$unix(r1, &(0x7f0000000000)=@abs, 0x6e) r2 = socket(0x2, 0x2, 0x1) bind$unix(r2, &(0x7f0000000000)=@abs, 0x6e) syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x4000, &(0x7f00000000c0), 0x2, 0xbbf, &(0x7f0000000c00)="$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") open(&(0x7f0000000040)='./file1\x00', 0x80242, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x2141, 0x59) syz_open_procfs(0x0, &(0x7f0000000000)='environ\x00') open(&(0x7f00000000c0)='./file2\x00', 0x24842, 0x80) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x100, 0x52) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0x8004587d, &(0x7f0000000080)={@desc={0x1, 0x0, @desc4}}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r5 = socket(0x2, 0x2, 0x1) bind$unix(r5, &(0x7f0000000000)=@abs, 0x6e) r6 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(r6, 0xd, 0x0, 0x0) r7 = syz_open_procfs(r6, &(0x7f0000000080)='net/icmp\x00') preadv(r7, &(0x7f0000000700)=[{&(0x7f0000000300)=""/178, 0xb2}], 0x1, 0x17c, 0x9) 11m3.172074792s ago: executing program 5 (id=6098): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80552, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0xa}, 0x102260, 0x10000, 0x0, 0x1, 0x5, 0xfffffffb, 0x0, 0x0, 0x0, 0x0, 0x2000000020000005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73772cc9f1ba1f848430000005e140602000000000e000a000d000000028000001294", 0x2e}], 0x1, 0x0, 0x0, 0x2400}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x88, 0x24, 0xf0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x1, [], 0x0, [0x1, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c4, 0x8000, 0x0, 0x0, 0x3dc], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}]}, 0x88}}, 0x20000000) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xa802, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x6) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) r5 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x0, 0xfffffffd, {0x0, 0x0, 0x0, r6, {0xb, 0xd}, {}, {0x8, 0xfff1}}}, 0x24}}, 0x40004) 11m3.047163938s ago: executing program 5 (id=6099): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x22004043}, 0x880) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x3, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000180100002020692500000000002060207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000005c0)={r1}, 0xc) r2 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r2) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90324fc602f00000009000100053582c137153e3702480180000c0000d1bd", 0x33fe0}], 0x1}, 0x0) 11m2.975251562s ago: executing program 41 (id=6099): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x22004043}, 0x880) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x3, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000180100002020692500000000002060207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000005c0)={r1}, 0xc) r2 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r2) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90324fc602f00000009000100053582c137153e3702480180000c0000d1bd", 0x33fe0}], 0x1}, 0x0) 1m8.797270229s ago: executing program 3 (id=8714): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) 1m7.563359552s ago: executing program 3 (id=8719): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x110c18, &(0x7f0000000280)={[{@acl}, {@bsdgroups}, {@bh}, {@max_batch_time}, {@journal_checksum}, {@bsdgroups}]}, 0x7, 0x60a, &(0x7f0000000880)="$eJzs3c9rHGUfAPDvzCZ5kzTvm/ZFxBbFgIcWpGlSi1Uv1nqwh4IFexDx0NAkNXT7gyYFWwum4EFBQcSrSC/+A96ld28iqDfPQhWpKKh0ZXZn2+1mN13T7E6b+Xxgknmemc3zfHfyZJ5nJs9OAKU1lX1JI3ZG3DqRREy2bJuIxsapfL+bv145mS1J1Gqv/ZJEkuc190/y79vyxGhEfHM44v+VteUuX7p8eq5aa3g3Yt/KmfP7li9d3rt0Zu7UwqmFs7P7nztwcOb52QOzmxLntvz7kaOvPv7Re289u/htdW8Sh+L48Dvz0RbHZpmKqbiVh9iaPxQRB7OVDu/Lw2YLhFBqlfz3cTgiHo3JqNRTDZOx9GGhlQP6qlaJqAEllWj/UFLNfkBzbN/bOPh4n3slg3PjpcYAaG38Q41rIzFaHxuN30xaRkaNaxvbN6H8rIy/r+z6LFvirusQf9w+OkObUE43q1cj4rFO8Sf1um2vR5rFn95Vj2Q1YiYiRvL6vXwfdUha1vtxHWY9G40/jYhD+fcs//AGy59qSw86fgDK6XrW/8lO5KtZ6s75L+t7NPs/0aH/M9Hh3LURRZ//uvf/muf70fo18rStH5b1WY51/pHD7Rk/fnDkk27lt/b/siUrv9kXHIQbVyN2tcX/fhZs3v/J4k86HP9slxOHeivjle9+PtJtW9Hx165F7O44/rnTK83W1rk/uW9xqbow0/jasYyvvn7zi27lFx1/dvzHu8TfcvzT9tdl78n5Hsv48ti1M922TXSMf7VldJr+NJI0xpsj+WvenltZuTAbMZIcbWSkLfn7169Lc5/mz8ji3/NU5/bf+vvf/gaMNf9k9uD866dvdtu2kePfcjP5Vq3HOnSTxT9/7+O/pv1neR/3WMbvb1x8otu29eIfu5/AAAAAAAAAoITS+j3YJJ2+vZ6m09ON+bKPxHhaPbe88vTiuYtn5yP21P8fcjht3umebKSTLD2b/z9sM72/Lf1MROyIiE8rY/X09Mlz1fmigwcAAAAAAAAAAAAAAAAAAIAHxLZ8/n/zOdW/VRrz/4GS6OcD5oAHm/YP5VRptv81j3gCysD5H8pL+4fy0v6hvLR/KC/tH8pL+4fy0v6hvLR/AAAAANiSdjx5/YckIlZfGKsvmZF8mxlBsLUNF10BoDCVoisAFOb2rX+dfSidnvr/f+YfDtj/6gAFSDpl1jsHtfUb//WOrwQAAAAAAAAAAAAA+mD3zu7z/80Nhq3NtD8or/uY/++jA+Ah56P/obyM8YF7zeIf7bbB/H8AAAAAAAAAAAAAGJiJ+pKk0/lc4IlI0+npiP9GxPYYThaXqgszEfG/iPi+MvyfLD1bdKUBAAAAAAAAAAAAAAAAAABgi1m+dPn0XLW6cKF15a81OVt7pfkU1PX2GY9779PDyovxL18VyeDflrGIKPyg9G1lqCUniVjNjuoDUbELy9GSM1TwISjwjxIAAAAAAAAAAAAAAAAAAJRUy9zjznZ9PuAaAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDg3Xn+f/9Wio4RAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHg4/RMAAP//RM5Cug==") r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00032cbd7000fddbdf256f0000000500d60009001c00000008002700010000000800270001000000bd15e918df5562e40c167e83842362f94a3a88355b821de4c0fad18486b99638b420e943a1"], 0x44}, 0x1, 0x0, 0x0, 0x20040011}, 0x20000000) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0xffff, 0x0, @loopback, 0xfffffffb}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000140001000abd7800fedbdf25010000000800010040"], 0x1c}, 0x1, 0x0, 0x0, 0x4000d}, 0x20000000) r3 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="2e00000011008188040f80ec59acbc0413a181000a000000000100000010001f0e0027000f00000000800200121f", 0x2e}], 0x1}, 0x0) process_madvise(r0, &(0x7f0000000100)=[{&(0x7f0000000080)="76870b67df920071263d20b5fe7f7be1398b8f75cfb06deba96dce943a3a96090ffc70369feed80a2cb1448d0da918d577ed9d981f85b81696f64574ef7ed74384e17c293cc7097787133b6c52c9469cf8df953275b4ce5f1da94726bb67c12e602db64bbf49e82411d095d9e013f709a3dfd8709ef7680f98da0b21", 0x7c}], 0x1, 0xf, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x80201, 0x0) write$rfkill(r4, &(0x7f0000000240)={0x1, 0x1, 0x2, 0x0, 0x1}, 0x8) quotactl_fd$Q_SETQUOTA(r0, 0xffffffff80000801, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000010880)=@base={0x6, 0x4, 0x8, 0xc}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000010400)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r6, r5}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 1m6.702042487s ago: executing program 3 (id=8721): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) syz_io_uring_setup(0xa6a, &(0x7f00000007c0)={0x0, 0x9bc1, 0x8000, 0x400}, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x90404, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x2}, 0x1101, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000170000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x11000) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x3be2b02884f95c63}]) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 1m5.237436092s ago: executing program 0 (id=8724): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) 1m4.986541216s ago: executing program 3 (id=8726): bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x2, 0x0, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x4008032, 0xffffffffffffffff, 0xcd0b3000) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) connect$can_bcm(r6, &(0x7f00000004c0)={0x1d, r7}, 0x10) write$cgroup_subtree(r4, &(0x7f0000000080)=ANY=[], 0x48) splice(r3, 0x0, r5, 0x0, 0x3000, 0x100000000000000d) sendmsg$inet(r1, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f", 0xdc}, {&(0x7f00000007c0)}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae", 0xcb}], 0x8, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0xffffffff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="020200090c0000000004000000000000030006000000000002000000ffffffff000000000000000002000100000000000000000001000020030005000000000002000000ac1414aa0000000000000000010015000000000001"], 0x60}, 0x1, 0x7}, 0x40) recvmsg$unix(r2, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) socket$inet6_udp(0xa, 0x2, 0x0) syz_clone(0x2a801400, 0x0, 0x0, 0x0, 0x0, 0x0) 1m4.875359501s ago: executing program 4 (id=8727): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x1018e58, &(0x7f00000005c0)={[{@nodioread_nolock}, {@noblock_validity}, {@data_err_ignore}, {@max_batch_time={'max_batch_time', 0x3d, 0x7}}, {@nodiscard}, {@stripe={'stripe', 0x3d, 0x4}}, {@noauto_da_alloc}]}, 0x6, 0x61f, &(0x7f0000000b00)="$eJzs3c9rXNUeAPDvncmkSZv30j4ej9fyHi/wFi1I00wtVt3Y1oVdFCzYhYiLhiapodMfNCmYWGgKLhQURNyKdOM/4F66dyeCunMtVJGKikpH7syddDKZSdIkM9Pmfj5wM/ece2fO+c6dM/fce3PmBpBbY+mfQsT+iAfnk4jRpmUjUV84lq13/6ebF9IpiWr1lR+TSLK8xvpJ9rgnSwxFxJenIv5RXF3u3MLipclKte5WxJH5y9eOzC0sHp69PHlx+uL0lfLRZ48dn3iufKy8LXHuyR5Pn3n5P++//cYzM19VDidxIs6V3pqKlji2y1iMxYMsxOb8gYg4ns60eV+eNDsghFwrZp/HUkT8K0ajWEvVjcbse32tHNBV1WJEFcipRPuHnGr0AxrH9hs7Dj7X5V5J79w7WT8AWh3/QP3cSAzVjo1230+ajowGauc29m5D+WkZf9488HE6xYrzEL8ub52BbSink6XbEfHvdvEntbrtrUWaxl9YUY8kIiYiYjCr34tbqEPSNN+N8zBr2Wz8hYg4kT2m+ac2Wf5YS7rX8QOQT3dPZjvypTT1cP+X9j0a/Z9Y1f+pXxtq3XdtRr/3f537f439/VDtHHmhpR+W9lnOtn/JUmvGd++e/rBT+c39v3RKy2/0BXvh3u2IAy3xv5MGm/V/0viTNts/XeX8iY2V8dLXP5zutKzf8VfvRBxse/zzsFeazrVenxzOlpWPlY/MzFamJ+p/25bx+Revf9qp/H7Hn27/3R3ib9r+hdbnpe/JtQ2W8dnZO5c7LRtZN/7C94NJ/XhzMMt5c3J+/no5YjA5k61Sv5BVyz+6dl0a6zReI43/0P/bt/8Vn//bK19nuPGVuQHXXr10v9OyzWz/povJD6obrEMnafxT62//Ve0/zftgOXVrzTJ+ee3GfzstWyv+4S3GBgAAAAAAAHlTqF2DTQrjy/OFwvh4fbzsP2N3oXJ1bv6pmas3rkxFHKr9P2Sp0LjSPVpPJ2m6nP0/bCN9tCX9dETsi4iPisO19PiFq5WpfgcPAAAAAAAAAAAAAAAAAAAAj4k92fj/xn2qfy7Wx/8DOdHNG8wBjzftH/Kr1v5X3eIJyAP7f8gv7R/yS/uH/NL+Ib+0f8gv7R/yS/uH/NL+AQAAAGBH2ve/u98mEbH0/HBtSg1my4wIgp2t1O8KAH1T7HcFgL5ZvvSvsw+5s6H+/+/ZjwN2vzpAHyTtMmudg+rajf9u22cCAAAAAAAAAAAAAF1wcH/78f+JscGw4xn2B/m1hfH/fjoAnnB++h/yyzE+sN4o/qFOC4z/BwAAAAAAAAAAAICeGalNSWE8Gws8EoXC+HjE3yJib5SSmdnK9ERE/D0ivimWdqXpcr8rDQAAAAAAAAAAAAAAAAAAADvM3MLipclKZfp688wfq3J29kzjLqg9KOuFeMRnRdL7t2U4IpZzShGPWufuzezKPrZbeZ2BuYXF5LdqTRKxFI9PgFuKa5tn1v3qGOzqFxMAAAAAAAAAAAAAAAAAAORQ09jj9g580uMaAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDvPbz/f/dm+h0jAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPBk+isAAP//GjM9YA==") r1 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x8a, &(0x7f00000001c0)={[{@stripe={'stripe', 0x3d, 0x8}}, {@init_itable}, {@block_validity}, {@journal_async_commit}, {@bh}, {@noinit_itable}]}, 0x1, 0x479, &(0x7f0000000dc0)="$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") r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="b4050000200080006110600000000000c60000000000000095000000000000009f33ef60916e6e893f1eeb0be20000d072f5b89c3043c47c896ce0bc8731fa595b6b4d45ef26dcca5582054d54d53cd2b685b431c70ea948259c4c869b4fc8db714e4b94bdae214fa68a051d4dca7d2647bec1fc89398d2b9000f224891060017c4700de60beac671e8e8f00cb03588aa6007e71f871ab5c2ff88afc6002084e5b52710aeee835cf0d78e45f70983826fb8579c1fb47d2c59005cff414ed55b0d18a9d446935fb332bb593ee341ab59016f81860324b800c00000000000092d9c5fe34ccb80a61ffcb3363073fd8962823ee45f5d7394e9510f4ac6c702cfabe8a9c55c8dafcdb110036e14c1035cafdfef6a358cbfadb3579a285580a3c080d4e0a48d7bdc38a0437c8c1b3aa408a0000000000002248950b000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000ac0)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000048c0)={r6, &(0x7f00000047c0), &(0x7f0000004880)=@udp=r4}, 0x20) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0xe2, 0x0, 0x7fff0000}]}) close_range(r7, 0xffffffffffffffff, 0xff0f000000000000) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)={0x24, r3, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}]}, 0x24}}, 0x0) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x662802, 0x0) syz_io_uring_setup(0x1e0c, &(0x7f00000000c0)={0x0, 0x9d58, 0x0, 0x2, 0x2b2}, 0x0, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r9 = syz_io_uring_setup(0xefe, &(0x7f0000000080)={0x0, 0x4, 0x10000, 0xfffffff9, 0x2376}, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r10, r11, r12, &(0x7f0000000000)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x4004, @fd_index=0x4, 0x718a, 0x0, 0x0, 0x12, 0x1, {0x2}}) io_uring_enter(r9, 0x742f, 0x77ae, 0x1, 0x0, 0x0) r13 = socket(0x1d, 0x2, 0x6) r14 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, 0x0, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r14, 0x8933, &(0x7f0000000140)={'vxcan1\x00', 0x0}) bind$can_j1939(r13, &(0x7f0000000000)={0x1d, r15, 0x6}, 0x18) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r13) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r8, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {r1}}, './file0/file0\x00'}) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000100)='.\x00', 0x200e1, &(0x7f00000001c0)=ANY=[], 0x0, 0x0, &(0x7f0000000000)) 1m3.596746077s ago: executing program 0 (id=8729): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, 0x0}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) 1m1.812676549s ago: executing program 4 (id=8731): write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)={'some', 0x20, 0x5, 0x20, 0x7}, 0x2f) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="100000002d000b02d25a806f8c6394f9101a0400", 0x14}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d80000001c0081044e81f782db44b9040a1d08030e000000e8fea4a1", 0x1c}], 0x1, 0x0, 0x0, 0x7400}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0, 0x0, 0x0, 0x5c8}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce620300fe"], 0xfe1b) r0 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001800599c6d0eab070004000523"], 0xfe33) 1m1.572663811s ago: executing program 0 (id=8732): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_io_uring_complete(0x0, 0x0) get_robust_list(0x0, &(0x7f0000000640)=&(0x7f00000005c0)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000580)={&(0x7f0000000540)}}, &(0x7f0000000680)=0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r1 = syz_open_dev$evdev(&(0x7f0000004c00), 0x2, 0x42000) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000004c40)=""/226) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000050000000100000001000013040000000200000088060000ff0f0000002e2e"], 0x0, 0x35}, 0x28) syz_emit_ethernet(0x4a, &(0x7f0000000200)={@local, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "cabf00", 0x14, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, "a78c"}]}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180005000000ffff000077b9080000009500000000d3a07e"], &(0x7f0000000080)='GPL\x00', 0x7, 0x4fa, &(0x7f0000000cc0)=""/4096, 0x40f00, 0x5, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x0, 0x2, 0x4, 0x9}, 0x1, 0x0, 0x0, 0xff3e, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) sendmsg$DEVLINK_CMD_RATE_NEW(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000240)=ANY=[], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$IPCTNL_MSG_CT_DELETE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000940)=ANY=[], 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x88ce359bdb00143c, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCFLSH(r4, 0x400455c8, 0x0) bind$bt_hci(r0, &(0x7f0000000000), 0x6) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x100600, 0x2, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000011008188040f46ecdb4cb9cca7480ef400000000e3bd6efb440013030e001b000d000008ba8000001201", 0x2e}], 0x1}, 0x0) close_range(r5, 0xffffffffffffffff, 0x0) 1m0.184462153s ago: executing program 3 (id=8734): perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x100, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x400000, 0x184, &(0x7f0000c00000/0x400000)=nil) shmdt(0x0) connect$unix(0xffffffffffffffff, 0x0, 0x4) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000140)=""/116) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0x40305829, &(0x7f0000000140)={0x17c04, 0xffffffffffffffff, 0x2, 0x973f, 0x84, 0x8000}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f00000001c0)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x11, 0x14, &(0x7f0000000280)=ANY=[], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0x0, 0xfffffff4}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r4}, 0xc) r5 = io_uring_setup(0x1684, &(0x7f0000000200)={0x0, 0x3a2b, 0x8, 0x4, 0x2}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x20000000ec071, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002700)=ANY=[@ANYBLOB], 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x4) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r5, 0x10, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x0, 0x21}, 0x20) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_io_uring_setup(0x596d, &(0x7f0000000240)={0x0, 0x8abd, 0x8, 0x2, 0x1e7, 0x0, r6}, &(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r8 = syz_io_uring_setup(0x2c00, &(0x7f0000000080)={0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) r12 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) syz_io_uring_submit(r9, r10, r11, &(0x7f00000002c0)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0, 0x12345, {0x0, r12}}) syz_io_uring_setup(0x49df, &(0x7f0000000400)={0x0, 0x1d86, 0x100, 0x0, 0x208}, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)=0x0) syz_io_uring_submit(r7, r10, r13, &(0x7f0000000540)=@IORING_OP_READ_FIXED={0x4, 0x28, 0x4000, @fd, 0x0, 0xff, 0x7, 0x2, 0x1, {0x3}}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2c, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1f0519, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x6, 