last executing test programs: 6.107595275s ago: executing program 2 (id=296): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, 0x0) r2 = syz_open_dev$evdev(0x0, 0xcba, 0x202000) ioctl$EVIOCGUNIQ(r2, 0x80404508, 0x0) syz_open_procfs(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa10000000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfbfff00c}, {0x6}]}, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb801b, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0xb093, 0x800000, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) socket$tipc(0x1e, 0x5, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000300)={0xa, 0x4e23, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x2, &(0x7f0000000000)=@gcm_256={{0x303, 0x36}, "00000007e4008000", "8b3de2aabceef22f419e59f30000000004000000000200", "e73400", "000000d900"}, 0x38) sendmmsg$inet(r3, &(0x7f0000002c40)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000a80)="2a73ed35", 0x732a}], 0x1}}], 0x400000000000292, 0x0) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r6, &(0x7f0000000040)={0x4}) socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8, &(0x7f0000000580), 0x5, 0x4f3, &(0x7f00000005c0)="$eJzs3d1rW+cZAPBHku3YibN8bIwkgyWQQfZBLH8wYm+DsattF4GxwG42yDxb8TLLkbHkLDa5cLa7XOxibLRQetH7/gW9aa4aAqXXLb3tVUloUxfakoKKjiTHH5KjtraU+Px+cKJzzqvoeV/Zz+uj97xHJ4DUOlf7JxMxHBHvRMSx+ubWJ5yrP6w/vj1TWzJRrV75KJM8r7bdfGrz/x2JiLWIGIyIP/424m+ZnXHLK6vz08ViYamxna8sLObLK6sXry9MzxXmCjfGJi9NTU2OToxP7Vlb7/7nH3cvv/H7gdc/+/fD+/99681atYYbZZvbsZfqTe+PE5v29UXEr/YjWA/kGu0Z6nVF+EZqP7/vRsT5JP+PRS75aXbmyb7WDNhv1Wq1+mX1ULvitSpwYGWTY+BMdiQi6uvZ7MhI/Rj+e3E4WyyVKz+7Vlq+MVs/Vj4e/dlr14uF0cZnhePRn6ltjyXrT7fHt21PRCTHwP/LDSXbIzOl4mx3uzpgmyPb8v/TXD3/gZTo/CM/cNDIf0gv+Q/pJf8hveQ/pJf8h/SS/5Be8h/SS/5DerXK/6M9qAfQfbv9/R/oYj2ArvrD5cu1pdq8/n325sryfOnmxdlCeX5kYXlmZKa0tDgyVyrNJdfsLDzr9Yql0uLYz2P5Vr5SKFfy5ZXVqwul5RuVq8l1/VcL/V1pFdCJE2fvvZeJiLVfDCVLbPqTL1fhYKtWM9Hra5CB3sj1ugMCesapP0ivr/EZv+2XhAEvthZf0bth8Ejbol/H4r5UB+iC7G6FTx50ryJA11047fwfpJXxf0gv4/+QXo7xgd3G/6NxL7+WjP/DC2vX8X/gQBtuc/+vo5vu3TUaEd+JiHdz/Yea9/oCDoLsh5nG8f+FYz8a3l46kPk8OUUwEBH/fOXKS7emK5Wlsdr+jzf2V15u7B/vRf2B9raO8DXztJnHAEB6rT++PdNcuhn30W/qkxB2xu9rjE0OJkcwh9czW+YqZPZo7sLanYg41Sp+pnG/8/qZj8PruR3xTzYeM/WXSOrbl9w3vTvxT2+K/8NN8c9863cF0uFerf8ZbZV/2SSnYyP/tvY/w3s0d6LZ/zXnXG+O3+z/cm36v7Mdxvj7q/9qdXo3mez96E7EmZb9bzPeYBJre/xa3S50GP/hX/70/XZl1dfqr9MqflNtLV9ZWMyXV1YvXm/WYvLS1NTk6MT4VD4Zo843R6p3+uWpt++3i19rf0Ob9r+/o/1DjTr9pMP2f/GDB38+t0v8H59v/ft3Mnnc9v5Xqxt1+GmH8T8Z/+Cv7cpq8WfbvP/ZVvGjWRox0WH88v9/59phAHiOlFdW56eLxcKSFStWnu+Vvuhi0Gf1HGvd6aCAffM06XtdEwAAAAAAAAAAAKBT7Wb/3tvD6cS9biMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwEHwVQAAAP//QUvQlg==") syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000280)='./bus\x00', 0x3d3c9b, 0x0, 0x80, 0x0, &(0x7f0000000600)) ioctl$OCFS2_IOC_MOVE_EXT(r2, 0x40406f06, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, 0x0, 0x8880) 5.985613903s ago: executing program 2 (id=299): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x284, 0x0, 0x11000, 0x0, 0x2, 0x80000011, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="04"], 0x14}, 0x1, 0x0, 0x0, 0x4044020}, 0x4000000) recvmmsg(r2, &(0x7f0000000a00)=[{{0x0, 0x0, &(0x7f0000001580), 0x100000000000009a}, 0xfffffffd}, {{&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @private}}, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/165}, {&(0x7f0000000600)=""/10}, {&(0x7f0000000640)=""/141}, {&(0x7f0000000700)=""/225}, {&(0x7f0000000800)=""/171}], 0x0, &(0x7f0000000940)=""/138}}], 0x1, 0x40030002, 0x0) sendmsg$nl_generic(r2, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002b40)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x3bffffffc, 0x4}, 0x2000, 0x0, 0x0, 0x7, 0xfff, 0xa001, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffff7ff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sysfs(0xffffff9c, 0x0, 0x1c9a82, 0x20) copy_file_range(r1, &(0x7f0000000100)=0x9, r3, &(0x7f0000000180)=0x6, 0xfffffffffffffffa, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000240)={[{@noblock_validity}, {}, {@sysvgroups}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@nodelalloc}, {@grpid}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x56a, &(0x7f00000015c0)="$eJzs3c9rHFUcAPDvbJL+1qZQinqQQA9WajdN4o8KQutRtFjQe12SaSjZdEt2U5pYaHuwFy9SBBEL4h/g3WPxH/CvKGihSAl68BKZzWy7TbL5uXW3zucD0743M5s3b998335nZ5cNoLBGsn9KEa9GxDdJxOG2bYORbxxZ2W/p8Y3JbEliefmzP5NI8nWt/ZP8/4N55ZWI+PWriJOlte3WFxZnKtVqOpfXRxuzV0frC4unLs9WptPp9Mr4xMSZdybG33/v3a719c0Lf3//6f2Pznx9fOm7nx8euZvEuTiUb2vvxy7caq+MxEj+nAzFuVU7jnWhsX6S9PoA2JGBPM6HIpsDDsdAHvXA/9/NiFgGCioR/1BQrTygdW3fpevgF8ajD1cugNb2f3DlvZHY17w2OrCUPHNllF3vDneh/ayNX/64dzdbYpP3IW52oT2Allu3I+L04ODa+S/J57+dO91883hjq9so2usP9NL9LP95a738p/Qk/4l18p+D68TuTmwe/6WHXWimoyz/+2Dd/PfJ1DU8kNdeauZ8Q8mly9X0dES8HBEnYmhvVt/ofs6ZpQfLnba153/ZkrXfygXz43g4uPfZx0xVGpXd9Lndo9sRrz3Nf5NYM//va+a6q8c/ez4ubLGNY+m91ztt27z/7bqfAS//FPHGuuP/9I5WsvH9ydHm+TDaOivW+uvOsd86tb+9/ndfNv4HNu7/cNJ+v7a+/TZ+3PdP2mnbTs//PcnnzfKefN31SqMxNxaxJ/lk7frxp49t1Vv7Z/0/cXzj+W+9839/RHyxxf7fOXqn4679MP5T2xr/7RcefPzlD53a39r4v90sncjXbGX+2+oB7ua5AwAAAAAAgH5TiohDkZTKT8qlUrm88vmOo3GgVK3VGycv1eavTEXzu7LDMVRq3ek+3PZ5iLH887Ct+viq+kREHImIbwf2N+vlyVp1qtedBwAAAAAAAAAAAAAAAAAAgD5xsMP3/zO/D/T66IDnzk9+Q3FtGv/d+KUnoC95/YfiEv9QXOIfikv8Q3GJfygu8Q/FJf6huMQ/AAAAAAAAAAAAAAAAAAAAAAAAAAAAdNWF8+ezZXnp8Y3JrD51bWF+pnbt1FRanynPzk+WJ2tzV8vTtdp0NS1P1mY3+3vVWu3q2HjMXx9tpPXGaH1h8eJsbf5K4+Ll2cp0ejEd+k96BQAAAAAAAAAAAAAAAAAAAC+W+sLiTKVaTecUOhbORl8cxo4LyWajfDY/GXbUxGDvO6jwHAo9npgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoM2/AQAA///fKTPH") fchmod(0xffffffffffffffff, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c80)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@map_fd={0x18, 0xa, 0x1, 0x0, r3}, @generic={0x3, 0x1, 0x2, 0x3, 0x4}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x8}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7271f7f3}, @func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f00000004c0)='syzkaller\x00', 0x2, 0xd5, &(0x7f0000000a80)=""/213, 0x41000, 0x2, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b80)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000bc0)={0x5, 0xd, 0x1, 0x4}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000c00)=[r3, r3, r3], &(0x7f0000000c40)=[{0x2, 0x2, 0x1}], 0x10, 0x5}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r3}, &(0x7f00000001c0), &(0x7f0000000d40)=r4}, 0x20) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) write(r6, &(0x7f0000000280)="96fa2c0bff2099297e1c1ea6d53ff4c2f69b32d385f14857ae25047e39555bbacdb216aa20b99d21a3aa5e5775e86006778ec677400377670a3422aa5184ed400cf452f14ef81d20a792091e037ed82c9ee401f0f428bd4951eab88952d04fd3c2201db3378816", 0xfffffdce) close(r5) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002c00128009000100626f6e64000000001c000280050021"], 0x4c}}, 0x0) 5.500469356s ago: executing program 2 (id=303): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket(0x15, 0x5, 0x0) connect$l2tp6(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) creat(0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r4, @ANYBLOB=',version=9p2000,\x00']) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000200)=0x6010, 0x4) getsockname$llc(r0, 0x0, &(0x7f00000000c0)) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file2\x00', 0x8, &(0x7f0000000080)={[{@nodioread_nolock}, {@sb={'sb', 0x3d, 0x1}}]}, 0x4, 0x523, &(0x7f00000018c0)="$eJzs3cFvG1kZAPBvnLhJs+mmC3sABGxZFgqq6iTubrTqhfYCQlUlRMWJQxsSN4pi11Hsiib0kB65V6ISJ+A/4MYBqScO3LjBjUs5IBWoQA0SB6MZT1I3sZNAnbiJfz9pMvPeTP29F/e953mR5wUwtC5ExGZEnImIOxExlecn+RbX2lt63csXDxe2XjxcSKLVuvX3JDuf5kXHv0m9k7/meER8/zsRP0r2xm2sb6zMV6uVtTw93aytTjfWNy4vF/Kc8tzs3MynVz4p962uH9R+/fzbyzd+8NvffOnZHza/+ZO0WJM/PZed66xHP7WrXozJjrzRiLhxFMEGZDT//8PJk7a2z0TEh1n7n4qR7N0EAE6zVmsqWlOdaQDgtEvv/ycjKZTyuYDJKBRKpfYc3vsxUajWG81LU/X79xYjm8M6H8XC3eVqZSafKzwfxSRNz2bHr9Ll19KPK1ci4r2IeDx2NjtfWqhXFwf5wQcAhtg7u8b/f421x/9OxUEVDgA4OuODLgAAcOyM/wAwfIz/ADB8/ofx37cDAeCUcP8PAMPH+A8Aw+fA8f/R8ZQDADgW37t5M91aW+3nX28/qfvyYqWxUqrdXygt1NdWS0v1+lK1UlpotQ56vWq9vjr78U6ysb5xu1a/f695e7k2v1S5XfEsAQAYvPc+ePqndNDfvHo226JjLQdjNZxuhUEXABiYkUEXABgY3+eB4XWIe3zTAHDKdVmity2fIEh6XfDE4q9wUl38vPl/GFZvMv9v7gBOtv9v/v9bfS8HcPyM4TC8Wq3Emv8AMGTM8QM9//6f6/mIkCf9LwsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACcFJPZlhRK2Vrgm+nPQqkUcS4izkcxubtcrcxExLsR8cex4lianh10oQGAN1T4a5Kv/3Vx6qPJ3WfPJP8ey/YR8eOf3/rZg/lmc202zf/HTn7zSZp/trlWPjOICgAAna7tzcrG73K+77iRf/ni4cL2dpxFfH69vbhoGncr39pnRmM0249HMSIm/pnk6bb088pIH+JvPoqIz23XfzwedESYzOZA2iuf7o6fxj7X9/idv//d8Quv1beQnUv3xex38dnYVTjgQE+vt/vJvO2lTTxvf4W4kO27t//xrId6c2n/lzbXrT39X2Gn/xvZEz/J2vyFnfT+JXn+8e++uyezNdU+9yjiC6Pd4ic78ZPu/W/xo0PW8c9f/PKHvc61fhFxsWv9t1ekrmXd7HSztjrdWN+4vFybX6osVe6Vy3OzczOfXvmkPJ3NUbd//r5bjL9dvfRur/hp/Sd6xB/fv/7xtUPW/5f/ufPDr+wT/xtf7f7+v79P/HRM/Poh489PXOu5fHcaf7FH/Q94/+PSIeM/+8vG4iEvBQCOQWN9Y2W+Wq2sHXCQftY86BoHhz9I7+3fgmJkB7EZ0a8XzCYlIqLrNekn6rejykd1kAws+q/6/YKD7pmAo/aq0Q+6JAAAAAAAAAAAAAAAQC+N9Y2Vse7f1urbwaDrCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwOn13wAAAP//KHnENg==") r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x1, 'bridge0\x00', {}, 0x80}) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000001d000100200000000000000007000000e2fda69d4ccf5490353f205a0bc00756a32c167d249345fc8e9079bcdf16e705b7475c474cb5cf6da3d76c3c310b33d1d6a35571f29235bae0", @ANYRES32, @ANYBLOB="800002000a0002000180c20000010000"], 0x28}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000180)={'syztnl0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x7808, 0x7800, 0xff, 0x4bc1, {{0x21, 0x4, 0x0, 0x0, 0x84, 0x67, 0x0, 0x5e, 0x29, 0x0, @loopback, @broadcast, {[@lsrr={0x83, 0x13, 0x8e, [@multicast2, @multicast1, @empty, @multicast2]}, @cipso={0x86, 0x4f, 0x0, [{0x0, 0x2}, {0x0, 0x2}, {0x0, 0x11, "308038cee6a63a8344d1f16be0fd14"}, {0x6, 0x11, "cc0fd4b614c6c3a6fab3d912d0fab2"}, {0x2, 0xf, "3dccd641ae289ade7b72737d00"}, {0x5, 0x7, "6734d3464f"}, {0x1, 0xd, "ce8ca2d28965c4a751ec06"}]}, @noop, @ssrr={0x89, 0xb, 0xe0, [@multicast1, @dev={0xac, 0x14, 0x14, 0x18}]}, @end]}}}}}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) fallocate(r7, 0x11, 0x0, 0x8000000) openat$dir(0xffffffffffffff9c, &(0x7f0000000400)='./file0/file1\x00', 0x2441, 0x83) 5.470196938s ago: executing program 2 (id=305): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x3fffffffc, 0x4}, 0x0, 0x0, 0x0, 0x2, 0xfff, 0xa001, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000190426bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0305000000000200080025000100000008000400"], 0x30}, 0x1, 0x0, 0x0, 0x20004800}, 0x24000009) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000190001000000000000000000021800000000fd000000ed0008000100ac141400340008"], 0x2c}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xfffffffffffffff9) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = epoll_create(0xfffff8d9) epoll_pwait(r1, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x80000000, &(0x7f0000000440)={[0x5]}, 0x8) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x81, 0x0, 0x0, 0x0, 0x10, 0x640a9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x3}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@delsa={0x48, 0x12, 0x1, 0x0, 0x0, {@in=@dev}, [@srcaddr={0x14, 0xd, @in6=@rand_addr=' \x01\x00'}, @mark={0xc}]}, 0x48}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x190, 0x5b30}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_PACKETS_PER_SLAVE={0x8, 0x14, 0x2}]}}}]}, 0x3c}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x1, 0x10, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x2800}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_ICV_LEN={0x5, 0x3, 0x8}]}}}]}, 0x3c}}, 0x0) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000000082295"], &(0x7f0000000040)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x1f4, 0xd50, 0x1000000, &(0x7f0000000100)="ff412f66b0833efc8864968781", 0x0, 0x300, 0x300, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe, 0x2}, 0x50) 5.4407746s ago: executing program 2 (id=306): sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000440)=[{{0x0, 0x0, &(0x7f0000000540), 0x0, 0x0, 0x0, 0x900}}], 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x7, 0x4) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) set_mempolicy(0x8006, 0x0, 0x5) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCL_SETVESABLANK(r2, 0x560e, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x2}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a90000000060a0b0400000000000000000200000064000480240001800b000100736f636b657400001400028008000240000000030800014000000005240001800b0001007470726f787900001400028008000140000000020800024000000003180001800d00010073796e70726f787900000000040002900900010073797a30000000000900020073797a32"], 0xb8}}, 0x40408c0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x670, 0x5, 0x3d0, 0x0, 0x1a0, 0xfeffffff, 0x270, 0x270, 0x338, 0x338, 0xffffffff, 0x338, 0x338, 0x5, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'veth0_to_bond\x00', 'caif0\x00', {}, {}, 0x6}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@inet=@tcp={{0x30}}, @common=@inet=@tcp={{0x30}, {[], [], 0x0, 0x0, 0x2}}]}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @broadcast, @remote, @icmp_id}}}}, {{@ip={@loopback, @rand_addr, 0x0, 0x0, 'lo\x00', 'ip6tnl0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id}}}}, {{@ip={@remote, @broadcast, 0x0, 0x0, 'pim6reg0\x00', 'wlan0\x00'}, 0x0, 0x90, 0xc8, 0x0, {}, [@common=@socket0={{0x20}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @rand_addr, @gre_key, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x430) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000000740)=ANY=[], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1}, 0x8}, 0x94) perf_event_open(&(0x7f0000000cc0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0x2, 0x8406, 0x7, 0x8, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x4a}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) timer_create(0x3, 0x0, &(0x7f0000044000)=0x0) timer_settime(r6, 0x236bd4336e4642df, &(0x7f0000000300), 0x0) r7 = socket(0x10, 0x803, 0x0) sendto(r7, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 4.906347636s ago: executing program 4 (id=311): sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000440)=[{{0x0, 0x0, &(0x7f0000000540), 0x0, 0x0, 0x0, 0x900}}], 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x7, 0x4) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCL_SETVESABLANK(r1, 0x560e, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x2}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a90000000060a0b0400000000000000000200000064000480240001800b000100736f636b657400001400028008000240000000030800014000000005240001800b0001007470726f787900001400028008000140000000020800024000000003180001800d00010073796e70726f787900000000040002900900010073797a30000000000900020073797a32"], 0xb8}}, 0x40408c0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x670, 0x5, 0x3d0, 0x0, 0x1a0, 0xfeffffff, 0x270, 0x270, 0x338, 0x338, 0xffffffff, 0x338, 0x338, 0x5, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'veth0_to_bond\x00', 'caif0\x00', {}, {}, 0x6}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@inet=@tcp={{0x30}}, @common=@inet=@tcp={{0x30}, {[], [], 0x0, 0x0, 0x2}}]}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @broadcast, @remote, @icmp_id}}}}, {{@ip={@loopback, @rand_addr, 0x0, 0x0, 'lo\x00', 'ip6tnl0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id}}}}, {{@ip={@remote, @broadcast, 0x0, 0x0, 'pim6reg0\x00', 'wlan0\x00'}, 0x0, 0x90, 0xc8, 0x0, {}, [@common=@socket0={{0x20}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @rand_addr, @gre_key, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x430) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000000740)=ANY=[], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1}, 0x8}, 0x94) perf_event_open(&(0x7f0000000cc0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0x2, 0x8406, 0x7, 0x8, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x4a}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) timer_create(0x3, 0x0, &(0x7f0000044000)=0x0) timer_settime(r4, 0x236bd4336e4642df, &(0x7f0000000300), 0x0) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 2.433436535s ago: executing program 1 (id=333): socket$nl_route(0x10, 0x3, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x2, @perf_config_ext={0x6, 0xf60e}, 0x9192, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r0 = socket(0x28, 0x5, 0x0) r1 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r1, 0x4) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000000100), 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$sndseq(r2, &(0x7f0000000180)=[{0x0, 0x47, 0xd, 0x0, @tick=0x900, {0x40, 0xff}, {0x10, 0x9}, @note={0xa, 0x8, 0xb0, 0x9, 0x3}}, {0x0, 0x0, 0x0, 0x0, @tick=0x46f, {}, {0x80, 0x1}, @connect={{0x40, 0x7}, {0x80, 0xf6}}}], 0x38) r3 = accept4$unix(r1, 0x0, 0x0, 0x800) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) recvfrom$unix(r3, &(0x7f0000000140)=""/248, 0x1ffd4, 0x0, 0x0, 0x0) 2.374393709s ago: executing program 1 (id=334): prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9}, 0x0, 0x0, 0x800000, 0x0, 0x20002, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22020400) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r3, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt(r3, 0x200000000114, 0x2715, 0x0, &(0x7f0000000400)) r4 = io_uring_setup(0x1b7a, &(0x7f0000000040)={0x0, 0x970, 0x1f480, 0xfffffffc, 0x399}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) io_uring_enter(r4, 0x8ae, 0x6931, 0x17, 0x0, 0x0) syz_emit_ethernet(0xaf, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) poll(0x0, 0x0, 0x9) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) 1.920468509s ago: executing program 4 (id=339): bpf$PROG_LOAD(0x5, 0x0, 0x6) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1, 0x4, 0x0, 0x0, 0xfffffff3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8}, 0x94) r0 = eventfd2(0x7fffffff, 0x80000) timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') r2 = creat(&(0x7f0000000280)='./file0\x00', 0x44) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="c4"], 0x20) r3 = open$dir(&(0x7f0000000200)='./file0\x00', 0x1a5280, 0xc8) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0xf4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1b}, 0x0, 0x0, 0xffffffff, 0x4, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) memfd_create(&(0x7f0000000000)='\x02\x00\x00\x00\x1e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x95\xa5g\x8cyj\xe4\xd1_9\x83\x81\x99\x10>LZcp\xc8\bW1', 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet6(r4, &(0x7f0000000500)={&(0x7f0000000080)={0xa, 0xce27, 0x81, @dev={0xfe, 0x80, '\x00', 0x23}, 0x8}, 0x1c, &(0x7f00000001c0)=[{&(0x7f00000000c0)="06", 0x1}], 0x1}, 0x80001) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={r5, 0x4}, 0x8) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x400, &(0x7f00000002c0)=ANY=[@ANYRES16=0x0], 0xfd, 0x2c7, &(0x7f0000000b80)="$eJzs3U1rE1sYwPGnadMmKW2yuFy4F6QPutHN0MZPEKQFMaDUpqgLYWonGjImJRMjEbHduXXndygu3QnWL9CNO/fipgiCmy6kI53JmGk7fTVp0vb/g3JO55wn58wL5Zmhc7Jx783TctEximZdYgmVmCRWZFMkIzEJLLfK7S0DMixhK3Jt9OeXS3fvP7iVy+enZ1VncnPXs6o6PvHx+ct3lz/VR+ffj38YkfXMw40f2a/r/67/t7E1F3x6ta6mLlSrdXPBtnSx5JQN1Tu2ZTqWliqOVdvRXrSrS0tNNSuLY6mlmuU4alaaWraaWq9qvdZU87FZqqhhGDqWkotm8KDGZNTGwursrJk71iCxY04KpynyLNdqOXMwsrGwehqTAgAA/WVv/i978v+BVtnJ/P9JydGSo5XD8v+YkP93j5f/b0UmjTgf4ts3ADkzFXnrRv4PAAAAAAAAAAAAAAAAAAAAAMBZsOm6add100EZ/IyISEK2En4vN93reaI7Dj7/IsHvoZCBHk4XHRZ6cS8hYr9uFBoFv/Tbc0UpiS2WTMZFfnnXQ4tfn7mZn55UT0bW7OVWvPeS4EgQH8hEx0/58RqKX24U4pIKj5+VtPwTHZ/dFR8XkUZhWK5eCcUbkpbPj6Qqtix613U7/tWU6o3b+V3jJ71+AAAAAACcB4b+kdl5/+uvJmkYGiwbsqvd39h+PiDpQ54PqKwNSzt+SP4f6t1+AwAAAABwkTjNF2XTtq3aySsT838V3geVpBw/qiOH7oxVjNa/gx3Y2XVd7wtjjvjJb5Mi+zTFZN+mble+i0gfHPBOV74980/gUTr38q8SAAAAgG5oJ/29ngkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABfXURcPC/qfZO2x0HCDvdlLAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoD/8DgAA//8uWRWa") openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000540)={0x80000000}) read(r0, 