0x5}, 0x110124, 0x37e, 0xb, 0x0, 0x10000075, 0x20005, 0x7f, 0x0, 0x0, 0x0, 0x20000008}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xa) r14 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_int(r14, 0x0, 0x13, &(0x7f0000000040), 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x48) 57.470149803s ago: executing program 1 (id=8735): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x2}, 0x94) pwritev2(r0, &(0x7f0000001500)=[{&(0x7f0000000000)="4e188936594009c3cdfaa996f44f8eefff33ba4e01b3b286c8e7dd9ac263baf1f0787883962cc0c243b17c48204f029bac548f17200e731f230b399832488cafd87893ebd924cb16daba8e14ec1312de2d1d2d727778f4e64d2d0458812f5d66183d19a37f360b9dafe16ee03c99f78b45f7d78b92e74325c9ecc8f63e4386570b1fa17c2590f3d1450fcccfd2f02beb67191c0e38efd51634dafa888cd49db6c80a39f95f9e77", 0xa7}, {&(0x7f00000000c0)="6a73e1a0f4f1e492b7c75f7b5bd5f71c8a04cb82b79349c34dc99e78913eed0ebafab158be02eaf24c5b6bf068b78a216509c798f730cdbec5648112674ac2", 0x3f}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="c4c90d7b013f58cb981eeecfbd07e50f1eccd5a8f27b0f1ed098f1156f896b4ec9a5d3071992826089cf728c421f55e7e7eb55e2014106de6cd4609bf1ec830cc961ee82c46e573eaf9d65bd28539999a3eef6879dfec721be22c13cb5a53348c50328c7bbe9f84b1b47aa0c13387a702b4fb3383268a13a7f14083420dbfea57f869b2d873e59bf354ae99141805e50d5725d2fa14d9c6501275335615e6f0b5f343bee6180db17e4aaa23d533466d0bb89c01ea068f93cc0359fdbad210395863ce8b85906fd92afd71dcad713cff066bd3c74ca74bd97f65a34b9b3d6c01c89092c142a9d53bdf3eeb46315423601", 0xf0}, {&(0x7f0000001400)="9bb5cc9fba1e6745518ad08e0c2b6511866c2166192a27c76cbcdff537504e8f0784f3267ac70b9cf7900d35f5a32b8a0e4bf900d8c8e0ef106010e02e78c11ac6ede37c4035d2f8dd0b72065a68d198a4308ab11db920bcd79d4e0f95eace", 0x5f}, {&(0x7f0000001480)="abb7c2f09b63127fe4468daac325f7b929217e9c5ad97dbdc44c6a1152a024d5233df637191aa5c76870a7c3a9c11fb961706c2dd15a32a60726dad1c3e0a9c9", 0x40}, {&(0x7f00000014c0)='2{\t', 0x3}], 0x7, 0xdf4e, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="8c00000010001fff28bd70000000800000000000", @ANYRES32=0x0, @ANYBLOB="efb00000800000006c0012800b00010062726964676500005c00028008000500010000000c002e"], 0x8c}, 0x1, 0x0, 0x0, 0x4000084}, 0x14) 56.021388768s ago: executing program 4 (id=8736): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) syz_io_uring_setup(0xa6a, &(0x7f00000007c0)={0x0, 0x9bc1, 0x8000, 0x400}, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x90404, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x2}, 0x1101, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000017000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x11000) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x3be2b02884f95c63}]) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 53.25854466s ago: executing program 0 (id=8738): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000000000000000100000000000022107fdd00000000000000000000000000000000ffffffff00000000ffffffffffffffff0000000000000000faffffffffffffff0400000000000000030000000000000004000000b56b6e000001030200000000"], 0xb8}, 0x1, 0x0, 0x0, 0x2000c810}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x8b}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102b00fe80000000000000875a650b9ff57b0000000000000000000000000000000001"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x4, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 51.209023197s ago: executing program 1 (id=8739): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) 50.425662767s ago: executing program 2 (id=8740): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x1943}, 0x3a, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000001440)=ANY=[@ANYBLOB="48000000020605000000000000000000000000000500010006000000050005000200000005000400000000000900020073797a31000000000d000300686173683a6e6574000000006ebc63fb895077c87a724d692b34a7d82a9bfc377a46edb3"], 0x48}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x44, 0x9, 0x6, 0x201, 0x0, 0x0, {0x7}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x10000047}, 0x4000050) 49.706741254s ago: executing program 3 (id=8741): r0 = syz_clone(0x80050000, &(0x7f0000000040)="73a7ef139951d9eff533ed643c24411369777095c16c06ce2d1b65cf9a47dc97623621f1341f6b46a70cf54f277d242349d307047103eaa70fa687079a4b612634b459c32882a90a0a3e538b96d13add778464ccb0ea371710c8cce78a42e39ce1a1dd2195e5af89a89a72ebde31bb5854f453d52ab41fe710728fb309441c5c5f7a445e687b86c1f889862f0a42d664692b5733ac0d035943cf0fb74e1dff9ca7debf843855aa75635ec858d46369ba4c1743c23ddab4da2939ed46", 0xbc, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="be22c19380b51f43a1951b793b3550b8135112b9e44395e858a5b6226553b5a6538e9f71d2467471ea6634474e2c3500acec31176f02a8e73434d066352d1fc9ac0d9b04d82d670c337148100321") perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x8}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='map_files\x00') r2 = open(0x0, 0x141b42, 0x8) prlimit64(r0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_genetlink_get_family_id$tipc2(0x0, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f0000001940)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_bp={0x0, 0x3}, 0x80, 0x10000, 0x0, 0x8, 0x10, 0x9, 0x0, 0x0, 0x0, 0x0, 0x42d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x28083, 0x0) ioctl$XFS_IOC_AG_GEOMETRY(r8, 0xc080583d, 0x0) syz_clone(0xc1e2e7fc8415d4a9, 0x0, 0x52, 0x0, 0x0, 0x0) r9 = socket$kcm(0x2a, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000001f80)={&(0x7f0000001d00)=@qipcrtr={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0x80, 0x0, 0x0, 0x0, 0xf0}, 0x0) recvmsg(r9, 0x0, 0x40002182) fcntl$notify(r1, 0x402, 0x5) 48.62117167s ago: executing program 4 (id=8742): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x3, &(0x7f0000000780), 0x8, 0x61f, &(0x7f00000008c0)="$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") r3 = socket(0x10, 0x80002, 0x0) capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000180)={0x401, 0x7ff, 0x9, 0x58, 0x1, 0x9}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r4, 0x80083313, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001100a7cc4a372eaf541d002007000000", @ANYRES32=r2, @ANYBLOB="00000000100000001c001a80080002802d00ff0008000200", @ANYRES16=r3, @ANYRES32=r3], 0x44}}, 0x2000800) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000001400000008000f00fc00000018000180140002006e657464657673696d300000000000000800080000fcffff0800090000000000080011000000000008000e00800000000800", @ANYRES64=r0], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 47.26806205s ago: executing program 0 (id=8743): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) r1 = syz_open_dev$loop(&(0x7f0000000540), 0x8000000000000001, 0x400000) ioctl$BLKGETZONESZ(r1, 0x80041284, &(0x7f0000000580)=0x81) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000003c0), 0x3) getsockopt$bt_hci(r0, 0x11a, 0x2, 0x0, 0x0) munmap(&(0x7f0000002000/0x4000)=nil, 0x4000) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') getdents64(r2, &(0x7f0000001e80)=""/4118, 0x1016) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x2004de, &(0x7f0000000100), 0x3, 0x451, &(0x7f0000000f80)="$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") lgetxattr(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280)=@known='trusted.overlay.upper\x00', 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) execve(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003, 0x2, @perf_config_ext={0xe82, 0x722}, 0x106200, 0x10003, 0x20da, 0x9, 0x7, 0x20209, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x149a82, 0x0) lsetxattr(&(0x7f0000000080)='.\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="757365722eba2edacfc4bdf3427b65b63a00"], &(0x7f0000000140)='\x00', 0x1, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x40, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket(0x10, 0x803, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000280)={'veth0_to_team\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000004c0)={r5, r7, 0x25, 0x0, @void}, 0x10) write$cgroup_int(r4, &(0x7f0000000040)=0x7fff, 0x12) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f00000003c0)=0x7ff, 0x4) mmap$xdp(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x100000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="5c00000020000100000000000000000002"], 0x5c}}, 0x0) 46.945442567s ago: executing program 1 (id=8744): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) syz_io_uring_setup(0xa6a, &(0x7f00000007c0)={0x0, 0x9bc1, 0x8000, 0x400}, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpgrp(r0) setpgid(r3, r0) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x90404, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x2}, 0x1101, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$packet(0x11, 0x3, 0x300) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x11000) io_setup(0x3fc, &(0x7f0000000500)=0x0) io_submit(r7, 0x1, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, 0x0, 0x3be2b02884f95c63}]) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) mincore(&(0x7f0000000000/0x800000)=nil, 0x800000, &(0x7f0000000440)=""/173) syz_emit_ethernet(0x0, 0x0, 0x0) unshare(0x8040600) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) socket$pppl2tp(0x18, 0x1, 0x1) 44.093483324s ago: executing program 2 (id=8745): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x38}}, 0x10) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x483, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x1000, 0x2, 0x2, 0x80000011, 0xfffd, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r1, 0x0, 0xff2e) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_read_part_table(0x105f, &(0x7f0000001080)="$eJzsz7FtwkAYBeDnS2z5lCJVRoiyQTZJnRKJEhZwQ0XBHLAJkzCGEbLNCEDxfc09vSed9Ienarqs/99+ktQkw72e3/exSUoOm4/fNttVkm4aalLLd5LyeWlvRb+fhvNx+aOrS+qbccpD+uy+Ms59+Ts94EQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeHnXAAAA//8SNwwv") perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x20000000000002, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x45, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xff, 0x30000000000}, 0x12122, 0x10000, 0xfffffffe, 0x5, 0x8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = io_uring_setup(0x2f4, &(0x7f00000003c0)={0x0, 0xcb2c, 0x8, 0x0, 0x1000169}) close(r3) r4 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x2) read$qrtrtun(r4, 0x0, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x38, 0x3, 0x6, 0x0, 0x1ff, 0x1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_config_ext={0x5f, 0x200}, 0x6080, 0x9, 0xe6, 0x1, 0x0, 0x4a, 0x0, 0x0, 0x8, 0x0, 0x10}, 0x0, 0x10, r0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) mbind(&(0x7f00006d4000/0x2000)=nil, 0x2000, 0xc002, 0x0, 0x3, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x89f9b000) 41.252000381s ago: executing program 4 (id=8746): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x111, 0x5}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940), 0x2, 0x0) mmap(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x2, 0x12, r1, 0xe33f6000) writev(r1, &(0x7f0000000040), 0x0) syz_io_uring_setup(0x54b6, &(0x7f0000000140)={0x0, 0x64ee, 0x4, 0x80000001, 0x2a6}, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010000100000000001000000085ff00003b000000000000000000000008001c00c9000000e7fea8022bdf"], 0x28}], 0x1, 0x0, 0x0, 0xb305e06d8ab48277}, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="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"], 0x25, 0x359, &(0x7f0000000bc0)="$eJzs3T1onHUYAPDn+ia5JFiTQSg6nW6ClCbioFNCqVDMoJXDr8XDpn7kzkIOD+KQyy1KcVJcBJ3cOujYWRxE3BxcrSBVcbFbocFX3rv3vnJ3Jhkutvj7DeXh+f+f+z/vB33fhOSf15uxdXk2rty+fSvm5wsxs3Z+Le4UYjlORRIdezHWR3Pj8wDAPe5OmsZfacfhsz9Z7Eae/QBw/2o//9883U8Uj1F87YFptAQATNkRv/5/fmz26tTaAgCmaOT5/9jQ8IFv88/0fiYAALh/vfjKq8+tb0RcKpXmI2ofNsqNcjzTH1+/Em9HNTbjXCzFfkTnRaHztpD9++zFjQvnSpnflqOcVTTKEbVmo9x5U1hP2vXFWImlWM7r0159ktWvtOtLEbHXbK8ftUKjPBuL+fo/L8ZmrMZSPDRSH3Fx48JqKf+Acq1b34xoxXz3ILL+z8ZS/PhGXI1qXI6stt//7kqpdD7dGKpvXC+25wEAAAAAAAAAAAAAAAAAAAAAwDScLfUs9/a/SWvNxgeXDk7ojRfb+/t0hvP9gVqd/YHSYnd3nmvJwf2BhvfnaZRn4tR/euQAAAAAAAAAAAAAAAAAAABw76jvzEWlWt3cru+8vzUYNAcy737/1bcL0R2ayUvfSfpVkSeHPqc7ceCTk+gtkfbK02RoTh4kEd3Je5XrN3odD84p9o5ipDwLiiNDhbynSrV6+tFfPx9X9XcW7LUzSYycluGgkK8/MFR7MEvMR8T+pKrJweohc26maTqpfPezXqbbVj0KETNx7DaOEHx3662Hn6yfeaqd+Sbf9OHxJ5Zeuvnpl39sVarR6rRQrc5t1/fTSVcnvxZZJut1dK1k4P4p5Oe5MOZOGB+0+pnWdn2nkvz058uPfPzDgcnJ+PsnHcy8N3mtrw9m5jpBIWK5exL+rdXZMTf/+OC1u0Nn7LCqhaHMmS/WKjd2f/n9qFd54D8JG3UAAAAAAAAAAAAAAAAAAMCJ6P/S73Gqnn5heh0BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwMnr//3/gaA1kjlKcLcZo0PFze36xMUXTvRQAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4H/snAAD//82Fa84=") syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x903d01) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1f, 0x87010, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6f, 0x4, @perf_bp={0x0, 0xe}, 0x10c0e8, 0x0, 0x0, 0x3, 0x6, 0x7, 0x7fff, 0x0, 0xfffffffe, 0x0, 0x200000000}, 0x0, 0xff67bfffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x10, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x2a402b, &(0x7f0000000340)=ANY=[@ANYBLOB="6e72332c00aca095083a4728000000000000000000000000000000a5e4b28205b286e9c242defd0885b8434179166ab663dc8248d64a13865d6752e5455acbfd9f5cc973c2591edcf41203b684bdc670e1c3ca8110a96c34f03c718709e7149b0b775652d1e4fc524f289b6ccf0ea792ad607e158e0be2b97fb9a72d11ff2563caefc3e2a60cff7f0ee2670c3f5cd8099ee5e2eb1c438d50f2af691628816d9402ec13edc218511d6db5fdf3cdf90492b8aec48ab6"]) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000540)='.log\x00', 0x2000, 0x9c37611dc13d0db5) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x6, 0x0, 0x0, 0x0, 0xbb1e, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffe, 0x0, 0x2, 0x80000011, 0x6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000008c00000000000000"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) 40.599390044s ago: executing program 1 (id=8747): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x70}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) 39.768078377s ago: executing program 0 (id=8748): r0 = socket$nl_route(0x10, 0x3, 0x0) (async) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x12d0c2, 0x0) ioctl$TIOCCBRK(r1, 0x5428) (async) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newlink={0x2c, 0x10, 0x1, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x60938, 0x3}, [@IFLA_GROUP={0x8}, @IFLA_IFALIASn={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40801}, 0x0) 36.318106195s ago: executing program 1 (id=8749): ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfffffff0}}, './file0\x00'}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x24, r1, 0x5, 0x70bd2d, 0x25dfdffc, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_SURVEY(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00032dbd7000fddbdf253200000008000300", @ANYRES32=r3, @ANYBLOB="0c0099000e00000030000000"], 0x28}, 0x1, 0x0, 0x0, 0x40400c2}, 0x880) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[], 0x4, 0x1286, &(0x7f0000002440)="$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") mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) 34.158854326s ago: executing program 42 (id=8741): r0 = syz_clone(0x80050000, &(0x7f0000000040)="73a7ef139951d9eff533ed643c24411369777095c16c06ce2d1b65cf9a47dc97623621f1341f6b46a70cf54f277d242349d307047103eaa70fa687079a4b612634b459c32882a90a0a3e538b96d13add778464ccb0ea371710c8cce78a42e39ce1a1dd2195e5af89a89a72ebde31bb5854f453d52ab41fe710728fb309441c5c5f7a445e687b86c1f889862f0a42d664692b5733ac0d035943cf0fb74e1dff9ca7debf843855aa75635ec858d46369ba4c1743c23ddab4da2939ed46", 0xbc, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="be22c19380b51f43a1951b793b3550b8135112b9e44395e858a5b6226553b5a6538e9f71d2467471ea6634474e2c3500acec31176f02a8e73434d066352d1fc9ac0d9b04d82d670c337148100321") perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x8}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='map_files\x00') r2 = open(0x0, 0x141b42, 0x8) prlimit64(r0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_genetlink_get_family_id$tipc2(0x0, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f0000001940)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_bp={0x0, 0x3}, 0x80, 0x10000, 0x0, 0x8, 0x10, 0x9, 0x0, 0x0, 0x0, 0x0, 0x42d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x28083, 0x0) ioctl$XFS_IOC_AG_GEOMETRY(r8, 0xc080583d, 0x0) syz_clone(0xc1e2e7fc8415d4a9, 0x0, 0x52, 0x0, 0x0, 0x0) r9 = socket$kcm(0x2a, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000001f80)={&(0x7f0000001d00)=@qipcrtr={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0x80, 0x0, 0x0, 0x0, 0xf0}, 0x0) recvmsg(r9, 0x0, 0x40002182) fcntl$notify(r1, 0x402, 0x5) 33.677084531s ago: executing program 4 (id=8751): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000004000)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x11, 0x200000000000002, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet6(r2, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0x4e20, 0x2, @remote, 0x29}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)="8000e8beec9dbc13", 0x8}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="140000000000000029000000430000000102"], 0xffc5}, 0x4004000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r3) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}, 0x1, 0x0, 0x0, 0x44081}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) close(r5) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000005c0)=@gettfilter={0x4c, 