0x0, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x2c, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x9, @private2={0xfc, 0x2, '\x00', 0x6}, 0x7177}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f00000002c0)={r8, 0x5}, 0x8) 1.859564223s ago: executing program 4 (id=341): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) request_key(0x0, 0x0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbee2, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x2, 0x0, &(0x7f0000044000)=0x0) timer_settime(r0, 0x1, &(0x7f0000020440), 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000010280)='./file0/../file0\x00', 0x2a00c1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = socket(0x400000000010, 0x3, 0x20000000) r3 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x70bd29, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xc, 0xf}}}, 0x24}}, 0x20008850) r5 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000020500)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000020480)=@gettfilter={0x5c, 0x2e, 0x205, 0x70bd2c, 0x25dfdafd, {0x0, 0x0, 0x0, r6, {0xc, 0xc}, {0x0, 0xfff1}}, [{0x8, 0xb, 0x6}, {0x8, 0xb, 0x7ff}, {0x8, 0xb, 0x7}, {0x8, 0xb, 0x2}, {0x8}, {0x8, 0xb, 0x5}, {0x8, 0xb, 0x3ff}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000801}, 0x4041080) open_tree(r1, &(0x7f00000000c0)='./file0/../file0\x00', 0x1000) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.844896214s ago: executing program 2 (id=342): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x20, r4, 0x309, 0x70bd2c, 0x0, {0x1d}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x880}, 0x40000) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) r7 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r7, &(0x7f0000000380)={0x1d, r8, 0x2, {0x2, 0x0, 0x2}}, 0x18) sendmsg$IPVS_CMD_NEW_DEST(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x500}, 0x1, 0x0, 0x0, 0x24008807}, 0x8010) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={0x4c, 0x12, 0x301, 0x0, 0x0, {0x0, 0x0, 0x2, 0x0, {}, 0xf0ffdfff}}, 0x4c}}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) 1.794430728s ago: executing program 0 (id=343): prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9}, 0x0, 0x0, 0x800000, 0x0, 0x20002, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22020400) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r3, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = io_uring_setup(0x1b7a, &(0x7f0000000040)={0x0, 0x970, 0x1f480, 0xfffffffc, 0x399}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) io_uring_enter(r4, 0x8ae, 0x6931, 0x17, 0x0, 0x0) 1.248081815s ago: executing program 1 (id=349): ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="01030003000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)=ANY=[@ANYBLOB="4c00000010001ffffcfffffffdffffff00000000", @ANYRES32=0x0, @ANYBLOB="0002010000000000240012800b00010065727370616e000014000280050016000000000008000700ac1414bb08000a00", @ANYRES32=r3], 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x4) r6 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x6}, 0x100224, 0x1, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001380)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x50) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x20088814}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x7400, &(0x7f00000001c0)={&(0x7f0000000200)=@delchain={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x24}}, 0x0) 1.16638971s ago: executing program 3 (id=350): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000004c0)={0xa, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x840, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x10000, 0x3, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x1003000, 0x0, 0x2000, 0x0, 0x0, 0x0) 1.159860051s ago: executing program 3 (id=351): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000280)=[{&(0x7f0000000300)="d8000000187c81054e81f782db4cb904021d080406037c09e8fe55a10a0015400400142603600e122f00160006000600a8000600200005400700027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1, 0x0, 0x0, 0x4a0f0000}, 0x0) 1.138757662s ago: executing program 4 (id=352): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000400000000000000000000008500000007000000850000000f00000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="1d89314af63c17fe75948ee98c19", 0x0, 0x1008, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 1.03027503s ago: executing program 4 (id=353): prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9}, 0x0, 0x0, 0x800000, 0x0, 0x20002, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x22020400) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r3, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40) 1.015495651s ago: executing program 3 (id=354): r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) fcntl$lock(r0, 0x410, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0xfffe}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r2 = gettid() timer_create(0x9, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, 0x0, 0x0) fremovexattr(r1, &(0x7f0000000000)=@known='system.posix_acl_default\x00') 800.926816ms ago: executing program 0 (id=355): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x3fffffffc, 0x4}, 0x0, 0x0, 0x0, 0x2, 0xfff, 0xa001, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000190426bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0305000000000200080025000100000008000400"], 0x30}, 0x1, 0x0, 0x0, 0x20004800}, 0x24000009) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000190001000000000000000000021800000000fd000000ed0008000100ac141400340008"], 0x2c}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x9, 0x1, 0x0, 0x0, 0x0, 0x4000000000000007, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x3}, 0x2200, 0x10004, 0x20da, 0x1, 0x7fffffffffffffff, 0x20005, 0x5e8, 0x0, 0x10000, 0x0, 0x20000006}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = epoll_create(0xfffff8d9) epoll_pwait(r1, 0x0, 0x0, 0x80000000, &(0x7f0000000440)={[0x5]}, 0x8) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x81, 0x0, 0x0, 0x0, 0x10, 0x640a9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x3}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@delsa={0x48, 0x12, 0x1, 0x0, 0x0, {@in=@dev}, [@srcaddr={0x14, 0xd, @in6=@rand_addr=' \x01\x00'}, @mark={0xc}]}, 0x48}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x190, 0x5b30}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_PACKETS_PER_SLAVE={0x8, 0x14, 0x2}]}}}]}, 0x3c}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x1, 0x10, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x2800}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_ICV_LEN={0x5, 0x3, 0x8}]}}}]}, 0x3c}}, 0x0) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000000082295"], &(0x7f0000000040)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x1f4, 0xd50, 0x1000000, &(0x7f0000000100)="ff412f66b0833efc8864968781", 0x0, 0x300, 0x300, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe, 0x2}, 0x50) 750.836219ms ago: executing program 0 (id=356): r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000140)={&(0x7f0000000340)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f0000000380)=[{&(0x7f00000001c0)='N', 0x1}], 0x1, 0x0, 0x0, 0x804c040}, 0x4000891) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, 0x0, 0x0) 726.145061ms ago: executing program 1 (id=357): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="0100000000000000000008000000180001801400020073797a5f74756e00000000000000000018000280080002000a00000004000100080004"], 0x44}}, 0x0) 670.427324ms ago: executing program 0 (id=358): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x74099, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x4, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x7, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002040)={0x5, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="611570180000000061136c0000000000bfa000000000000014000000ee0016055e03010000000000160500000001000069163e0000000000bf07000000000000260507000fff07206706000020000201140600000ee60060bf500000000000002f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05002000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ace0600006e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc0da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44e2a2235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d00c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932fb3bba54b3a6aa57f1ad2e99e0e67ab9ff16d20000009f0f53acbb40b4f8e2738270001562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000007b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000815266b2c9e1bfadc7498e9dda5d000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631822a11dc3c693962895496d4f6e9cc54db6c7205a6b26f92121ef53e553acdf42068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710eec53f1b11cced7bc3c8da0c44d2fbf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db80300c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f8709d87b27f8a5d9121fdc058447b728f134f72062fc4b1ca0780b1a7af137ff7b4ff139604faf0453b65586f65c7943d56b52f06c870edf0c5d744b5272b44c23480b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca871073f6bd61940aabc86b94f8cbde4d47060400e722a6a2af483ad0d3415ed0f9db009acaba9eaea93f811d434e00000000000000000000d154672fea96aedf346279ec00000000000000000000d535d41b0067f01e2e54b9154d876020b669640ead4ca44631fadf7c4ac39a1b331dbdcd52b36df021b731ef1f92330d347f88ced5c1aaadbcdd8d2257e3a9a7c7494fadf9be36f7a2334ee6e9446fa1fd486f85d672a77dc5bd21463994d49f12016305a1e394d292b66840fe32b40ad665d241a8b8a32b3100450c32832789aa8a096f41201b585cd76631c88cf958e9e9047f5af1730c5e83db12460a0768fd4b62be6c41eed307048bac8d1f7f164574241e06027654b248dcc38749eee0c1ee7c61b3f6411a559c3d45637b11e440ed5a99109b8e71d28c3d677af5f0499c6d3fc6a129775056958c9df824ebe5fa9fb306b24a8a8334910627d03efe69d4b61c4345f048c5da8aca16cea848fa77d2507c920a6bd654b00e07789382ed902c80deeff2fd5c78f42e4353e5360c3e55962efd1331e6736eaf4ee27736fa54803ee8ec1a15266ffcd8b30368740b584c2559e691e542cab3d49db327db62328f159d1e0900b3e23e84dedcd1377aa15dbeab7db181bd66980c3557c7d9f7377fcb6023accb5c368a121acf70e5f4c3f2a0ea07011c7149ea979cab2ee65cf7ffa29152b7a8fed89575e6e6fd77d4d9463d21775abac886ee6a1f2d7d8523840438a73d6307a87e2f525867fc3af7ab74520a773ae26bae74cdd405a211e8833e1ba523cde51d04a7ca6732"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 