0x2e, 0x800, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, r7, {0xe}, {0x4, 0xfff1}, {0x7, 0xb}}, [{0x8, 0xb, 0x3}, {0x8, 0xb, 0x6}, {0x8, 0xb, 0x10000002}, {0x8, 0xb, 0xfffffff4}, {0x8, 0xb, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4008841}, 0x20000051) ioctl$SIOCSIFHWADDR(r5, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x8003fffe, 0x208, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x1}, 0x8202, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x2, 0x0, 0x74}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x15}, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_GET(r10, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000091408002bbd7000fbdbdf25080001000000000008000100000000000800010002000000c34213c763260389f9ffffffffffffff453784695e825d2b8845137795dcab8ed0beb726f22c032ba733a93741c2c2ec147468ca0871647f6e241b60426c56bb7b03fbf24b05cbf82433db462e05fa5ea0a3b020649163b323c6239c4755ddaec0b64bf1afdbc63f8e4e637033499b1499e31c05eb183679dcefd5411c9c2829bdd40466d7be149a30d71e76b7dda00e06b0cf0098f74e7fd9317e6e1ea3efa36c56cde8ef433861f620731e4e12600b"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x11) write$sndseq(0xffffffffffffffff, 0x0, 0x0) r11 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r11, 0x9, 0x0) 32.597392697s ago: executing program 2 (id=8752): r0 = socket$inet6(0xa, 0x802, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0xe8034000, 0x0, 0xffffffffffffff30, 0x0, 0x0}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b80, 0x2, @perf_config_ext={0x7, 0x101}, 0x214, 0x0, 0x43a1bd76, 0x6, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) 28.699401058s ago: executing program 1 (id=8753): openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2241, 0x0) r1 = fsopen(&(0x7f00000001c0)='hugetlbfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x1, 0x7) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x8, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'pimreg\x00', 0x5005}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000180), 0x2000090, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 25.839943036s ago: executing program 2 (id=8754): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) 23.973283622s ago: executing program 43 (id=8748): r0 = socket$nl_route(0x10, 0x3, 0x0) (async) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x12d0c2, 0x0) ioctl$TIOCCBRK(r1, 0x5428) (async) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newlink={0x2c, 0x10, 0x1, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x60938, 0x3}, [@IFLA_GROUP={0x8}, @IFLA_IFALIASn={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40801}, 0x0) 21.273186801s ago: executing program 2 (id=8756): bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bc0900000000000035090100000000009500000000000000b7020000000000217b9af8ff00000000b5090b00000000007baaf0ff00000000bf87000000000000070800", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000cf4900000000000056080000000000008500000000000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) 18.21344156s ago: executing program 44 (id=8751): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000004000)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x11, 0x200000000000002, 0x300) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet6(r2, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0x4e20, 0x2, @remote, 0x29}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)="8000e8beec9dbc13", 0x8}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="140000000000000029000000430000000102"], 0xffc5}, 0x4004000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r3) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}, 0x1, 0x0, 0x0, 0x44081}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) close(r5) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000005c0)=@gettfilter={0x4c, 0x2e, 0x800, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, r7, {0xe}, {0x4, 0xfff1}, {0x7, 0xb}}, [{0x8, 0xb, 0x3}, {0x8, 0xb, 0x6}, {0x8, 0xb, 0x10000002}, {0x8, 0xb, 0xfffffff4}, {0x8, 0xb, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4008841}, 0x20000051) ioctl$SIOCSIFHWADDR(r5, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x8003fffe, 0x208, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x1}, 0x8202, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x2, 0x0, 0x74}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x15}, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_GET(r10, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000091408002bbd7000fbdbdf25080001000000000008000100000000000800010002000000c34213c763260389f9ffffffffffffff453784695e825d2b8845137795dcab8ed0beb726f22c032ba733a93741c2c2ec147468ca0871647f6e241b60426c56bb7b03fbf24b05cbf82433db462e05fa5ea0a3b020649163b323c6239c4755ddaec0b64bf1afdbc63f8e4e637033499b1499e31c05eb183679dcefd5411c9c2829bdd40466d7be149a30d71e76b7dda00e06b0cf0098f74e7fd9317e6e1ea3efa36c56cde8ef433861f620731e4e12600b"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x11) write$sndseq(0xffffffffffffffff, 0x0, 0x0) r11 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r11, 0x9, 0x0) 16.089760669s ago: executing program 2 (id=8758): socket$inet_tcp(0x2, 0x1, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(0xffffffffffffffff, 0xb, &(0x7f0000000000)=[@ioring_restriction_register_op], 0x1) io_uring_register$IORING_REGISTER_SYNC_CANCEL(0xffffffffffffffff, 0x25, 0x0, 0x1) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000240)='./file3\x00', 0x4002, &(0x7f0000000200)={[{@errors_remount}, {@bh}, {@grpquota}, {@stripe={'stripe', 0x3d, 0x1}}]}, 0x1, 0xbd2, &(0x7f0000000540)="$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") socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1}, 0x1000, 0x1, 0xffffff7e, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffdffffff, r0, 0xa) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newtfilter={0x44, 0x2c, 0xf3f, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xb, 0xfff3}, {}, {0x7, 0x300}}, [@filter_kind_options=@f_basic={{0xa}, {0x14, 0x2, [@TCA_BASIC_EMATCHES={0x10, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_LIST={0x4}]}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x20041090}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000080900010073797a30000000005c000000030a03000000000000000000050000000900010073797a30000000000900030073797a300000000008000c40000000032800048008000240000000120800014000000000140004"], 0xa4}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x84}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3003, 0x0, 0x0, 0x0, 0x9, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x8c0002) ioctl$USBDEVFS_RESETEP(r2, 0x80045503, 0x0) 12.543671172s ago: executing program 45 (id=8753): openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2241, 0x0) r1 = fsopen(&(0x7f00000001c0)='hugetlbfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x1, 0x7) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x8, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'pimreg\x00', 0x5005}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000180), 0x2000090, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 0s ago: executing program 46 (id=8758): socket$inet_tcp(0x2, 0x1, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(0xffffffffffffffff, 0xb, &(0x7f0000000000)=[@ioring_restriction_register_op], 0x1) io_uring_register$IORING_REGISTER_SYNC_CANCEL(0xffffffffffffffff, 0x25, 0x0, 0x1) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000240)='./file3\x00', 0x4002, &(0x7f0000000200)={[{@errors_remount}, {@bh}, {@grpquota}, {@stripe={'stripe', 0x3d, 0x1}}]}, 0x1, 0xbd2, &(0x7f0000000540)="$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") socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1}, 0x1000, 0x1, 0xffffff7e, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffdffffff, r0, 0xa) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newtfilter={0x44, 0x2c, 0xf3f, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xb, 0xfff3}, {}, {0x7, 0x300}}, [@filter_kind_options=@f_basic={{0xa}, {0x14, 0x2, [@TCA_BASIC_EMATCHES={0x10, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_LIST={0x4}]}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x20041090}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000080900010073797a30000000005c000000030a03000000000000000000050000000900010073797a30000000000900030073797a300000000008000c40000000032800048008000240000000120800014000000000140004"], 0xa4}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x84}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3003, 0x0, 0x0, 0x0, 0x9, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x8c0002) ioctl$USBDEVFS_RESETEP(r2, 0x80045503, 0x0) kernel console output (not intermixed with test programs): 46 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1880.732552][ T28] audit: type=1400 audit(47711.211:138851): avc: denied { unmount } for pid=10840 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 1881.000069][ T4624] netdevsim netdevsim0 netdevsim1 (unregistering): left allmulticast mode [ 1881.035392][ T28] audit: type=1400 audit(47711.271:138852): avc: denied { read write } for pid=10840 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1881.252663][ T4624] netdevsim netdevsim0 netdevsim1 (unregistering): left promiscuous mode [ 1881.309290][ T4624] bridge0: port 3(netdevsim1) entered disabled state [ 1881.391603][ T28] audit: type=1400 audit(47711.271:138853): avc: denied { open } for pid=10840 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1881.512921][T10840] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1881.523487][T15264] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1881.530217][ T28] audit: type=1400 audit(47711.271:138854): avc: denied { ioctl } for pid=10840 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=102 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1881.570809][T10840] audit: audit_lost=3191 audit_rate_limit=0 audit_backlog_limit=64 [ 1881.583187][T15264] audit: audit_lost=3192 audit_rate_limit=0 audit_backlog_limit=64 [ 1881.772653][T15266] loop3: detected capacity change from 0 to 128 [ 1881.795916][ T4624] hsr0: left allmulticast mode [ 1881.830802][ T4624] hsr_slave_0: left allmulticast mode [ 1881.881931][ T4624] hsr_slave_1: left allmulticast mode [ 1882.079198][ T4624] hsr0: left promiscuous mode [ 1882.096306][T15285] loop2: detected capacity change from 0 to 512 [ 1882.108782][ T4624] bridge0: port 4(hsr0) entered disabled state [ 1882.167615][T15285] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1882.210999][ T4624] bridge_slave_1: left allmulticast mode [ 1882.244706][ T4624] bridge_slave_1: left promiscuous mode [ 1882.284654][ T4624] bridge0: port 2(bridge_slave_1) entered disabled state [ 1882.562686][ T4624] bridge_slave_0: left allmulticast mode [ 1882.583547][T10840] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1882.598639][ T4624] bridge_slave_0: left promiscuous mode [ 1882.636048][ T4624] bridge0: port 1(bridge_slave_0) entered disabled state [ 1884.061964][ T6545] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1884.800007][T15307] loop4: detected capacity change from 0 to 164 [ 1885.102393][T15307] iso9660: Bad value for 'check' [ 1885.247918][ T28] kauditd_printk_skb: 269 callbacks suppressed [ 1885.247934][ T28] audit: type=1400 audit(47716.231:139065): avc: denied { perfmon } for pid=15313 comm="syz.1.8617" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1885.321666][T15310] loop2: detected capacity change from 0 to 128 [ 1885.422795][ T28] audit: type=1400 audit(47716.261:139066): avc: denied { kernel } for pid=15313 comm="syz.1.8617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1885.534391][ T28] audit: type=1400 audit(47716.271:139067): avc: denied { perfmon } for pid=15313 comm="syz.1.8617" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1885.636249][ T28] audit: type=1400 audit(47716.281:139068): avc: denied { write } for pid=15313 comm="syz.1.8617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1885.704330][ T28] audit: type=1400 audit(47716.301:139069): avc: denied { read write } for pid=15309 comm="syz.2.8616" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1885.790587][ T28] audit: type=1400 audit(47716.301:139070): avc: denied { read write open } for pid=15309 comm="syz.2.8616" path="/dev/loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1885.847513][ T28] audit: type=1400 audit(47716.301:139071): avc: denied { ioctl } for pid=15309 comm="syz.2.8616" path="/dev/loop2" dev="devtmpfs" ino=102 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1885.895852][T15328] netlink: 16410 bytes leftover after parsing attributes in process `syz.3.8619'. [ 1885.936745][ T28] audit: type=1400 audit(47716.321:139072): avc: denied { create } for pid=15313 comm="syz.1.8617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1885.987679][ T28] audit: type=1400 audit(47716.351:139073): avc: denied { create } for pid=15313 comm="syz.1.8617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1886.037730][ T28] audit: type=1400 audit(47716.351:139074): avc: denied { read write } for pid=32579 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1888.586298][T15336] loop1: detected capacity change from 0 to 1024 [ 1888.715103][T15336] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1888.865424][ T4624] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1888.941455][ T4624] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1889.000364][ T4624] bond0 (unregistering): Released all slaves [ 1889.041078][T12415] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1889.094058][ T4624] bond1 (unregistering): Released all slaves [ 1889.248597][ T4624] bond2 (unregistering): Released all slaves [ 1889.274640][ T4624] bond3 (unregistering): Released all slaves [ 1889.299041][ T4624] bond4 (unregistering): Released all slaves [ 1889.340067][ T4624] bond5 (unregistering): Released all slaves [ 1889.416971][ T4624] bond6 (unregistering): Released all slaves [ 1889.493799][ T4624] bond7 (unregistering): Released all slaves [ 1889.665801][ T4624] bond8 (unregistering): Released all slaves [ 1889.729181][ T4624] bond9 (unregistering): Released all slaves [ 1889.799008][ T4624] bond10 (unregistering): Released all slaves [ 1889.922467][ T4624] bond11 (unregistering): (slave lo): Releasing backup interface [ 1890.116036][ T4624] bond11 (unregistering): (slave lo): last VLAN challenged slave left bond - VLAN blocking is removed [ 1890.217935][ T4624] bond11 (unregistering): Released all slaves [ 1890.291090][ T28] kauditd_printk_skb: 211 callbacks suppressed [ 1890.291107][ T28] audit: type=1400 audit(47721.271:139286): avc: denied { create } for pid=15360 comm="syz.1.8627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1890.374171][ T28] audit: type=1400 audit(47721.341:139287): avc: denied { create } for pid=15360 comm="syz.1.8627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1890.394597][ T28] audit: type=1400 audit(47721.351:139288): avc: denied { sys_module } for pid=15348 comm="syz.3.8626" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1890.417453][ T28] audit: type=1400 audit(47721.351:139289): avc: denied { recv } for pid=6586 comm="udevd" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1890.586042][ T28] audit: type=1400 audit(47721.351:139290): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1890.765459][ T28] audit: type=1400 audit(47721.351:139291): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1890.928668][ T4624] hsr_slave_0: left promiscuous mode [ 1890.965616][ T28] audit: type=1400 audit(47721.361:139292): avc: denied { module_request } for pid=15251 comm="syz-executor" kmod="netdev-rose0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1891.026995][ T4624] hsr_slave_1: left promiscuous mode [ 1891.148677][ T28] audit: type=1400 audit(47721.431:139293): avc: denied { module_request } for pid=15348 comm="syz.3.8626" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1891.198207][T15385] loop1: detected capacity change from 0 to 256 [ 1891.251006][T15385] FAT-fs (loop1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 1891.283481][ T28] audit: type=1400 audit(47721.441:139294): avc: denied { read write } for pid=10840 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1891.366864][T15385] FAT-fs (loop1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 1891.426648][T10840] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1891.460508][ T4624] team0 (unregistering): Port device team_slave_1 removed [ 1891.551046][ T4624] team0 (unregistering): Port device team_slave_0 removed [ 1891.916922][T15403] netlink: 20 bytes leftover after parsing attributes in process `syz.3.8634'. [ 1892.421193][T15251] wg1 speed is unknown, defaulting to 1000 [ 1892.793351][T15419] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8635'. [ 1893.394178][T15251] chnl_net:caif_netlink_parms(): no params data found [ 1894.197262][T15541] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15541 comm=syz.2.8640 [ 1894.335397][T15541] netlink: 44 bytes leftover after parsing attributes in process `syz.2.8640'. [ 1894.647614][T15251] bridge0: port 1(bridge_slave_0) entered blocking state [ 1894.705443][T15251] bridge0: port 1(bridge_slave_0) entered disabled state [ 1894.762240][T15251] bridge_slave_0: entered allmulticast mode [ 1894.830866][T15251] bridge_slave_0: entered promiscuous mode [ 1895.131422][T15251] bridge0: port 2(bridge_slave_1) entered blocking state [ 1895.193038][T15251] bridge0: port 2(bridge_slave_1) entered disabled state [ 1895.266430][T15251] bridge_slave_1: entered allmulticast mode [ 1895.294861][ T28] kauditd_printk_skb: 776 callbacks suppressed [ 1895.294878][ T28] audit: type=1400 audit(47726.281:140060): avc: denied { ioctl } for pid=15572 comm="syz.2.8644" path="/dev/loop2" dev="devtmpfs" ino=102 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1895.335887][T15576] loop2: detected capacity change from 0 to 512 [ 1895.363671][T15251] bridge_slave_1: entered promiscuous mode [ 1895.452841][T15576] FAT-fs (loop2): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 1895.507210][ T28] audit: type=1400 audit(47726.401:140061): avc: denied { search } for pid=15579 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1895.631643][ T28] audit: type=1400 audit(47726.401:140062): avc: denied { read } for pid=15579 comm="cmp" name="resolv.conf" dev="tmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1895.690944][T15586] loop3: detected capacity change from 0 to 1024 [ 1895.754101][T15586] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1895.802214][ T28] audit: type=1400 audit(47726.401:140063): avc: denied { read open } for pid=15579 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1895.845168][T15586] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (42152!