670.080604ms ago: executing program 0 (id=359): getuid() newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xff, 0x3, 0x2, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0xec, 0x4}, 0x8000, 0x7, 0xfff, 0x7, 0x3, 0x7f, 0x5, 0x0, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000006400000000000000ffffffff85000000a400000095"], &(0x7f0000000000)='syzkaller\x00', 0x1}, 0x94) setresuid(0xee01, r0, r0) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6000, 0x400, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, 0xee01, r1) setreuid(0xffffffffffffffff, 0xee01) getuid() (async) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000200), 0x6000) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xff, 0x3, 0x2, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0xec, 0x4}, 0x8000, 0x7, 0xfff, 0x7, 0x3, 0x7f, 0x5, 0x0, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000006400000000000000ffffffff85000000a400000095"], &(0x7f0000000000)='syzkaller\x00', 0x1}, 0x94) (async) setresuid(0xee01, r0, r0) (async) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6000, 0x400, &(0x7f0000000100)) (async) setresuid(0xee00, 0xee01, r1) (async) setreuid(0xffffffffffffffff, 0xee01) (async) 669.944594ms ago: executing program 1 (id=360): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0x50) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x13, r1, 0x32139000) 624.961537ms ago: executing program 0 (id=361): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0xf, 0x1c, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000001000000000000008100000018110000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x9, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_device=0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000080)={{0x0, 0x7, 0x3fc, 0x7fffffffffffffff, 0x0, 0x673, 0x2, 0xd2, 0x10000, 0x91, 0x8, 0x9, 0x5, 0x6, 0x681}, 0x20, [0x0, 0x0, 0x0, 0x0]}) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x652c0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_config_ext={0x800000, 0x3fff8000}, 0x844, 0x32, 0x43a1bd76, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0xfffffda1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0xfffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe, 0x0, @perf_bp={0x0, 0x9}, 0x17008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x80008000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000022c0)={{r1, 0x10, 0x4, 0x3, 0x0, 0x9, 0x8, 0x5, 0x6, 0x3, 0x5, 0x2, 0x2000000000007, 0x7, 0x5}}) add_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000200)="7589d70300", 0xfe07, 0xfffffffffffffffe) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f00000002c0)={0x0, 'syzkaller0\x00', {0x1}, 0xb5}) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) 624.636197ms ago: executing program 1 (id=362): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000008c0)='./file1\x00', 0x1008490, &(0x7f0000000a40)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000001500)="$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") quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)={0x51, 0x6, 0x7, 0x7fffffffffffffff, 0xfffffffffffffffa, 0xfffffffffffffffb, 0x10000000000000, 0x7fff, 0x2}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) (async) ioctl$TCFLSH(r0, 0x540b, 0x2) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', 0x2048c5, &(0x7f0000000000)=ANY=[@ANYRES64=r0], 0x1, 0x2b9, &(0x7f00000003c0)="$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") perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x2, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x5, @perf_bp={0x0, 0x9}, 0x106200, 0x1000, 0x20da, 0x0, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) (async) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x2, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x5, @perf_bp={0x0, 0x9}, 0x106200, 0x1000, 0x20da, 0x0, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4, 0x1f, 0x8, 0x0, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde4, 0x1f, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYRES64=r1], 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYRES64=r1], 0x48) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRESHEX], 0x4, 0x1296, &(0x7f0000001b80)="$eJzs3c9rY0UcAPBv2nQ37bpN1XV1F8RBL4qQ3fbgyUuRXRArSrULKghvbaoh6Q+aUEgRt548Cf4Zoh69CeI/0IsXz4Ig0ovHPYhP2qRr0/SX/Qny+VwyzMx35jud18ALb3gbr341X59rVuayVgwUClFcGoriwxQpBmIwOtbipXu//PrsO++9/8bk1NSd6ZTuTr47/kpKafS5Hz/49Lvnf2pduff96A+XY31sYOPPid/Wr6/f2Pj726g1U62ZFhZbKUv3Fxdb2f1GNc3WmvVKSm83qlmzmmoLzepyT/tcY3FpqZ2yhdmrI0vL1WYzZQvtVK+2U6uQWsvtlH2c1RZSpVJJV0eCk5j55mGe5xF5PhSXIs/zfDhG4ko8FldjNMoxFo/HE/FkXIun4no8Hc/Eja1eF503AAAAAAAAAAAAAAAAAAAA/L8ccv6/4Pw/AAAAAAAAAAAAAAAAAAAAnL3d5/+LEd7/DwAAAAAAAAAAAAAAAAAAAOfskPf/7zr//7Lz/wAAAAAAAAAAAAAAAAAAAHAWSp2P6ZRKEfNfrMyszHQ+O/WTc1GLRlTjdpTjr9g6/d/RKd99ferO7bRlLG7NP+jGP1iZGeyNHx8qx1hhz/jx4YhIKfXGX46RnfETUY5re88/0Zl/V3wpXnxhM/7zTnwlyvHzR7EYjZiNKHRXvxX/2XhKr701Ndwbf3Oz374Gz3hbAAAA4DRV0iP99+9r3U6d9lJve6epe3+euj0LB/w+sOv+vBg3ixe1arY126v1rNGoLh+zcGn/cS6dbOS+QiEisthZMzry+/Tm5EccZ/tyO6V8dhQGjxF1/DSGDu5zgj2N4pH/mKv10lFSPfrudJNf212TlyN21Nz68M36oeP88fWOmlKc9nbvVRh4tNKB7mWWNdaOfLHFWp6faYZ9/4zD7dX65YOi9v/OKJzxdxLn599Nv+hMAAAAAAAAAAAA+C/2fPpvOCL6ngf8pK9m+/Hw3vD+kfef/ctzWCEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/sAPHAgAAAADC/K3T6NgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4KgAA//+hs8cA") r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000e80)='./bus\x00', 0x1c1002, 0x0) write$bt_hci(r3, &(0x7f0000004d00)=ANY=[], 0xa) sendfile(r3, r2, 0x0, 0x40001) (async) sendfile(r3, r2, 0x0, 0x40001) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/38) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000200)) 200.777336ms ago: executing program 3 (id=363): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x809, 0x510, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x10001, 0xda, 0x0, 0xabca, 0x85, 0xa, 0x0, 0x0, 0x0, 0x4000000020000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="1400000d100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000000b0002007665746830"], 0xa8}}, 0x0) 122.533431ms ago: executing program 3 (id=364): pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000)="fc0000001d000724ab09254ec100070007ab08001b000000f0ffff002100057e0000000100000e000039000000039815fad151ba0101099cecb94b46fe0000000a00020025", 0xffffff0c) close(r0) 61.876196ms ago: executing program 3 (id=365): r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) prctl$PR_MCE_KILL(0x35, 0x0, 0x8) prctl$PR_GET_SPECULATION_CTRL(0x35, 0x0, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x2b, 0x80801, 0x1) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000240)) bind$packet(r4, &(0x7f0000000100)={0x11, 0x4, r2, 0x1, 0x5, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1e}}, 0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'bond0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001400)=ANY=[@ANYBLOB="3c00000010003b15000800"/20, @ANYRES32=0x0, @ANYBLOB="340e000000b401001400128009000100626f6e64000000000400028008000a00", @ANYRES32=r7], 0x3c}}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), r0) getsockopt$PNPIPE_IFINDEX(r4, 0x113, 0x2, &(0x7f0000000200)=0x0, &(0x7f0000000300)=0x4) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r11, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000040)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', r12}, 0x94) sendmsg$ETHTOOL_MSG_RINGS_GET(r4, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x154, r9, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x10}, 0x40) r13 = socket(0x840000000002, 0x3, 0x100) connect$inet(r13, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(r13, &(0x7f0000005240), 0x4000095, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r13, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r13, 0x0, 0x20, &(0x7f0000000080)={@local, @rand_addr=0x64010101, r14}, 0xc) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="340000001100050000000000feffffff07000000", @ANYRES32=r8, @ANYBLOB="003000000000000014001a80100004800c0009"], 0x34}, 0x1, 0x0, 0x0, 0x800c000}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x50, 0x24, 0xd0f, 0x70bd27, 0x0, {0x60, 0x0, 0x0, r2, {0x0, 0x2}, {0xffff, 0xffff}, {0x0, 0xe}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0x8}}}, @TCA_RATE={0x6, 0x5, {0x40, 0x1}}]}, 0x50}}, 0x0) 0s ago: executing program 4 (id=366): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200480, 0x171) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2f}}}, 0x6, 0x5}, 0x90) ioctl$XFS_IOC_GETBMAPX(r0, 0xc0205838, &(0x7f0000000100)={0x3, 0x400, 0x400, 0x9, 0x74, 0x10}) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000180)={0x8000000000000001, 0x8, '\x00', 0x0, &(0x7f0000000140)=[0x0]}) getdents64(r0, &(0x7f00000001c0)=""/20, 0x14) getdents64(r0, &(0x7f0000000200)=""/214, 0xd6) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000300)=0x6000, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000340)={0x200, 0x800, 0xd, 0x40, 0xc, 0x4e96, 0x2, 0xb, 0x0}, &(0x7f0000000380)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000003c0)={0x2, 0x3, 0xc, 0x1000, 0x0, 0x40, 0x7, 0x1, r1}, &(0x7f0000000400)=0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000440), 0x4801, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000480)={0x0, 0x200, 0xf6}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000c80)={0x0, 0xfffffffffffff2d6, 0x1, [0x5, 0x9, 0xe, 0x4, 0x3], [0x4, 0x9, 0x8000000000000000, 0xfff, 0x4, 0xfff, 0x7, 0x5, 0xe0c, 0x7, 0x9, 0x400, 0x8000000000000001, 0x9648, 0x1ff, 0x560, 