=20869) [ 1895.908562][T15586] EXT4-fs (loop3): stripe (2) is not aligned with cluster size (16), stripe is disabled [ 1895.982824][T15586] EXT4-fs error (device loop3): ext4_get_journal_inode:5896: inode #5: comm syz.3.8647: unexpected bad inode w/o EXT4_IGET_BAD [ 1895.998960][ T28] audit: type=1400 audit(47726.401:140064): avc: denied { mounton } for pid=15572 comm="syz.2.8644" path=2F3134302F2E02 dev="tmpfs" ino=750 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1896.097674][T15586] loop3: lost file I/O error report for ino 5 type 5 pos 0x0 len 0x0 error -117 [ 1896.097809][T15586] EXT4-fs (loop3): no journal found [ 1896.107026][ C0] EXT4-fs (loop3): error count since last fsck: 1 [ 1896.107042][ C0] EXT4-fs (loop3): initial error at time 47727: ext4_get_journal_inode:5896: inode 5 [ 1896.107071][ C0] EXT4-fs (loop3): last error at time 47727: ext4_get_journal_inode:5896: inode 5 [ 1896.188718][ T28] audit: type=1400 audit(47726.411:140065): avc: denied { search } for pid=15579 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1896.275193][ T3048] 8021q: adding VLAN 0 to HW filter on device eth13 [ 1896.295806][ T28] audit: type=1400 audit(47726.411:140066): avc: denied { search } for pid=15579 comm="cmp" name="dhcpcd" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1896.353721][T15586] EXT4-fs (loop3): can't get journal size [ 1896.422967][ T28] audit: type=1400 audit(47726.411:140067): avc: denied { search } for pid=15579 comm="cmp" name="hook-state" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1896.432007][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1896.451486][ C1] audit: audit_lost=3216 audit_rate_limit=0 audit_backlog_limit=64 [ 1896.478165][T15251] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1896.494561][T15251] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1896.531388][T15586] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 1896.538306][T15251] team0: Port device team_slave_0 added [ 1896.611658][T15251] team0: Port device team_slave_1 added [ 1896.875030][T15251] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1896.938050][T15251] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1896.987103][T32579] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1897.148271][T15251] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1897.255526][T15251] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1897.281560][T15657] loop2: detected capacity change from 0 to 1024 [ 1897.308384][T15251] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1897.368541][T15657] EXT4-fs: Ignoring removed bh option [ 1897.399169][T15657] EXT4-fs: inline encryption not supported [ 1897.434331][T15658] ALSA: seq fatal error: cannot create timer (-19) [ 1897.449334][T15657] EXT4-fs (loop2): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 1897.487279][T15251] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1897.559025][T15657] EXT4-fs error (device loop2): ext4_map_blocks:791: inode #3: block 2: comm syz.2.8649: lblock 2 mapped to illegal pblock 2 (length 1) [ 1897.667771][T15657] loop2: lost file I/O error report for ino 3 type 5 pos 0x0 len 0x0 error -117 [ 1897.670475][T15657] EXT4-fs error (device loop2): __ext4_get_inode_loc:4885: comm syz.2.8649: Invalid inode table block 1 in block_group 0 [ 1897.679611][ C0] EXT4-fs (loop2): error count since last fsck: 1 [ 1897.679632][ C0] EXT4-fs (loop2): initial error at time 47728: ext4_map_blocks:791: inode 3: block 2 [ 1897.679685][ C0] EXT4-fs (loop2): last error at time 47728: ext4_map_blocks:791: inode 3: block 2 [ 1897.784979][T15657] loop2: lost filesystem error report for type 5 error -117 [ 1897.788615][T15657] EXT4-fs error (device loop2) in ext4_reserve_inode_write:6383: Corrupt filesystem [ 1897.838541][T15251] hsr_slave_0: entered promiscuous mode [ 1897.887084][T15251] hsr_slave_1: entered promiscuous mode [ 1897.934303][T15251] debugfs: 'hsr0' already exists in 'hsr' [ 1897.977587][T15251] Cannot create hsr debugfs directory [ 1898.005427][T15657] loop2: lost filesystem error report for type 5 error -117 [ 1898.005659][T15657] EXT4-fs error (device loop2): __ext4_ext_dirty:207: inode #3: comm syz.2.8649: mark_inode_dirty error [ 1898.157138][T15704] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8653'. [ 1898.173029][T15657] loop2: lost file I/O error report for ino 3 type 5 pos 0x0 len 0x0 error -117 [ 1898.175544][T15657] EXT4-fs error (device loop2): ext4_acquire_dquot:7034: comm syz.2.8649: Failed to acquire dquot type 0 [ 1898.225834][T15699] nfs4: Unknown parameter 'sys/power/pm_trace' [ 1898.232282][T15704] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8653'. [ 1898.282248][T15657] loop2: lost filesystem error report for type 5 error -117 [ 1898.282462][T15657] EXT4-fs error (device loop2) in ext4_reserve_inode_write:6383: Corrupt filesystem [ 1898.381955][T15657] loop2: lost filesystem error report for type 5 error -117 [ 1898.382132][T15657] EXT4-fs error (device loop2): ext4_evict_inode:267: inode #11: comm syz.2.8649: mark_inode_dirty error [ 1898.495569][T15657] loop2: lost file I/O error report for ino 11 type 5 pos 0x0 len 0x0 error -117 [ 1898.496869][T15657] EXT4-fs warning (device loop2): ext4_evict_inode:270: couldn't mark inode dirty (err -117) [ 1898.544946][T15657] EXT4-fs (loop2): 1 orphan inode deleted [ 1898.562554][ T6184] EXT4-fs error (device loop2): ext4_map_blocks:791: inode #3: block 1: comm kworker/u8:8: lblock 1 mapped to illegal pblock 1 (length 1) [ 1898.618686][T15657] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1898.642665][ T6184] loop2: lost file I/O error report for ino 3 type 5 pos 0x0 len 0x0 error -117 [ 1898.643465][ T6184] EXT4-fs error (device loop2): ext4_release_dquot:7070: comm kworker/u8:8: Failed to release dquot type 0 [ 1898.752919][ T6184] loop2: lost filesystem error report for type 5 error -117 [ 1898.839614][T15657] EXT4-fs error (device loop2): ext4_map_blocks:791: inode #2: block 16: comm syz.2.8649: lblock 0 mapped to illegal pblock 16 (length 1) [ 1898.881483][T15772] EXT4-fs error (device loop2): ext4_map_blocks:791: inode #2: block 16: comm syz.2.8649: lblock 0 mapped to illegal pblock 16 (length 1) [ 1899.569212][T15251] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1899.623454][T15251] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 1899.696088][T15251] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1899.717391][T10840] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1899.772944][T10840] EXT4-fs error (device loop2): __ext4_get_inode_loc:4885: comm syz-executor: Invalid inode table block 1 in block_group 0 [ 1899.821367][T15251] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 1899.851782][T10840] loop2: lost filesystem error report for type 5 error -117 [ 1899.851932][T10840] EXT4-fs error (device loop2) in ext4_reserve_inode_write:6383: Corrupt filesystem [ 1899.906044][T15251] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1899.965838][T15251] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 1899.965845][T10840] loop2: lost filesystem error report for type 5 error -117 [ 1899.985753][T10840] EXT4-fs error (device loop2): ext4_quota_off:7318: inode #3: comm syz-executor: mark_inode_dirty error [ 1900.040886][T15251] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1900.104867][T10840] loop2: lost file I/O error report for ino 3 type 5 pos 0x0 len 0x0 error -117 [ 1900.116640][T15251] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 1900.307728][ T28] kauditd_printk_skb: 713 callbacks suppressed [ 1900.307743][ T28] audit: type=1400 audit(47731.291:140774): avc: denied { read } for pid=15251 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1900.464736][ T28] audit: type=1400 audit(47731.301:140775): avc: denied { prog_load } for pid=15821 comm="syz.4.8659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1900.573786][ T28] audit: type=1400 audit(47731.321:140776): avc: denied { bpf } for pid=15821 comm="syz.4.8659" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1900.689361][ T28] audit: type=1400 audit(47731.321:140777): avc: denied { open } for pid=15821 comm="syz.4.8659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1900.803724][ T28] audit: type=1400 audit(47731.331:140778): avc: denied { perfmon } for pid=15821 comm="syz.4.8659" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1900.932299][ T28] audit: type=1400 audit(47731.331:140779): avc: denied { kernel } for pid=15821 comm="syz.4.8659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1901.007452][T15836] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8661'. [ 1901.026111][ T28] audit: type=1400 audit(47731.341:140780): avc: denied { perfmon } for pid=15821 comm="syz.4.8659" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1901.073777][T15836] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8661'. [ 1901.134271][ T28] audit: type=1400 audit(47731.371:140781): avc: denied { prog_load } for pid=15821 comm="syz.4.8659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1901.208493][T15251] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1901.222474][T15698] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1901.239773][ T6545] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1901.560745][T15251] 8021q: adding VLAN 0 to HW filter on device team0 [ 1901.594339][T15844] loop4: detected capacity change from 0 to 256 [ 1901.628913][T15844] FAT-fs (loop4): Directory bread(block 64) failed [ 1901.659371][T15844] FAT-fs (loop4): Directory bread(block 65) failed [ 1901.694820][T15844] FAT-fs (loop4): Directory bread(block 66) failed [ 1901.724923][T15844] FAT-fs (loop4): Directory bread(block 67) failed [ 1901.747809][T15844] FAT-fs (loop4): Directory bread(block 68) failed [ 1901.770867][T15844] FAT-fs (loop4): Directory bread(block 69) failed [ 1901.801023][T15844] FAT-fs (loop4): Directory bread(block 70) failed [ 1901.823854][T15844] FAT-fs (loop4): Directory bread(block 71) failed [ 1901.844827][T15844] FAT-fs (loop4): Directory bread(block 72) failed [ 1901.869810][T15844] FAT-fs (loop4): Directory bread(block 73) failed [ 1902.163949][ T4624] bridge0: port 1(bridge_slave_0) entered blocking state [ 1902.171098][ T4624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1902.334162][T26688] bridge0: port 2(bridge_slave_1) entered blocking state [ 1902.341355][T26688] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1903.410055][T15867] loop3: detected capacity change from 0 to 512 [ 1903.502637][T15867] ext4: Unknown parameter 'nobloc' [ 1904.580436][T15898] loop2: detected capacity change from 0 to 512 [ 1904.803738][T15898] EXT4-fs error (device loop2): ext4_free_inode:354: comm syz.2.8671: bit already cleared for inode 11 [ 1904.957020][T15898] loop2: lost filesystem error report for type 5 error -117 [ 1904.957513][T15898] EXT4-fs error (device loop2) in ext4_free_inode:361: Corrupt filesystem [ 1904.964958][ C0] EXT4-fs (loop2): error count since last fsck: 1 [ 1904.964975][ C0] EXT4-fs (loop2): initial error at time 47735: ext4_free_inode:354 [ 1904.964994][ C0] EXT4-fs (loop2): last error at time 47735: ext4_free_inode:354 [ 1905.123560][T15898] loop2: lost filesystem error report for type 5 error -117 [ 1905.126584][T15898] EXT4-fs error (device loop2) in ext4_free_inode:361: Corrupt filesystem [ 1905.236992][T15898] loop2: lost filesystem error report for type 5 error -117 [ 1905.237223][T15898] EXT4-fs (loop2): 1 orphan inode deleted [ 1905.343572][T15898] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1905.360779][ T28] kauditd_printk_skb: 1005 callbacks suppressed [ 1905.360799][ T28] audit: type=1400 audit(47736.341:141771): avc: denied { write } for pid=15859 comm="syz.3.8664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1905.449990][ T28] audit: type=1400 audit(47736.391:141772): avc: denied { search } for pid=15914 comm="sed" name="resolv.conf" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1905.600481][ T28] audit: type=1400 audit(47736.391:141773): avc: denied { read } for pid=15914 comm="sed" name="eth0.dhcp" dev="tmpfs" ino=516 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1905.644499][T15921] loop1: detected capacity change from 0 to 256 [ 1905.668786][ T28] audit: type=1400 audit(47736.391:141774): avc: denied { mount } for pid=15894 comm="syz.2.8671" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1905.755171][T15921] FAT-fs (loop1): Directory bread(block 64) failed [ 1905.783694][T15921] FAT-fs (loop1): Directory bread(block 65) failed [ 1905.802237][ T28] audit: type=1400 audit(47736.391:141776): avc: denied { read open } for pid=15914 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=516 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1905.843517][T15921] FAT-fs (loop1): Directory bread(block 66) failed [ 1905.882375][T15921] FAT-fs (loop1): Directory bread(block 67) failed [ 1905.905173][T10840] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1905.916442][T15921] FAT-fs (loop1): Directory bread(block 68) failed [ 1905.941159][T15921] FAT-fs (loop1): Directory bread(block 69) failed [ 1905.961386][ T28] audit: type=1400 audit(47736.391:141777): avc: denied { getattr } for pid=15914 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=516 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1906.000891][T15921] FAT-fs (loop1): Directory bread(block 70) failed [ 1906.015974][T15869] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1906.017258][T15921] FAT-fs (loop1): Directory bread(block 71) failed [ 1906.022669][T15869] audit: audit_lost=3224 audit_rate_limit=0 audit_backlog_limit=64 [ 1906.022688][T15869] audit: backlog limit exceeded [ 1906.022706][T15869] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1906.141157][T15921] FAT-fs (loop1): Directory bread(block 72) failed [ 1906.186092][T15921] FAT-fs (loop1): Directory bread(block 73) failed [ 1906.435587][T15251] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1907.301001][T15948] loop4: detected capacity change from 0 to 128 [ 1908.428011][T15251] veth0_vlan: entered promiscuous mode [ 1908.599418][T15251] veth1_vlan: entered promiscuous mode [ 1908.973592][T15251] veth0_macvtap: entered promiscuous mode [ 1909.081393][T15251] veth1_macvtap: entered promiscuous mode [ 1909.144967][T15975] 9pnet_fd: Insufficient options for proto=fd [ 1909.475679][T15251] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1909.958190][T15993] tipc: Started in network mode [ 1909.984719][T15993] tipc: Node identity b2ad8277b387, cluster identity 4711 [ 1910.047767][T15993] tipc: Enabled bearer , priority 0 [ 1910.154004][T15251] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1910.185246][T15990] tipc: Resetting bearer [ 1910.270374][ T6170] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1910.304349][ T6170] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1910.354324][ T6170] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1910.382390][T15996] syzkaller0: entered promiscuous mode [ 1910.391913][ T28] kauditd_printk_skb: 1384 callbacks suppressed [ 1910.391931][ T28] audit: type=1400 audit(47741.371:143111): avc: denied { search } for pid=16003 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1910.444529][T15996] syzkaller0: entered allmulticast mode [ 1910.467292][ T6170] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1910.486506][T15984] tipc: Resetting bearer [ 1910.496781][ T28] audit: type=1400 audit(47741.371:143112): avc: denied { search } for pid=16003 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1910.545673][T15984] tipc: Disabling bearer [ 1910.562158][ T28] audit: type=1400 audit(47741.371:143113): avc: denied { search } for pid=16003 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1910.630337][ T28] audit: type=1400 audit(47741.371:143114): avc: denied { search } for pid=16003 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1910.750573][ T28] audit: type=1400 audit(47741.701:143115): avc: denied { search } for pid=16004 comm="sed" name="resolv.conf" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1910.865632][ T28] audit: type=1400 audit(47741.701:143116): avc: denied { read } for pid=16004 comm="sed" name="eth0.dhcp" dev="tmpfs" ino=516 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1911.022646][ T28] audit: type=1400 audit(47741.711:143117): avc: denied { read open } for pid=16004 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=516 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1911.206710][ T28] audit: type=1400 audit(47741.711:143118): avc: denied { recv } for pid=15987 comm="syz.3.8686" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1911.300608][T16019] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1911.315106][T16020] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1911.361811][T16021] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8688'. [ 1911.958173][T16023] loop3: detected capacity change from 0 to 512 [ 1911.999034][T16023] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 1912.050994][T16023] EXT4-fs (loop3): couldn't mount as ext2 due to feature incompatibilities [ 1913.348119][T16061] loop3: detected capacity change from 0 to 128 [ 1914.187972][T16066] bridge_slave_0: left allmulticast mode [ 1914.284983][T16066] bridge_slave_0: left promiscuous mode [ 1915.288273][T16066] bridge0: port 1(bridge_slave_0) entered disabled state [ 1915.923359][ T28] kauditd_printk_skb: 514 callbacks suppressed [ 1915.923377][ T28] audit: type=1400 audit(47746.441:143587): avc: denied { recv } for pid=16056 comm="syz.4.8696" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1916.062969][T16066] bridge_slave_1: left allmulticast mode [ 1916.107443][T16066] bridge_slave_1: left promiscuous mode [ 1916.122736][ T28] audit: type=1400 audit(47746.921:143588): avc: denied { recv } for pid=4624 comm="kworker/u8:0" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1916.202181][T16066] bridge0: port 2(bridge_slave_1) entered disabled state [ 1916.270295][ T28] audit: type=1400 audit(47746.921:143589): avc: denied { recv } for pid=6184 comm="kworker/u8:8" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1916.346988][T16066] bond0: (slave bond_slave_0): Releasing backup interface [ 1916.418803][T16066] bond0: (slave bond_slave_1): Releasing backup interface [ 1916.453947][ T28] audit: type=1400 audit(47746.921:143590): avc: denied { recv } for pid=6184 comm="kworker/u8:8" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1916.534844][T16066] team0: Port device team_slave_0 removed [ 1916.549184][ T28] audit: type=1400 audit(47746.921:143591): avc: denied { recv } for pid=6184 comm="kworker/u8:8" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1916.583569][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1916.590154][ C0] audit: audit_lost=3258 audit_rate_limit=0 audit_backlog_limit=64 [ 1916.598128][ C0] audit: backlog limit exceeded [ 1916.609975][T16088] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1916.625770][T16088] audit: audit_lost=3259 audit_rate_limit=0 audit_backlog_limit=64 [ 1916.764559][T16066] team0: Port device team_slave_1 removed [ 1916.776154][T16066] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1916.817070][T16066] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1916.850273][T16066] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1916.881579][T16066] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1916.921348][T16066] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 1916.966950][ T3551] wg1 speed is unknown, defaulting to 1000 [ 1916.978169][T16074] team0: Mode changed to "loadbalance" [ 1917.211226][T16077] wg1 speed is unknown, defaulting to 1000 [ 1919.042419][T16108] 9p: Bad value for 'source' [ 1920.150207][T16123] loop1: detected capacity change from 0 to 512 [ 1920.308876][T16123] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 1920.520024][T16123] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1920.960095][ T28] kauditd_printk_skb: 259 callbacks suppressed [ 1920.960114][ T28] audit: type=1400 audit(47751.941:143847): avc: denied { recv } for pid=16103 comm="syz.0.8704" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1921.149459][ T28] audit: type=1400 audit(47752.021:143848): avc: denied { read write } for pid=16119 comm="syz.1.8707" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1921.295331][T16123] EXT4-fs error (device loop1): ext4_lookup:1785: inode #12: comm syz.1.8707: iget: bad i_size value: 2533274857506816 [ 1921.325909][ T28] audit: type=1400 audit(47752.021:143850): avc: denied { create } for pid=16136 comm="syz.3.8710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1921.386359][T16123] EXT4-fs error (device loop1): ext4_lookup:1785: inode #12: comm syz.1.8707: iget: bad i_size value: 2533274857506816 [ 1921.426111][ T28] audit: type=1400 audit(47752.021:143851): avc: denied { create } for pid=16136 comm="syz.3.8710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1921.513548][ T28] audit: type=1400 audit(47752.021:143849): avc: denied { read write open } for pid=16119 comm="syz.1.8707" path="/dev/loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1921.573894][T12415] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1921.626364][ T28] audit: type=1400 audit(47752.031:143852): avc: denied { recv } for pid=16103 comm="syz.0.8704" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1921.748442][ T28] audit: type=1400 audit(47752.031:143853): avc: denied { recv } for pid=16103 comm="syz.0.8704" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1921.847272][ T28] audit: type=1400 audit(47752.041:143854): avc: denied { read } for pid=16136 comm="syz.3.8710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1921.905898][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1921.909691][T16148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1923.108993][T16174] loop2: detected capacity change from 0 to 128 [ 1923.486368][T16170] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16170 comm=syz.1.8712 [ 1923.631004][T16180] loop3: detected capacity change from 0 to 1024 [ 1925.091694][T16198] loop0: detected capacity change from 0 to 512 [ 1925.125185][T16198] EXT4-fs: Mount option(s) incompatible with ext3 [ 1925.973743][ T28] kauditd_printk_skb: 3172 callbacks suppressed [ 1925.973762][ T28] audit: type=1400 audit(47756.961:147005): avc: denied { prog_load } for pid=16208 comm="syz.1.8725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1926.140451][ T28] audit: type=1400 audit(47756.981:147006): avc: denied { bpf } for pid=16208 comm="syz.1.8725" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1926.265571][ T28] audit: type=1400 audit(47756.991:147007): avc: denied { prog_load } for pid=16208 comm="syz.1.8725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1926.361086][T16218] loop4: detected capacity change from 0 to 1024 [ 1926.374951][ T28] audit: type=1400 audit(47757.001:147008): avc: denied { perfmon } for pid=16208 comm="syz.1.8725" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1926.425848][T16218] EXT4-fs (loop4): stripe (4) is not aligned with cluster size (4096), stripe is disabled [ 1926.486604][T16218] EXT4-fs error (device loop4): ext4_map_blocks:791: inode #3: block 2: comm syz.4.8727: lblock 2 mapped to illegal pblock 2 (length 1) [ 1926.504241][ T28] audit: type=1400 audit(47757.011:147009): avc: denied { perfmon } for pid=16208 comm="syz.1.8725" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1926.527692][ T28] audit: type=1400 audit(47757.011:147010): avc: denied { perfmon } for pid=16208 comm="syz.1.8725" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1926.533756][T16218] loop4: lost file I/O error report for ino 3 type 5 pos 0x0 len 0x0 error -117 [ 1926.550062][ T28] audit: type=1400 audit(47757.021:147011): avc: denied { perfmon } for pid=16208 comm="syz.1.8725" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1926.582742][ T28] audit: type=1400 audit(47757.031:147012): avc: denied { bpf } for pid=16208 comm="syz.1.8725" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1926.605873][ T28] audit: type=1400 audit(47757.041:147013): avc: denied { bpf } for pid=16208 comm="syz.1.8725" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1926.641505][ C0] EXT4-fs (loop4): error count since last fsck: 1 [ 1926.648208][ C0] EXT4-fs (loop4): initial error at time 47757: ext4_map_blocks:791: inode 3: block 2 [ 1926.657860][ C0] EXT4-fs (loop4): last error at time 47757: ext4_map_blocks:791: inode 3: block 2 [ 1926.680017][T16218] Quota error (device loop4): qtree_write_dquot: dquota write failed [ 1926.705737][T16218] EXT4-fs error (device loop4): ext4_map_blocks:791: inode #3: block 48: comm syz.4.8727: lblock 0 mapped to illegal pblock 48 (length 1) [ 1926.746403][T16218] loop4: lost file I/O error report for ino 3 type 5 pos 0x0 len 0x0 error -117 [ 1926.746610][T16218] EXT4-fs error (device loop4): ext4_acquire_dquot:7034: comm syz.4.8727: Failed to acquire dquot type 0 [ 1926.850120][T16218] loop4: lost filesystem error report for type 5 error -117 [ 1926.851269][T16218] EXT4-fs error (device loop4) in ext4_reserve_inode_write:6383: Corrupt filesystem [ 1926.873525][T16218] loop4: lost filesystem error report for type 5 error -117 [ 1926.873737][T16218] EXT4-fs error (device loop4): ext4_evict_inode:267: inode #11: comm syz.4.8727: mark_inode_dirty error [ 1926.894646][T16218] loop4: lost file I/O error report for ino 11 type 5 pos 0x0 len 0x0 error -117 [ 1926.894847][T16218] EXT4-fs warning (device loop4): ext4_evict_inode:270: couldn't mark inode dirty (err -117) [ 1926.920579][T16218] EXT4-fs (loop4): 1 orphan inode deleted [ 1926.927883][T16218] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1926.940945][ T6170] EXT4-fs error (device loop4): ext4_map_blocks:791: inode #3: block 1: comm kworker/u8:1: lblock 1 mapped to illegal pblock 1 (length 1) [ 1926.990112][ T6170] loop4: lost file I/O error report for ino 3 type 5 pos 0x0 len 0x0 error -117 [ 1926.990238][ T6170] EXT4-fs error (device loop4): ext4_release_dquot:7070: comm kworker/u8:1: Failed to release dquot type 0 [ 1929.113982][ T6545] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1929.243935][ T6545] EXT4-fs error (device loop4): __ext4_get_inode_loc:4885: comm syz-executor: Invalid inode table block 1 in block_group 0 [ 1929.366423][ T6545] loop4: lost filesystem error report for type 5 error -117 [ 1929.431893][ T6545] EXT4-fs error (device loop4) in ext4_reserve_inode_write:6383: Corrupt filesystem [ 1929.627399][ T6545] loop4: lost filesystem error report for type 5 error -117 [ 1929.632490][ T6545] EXT4-fs error (device loop4): ext4_quota_off:7318: inode #3: comm syz-executor: mark_inode_dirty error [ 1929.863553][ T6545] loop4: lost file I/O error report for ino 3 type 5 pos 0x0 len 0x0 error -117 [ 1931.479067][ T28] kauditd_printk_skb: 156 callbacks suppressed [ 1931.479084][ T28] audit: type=1400 audit(47762.461:147168): avc: denied { recv } for pid=10840 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1931.981004][ T28] audit: type=1400 audit(47762.591:147169): avc: denied { map_create } for pid=16241 comm="syz.1.8730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1932.182378][ T28] audit: type=1400 audit(47762.661:147170): avc: denied { create } for pid=16241 comm="syz.1.8730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1932.432914][ T28] audit: type=1400 audit(47762.701:147171): avc: denied { open } for pid=16241 comm="syz.1.8730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1932.658440][ T28] audit: type=1400 audit(47762.811:147172): avc: denied { perfmon } for pid=16241 comm="syz.1.8730" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1932.952107][ T28] audit: type=1400 audit(47762.901:147173): avc: denied { kernel } for pid=16241 comm="syz.1.8730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1933.165003][ T28] audit: type=1400 audit(47762.931:147174): avc: denied { egress } for pid=6583 comm="udevd" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 1933.436523][ T28] audit: type=1400 audit(47762.931:147175): avc: denied { sendto } for pid=6583 comm="udevd" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 1933.672670][T16253] netlink: 16186 bytes leftover after parsing attributes in process `syz.4.8731'. [ 1933.733993][ T28] audit: type=1400 audit(47762.931:147176): avc: denied { create } for pid=16241 comm="syz.1.8730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1933.995796][ T28] audit: type=1400 audit(47762.961:147177): avc: denied { recv } for pid=12167 comm="kworker/1:10" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1937.103126][ T28] kauditd_printk_skb: 75 callbacks suppressed [ 1937.103147][ T28] audit: type=1400 audit(47768.081:147253): avc: denied { recv } for pid=2969 comm="jbd2/sda1-8" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1937.482004][ T28] audit: type=1400 audit(47768.151:147254): avc: denied { perfmon } for pid=16255 comm="syz.3.8734" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1937.616138][ T28] audit: type=1400 audit(47768.171:147255): avc: denied { recv } for pid=15251 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1937.789895][T16267] netlink: 68 bytes leftover after parsing attributes in process `syz.1.8735'. [ 1937.925044][ T28] audit: type=1400 audit(47768.211:147256): avc: denied { recv } for pid=6545 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1938.278566][ T28] audit: type=1400 audit(47768.251:147257): avc: denied { recv } for pid=16265 comm="syz.1.8735" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1938.836924][ T28] audit: type=1400 audit(47768.311:147258): avc: denied { recv } for pid=15251 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1939.122385][ T28] audit: type=1400 audit(47768.321:147259): avc: denied { prog_load } for pid=16265 comm="syz.1.8735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1939.141472][ T28] audit: type=1400 audit(47768.431:147260): avc: denied { recv } for pid=6197 comm="kworker/u8:21" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1939.429942][T16276] netlink: 28 bytes leftover after parsing attributes in process `syz.2.8737'. [ 1939.565974][ T28] audit: type=1400 audit(47768.501:147261): avc: denied { bpf } for pid=16265 comm="syz.1.8735" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1939.824941][ T28] audit: type=1400 audit(47768.521:147262): avc: denied { perfmon } for pid=16265 comm="syz.1.8735" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1942.155247][ T28] kauditd_printk_skb: 66 callbacks suppressed [ 1942.155267][ T28] audit: type=1400 audit(47773.141:147329): avc: denied { prog_load } for pid=16281 comm="syz.0.8738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1942.405837][ T28] audit: type=1400 audit(47773.141:147330): avc: denied { recv } for pid=16281 comm="syz.0.8738" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1942.662438][ T28] audit: type=1400 audit(47773.181:147331): avc: denied { perfmon } for pid=16281 comm="syz.0.8738" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1942.881852][ T28] audit: type=1400 audit(47773.291:147332): avc: denied { perfmon } for pid=16281 comm="syz.0.8738" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1943.152510][ T28] audit: type=1400 audit(47773.291:147333): avc: denied { perfmon } for pid=16281 comm="syz.0.8738" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1943.387576][ T28] audit: type=1400 audit(47773.311:147334): avc: denied { perfmon } for pid=16281 comm="syz.0.8738" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1943.652133][ T28] audit: type=1400 audit(47773.391:147335): avc: denied { perfmon } for pid=16281 comm="syz.0.8738" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1943.909297][ T28] audit: type=1400 audit(47773.511:147336): avc: denied { perfmon } for pid=16281 comm="syz.0.8738" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1944.156389][ T28] audit: type=1400 audit(47773.511:147337): avc: denied { perfmon } for pid=16281 comm="syz.0.8738" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1944.425559][ T28] audit: type=1400 audit(47773.541:147338): avc: denied { read write } for pid=6545 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1946.417199][T16304] loop4: detected capacity change from 0 to 1024 [ 1946.574704][T16304] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1947.080406][T16306] random: crng reseeded on system resumption [ 1947.328742][ T28] kauditd_printk_skb: 92 callbacks suppressed [ 1947.328758][ T28] audit: type=1400 audit(47778.311:147431): avc: denied { create } for pid=16302 comm="syz.4.8742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1947.883477][ T28] audit: type=1400 audit(47778.541:147432): avc: denied { open } for pid=16310 comm="syz.1.8744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1948.434184][ T28] audit: type=1400 audit(47778.551:147433): avc: denied { perfmon } for pid=16310 comm="syz.1.8744" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1948.633787][ T28] audit: type=1400 audit(47778.561:147434): avc: denied { kernel } for pid=16310 comm="syz.1.8744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1948.820979][ T28] audit: type=1400 audit(47778.581:147435): avc: denied { perfmon } for pid=16310 comm="syz.1.8744" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1948.965161][ T28] audit: type=1400 audit(47778.591:147436): avc: denied { open } for pid=16310 comm="syz.1.8744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1949.109855][T16312] loop0: detected capacity change from 0 to 512 [ 1949.240985][ T28] audit: type=1400 audit(47778.601:147437): avc: denied { perfmon } for pid=16310 comm="syz.1.8744" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1949.329963][T16312] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 1949.450610][ T28] audit: type=1400 audit(47778.611:147438): avc: denied { kernel } for pid=16310 comm="syz.1.8744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1949.785363][T16312] EXT4-fs (loop0): 1 truncate cleaned up [ 1949.805726][ T28] audit: type=1400 audit(47778.621:147439): avc: denied { perfmon } for pid=16310 comm="syz.1.8744" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1949.942302][T16312] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1950.054507][ T28] audit: type=1400 audit(47778.631:147440): avc: denied { kernel } for pid=16310 comm="syz.1.8744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1950.994639][T15251] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1952.428522][ T28] kauditd_printk_skb: 61 callbacks suppressed [ 1952.428541][ T28] audit: type=1400 audit(47783.411:147502): avc: denied { open } for pid=16326 comm="syz.2.8745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1952.718416][ T28] audit: type=1400 audit(47783.501:147503): avc: denied { perfmon } for pid=16326 comm="syz.2.8745" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1953.035656][ T28] audit: type=1400 audit(47783.661:147504): avc: denied { perfmon } for pid=16326 comm="syz.2.8745" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1953.307230][ T28] audit: type=1400 audit(47783.741:147505): avc: denied { kernel } for pid=16326 comm="syz.2.8745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1953.531881][ T28] audit: type=1400 audit(47783.751:147506): avc: denied { perfmon } for pid=16326 comm="syz.2.8745" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1953.736731][ T28] audit: type=1400 audit(47783.851:147507): avc: denied { perfmon } for pid=16326 comm="syz.2.8745" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1953.988946][ T28] audit: type=1400 audit(47783.951:147508): avc: denied { create } for pid=16332 comm="syz.1.8747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1954.020533][T16340] loop4: detected capacity change from 0 to 256 [ 1954.227284][ T28] audit: type=1400 audit(47783.981:147509): avc: denied { bpf } for pid=16326 comm="syz.2.8745" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1954.439370][ T28] audit: type=1400 audit(47784.151:147510): avc: denied { read write } for pid=16333 comm="syz.4.8746" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1954.755408][ T28] audit: type=1400 audit(47784.161:147511): avc: denied { write } for pid=16332 comm="syz.1.8747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1954.989054][T16340] FAT-fs (loop4): Directory bread(block 64) failed [ 1955.089988][T16340] FAT-fs (loop4): Directory bread(block 65) failed [ 1955.257617][T16340] FAT-fs (loop4): Directory bread(block 66) failed [ 1955.322687][T16340] FAT-fs (loop4): Directory bread(block 67) failed [ 1955.433296][T16340] FAT-fs (loop4): Directory bread(block 68) failed [ 1955.558856][T16340] FAT-fs (loop4): Directory bread(block 69) failed [ 1955.636356][T16340] FAT-fs (loop4): Directory bread(block 70) failed [ 1955.732720][T16340] FAT-fs (loop4): Directory bread(block 71) failed [ 1955.789678][T16340] FAT-fs (loop4): Directory bread(block 72) failed [ 1955.847605][T16340] FAT-fs (loop4): Directory bread(block 73) failed [ 1957.513509][ T28] kauditd_printk_skb: 53 callbacks suppressed [ 1957.513529][ T28] audit: type=1400 audit(47788.491:147565): avc: denied { recv } for pid=6200 comm="kworker/u8:22" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1957.877508][ T28] audit: type=1400 audit(47788.811:147566): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1958.184770][ T28] audit: type=1400 audit(47788.851:147567): avc: denied { recv } for pid=6188 comm="kworker/u8:15" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1958.558897][ T28] audit: type=1400 audit(47788.901:147568): avc: denied { recv } for pid=6170 comm="kworker/u8:1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1958.922138][ T28] audit: type=1400 audit(47788.931:147569): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1959.280854][ T28] audit: type=1400 audit(47788.951:147570): avc: denied { recv } for pid=3598 comm="kworker/1:3" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1959.619062][ T28] audit: type=1400 audit(47788.981:147571): avc: denied { recv } for pid=16348 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1959.971311][ T28] audit: type=1400 audit(47788.991:147572): avc: denied { recv } for pid=6184 comm="kworker/u8:8" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1960.332597][ T28] audit: type=1400 audit(47788.991:147573): avc: denied { recv } for pid=6184 comm="kworker/u8:8" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1960.671988][ T28] audit: type=1400 audit(47789.021:147574): avc: denied { recv } for pid=19371 comm="kworker/u8:18" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1962.641672][ T28] kauditd_printk_skb: 44 callbacks suppressed [ 1962.641691][ T28] audit: type=1400 audit(47793.481:147620): avc: denied { perfmon } for pid=16363 comm="syz.2.8752" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1963.034975][ T28] audit: type=1400 audit(47793.491:147621): avc: denied { prog_load } for pid=16363 comm="syz.2.8752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1963.293238][ T28] audit: type=1400 audit(47793.491:147622): avc: denied { kernel } for pid=16363 comm="syz.2.8752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1963.581122][ T28] audit: type=1400 audit(47793.491:147623): avc: denied { recv } for pid=16363 comm="syz.2.8752" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1963.962856][ T28] audit: type=1400 audit(47793.501:147624): avc: denied { perfmon } for pid=16363 comm="syz.2.8752" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1964.353468][ T28] audit: type=1400 audit(47793.511:147625): avc: denied { bpf } for pid=16363 comm="syz.2.8752" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1964.678235][ T28] audit: type=1400 audit(47793.521:147626): avc: denied { perfmon } for pid=16363 comm="syz.2.8752" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1964.985532][ T28] audit: type=1400 audit(47793.531:147627): avc: denied { prog_load } for pid=16363 comm="syz.2.8752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1965.241018][ T28] audit: type=1400 audit(47793.541:147628): avc: denied { perfmon } for pid=16363 comm="syz.2.8752" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1965.454490][ T28] audit: type=1400 audit(47793.551:147629): avc: denied { perfmon } for pid=16363 comm="syz.2.8752" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1967.848505][ T28] kauditd_printk_skb: 60 callbacks suppressed [ 1967.848550][ T28] audit: type=1400 audit(47798.831:147689): avc: denied { execmem } for pid=16380 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1968.017694][T16383] 9p: Bad value for 'rfdno' [ 1968.102239][ T28] audit: type=1400 audit(47798.951:147690): avc: denied { mounton } for pid=16379 comm="syz.1.8753" path="/120" dev="tmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1968.331209][ T28] audit: type=1400 audit(47799.311:147691): avc: denied { create } for pid=16384 comm="syz.2.8754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1968.552298][ T28] audit: type=1400 audit(47799.461:147692): avc: denied { create } for pid=16384 comm="syz.2.8754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1968.759225][ T28] audit: type=1400 audit(47799.501:147693): avc: denied { recv } for pid=16384 comm="syz.2.8754" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1969.001028][ T28] audit: type=1400 audit(47799.601:147694): avc: denied { write } for pid=16384 comm="syz.2.8754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1969.248741][ T28] audit: type=1400 audit(47800.091:147695): avc: denied { read } for pid=16388 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1969.435764][ T28] audit: type=1400 audit(47800.141:147696): avc: denied { read open } for pid=16388 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1969.701738][ T28] audit: type=1400 audit(47800.351:147697): avc: denied { recv } for pid=16388 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1970.018676][ T28] audit: type=1400 audit(47800.381:147698): avc: denied { mounton } for pid=16388 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1972.911725][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 1972.911745][ T28] audit: type=1400 audit(47803.871:147718): avc: denied { perfmon } for pid=16392 comm="syz.2.8756" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1973.229406][ T28] audit: type=1400 audit(47804.061:147719): avc: denied { execmem } for pid=16393 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1973.449021][ T28] audit: type=1400 audit(47804.381:147720): avc: denied { map_create } for pid=16392 comm="syz.2.8756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1973.670067][ T28] audit: type=1400 audit(47804.481:147721): avc: denied { perfmon } for pid=16392 comm="syz.2.8756" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1973.882990][ T28] audit: type=1400 audit(47804.501:147722): avc: denied { recv } for pid=6192 comm="kworker/u8:17" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1974.128832][ T28] audit: type=1400 audit(47804.681:147723): avc: denied { map_create } for pid=16392 comm="syz.2.8756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1974.326188][ T28] audit: type=1400 audit(47804.751:147724): avc: denied { prog_load } for pid=16392 comm="syz.2.8756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1974.575881][ T28] audit: type=1400 audit(47804.791:147725): avc: denied { bpf } for pid=16392 comm="syz.2.8756" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1974.736135][ T28] audit: type=1400 audit(47804.801:147726): avc: denied { map_read map_write } for pid=16392 comm="syz.2.8756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1974.983057][ T28] audit: type=1400 audit(47804.851:147727): avc: denied { prog_load } for pid=16392 comm="syz.2.8756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1978.039005][ T28] kauditd_printk_skb: 23 callbacks suppressed [ 1978.039023][ T28] audit: type=1400 audit(47809.021:147751): avc: denied { recv } for pid=6181 comm="kworker/u8:6" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1978.360247][ T28] audit: type=1400 audit(47809.071:147752): avc: denied { recv } for pid=16343 comm="syz.0.8748" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1978.538880][ T28] audit: type=1400 audit(47809.111:147753): avc: denied { recv } for pid=26688 comm="kworker/u8:7" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1978.827269][ T28] audit: type=1400 audit(47809.131:147754): avc: denied { recv } for pid=6181 comm="kworker/u8:6" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1978.883447][T16403] loop2: detected capacity change from 0 to 4096 [ 1978.984087][T16403] EXT4-fs: Ignoring removed bh option [ 1978.991673][ T28] audit: type=1400 audit(47809.141:147755): avc: denied { recv } for pid=16343 comm="syz.0.8748" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1979.287116][ T28] audit: type=1400 audit(47809.511:147756): avc: denied { recv } for pid=6181 comm="kworker/u8:6" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1979.445939][T16403] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1979.550400][ T28] audit: type=1400 audit(47809.721:147757): avc: denied { read write } for pid=16401 comm="syz.2.8758" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1979.827413][ T28] audit: type=1400 audit(47809.781:147758): avc: denied { execmem } for pid=16404 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1980.079074][ T28] audit: type=1400 audit(47809.811:147759): avc: denied { read write open } for pid=16401 comm="syz.2.8758" path="/dev/loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1980.356989][ T28] audit: type=1400 audit(47809.811:147760): avc: denied { ioctl } for pid=16401 comm="syz.2.8758" path="/dev/loop2" dev="devtmpfs" ino=102 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1984.540741][ T28] kauditd_printk_skb: 31 callbacks suppressed [ 1984.540804][ T28] audit: type=1400 audit(47815.521:147792): avc: denied { recv } for pid=6190 comm="kworker/u8:16" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1985.546810][ T28] audit: type=1400 audit(47816.521:147793): avc: denied { recv } for pid=26686 comm="kworker/u8:5" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1987.539117][ T28] audit: type=1400 audit(47818.521:147794): avc: denied { recv } for pid=12167 comm="kworker/1:10" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1988.565871][ T28] audit: type=1400 audit(47819.521:147795): avc: denied { recv } for pid=3598 comm="kworker/1:3" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1989.548934][ T28] audit: type=1400 audit(47820.521:147796): avc: denied { recv } for pid=19359 comm="kworker/u8:13" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1990.050917][ T28] audit: type=1400 audit(47821.021:147797): avc: denied { recv } for pid=19359 comm="kworker/u8:13" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1990.574847][ T28] audit: type=1400 audit(47821.561:147798): avc: denied { recv } for pid=6170 comm="kworker/u8:1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1990.817342][ T28] audit: type=1400 audit(47821.641:147799): avc: denied { recv } for pid=26688 comm="kworker/u8:7" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1991.119683][ T28] audit: type=1400 audit(47821.671:147800): avc: denied { recv } for pid=16376 comm="kworker/u8:2" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1991.366541][ T28] audit: type=1400 audit(47821.681:147801): avc: denied { recv } for pid=6170 comm="kworker/u8:1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1991.644071][ T28] audit: type=1400 audit(47822.381:147802): avc: denied { execmem } for pid=16413 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1992.351046][ T28] audit: type=1400 audit(47823.331:147803): avc: denied { read } for pid=16414 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1992.550872][ T28] audit: type=1400 audit(47823.401:147804): avc: denied { read open } for pid=16414 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1992.799623][ T28] audit: type=1400 audit(47823.591:147805): avc: denied { mounton } for pid=16414 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1995.054979][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 1995.054998][ T28] audit: type=1400 audit(47826.031:147811): avc: denied { recv } for pid=6197 comm="kworker/u8:21" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1997.554047][ T28] audit: type=1400 audit(47828.531:147812): avc: denied { recv } for pid=12167 comm="kworker/1:10" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2000.089307][ T28] audit: type=1400 audit(47831.031:147813): avc: denied { recv } for pid=6186 comm="kworker/u8:14" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2004.059363][ T28] audit: type=1400 audit(47835.041:147814): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2004.567902][ T28] audit: type=1400 audit(47835.541:147815): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2005.561171][ T28] audit: type=1400 audit(47836.541:147816): avc: denied { recv } for pid=3598 comm="kworker/1:3" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2007.065460][ T28] audit: type=1400 audit(47838.041:147817): avc: denied { recv } for pid=6200 comm="kworker/u8:22" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2008.060540][ T28] audit: type=1400 audit(47839.041:147818): avc: denied { recv } for pid=6192 comm="kworker/u8:17" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2008.566325][ T28] audit: type=1400 audit(47839.541:147819): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2009.070641][ T28] audit: type=1400 audit(47840.041:147820): avc: denied { recv } for pid=26694 comm="kworker/u8:12" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2010.594530][ T28] audit: type=1400 audit(47841.551:147821): avc: denied { recv } for pid=6188 comm="kworker/u8:15" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2011.066425][ T28] audit: type=1400 audit(47842.051:147822): avc: denied { recv } for pid=26688 comm="kworker/u8:7" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2011.576208][ T28] audit: type=1400 audit(47842.551:147823): avc: denied { recv } for pid=6192 comm="kworker/u8:17" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2012.727017][T16345] bridge0: port 2(bridge_slave_1) entered disabled state [ 2012.734429][T16345] bridge0: port 1(bridge_slave_0) entered disabled state [ 2013.067437][ T28] audit: type=1400 audit(47844.051:147824): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2013.564759][ T28] audit: type=1400 audit(47844.551:147825): avc: denied { recv } for pid=26686 comm="kworker/u8:5" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2014.071691][ T28] audit: type=1400 audit(47845.051:147826): avc: denied { recv } for pid=6181 