0xaa5, 0x7, 0x3, 0x1ff, 0x81, 0x6, 0x8001, 0x3, 0x8000000000000000, 0x8, 0xb32, 0x5, 0x43c5, 0x8, 0x5726, 0x10001, 0xed4, 0x7, 0xff, 0x10000, 0x0, 0x5, 0x81, 0x6, 0x0, 0x8, 0x2c29, 0x8, 0x10001, 0x6, 0x6, 0x9, 0x8, 0x8001, 0x1ff, 0x7, 0x0, 0xdad, 0x5, 0x2, 0x8, 0x7fffffffffffffff, 0x8000000000000000, 0xffffffffffffffff, 0xfffffffffffffffa, 0x5, 0x3, 0x7fffffff, 0x5, 0xff, 0x3, 0x6, 0x8, 0x9, 0xe, 0x0, 0x7f3d, 0x1, 0x0, 0x1, 0x9bde, 0x1000, 0x0, 0x80000000, 0x9, 0x401, 0x800, 0xf, 0x401, 0x8, 0x3dd, 0x57b3, 0x7ff, 0x4, 0x7, 0x9, 0x8, 0x1, 0x5, 0x0, 0x57, 0x8000000000000000, 0x0, 0xb0, 0x81, 0x4, 0x5, 0x9e8, 0x100000000, 0xf95, 0xfffffffffffffff2, 0x100000000, 0x4f28c8a, 0x3, 0x0, 0x2, 0x8, 0xe, 0x5, 0x2, 0x7f, 0xc, 0xfffffffffffffffc, 0x4, 0x10001]}) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f00000010c0)={0x1, 0x1, {0x7, @usage=0x4, r3, 0x0, 0x1, 0x5, 0x2, 0xfffffffffffffffa, 0x3f, @struct={0xfffffff9, 0x7}, 0x9, 0x2, [0x800, 0x2, 0x2, 0x9, 0x4, 0xfff]}, {0x9, @struct={0x6, 0x3}, r4, 0x1, 0x2, 0x3a, 0x0, 0x7f, 0x80, @usage=0xcc0a, 0x3, 0x5, [0xbaa7, 0x1, 0x401, 0x2b, 0x2, 0x6]}, {0x5, @struct={0xffff36a9, 0xf5}, r5, 0x1, 0x8, 0x1, 0x4, 0x1, 0x80, @usage=0x8c, 0xffffffff, 0x3, [0x200, 0xd, 0x4, 0xffff, 0x80000000, 0x3]}, {0x7ff, 0xfffffffffffffffe, 0x7fff}}) renameat(r0, &(0x7f00000014c0)='./file0\x00', r2, &(0x7f0000001500)='./file0\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/177, 0xb1}], 0x1) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x20010, r0, 0xdcd31000) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000001640)={0x1000, 0x0, 0x200, 0x5, 0x8, "e4363cbfb87c832490e83596d327cf6aa3760d", 0xac, 0x7ff}) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000016c0), r0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001700)={'netdevsim0\x00', 0x0}) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f00000017c0)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001780)={&(0x7f0000001740)={0x1c, r6, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4004400) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, &(0x7f0000001800)=[@ioring_restriction_register_op={0x0, 0xb}, @ioring_restriction_sqe_op={0x1, 0x1c}, @ioring_restriction_register_op={0x0, 0x3}, @ioring_restriction_register_op={0x0, 0xc}], 0x4) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r8, 0xf503, 0x0) ioctl$SIOCX25GSUBSCRIP(0xffffffffffffffff, 0x89e0, &(0x7f0000001840)={'bond_slave_0\x00', 0x9}) clock_gettime(0x0, &(0x7f000000acc0)={0x0, 0x0}) recvmmsg(r0, &(0x7f000000aa40)=[{{&(0x7f0000001940)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)=""/36, 0x24}], 0x1, &(0x7f0000001a40)=""/96, 0x60}, 0x46}, {{&(0x7f0000001ac0)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001b40)=""/82, 0x52}, {&(0x7f0000001bc0)=""/55, 0x37}, {&(0x7f0000001c00)=""/158, 0x9e}, {&(0x7f0000001cc0)=""/212, 0xd4}, {&(0x7f0000001dc0)=""/95, 0x5f}, {&(0x7f0000001e40)=""/165, 0xa5}], 0x6, &(0x7f0000001f80)=""/226, 0xe2}, 0x1}, {{&(0x7f0000002080)=@l2tp={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000003100)=[{&(0x7f0000002100)=""/4096, 0x1000}], 0x1, &(0x7f0000003140)=""/25, 0x19}, 0x8}, {{&(0x7f0000003180)=@nfc, 0x80, &(0x7f0000003580)=[{&(0x7f0000003200)=""/207, 0xcf}, {&(0x7f0000003300)=""/201, 0xc9}, {&(0x7f0000003400)=""/77, 0x4d}, {&(0x7f0000003480)=""/203, 0xcb}], 0x4, &(0x7f00000035c0)=""/246, 0xf6}, 0x4}, {{&(0x7f00000036c0)=@rc={0x1f, @none}, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003740)=""/215, 0xd7}, {&(0x7f0000003840)=""/49, 0x31}, {&(0x7f0000003880)=""/227, 0xe3}, {&(0x7f0000003980)=""/238, 0xee}, {&(0x7f0000003a80)=""/120, 0x78}, {&(0x7f0000003b00)=""/252, 0xfc}], 0x6, &(0x7f0000003c80)=""/4096, 0x1000}, 0xa0}, {{&(0x7f0000004c80)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000005e00)=[{&(0x7f0000004d00)=""/4096, 0x1000}, {&(0x7f0000005d00)=""/228, 0xe4}], 0x2, &(0x7f0000005e40)=""/22, 0x16}, 0x8}, {{&(0x7f0000005e80)=@phonet, 0x80, &(0x7f0000005f80)=[{&(0x7f0000005f00)=""/82, 0x52}], 0x1, &(0x7f0000005fc0)=""/4096, 0x1000}, 0x6e}, {{&(0x7f0000006fc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000007040), 0x0, &(0x7f0000007080)=""/169, 0xa9}, 0x1}, {{&(0x7f0000007140)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000009540)=[{&(0x7f00000071c0)=""/216, 0xd8}, {&(0x7f00000072c0)=""/163, 0xa3}, {&(0x7f0000007380)=""/205, 0xcd}, {&(0x7f0000007480)=""/4096, 0x1000}, {&(0x7f0000008480)=""/4096, 0x1000}, {&(0x7f0000009480)=""/155, 0x9b}], 0x6, &(0x7f00000095c0)=""/4096, 0x1000}, 0x6}, {{&(0x7f000000a5c0)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f000000a9c0)=[{&(0x7f000000a640)=""/171, 0xab}, {&(0x7f000000a700)=""/204, 0xcc}, {&(0x7f000000a800)=""/94, 0x5e}, {&(0x7f000000a880)=""/147, 0x93}, {&(0x7f000000a940)=""/86, 0x56}], 0x5}, 0x37}], 0xa, 0x2, &(0x7f000000ad00)={r9, r10+60000000}) r11 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCBRADDBR(r11, 0x89a0, &(0x7f000000ad40)='ip6_vti0\x00') kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.77' (ED25519) to the list of known hosts. [ 30.392350][ T28] audit: type=1400 audit(1775524841.825:62): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 30.415323][ T28] audit: type=1400 audit(1775524841.845:63): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.416001][ T3299] cgroup: Unknown subsys name 'net' [ 30.443073][ T28] audit: type=1400 audit(1775524841.875:64): avc: denied { unmount } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.579944][ T3299] cgroup: Unknown subsys name 'cpuset' [ 30.586084][ T3299] cgroup: Unknown subsys name 'rlimit' [ 30.716488][ T28] audit: type=1400 audit(1775524842.145:65): avc: denied { setattr } for pid=3299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.741085][ T28] audit: type=1400 audit(1775524842.145:66): avc: denied { create } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.761715][ T28] audit: type=1400 audit(1775524842.145:67): avc: denied { write } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.784735][ T28] audit: type=1400 audit(1775524842.145:68): avc: denied { read } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.789987][ T3301] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 30.805264][ T28] audit: type=1400 audit(1775524842.145:69): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 30.839332][ T28] audit: type=1400 audit(1775524842.145:70): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 30.863229][ T28] audit: type=1400 audit(1775524842.175:71): avc: denied { read } for pid=3037 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 30.887950][ T3299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 31.955423][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 32.005620][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.012833][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.019961][ T3316] bridge_slave_0: entered allmulticast mode [ 32.026293][ T3316] bridge_slave_0: entered promiscuous mode [ 32.034819][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.042006][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.049058][ T3316] bridge_slave_1: entered allmulticast mode [ 32.055623][ T3316] bridge_slave_1: entered promiscuous mode [ 32.085898][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.098007][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.119298][ T3316] team0: Port device team_slave_0 added [ 32.127470][ T3316] team0: Port device team_slave_1 added [ 32.160982][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.168040][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.194174][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.217798][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.224789][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.251166][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.294192][ T3316] hsr_slave_0: entered promiscuous mode [ 32.300281][ T3316] hsr_slave_1: entered promiscuous mode [ 32.310726][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 32.338185][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 32.414061][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.421199][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.428343][ T3311] bridge_slave_0: entered allmulticast mode [ 32.434850][ T3311] bridge_slave_0: entered promiscuous mode [ 32.443677][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.451195][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.458326][ T3311] bridge_slave_1: entered allmulticast mode [ 32.464675][ T3311] bridge_slave_1: entered promiscuous mode [ 32.476896][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 32.503419][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.510729][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.517933][ T3314] bridge_slave_0: entered allmulticast mode [ 32.524617][ T3314] bridge_slave_0: entered promiscuous mode [ 32.552033][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.559104][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.566326][ T3314] bridge_slave_1: entered allmulticast mode [ 32.572715][ T3314] bridge_slave_1: entered promiscuous mode [ 32.579422][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 32.595584][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.617777][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.651995][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.670685][ T3311] team0: Port device team_slave_0 added [ 32.677181][ T3311] team0: Port device team_slave_1 added [ 32.685982][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.712297][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.719412][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.726655][ T3310] bridge_slave_0: entered allmulticast mode [ 32.733071][ T3310] bridge_slave_0: entered promiscuous mode [ 32.744349][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.751535][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.778140][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.795586][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.802883][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.810090][ T3310] bridge_slave_1: entered allmulticast mode [ 32.816523][ T3310] bridge_slave_1: entered promiscuous mode [ 32.829722][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.836897][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.863051][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.878515][ T3314] team0: Port device team_slave_0 added [ 32.889237][ T3314] team0: Port device team_slave_1 added [ 32.902873][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.918840][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.925958][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.933241][ T3317] bridge_slave_0: entered allmulticast mode [ 32.939736][ T3317] bridge_slave_0: entered promiscuous mode [ 32.951996][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.962108][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.969259][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.976611][ T3317] bridge_slave_1: entered allmulticast mode [ 32.983033][ T3317] bridge_slave_1: entered promiscuous mode [ 32.989722][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.996791][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.022995][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.066300][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.073270][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.099295][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.113628][ T3310] team0: Port device team_slave_0 added [ 33.126883][ T3311] hsr_slave_0: entered promiscuous mode [ 33.133200][ T3311] hsr_slave_1: entered promiscuous mode [ 33.138981][ T3311] debugfs: 'hsr0' already exists in 'hsr' [ 33.144741][ T3311] Cannot create hsr debugfs directory [ 33.150338][ T3316] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 33.159170][ T3316] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 33.168481][ T3310] team0: Port device team_slave_1 added [ 33.179655][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.189890][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.199107][ T3316] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 33.222086][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.229062][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.255373][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.270429][ T3316] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 33.281398][ T3314] hsr_slave_0: entered promiscuous mode [ 33.287492][ T3314] hsr_slave_1: entered promiscuous mode [ 33.293523][ T3314] debugfs: 'hsr0' already exists in 'hsr' [ 33.299420][ T3314] Cannot create hsr debugfs directory [ 33.309986][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.316989][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.343358][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.377891][ T3317] team0: Port device team_slave_0 added [ 33.391716][ T3317] team0: Port device team_slave_1 added [ 33.406426][ T3310] hsr_slave_0: entered promiscuous mode [ 33.412403][ T3310] hsr_slave_1: entered promiscuous mode [ 33.418198][ T3310] debugfs: 'hsr0' already exists in 'hsr' [ 33.424322][ T3310] Cannot create hsr debugfs directory [ 33.461505][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.468471][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.494668][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.505995][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.513011][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.539506][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.610862][ T3317] hsr_slave_0: entered promiscuous mode [ 33.616930][ T3317] hsr_slave_1: entered promiscuous mode [ 33.623123][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 33.628858][ T3317] Cannot create hsr debugfs directory [ 33.685537][ T3314] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 33.694270][ T3314] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 33.708586][ T3314] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 33.717442][ T3314] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 33.775273][ T3310] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 33.784129][ T3310] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 33.795509][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.810129][ T3310] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 33.818447][ T3310] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 33.850956][ T3311] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 33.860986][ T3311] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 33.870909][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.880161][ T3311] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 33.889010][ T3311] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 33.912523][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.919609][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.928438][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.935606][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.953790][ T3317] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 33.965711][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.976345][ T3317] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 33.992094][ T3317] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 34.000980][ T3317] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 34.029204][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.045430][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.052512][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.068980][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.076101][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.122699][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.137656][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.147434][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.162419][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.169510][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.186956][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.195287][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.202372][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.217036][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.237103][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.244230][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.262239][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.269658][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.301428][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.317952][ T3310] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 34.330352][ T3310] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.345494][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.362151][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.382433][ T3311] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.404296][ T69] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.411478][ T69] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.425346][ T69] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.432448][ T69] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.482583][ T3316] veth0_vlan: entered promiscuous mode [ 34.518623][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.535793][ T3316] veth1_vlan: entered promiscuous mode [ 34.572691][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.628510][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.641546][ T3316] veth0_macvtap: entered promiscuous mode [ 34.659984][ T3316] veth1_macvtap: entered promiscuous mode [ 34.668787][ T3314] veth0_vlan: entered promiscuous mode [ 34.677198][ T3314] veth1_vlan: entered promiscuous mode [ 34.708481][ T3314] veth0_macvtap: entered promiscuous mode [ 34.731819][ T3311] veth0_vlan: entered promiscuous mode [ 34.738192][ T3314] veth1_macvtap: entered promiscuous mode [ 34.745499][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.758500][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.766425][ T3311] veth1_vlan: entered promiscuous mode [ 34.785039][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.794189][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.810689][ T3311] veth0_macvtap: entered promiscuous mode [ 34.817097][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.825994][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.842957][ T3310] veth0_vlan: entered promiscuous mode [ 34.850789][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.858236][ T3311] veth1_macvtap: entered promiscuous mode [ 34.869846][ T3310] veth1_vlan: entered promiscuous mode [ 34.878073][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.897581][ T1271] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.910291][ T1271] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.923978][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.933855][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.943625][ T3310] veth0_macvtap: entered promiscuous mode [ 34.950861][ T1271] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.959799][ T1271] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.971342][ T3316] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 34.989163][ T1271] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.001705][ T3310] veth1_macvtap: entered promiscuous mode [ 35.011324][ T3317] veth0_vlan: entered promiscuous mode [ 35.026771][ T1271] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.036240][ T1271] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.065315][ T1271] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.080497][ C0] hrtimer: interrupt took 63317 ns [ 35.084755][ T3317] veth1_vlan: entered promiscuous mode [ 35.116931][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.133747][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.147300][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.160378][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.179002][ T3317] veth0_macvtap: entered promiscuous mode [ 35.194933][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.215932][ T3317] veth1_macvtap: entered promiscuous mode [ 35.230514][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.352630][ T3484] tipc: Started in network mode [ 35.360777][ T3484] tipc: Node identity aaaaaaaaaa38, cluster identity 4711 [ 35.376883][ T3484] tipc: Enabled bearer , priority 0 [ 35.385912][ T3493] IPVS: set_ctl: invalid protocol: 0 172.30.1.2:20003 [ 35.411469][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.448192][ T3494] loop4: detected capacity change from 0 to 512 [ 35.457255][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.469313][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 35.469330][ T28] audit: type=1400 audit(1775524846.895:117): avc: denied { mounton } for pid=3485 comm="syz.4.5" path="/0/file0" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 35.473527][ T3496] netlink: 'syz.2.7': attribute type 10 has an invalid length. [ 35.477927][ T28] audit: type=1400 audit(1775524846.905:118): avc: denied { write } for pid=3495 comm="syz.2.