comm="kworker/u8:6" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2015.076578][ T28] audit: type=1400 audit(47846.051:147827): avc: denied { recv } for pid=19359 comm="kworker/u8:13" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2016.579192][ T28] audit: type=1400 audit(47847.551:147828): avc: denied { recv } for pid=26686 comm="kworker/u8:5" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2018.374818][ T28] audit: type=1400 audit(47849.361:147829): avc: denied { execmem } for pid=16420 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2019.266199][ T28] audit: type=1400 audit(47850.251:147830): avc: denied { read } for pid=16421 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2019.442634][ T28] audit: type=1400 audit(47850.281:147831): avc: denied { read open } for pid=16421 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2019.666401][ T28] audit: type=1400 audit(47850.391:147832): avc: denied { mounton } for pid=16421 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2019.884269][ T28] audit: type=1400 audit(47850.551:147833): avc: denied { recv } for pid=26688 comm="kworker/u8:7" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2020.154079][ T28] audit: type=1400 audit(47850.591:147834): avc: denied { module_request } for pid=16421 comm="syz-executor" kmod="netdev-nr6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2020.698529][ T28] audit: type=1400 audit(47851.671:147835): avc: denied { sys_module } for pid=16421 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2020.881715][ T28] audit: type=1400 audit(47851.711:147836): avc: denied { module_request } for pid=16421 comm="syz-executor" kmod="nr6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2021.594594][ T28] audit: type=1400 audit(47852.561:147837): avc: denied { recv } for pid=26686 comm="kworker/u8:5" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2025.587609][ T28] audit: type=1400 audit(47856.561:147838): avc: denied { recv } for pid=6190 comm="kworker/u8:16" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2026.582068][ T28] audit: type=1400 audit(47857.561:147839): avc: denied { recv } for pid=6190 comm="kworker/u8:16" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2027.587029][ T28] audit: type=1400 audit(47858.561:147840): avc: denied { recv } for pid=6186 comm="kworker/u8:14" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2028.184649][ T28] audit: type=1400 audit(47859.171:147841): avc: denied { execmem } for pid=16427 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2028.917968][ T28] audit: type=1400 audit(47859.901:147842): avc: denied { read } for pid=16428 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2029.075090][ T28] audit: type=1400 audit(47859.941:147843): avc: denied { read open } for pid=16428 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2029.291807][ T28] audit: type=1400 audit(47860.041:147844): avc: denied { mounton } for pid=16428 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2029.399632][ T28] audit: type=1400 audit(47860.231:147845): avc: denied { module_request } for pid=16428 comm="syz-executor" kmod="netdev-nr8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2029.876362][ T28] audit: type=1400 audit(47860.861:147846): avc: denied { sys_module } for pid=16428 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2030.079272][ T28] audit: type=1400 audit(47860.921:147847): avc: denied { module_request } for pid=16428 comm="syz-executor" kmod="nr8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2030.252904][ T28] audit: type=1400 audit(47861.091:147848): avc: denied { recv } for pid=28 comm="kauditd" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2031.098483][ T28] audit: type=1400 audit(47862.071:147849): avc: denied { recv } for pid=16424 comm="kworker/u8:4" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2033.331857][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 2033.331875][ T28] audit: type=1400 audit(47864.311:147853): avc: denied { execmem } for pid=16431 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2034.478076][ T28] audit: type=1400 audit(47865.461:147854): avc: denied { read } for pid=16432 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2034.692249][ T28] audit: type=1400 audit(47865.491:147855): avc: denied { read open } for pid=16432 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2034.946308][ T28] audit: type=1400 audit(47865.571:147856): avc: denied { recv } for pid=6194 comm="kworker/u8:19" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2035.167878][ T28] audit: type=1400 audit(47865.601:147857): avc: denied { mounton } for pid=16432 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2035.399647][ T28] audit: type=1400 audit(47865.811:147858): avc: denied { module_request } for pid=16432 comm="syz-executor" kmod="netdev-nr9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2035.619638][ T28] audit: type=1400 audit(47866.071:147859): avc: denied { recv } for pid=16423 comm="kworker/u8:3" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2035.919103][ T28] audit: type=1400 audit(47866.671:147860): avc: denied { sys_module } for pid=16432 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2036.141337][ T28] audit: type=1400 audit(47866.681:147861): avc: denied { module_request } for pid=16432 comm="syz-executor" kmod="nr9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2036.305078][ T28] audit: type=1400 audit(47867.071:147862): avc: denied { recv } for pid=6188 comm="kworker/u8:15" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2040.081924][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 2040.081943][ T28] audit: type=1400 audit(47871.061:147864): avc: denied { execmem } for pid=16435 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2041.073873][ T28] audit: type=1400 audit(47872.061:147865): avc: denied { read } for pid=16436 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2041.267385][ T28] audit: type=1400 audit(47872.101:147866): avc: denied { read open } for pid=16436 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2041.556915][ T28] audit: type=1400 audit(47872.201:147867): avc: denied { mounton } for pid=16436 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2041.786431][ T28] audit: type=1400 audit(47872.491:147868): avc: denied { module_request } for pid=16436 comm="syz-executor" kmod="netdev-nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2042.472238][ T28] audit: type=1400 audit(47873.451:147869): avc: denied { sys_module } for pid=16436 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2042.704674][ T28] audit: type=1400 audit(47873.561:147870): avc: denied { module_request } for pid=16436 comm="syz-executor" kmod="nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2042.960268][ T28] audit: type=1400 audit(47873.581:147871): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2043.197134][ T28] audit: type=1400 audit(47874.091:147872): avc: denied { recv } for pid=16376 comm="kworker/u8:2" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2044.621172][ T28] audit: type=1400 audit(47875.591:147873): avc: denied { recv } for pid=12879 comm="kworker/u8:11" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2045.109000][ T28] audit: type=1400 audit(47876.091:147874): avc: denied { recv } for pid=6194 comm="kworker/u8:19" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2045.613659][ T28] audit: type=1400 audit(47876.591:147875): avc: denied { recv } for pid=6194 comm="kworker/u8:19" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2047.106698][ T28] audit: type=1400 audit(47878.091:147876): avc: denied { recv } for pid=14294 comm="kworker/1:11" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2047.626715][ T28] audit: type=1400 audit(47878.591:147877): avc: denied { recv } for pid=4624 comm="kworker/u8:0" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2048.659820][ T28] audit: type=1400 audit(47879.591:147878): avc: denied { recv } for pid=14294 comm="kworker/1:11" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2050.132538][ T28] audit: type=1400 audit(47881.091:147879): avc: denied { recv } for pid=6190 comm="kworker/u8:16" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2051.117572][ T28] audit: type=1400 audit(47882.091:147880): avc: denied { recv } for pid=16343 comm="syz.0.8748" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2052.131698][ T28] audit: type=1400 audit(47883.091:147881): avc: denied { recv } for pid=26694 comm="kworker/u8:12" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2052.325441][ T28] audit: type=1400 audit(47883.141:147882): avc: denied { execmem } for pid=16439 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2053.114540][ T28] audit: type=1400 audit(47884.091:147883): avc: denied { read } for pid=16440 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2053.293546][ T28] audit: type=1400 audit(47884.141:147884): avc: denied { read open } for pid=16440 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2053.541640][ T28] audit: type=1400 audit(47884.341:147885): avc: denied { mounton } for pid=16440 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2053.651324][ T28] audit: type=1400 audit(47884.581:147886): avc: denied { module_request } for pid=16440 comm="syz-executor" kmod="netdev-nr5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2054.409218][ T28] audit: type=1400 audit(47885.391:147887): avc: denied { sys_module } for pid=16440 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2054.599653][ T28] audit: type=1400 audit(47885.441:147888): avc: denied { module_request } for pid=16440 comm="syz-executor" kmod="nr5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2057.119804][ T28] audit: type=1400 audit(47888.101:147889): avc: denied { recv } for pid=12167 comm="kworker/1:10" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2059.120907][ T28] audit: type=1400 audit(47890.101:147890): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2059.626713][ T28] audit: type=1400 audit(47890.601:147891): avc: denied { recv } for pid=26694 comm="kworker/u8:12" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2060.128607][ T28] audit: type=1400 audit(47891.101:147892): avc: denied { recv } for pid=19359 comm="kworker/u8:13" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2062.132505][ T28] audit: type=1400 audit(47893.111:147893): avc: denied { recv } for pid=26688 comm="kworker/u8:7" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2065.654950][ T28] audit: type=1400 audit(47896.611:147894): avc: denied { recv } for pid=6194 comm="kworker/u8:19" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2066.659280][ T28] audit: type=1400 audit(47897.611:147895): avc: denied { recv } for pid=19359 comm="kworker/u8:13" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2068.630045][ T28] audit: type=1400 audit(47899.611:147896): avc: denied { recv } for pid=19359 comm="kworker/u8:13" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2070.645152][ T28] audit: type=1400 audit(47901.621:147897): avc: denied { recv } for pid=6190 comm="kworker/u8:16" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2071.134197][ T28] audit: type=1400 audit(47902.121:147898): avc: denied { recv } for pid=6194 comm="kworker/u8:19" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2072.636235][ T28] audit: type=1400 audit(47903.621:147899): avc: denied { recv } for pid=6200 comm="kworker/u8:22" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2073.148097][ T28] audit: type=1400 audit(47904.121:147900): avc: denied { recv } for pid=6194 comm="kworker/u8:19" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2075.151742][ T28] audit: type=1400 audit(47906.121:147901): avc: denied { recv } for pid=16343 comm="syz.0.8748" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2076.145754][ T28] audit: type=1400 audit(47907.121:147902): avc: denied { recv } for pid=6200 comm="kworker/u8:22" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2076.685821][ T28] audit: type=1400 audit(47907.621:147903): avc: denied { recv } for pid=6190 comm="kworker/u8:16" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2077.156863][ T28] audit: type=1400 audit(47908.121:147904): avc: denied { recv } for pid=6190 comm="kworker/u8:16" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2077.660894][ T28] audit: type=1400 audit(47908.621:147905): avc: denied { recv } for pid=16343 comm="syz.0.8748" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2078.166686][ T28] audit: type=1400 audit(47909.131:147906): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2079.119587][ T28] audit: type=1400 audit(47910.071:147907): avc: denied { execmem } for pid=16446 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2079.294522][ T28] audit: type=1400 audit(47910.131:147908): avc: denied { recv } for pid=26686 comm="kworker/u8:5" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2080.037149][ T28] audit: type=1400 audit(47911.001:147909): avc: denied { read } for pid=16447 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2080.229194][ T28] audit: type=1400 audit(47911.001:147910): avc: denied { read open } for pid=16447 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2080.377626][ T28] audit: type=1400 audit(47911.151:147911): avc: denied { mounton } for pid=16447 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2080.559522][ T28] audit: type=1400 audit(47911.531:147912): avc: denied { module_request } for pid=16447 comm="syz-executor" kmod="netdev-nr6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2080.748045][ T28] audit: type=1400 audit(47911.631:147913): avc: denied { recv } for pid=16423 comm="kworker/u8:3" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2081.270949][ T28] audit: type=1400 audit(47912.251:147914): avc: denied { sys_module } for pid=16447 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2081.454741][ T28] audit: type=1400 audit(47912.311:147915): avc: denied { module_request } for pid=16447 comm="syz-executor" kmod="nr6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2082.650945][ T28] audit: type=1400 audit(47913.631:147916): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2084.162727][ T28] audit: type=1400 audit(47915.131:147917): avc: denied { recv } for pid=14294 comm="kworker/1:11" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2085.653939][ T28] audit: type=1400 audit(47916.631:147918): avc: denied { recv } for pid=12879 comm="kworker/u8:11" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2086.153014][ T28] audit: type=1400 audit(47917.131:147919): avc: denied { recv } for pid=6186 comm="kworker/u8:14" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2087.653666][ T28] audit: type=1400 audit(47918.641:147920): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2089.604100][ T28] audit: type=1400 audit(47920.581:147921): avc: denied { execmem } for pid=16451 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2090.906721][ T28] audit: type=1400 audit(47921.881:147922): avc: denied { read } for pid=16452 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2091.035175][ T28] audit: type=1400 audit(47921.931:147923): avc: denied { read open } for pid=16452 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2091.285672][ T28] audit: type=1400 audit(47921.991:147924): avc: denied { mounton } for pid=16452 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2091.442821][ T28] audit: type=1400 audit(47922.141:147925): avc: denied { recv } for pid=26694 comm="kworker/u8:12" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2091.660050][ T28] audit: type=1400 audit(47922.161:147926): avc: denied { module_request } for pid=16452 comm="syz-executor" kmod="netdev-nr8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2091.868079][ T28] audit: type=1400 audit(47922.841:147927): avc: denied { sys_module } for pid=16452 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2092.029759][ T28] audit: type=1400 audit(47922.891:147928): avc: denied { module_request } for pid=16452 comm="syz-executor" kmod="nr8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2092.225292][ T28] audit: type=1400 audit(47923.141:147929): avc: denied { recv } for pid=2969 comm="jbd2/sda1-8" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2092.674563][ T28] audit: type=1400 audit(47923.641:147930): avc: denied { recv } for pid=26694 comm="kworker/u8:12" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2094.174126][ T28] audit: type=1400 audit(47925.141:147931): avc: denied { recv } for pid=6188 comm="kworker/u8:15" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2096.625684][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 2096.625732][ T28] audit: type=1400 audit(47927.611:147937): avc: denied { sys_module } for pid=16456 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2096.876246][ T28] audit: type=1400 audit(47927.651:147938): avc: denied { recv } for pid=4624 comm="kworker/u8:0" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2097.099894][ T28] audit: type=1400 audit(47927.681:147939): avc: denied { module_request } for pid=16456 comm="syz-executor" kmod="nr9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2097.682763][ T28] audit: type=1400 audit(47928.651:147940): avc: denied { recv } for pid=6188 comm="kworker/u8:15" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2098.670369][ T28] audit: type=1400 audit(47929.651:147941): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2099.174299][ T28] audit: type=1400 audit(47930.151:147942): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2101.158306][ T28] audit: type=1400 audit(47932.141:147943): avc: denied { execmem } for pid=16459 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2102.092439][ T28] audit: type=1400 audit(47933.061:147944): avc: denied { read } for pid=16460 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2102.280960][ T28] audit: type=1400 audit(47933.081:147945): avc: denied { read open } for pid=16460 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2102.492620][ T28] audit: type=1400 audit(47933.201:147946): avc: denied { mounton } for pid=16460 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2102.687440][ T28] audit: type=1400 audit(47933.451:147947): avc: denied { module_request } for pid=16460 comm="syz-executor" kmod="netdev-nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2103.042377][ T28] audit: type=1400 audit(47934.031:147948): avc: denied { sys_module } for pid=16460 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2103.217699][ T28] audit: type=1400 audit(47934.121:147949): avc: denied { module_request } for pid=16460 comm="syz-executor" kmod="nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2104.678412][ T28] audit: type=1400 audit(47935.661:147950): avc: denied { recv } for pid=6192 comm="kworker/u8:17" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2105.679280][ T28] audit: type=1400 audit(47936.661:147951): avc: denied { recv } for pid=26688 comm="kworker/u8:7" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2106.686583][ T28] audit: type=1400 audit(47937.661:147952): avc: denied { recv } for pid=6181 comm="kworker/u8:6" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2107.202869][ T28] audit: type=1400 audit(47938.161:147953): avc: denied { recv } for pid=16423 comm="kworker/u8:3" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2111.787341][T16345] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2113.048931][ T28] audit: type=1400 audit(47944.031:147954): avc: denied { execmem } for pid=16463 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2113.624842][ T28] audit: type=1400 audit(47944.601:147955): avc: denied { read } for pid=16464 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2113.835952][ T28] audit: type=1400 audit(47944.651:147956): avc: denied { read open } for pid=16464 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2113.962317][ T28] audit: type=1400 audit(47944.751:147957): avc: denied { mounton } for pid=16464 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2114.112097][ T28] audit: type=1400 audit(47945.031:147958): avc: denied { module_request } for pid=16464 comm="syz-executor" kmod="netdev-nr5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2114.947960][ T28] audit: type=1400 audit(47945.931:147959): avc: denied { sys_module } for pid=16464 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2115.137607][ T28] audit: type=1400 audit(47945.931:147960): avc: denied { module_request } for pid=16464 comm="syz-executor" kmod="nr5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2115.368501][ T28] audit: type=1400 audit(47946.171:147961): avc: denied { recv } for pid=6190 comm="kworker/u8:16" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2118.980860][T16345] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2119.204163][ T28] audit: type=1400 audit(47950.181:147962): avc: denied { recv } for pid=16423 comm="kworker/u8:3" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2120.195243][ T28] audit: type=1400 audit(47951.181:147963): avc: denied { recv } for pid=6181 comm="kworker/u8:6" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2123.700106][ T28] audit: type=1400 audit(47954.681:147964): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2125.230343][ T28] audit: type=1400 audit(47956.181:147965): avc: denied { recv } for pid=16424 comm="kworker/u8:4" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2126.219096][ T28] audit: type=1400 audit(47957.191:147966): avc: denied { recv } for pid=16424 comm="kworker/u8:4" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2127.712326][ T28] audit: type=1400 audit(47958.691:147967): avc: denied { recv } for pid=19359 comm="kworker/u8:13" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2128.709441][ T28] audit: type=1400 audit(47959.691:147968): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2131.722242][ T28] audit: type=1400 audit(47962.691:147969): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2133.224920][ T28] audit: type=1400 audit(47964.191:147970): avc: denied { recv } for pid=6188 comm="kworker/u8:15" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2133.520550][ T28] audit: type=1400 audit(47964.501:147971): avc: denied { recv } for pid=26686 comm="kworker/u8:5" saddr=10.128.0.163 src=46800 daddr=10.128.0.149 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2133.720385][ T28] audit: type=1400 audit(47964.621:147972): avc: denied { recv } for pid=6188 comm="kworker/u8:15" saddr=10.128.0.163 src=46800 daddr=10.128.0.149 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2133.921949][ T28] audit: type=1400 audit(47964.691:147973): avc: denied { recv } for pid=26688 comm="kworker/u8:7" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2134.216780][ T28] audit: type=1400 audit(47965.201:147974): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2135.716812][ T28] audit: type=1400 audit(47966.701:147975): avc: denied { recv } for pid=19359 comm="kworker/u8:13" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2136.235990][ T28] audit: type=1400 audit(47967.201:147976): avc: denied { recv } for pid=6190 comm="kworker/u8:16" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2138.224796][ T28] audit: type=1400 audit(47969.201:147977): avc: denied { recv } for pid=4624 comm="kworker/u8:0" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2138.717311][ T28] audit: type=1400 audit(47969.701:147978): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2139.725574][ T28] audit: type=1400 audit(47970.701:147979): avc: denied { recv } for pid=16423 comm="kworker/u8:3" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2140.640044][ T28] audit: type=1400 audit(47971.621:147980): avc: denied { execmem } for pid=16470 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2140.812344][ T28] audit: type=1400 audit(47971.701:147981): avc: denied { recv } for pid=6181 comm="kworker/u8:6" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2141.491012][ T28] audit: type=1400 audit(47972.471:147982): avc: denied { read } for pid=16471 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2141.624874][ T28] audit: type=1400 audit(47972.471:147983): avc: denied { read open } for pid=16471 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2141.826627][ T28] audit: type=1400 audit(47972.651:147984): avc: denied { mounton } for pid=16471 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2142.025332][ T28] audit: type=1400 audit(47972.701:147985): avc: denied { recv } for pid=4624 comm="kworker/u8:0" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2142.292930][ T28] audit: type=1400 audit(47972.891:147986): avc: denied { module_request } for pid=16471 comm="syz-executor" kmod="netdev-nr6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2143.785475][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 2143.785570][ T28] audit: type=1400 audit(47974.771:147992): avc: denied { egress } for pid=22 comm="ksoftirqd/1" saddr=fe80::a8aa:aaff:feaa:aa1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2144.001571][ T28] audit: type=1400 audit(47974.771:147993): avc: denied { sendto } for pid=22 comm="ksoftirqd/1" saddr=fe80::a8aa:aaff:feaa:aa1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 2145.224251][ T28] audit: type=1400 audit(47976.211:147994): avc: denied { recv } for pid=16343 comm="syz.0.8748" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2145.754373][ T28] audit: type=1400 audit(47976.711:147995): avc: denied { recv } for pid=19359 comm="kworker/u8:13" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2146.743901][ T28] audit: type=1400 audit(47977.711:147996): avc: denied { recv } for pid=26694 comm="kworker/u8:12" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2147.729722][ T28] audit: type=1400 audit(47978.711:147997): avc: denied { recv } for pid=26694 comm="kworker/u8:12" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2148.225815][ T28] audit: type=1400 audit(47979.211:147998): avc: denied { recv } for pid=6192 comm="kworker/u8:17" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2148.762618][ T28] audit: type=1400 audit(47979.711:147999): avc: denied { recv } for pid=6192 comm="kworker/u8:17" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2149.742420][ T28] audit: type=1400 audit(47980.711:148000): avc: denied { recv } for pid=26694 comm="kworker/u8:12" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2150.229375][ T28] audit: type=1400 audit(47981.211:148001): avc: denied { recv } for pid=4624 comm="kworker/u8:0" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2150.621297][ T28] audit: type=1400 audit(47981.601:148002): avc: denied { execmem } for pid=16474 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2151.447043][ T28] audit: type=1400 audit(47982.421:148003): avc: denied { read } for pid=16475 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2151.625676][ T28] audit: type=1400 audit(47982.451:148004): avc: denied { read open } for pid=16475 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2151.851049][ T28] audit: type=1400 audit(47982.641:148005): avc: denied { mounton } for pid=16475 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2152.054298][ T28] audit: type=1400 audit(47982.951:148006): avc: denied { module_request } for pid=16475 comm="syz-executor" kmod="netdev-nr8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2152.815794][ T28] audit: type=1400 audit(47983.801:148007): avc: denied { sys_module } for pid=16475 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2153.035187][ T28] audit: type=1400 audit(47983.891:148008): avc: denied { module_request } for pid=16475 comm="syz-executor" kmod="nr8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2153.758972][ T28] audit: type=1400 audit(47984.721:148009): avc: denied { recv } for pid=26694 comm="kworker/u8:12" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2155.506649][ T28] audit: type=1400 audit(47986.491:148010): avc: denied { execmem } for pid=16479 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2156.240354][ T28] audit: type=1400 audit(47987.221:148011): avc: denied { recv } for pid=6188 comm="kworker/u8:15" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2156.738343][ T28] audit: type=1400 audit(47987.721:148012): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2158.884402][ T28] audit: type=1400 audit(47989.871:148013): avc: denied { read } for pid=16480 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2159.081081][ T28] audit: type=1400 audit(47989.891:148014): avc: denied { read open } for pid=16480 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2159.308022][ T28] audit: type=1400 audit(47990.031:148015): avc: denied { mounton } for pid=16480 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2159.517277][ T28] audit: type=1400 audit(47990.361:148016): avc: denied { module_request } for pid=16480 comm="syz-executor" kmod="netdev-nr9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2160.098837][ T28] audit: type=1400 audit(47991.081:148017): avc: denied { sys_module } for pid=16480 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2160.292469][ T28] audit: type=1400 audit(47991.161:148018): avc: denied { module_request } for pid=16480 comm="syz-executor" kmod="nr9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2161.744475][ T28] audit: type=1400 audit(47992.721:148019): avc: denied { execmem } for pid=16483 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2162.922924][ T28] audit: type=1400 audit(47993.901:148020): avc: denied { read } for pid=16484 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2163.122256][ T28] audit: type=1400 audit(47993.931:148021): avc: denied { read open } for pid=16484 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2163.325027][ T28] audit: type=1400 audit(47994.101:148022): avc: denied { mounton } for pid=16484 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2163.518673][ T28] audit: type=1400 audit(47994.461:148023): avc: denied { module_request } for pid=16484 comm="syz-executor" kmod="netdev-nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2163.748124][ T28] audit: type=1400 audit(47994.731:148024): avc: denied { recv } for pid=6181 comm="kworker/u8:6" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2164.201492][ C0] ================================================================== [ 2164.209674][ C0] BUG: KCSAN: data-race in wq_worker_tick / wq_worker_tick [ 2164.216977][ C0] [ 2164.219343][ C0] read-write to 0xffff8881000c5cd8 of 8 bytes by interrupt on cpu 1: [ 2164.227445][ C0] wq_worker_tick+0x64/0x240 [ 2164.232082][ C0] sched_tick+0xbc/0x1f0 [ 2164.236458][ C0] update_process_times+0x15e/0x190 [ 2164.241699][ C0] tick_nohz_handler+0x275/0x3d0 [ 2164.246684][ C0] __hrtimer_run_queues+0x276/0x4f0 [ 2164.251952][ C0] hrtimer_interrupt+0x261/0x850 [ 2164.257041][ C0] __sysvec_apic_timer_interrupt+0x5f/0x1c0 [ 2164.262999][ C0] sysvec_apic_timer_interrupt+0x32/0x80 [ 2164.268695][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 2164.274712][ C0] __tsan_read1+0x2d/0x180 [ 2164.279179][ C0] skb_ext_add+0x23c/0x390 [ 2164.283641][ C0] vxcan_xmit+0xee/0x360 [ 2164.287941][ C0] dev_hard_start_xmit+0x12a/0x3a0 [ 2164.293303][ C0] __dev_queue_xmit+0xbd5/0x1ec0 [ 2164.298294][ C0] can_send+0x589/0x720 [ 2164.302502][ C0] can_can_gw_rcv+0x817/0x870 [ 2164.307322][ C0] can_rcv_filter+0xc3/0x480 [ 2164.311952][ C0] can_receive+0x13e/0x190 [ 2164.316409][ C0] can_rcv+0x17d/0x1f0 [ 2164.320520][ C0] process_backlog+0x363/0x670 [ 2164.325431][ C0] __napi_poll+0x61/0x300 [ 2164.329805][ C0] net_rx_action+0x452/0x930 [ 2164.334461][ C0] handle_softirqs+0xb9/0x280 [ 2164.339171][ C0] do_softirq+0x45/0x60 [ 2164.343362][ C0] __local_bh_enable_ip+0x70/0x80 [ 2164.348426][ C0] _raw_spin_unlock_bh+0x18/0x20 [ 2164.353411][ C0] nsim_dev_trap_report_work+0x52b/0x630 [ 2164.359087][ C0] process_scheduled_works+0x4f0/0x9c0 [ 2164.364601][ C0] worker_thread+0x58a/0x780 [ 2164.369232][ C0] kthread+0x22a/0x280 [ 2164.373339][ C0] ret_from_fork+0x146/0x330 [ 2164.377970][ C0] ret_from_fork_asm+0x1a/0x30 [ 2164.382780][ C0] [ 2164.385128][ C0] read-write to 0xffff8881000c5cd8 of 8 bytes by interrupt on cpu 0: [ 2164.393226][ C0] wq_worker_tick+0x64/0x240 [ 2164.397857][ C0] sched_tick+0xbc/0x1f0 [ 2164.402144][ C0] update_process_times+0x15e/0x190 [ 2164.407394][ C0] tick_nohz_handler+0x275/0x3d0 [ 2164.412369][ C0] __hrtimer_run_queues+0x276/0x4f0 [ 2164.417618][ C0] hrtimer_interrupt+0x261/0x850 [ 2164.422599][ C0] __sysvec_apic_timer_interrupt+0x5f/0x1c0 [ 2164.428541][ C0] sysvec_apic_timer_interrupt+0x32/0x80 [ 2164.434254][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 2164.440281][ C0] __tsan_read4+0x12/0x190 [ 2164.444741][ C0] skb_copy+0x17e/0x3f0 [ 2164.448967][ C0] can_can_gw_rcv+0x29d/0x870 [ 2164.453696][ C0] can_rcv_filter+0xc3/0x480 [ 2164.458325][ C0] can_receive+0x13e/0x190 [ 2164.462771][ C0] can_rcv+0x17d/0x1f0 [ 2164.466872][ C0] process_backlog+0x363/0x670 [ 2164.471687][ C0] __napi_poll+0x61/0x300 [ 2164.476082][ C0] net_rx_action+0x452/0x930 [ 2164.480724][ C0] handle_softirqs+0xb9/0x280 [ 2164.485443][ C0] do_softirq+0x45/0x60 [ 2164.489635][ C0] __local_bh_enable_ip+0x70/0x80 [ 2164.494699][ C0] __alloc_skb+0x658/0x690 [ 2164.499150][ C0] nsim_dev_trap_report_work+0x18a/0x630 [ 2164.504922][ C0] process_scheduled_works+0x4f0/0x9c0 [ 2164.510427][ C0] worker_thread+0x58a/0x780 [ 2164.515064][ C0] kthread+0x22a/0x280 [ 2164.519173][ C0] ret_from_fork+0x146/0x330 [ 2164.523799][ C0] ret_from_fork_asm+0x1a/0x30 [ 2164.528635][ C0] [ 2164.530980][ C0] value changed: 0x0000000007d1a5e0 -> 0x0000000007d1ccf0 [ 2164.538113][ C0] [ 2164.540459][ C0] Reported by Kernel Concurrency Sanitizer on: [ 2164.546665][ C0] CPU: 0 UID: 0 PID: 16423 Comm: kworker/u8:3 Tainted: G W syzkaller #0 PREEMPT(full) [ 2164.557818][ C0] Tainted: [W]=WARN [ 2164.561655][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 2164.571745][ C0] Workqueue: events_unbound nsim_dev_trap_report_work [ 2164.578557][ C0] ================================================================== [ 2164.649999][ T28] audit: type=1400 audit(47995.241:148025): avc: denied { recv } for pid=16485 comm="modprobe" saddr=10.128.0.163 src=30036 daddr=10.128.0.149 dest=40446 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2164.818459][ T28] audit: type=1400 audit(47995.451:148026): avc: denied { sys_module } for pid=16484 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2164.931853][ T28] audit: type=1400 audit(47995.481:148027): avc: denied { write } for pid=3308 comm="syz-executor" path="pipe:[2651]" dev="pipefs" ino=2651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 2165.187610][ T28] audit: type=1400 audit(47995.501:148028): avc: denied { module_request } for pid=16484 comm="syz-executor" kmod="nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1