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 35.530424][ T28] audit: type=1400 audit(1775524846.905:119): avc: denied { bind } for pid=3495 comm="syz.2.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 35.549358][ T12] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.564437][ T28] audit: type=1400 audit(1775524846.905:120): avc: denied { setopt } for pid=3495 comm="syz.2.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 35.579451][ T12] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.608355][ T3493] loop1: detected capacity change from 0 to 128 [ 35.620040][ T3499] netlink: 'syz.2.7': attribute type 10 has an invalid length. [ 35.620674][ T3494] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.647254][ T28] audit: type=1400 audit(1775524847.075:121): avc: denied { mount } for pid=3485 comm="syz.4.5" name="/" dev="loop4" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 35.673905][ T3496] team0: Failed to send options change via netlink (err -105) [ 35.680014][ T3494] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.694764][ T3496] team0: Port device dummy0 added [ 35.703436][ T3499] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 35.720897][ T3493] ======================================================= [ 35.720897][ T3493] WARNING: The mand mount option has been deprecated and [ 35.720897][ T3493] and is ignored by this kernel. Remove the mand [ 35.720897][ T3493] option from the mount to silence this warning. [ 35.720897][ T3493] ======================================================= [ 35.758057][ T3499] team0: Failed to send options change via netlink (err -105) [ 35.766217][ T3499] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 35.780591][ T3499] team0: Port device dummy0 removed [ 35.799776][ T3499] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 35.808350][ T28] audit: type=1400 audit(1775524847.225:122): avc: denied { mount } for pid=3492 comm="syz.1.2" name="/" dev="loop1" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 35.844552][ T12] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.853728][ T12] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.867599][ T28] audit: type=1400 audit(1775524847.235:123): avc: denied { read write } for pid=3492 comm="syz.1.2" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 35.914291][ T28] audit: type=1400 audit(1775524847.235:124): avc: denied { open } for pid=3492 comm="syz.1.2" path="/dev/loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 35.956499][ T3479] loop0: detected capacity change from 0 to 512 [ 35.965721][ T3502] mmap: syz.1.2 (3502) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 35.992671][ T28] audit: type=1400 audit(1775524847.295:125): avc: denied { ioctl } for pid=3311 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=102 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 36.064928][ T3479] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 36.089871][ T28] audit: type=1400 audit(1775524847.295:126): avc: denied { create } for pid=3500 comm="syz.2.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 36.190652][ T3512] netlink: 8 bytes leftover after parsing attributes in process `syz.4.11'. [ 36.200666][ T3512] netlink: 8 bytes leftover after parsing attributes in process `syz.4.11'. [ 36.215303][ T3514] FAULT_INJECTION: forcing a failure. [ 36.215303][ T3514] name failslab, interval 1, probability 0, space 0, times 1 [ 36.233986][ T3514] CPU: 1 UID: 0 PID: 3514 Comm: syz.2.10 Not tainted syzkaller #0 PREEMPT(full) [ 36.234017][ T3514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 36.234084][ T3514] Call Trace: [ 36.234162][ T3514] [ 36.234171][ T3514] __dump_stack+0x1d/0x30 [ 36.234203][ T3514] dump_stack_lvl+0x95/0xd0 [ 36.234229][ T3514] dump_stack+0x15/0x1b [ 36.234253][ T3514] should_fail_ex+0x263/0x280 [ 36.234302][ T3514] ? nf_nat_masq_schedule+0x223/0x450 [ 36.234336][ T3514] should_failslab+0x8c/0xb0 [ 36.234361][ T3514] __kmalloc_cache_noprof+0x5f/0x410 [ 36.234386][ T3514] nf_nat_masq_schedule+0x223/0x450 [ 36.234498][ T3514] ? __pfx_device_cmp+0x10/0x10 [ 36.234590][ T3514] ? __pfx_masq_device_event+0x10/0x10 [ 36.234617][ T3514] masq_device_event+0x72/0x90 [ 36.234648][ T3514] raw_notifier_call_chain+0x83/0x1c0 [ 36.234673][ T3514] ? rtmsg_ifinfo+0xef/0x110 [ 36.234812][ T3514] __dev_notify_flags+0x1f0/0x390 [ 36.234842][ T3514] netif_change_flags+0xac/0xd0 [ 36.234985][ T3514] do_setlink+0x905/0x2940 [ 36.235022][ T3514] ? selinux_capable+0x31/0x40 [ 36.235054][ T3514] ? security_capable+0x7b/0x90 [ 36.235141][ T3514] ? ns_capable+0x7c/0xb0 [ 36.235163][ T3514] ? netlink_ns_capable+0x86/0xa0 [ 36.235196][ T3514] rtnl_newlink+0xfd9/0x1330 [ 36.235241][ T3514] ? css_rstat_updated+0xbb/0x280 [ 36.235264][ T3514] ? __siphash_unaligned+0x197/0x2e0 [ 36.235289][ T3514] ? __rcu_read_unlock+0x4e/0x70 [ 36.235309][ T3514] ? avc_has_perm_noaudit+0xab/0x130 [ 36.235420][ T3514] ? cred_has_capability+0x224/0x2a0 [ 36.235497][ T3514] ? selinux_capable+0x31/0x40 [ 36.235558][ T3514] ? security_capable+0x7b/0x90 [ 36.235589][ T3514] ? ns_capable+0x7c/0xb0 [ 36.235608][ T3514] ? __pfx_rtnl_newlink+0x10/0x10 [ 36.235628][ T3514] rtnetlink_rcv_msg+0x64b/0x720 [ 36.235720][ T3514] netlink_rcv_skb+0x123/0x220 [ 36.235825][ T3514] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 36.235854][ T3514] rtnetlink_rcv+0x1c/0x30 [ 36.235874][ T3514] netlink_unicast+0x5c0/0x690 [ 36.235908][ T3514] netlink_sendmsg+0x5c8/0x6f0 [ 36.235971][ T3514] ? __pfx_netlink_sendmsg+0x10/0x10 [ 36.236060][ T3514] ____sys_sendmsg+0x563/0x5b0 [ 36.236082][ T3514] ___sys_sendmsg+0x195/0x1e0 [ 36.236158][ T3514] __x64_sys_sendmsg+0xd4/0x160 [ 36.236184][ T3514] x64_sys_call+0x194c/0x3020 [ 36.236292][ T3514] do_syscall_64+0x12c/0x370 [ 36.236392][ T3514] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.236412][ T3514] RIP: 0033:0x7fa0054cc819 [ 36.236429][ T3514] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 36.236448][ T3514] RSP: 002b:00007fa003f27028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 36.236471][ T3514] RAX: ffffffffffffffda RBX: 00007fa005745fa0 RCX: 00007fa0054cc819 [ 36.236545][ T3514] RDX: 0000000020000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 36.236560][ T3514] RBP: 00007fa003f27090 R08: 0000000000000000 R09: 0000000000000000 [ 36.236574][ T3514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 36.236589][ T3514] R13: 00007fa005746038 R14: 00007fa005745fa0 R15: 00007ffcbec51dd8 [ 36.236610][ T3514] [ 36.239972][ T3514] netlink: 1 bytes leftover after parsing attributes in process `syz.2.10'. [ 36.247581][ T3479] EXT4-fs (loop0): 1 orphan inode deleted [ 36.262247][ T147] EXT4-fs error (device loop0): ext4_release_dquot:7062: comm kworker/u8:5: Failed to release dquot type 1 [ 36.262338][ T147] loop0: lost filesystem error report for type 5 error -117 [ 36.275372][ T3479] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.284187][ T3479] ext4 filesystem being mounted at /0/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 36.289459][ T3516] netlink: 64 bytes leftover after parsing attributes in process `syz.3.12'. [ 36.317241][ T3514] syz.2.10 (3514) used greatest stack depth: 10344 bytes left [ 36.328761][ T3518] 9pnet_fd: Insufficient options for proto=fd [ 36.410754][ T3523] 9pnet_fd: Insufficient options for proto=fd [ 36.425017][ T3522] loop1: detected capacity change from 0 to 512 [ 36.430080][ T3360] tipc: Node number set to 9611946 [ 36.451800][ T3522] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.470589][ T3523] loop2: detected capacity change from 0 to 512 [ 36.549777][ T3522] ext4 filesystem being mounted at /1/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 36.612907][ T3523] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.636452][ T3518] netlink: 12 bytes leftover after parsing attributes in process `syz.1.13'. [ 36.659505][ T3523] ext4 filesystem being mounted at /6/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 36.760928][ T3479] syz.0.1 (3479) used greatest stack depth: 9800 bytes left [ 36.790470][ T3316] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.803282][ T3521] netlink: 12 bytes leftover after parsing attributes in process `syz.2.14'. [ 36.803734][ T3310] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.912838][ T3311] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.992382][ T3546] loop1: detected capacity change from 0 to 164 [ 36.999221][ T3546] iso9660: Bad value for 'dmode' [ 37.065059][ T3549] netlink: 6 bytes leftover after parsing attributes in process `syz.4.21'. [ 37.072157][ T3551] loop2: detected capacity change from 0 to 512 [ 37.150330][ T3551] EXT4-fs: Ignoring removed mblk_io_submit option [ 37.272792][ T3551] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 37.351921][ T3551] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 37.443584][ T3551] ext4 filesystem being mounted at /7/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 37.621904][ T3566] netlink: 8 bytes leftover after parsing attributes in process `syz.4.25'. [ 37.630833][ T3566] netlink: 8 bytes leftover after parsing attributes in process `syz.4.25'. [ 37.677116][ T3311] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.690266][ T3572] loop4: detected capacity change from 0 to 512 [ 37.698485][ T3572] EXT4-fs: Ignoring removed mblk_io_submit option [ 37.737425][ T3572] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 37.765823][ T3572] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 37.788269][ T3572] ext4 filesystem being mounted at /9/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 38.010293][ T3600] capability: warning: `syz.1.35' uses 32-bit capabilities (legacy support in use) [ 38.563301][ T3615] loop1: detected capacity change from 0 to 512 [ 38.675788][ T3615] EXT4-fs (loop1): 1 truncate cleaned up [ 38.702947][ T3615] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.720890][ T3314] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.749930][ T3621] FAULT_INJECTION: forcing a failure. [ 38.749930][ T3621] name failslab, interval 1, probability 0, space 0, times 0 [ 38.770058][ T3615] EXT4-fs (loop1): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 38.772665][ T3621] CPU: 1 UID: 0 PID: 3621 Comm: syz.2.42 Not tainted syzkaller #0 PREEMPT(full) [ 38.772774][ T3621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 38.772786][ T3621] Call Trace: [ 38.772792][ T3621] [ 38.772862][ T3621] __dump_stack+0x1d/0x30 [ 38.772890][ T3621] dump_stack_lvl+0x95/0xd0 [ 38.772914][ T3621] dump_stack+0x15/0x1b [ 38.772996][ T3621] should_fail_ex+0x263/0x280 [ 38.773024][ T3621] should_failslab+0x8c/0xb0 [ 38.773047][ T3621] kmem_cache_alloc_noprof+0x66/0x400 [ 38.773071][ T3621] ? do_getname+0x2e/0x1c0 [ 38.773170][ T3621] do_getname+0x2e/0x1c0 [ 38.773194][ T3621] getname_flags+0x1d/0x30 [ 38.773217][ T3621] do_sys_openat2+0x60/0x130 [ 38.773318][ T3621] __x64_sys_openat+0xf2/0x120 [ 38.773346][ T3621] x64_sys_call+0x1e39/0x3020 [ 38.773372][ T3621] do_syscall_64+0x12c/0x370 [ 38.773399][ T3621] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 38.773492][ T3621] RIP: 0033:0x7fa00548d04e [ 38.773509][ T3621] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 38.773528][ T3621] RSP: 002b:00007fa003f26b28 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 38.773594][ T3621] RAX: ffffffffffffffda RBX: 00007fa003f276c0 RCX: 00007fa00548d04e [ 38.773609][ T3621] RDX: 0000000000000482 RSI: 00007fa003f26c00 RDI: ffffffffffffff9c [ 38.773694][ T3621] RBP: 00007fa003f26c00 R08: 0000000000000000 R09: 0000000000000000 [ 38.773707][ T3621] R10: 0000000000000000 R11: 0000000000000246 R12: cccccccccccccccd [ 38.773721][ T3621] R13: 00007fa005746038 R14: 00007fa005745fa0 R15: 00007ffcbec51dd8 [ 38.773740][ T3621] [ 39.001633][ T3632] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 39.001633][ T3632] The task syz.4.45 (3632) triggered the difference, watch for misbehavior. [ 39.162851][ T3637] netlink: 12 bytes leftover after parsing attributes in process `syz.0.47'. [ 39.300063][ T3648] loop5: detected capacity change from 0 to 7 [ 39.470877][ T3310] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.616127][ T3664] futex_wake_op: syz.0.56 tries to shift op by -1; fix this program [ 39.884377][ T3677] FAULT_INJECTION: forcing a failure. [ 39.884377][ T3677] name failslab, interval 1, probability 0, space 0, times 0 [ 39.903610][ T3677] CPU: 0 UID: 0 PID: 3677 Comm: syz.3.60 Not tainted syzkaller #0 PREEMPT(full) [ 39.903642][ T3677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 39.903664][ T3677] Call Trace: [ 39.903671][ T3677] [ 39.903680][ T3677] __dump_stack+0x1d/0x30 [ 39.903710][ T3677] dump_stack_lvl+0x95/0xd0 [ 39.903788][ T3677] dump_stack+0x15/0x1b [ 39.903811][ T3677] should_fail_ex+0x263/0x280 [ 39.903843][ T3677] should_failslab+0x8c/0xb0 [ 39.903886][ T3677] kmem_cache_alloc_noprof+0x66/0x400 [ 39.903912][ T3677] ? __inet_bhash2_update_saddr+0x128/0xf70 [ 39.903944][ T3677] __inet_bhash2_update_saddr+0x128/0xf70 [ 39.904060][ T3677] ? xfrm_lookup_route+0xd6/0x110 [ 39.904086][ T3677] ? ip_route_output_flow+0xdb/0x110 [ 39.904108][ T3677] inet_bhash2_update_saddr+0x25/0x30 [ 39.904199][ T3677] tcp_v4_connect+0x61e/0xac0 [ 39.904224][ T3677] __inet_stream_connect+0x169/0x7f0 [ 39.904255][ T3677] ? tcp_sendmsg_fastopen+0x172/0x520 [ 39.904313][ T3677] ? should_failslab+0x8c/0xb0 [ 39.904333][ T3677] ? __kmalloc_cache_noprof+0x18a/0x410 [ 39.904357][ T3677] tcp_sendmsg_fastopen+0x43a/0x520 [ 39.904439][ T3677] tcp_sendmsg_locked+0x2939/0x2de0 [ 39.904463][ T3677] ? __rcu_read_unlock+0x4e/0x70 [ 39.904483][ T3677] ? terminate_walk+0x1e6/0x210 [ 39.904587][ T3677] ? path_openat+0x1ab2/0x2050 [ 39.904603][ T3677] ? path_openat+0x1b01/0x2050 [ 39.904618][ T3677] ? __rcu_read_unlock+0x4e/0x70 [ 39.904642][ T3677] ? avc_has_perm_noaudit+0xab/0x130 [ 39.904678][ T3677] ? avc_has_perm+0x101/0x190 [ 39.904779][ T3677] ? _raw_spin_lock_bh+0x56/0xb0 [ 39.904808][ T3677] ? __pfx_tcp_sendmsg+0x10/0x10 [ 39.904830][ T3677] ? __pfx_inet_sendmsg+0x10/0x10 [ 39.904847][ T3677] tcp_sendmsg+0x2f/0x50 [ 39.904886][ T3677] inet_sendmsg+0x76/0xd0 [ 39.904903][ T3677] __sys_sendto+0x3db/0x490 [ 39.904937][ T3677] __x64_sys_sendto+0x76/0x90 [ 39.905084][ T3677] x64_sys_call+0x2d35/0x3020 [ 39.905108][ T3677] do_syscall_64+0x12c/0x370 [ 39.905157][ T3677] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.905177][ T3677] RIP: 0033:0x7f238aa4c819 [ 39.905240][ T3677] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 39.905257][ T3677] RSP: 002b:00007f23894a7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 39.905278][ T3677] RAX: ffffffffffffffda RBX: 00007f238acc5fa0 RCX: 00007f238aa4c819 [ 39.905360][ T3677] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 39.905371][ T3677] RBP: 00007f23894a7090 R08: 0000200000e68000 R09: 0000000000000010 [ 39.905411][ T3677] R10: 00000000200007fd R11: 0000000000000246 R12: 0000000000000001 [ 39.905424][ T3677] R13: 00007f238acc6038 R14: 00007f238acc5fa0 R15: 00007ffeb1f67878 [ 39.905441][ T3677] [ 40.346333][ T3688] loop3: detected capacity change from 0 to 4096 [ 40.353244][ T3688] EXT4-fs: Ignoring removed bh option [ 40.374927][ T3688] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.395874][ T28] kauditd_printk_skb: 294 callbacks suppressed [ 40.396000][ T28] audit: type=1400 audit(1775557625.989:420): avc: denied { read append } for pid=3687 comm="syz.3.63" path="/7/file3/blkio.bfq.group_wait_time" dev="loop3" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 40.453007][ T3317] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.465394][ T28] audit: type=1400 audit(1775557626.020:421): avc: denied { lock } for pid=3687 comm="syz.3.63" path="/7/file3/blkio.bfq.group_wait_time" dev="loop3" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 40.569791][ T28] audit: type=1400 audit(1775557626.020:422): avc: denied { ioctl } for pid=3687 comm="syz.3.63" path="socket:[4774]" dev="sockfs" ino=4774 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 40.651032][ T28] audit: type=1400 audit(1775557626.020:423): avc: denied { read write } for pid=3687 comm="syz.3.63" name="uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 40.694379][ T28] audit: type=1400 audit(1775557626.020:424): avc: denied { open } for pid=3687 comm="syz.3.63" path="/dev/uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 40.717805][ T28] audit: type=1400 audit(1775557626.020:425): avc: denied { read } for pid=3687 comm="syz.3.63" name="mISDNtimer" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.784745][ T28] audit: type=1400 audit(1775557626.020:426): avc: denied { open } for pid=3687 comm="syz.3.63" path="/dev/mISDNtimer" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.814276][ T3711] loop4: detected capacity change from 0 to 4096 [ 40.821110][ T28] audit: type=1400 audit(1775557626.419:427): avc: denied { create } for pid=3705 comm="syz.4.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 40.858265][ T3711] EXT4-fs: Ignoring removed bh option [ 40.863755][ T3711] ext4: Unknown parameter 'fsuuid' [ 40.951220][ T3706] loop4: detected capacity change from 0 to 512 [ 41.119360][ T3723] FAULT_INJECTION: forcing a failure. [ 41.119360][ T3723] name failslab, interval 1, probability 0, space 0, times 0 [ 41.298556][ T3723] CPU: 0 UID: 0 PID: 3723 Comm: syz.3.74 Not tainted syzkaller #0 PREEMPT(full) [ 41.298655][ T3723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 41.298667][ T3723] Call Trace: [ 41.298675][ T3723] [ 41.298737][ T3723] __dump_stack+0x1d/0x30 [ 41.298770][ T3723] dump_stack_lvl+0x95/0xd0 [ 41.298799][ T3723] dump_stack+0x15/0x1b [ 41.298825][ T3723] should_fail_ex+0x263/0x280 [ 41.298855][ T3723] ? nfnetlink_rcv+0xa66/0x1720 [ 41.298957][ T3723] should_failslab+0x8c/0xb0 [ 41.298983][ T3723] __kmalloc_cache_noprof+0x5f/0x410 [ 41.299075][ T3723] nfnetlink_rcv+0xa66/0x1720 [ 41.299128][ T3723] netlink_unicast+0x5c0/0x690 [ 41.299222][ T3723] netlink_sendmsg+0x5c8/0x6f0 [ 41.299248][ T3723] ? __pfx_netlink_sendmsg+0x10/0x10 [ 41.299272][ T3723] ____sys_sendmsg+0x563/0x5b0 [ 41.299295][ T3723] ___sys_sendmsg+0x195/0x1e0 [ 41.299420][ T3723] __x64_sys_sendmsg+0xd4/0x160 [ 41.299447][ T3723] x64_sys_call+0x194c/0x3020 [ 41.299485][ T3723] do_syscall_64+0x12c/0x370 [ 41.299518][ T3723] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.299542][ T3723] RIP: 0033:0x7f238aa4c819 [ 41.299630][ T3723] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 41.299647][ T3723] RSP: 002b:00007f2389486028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 41.299707][ T3723] RAX: ffffffffffffffda RBX: 00007f238acc6090 RCX: 00007f238aa4c819 [ 41.299724][ T3723] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 41.299736][ T3723] RBP: 00007f2389486090 R08: 0000000000000000 R09: 0000000000000000 [ 41.299787][ T3723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.299816][ T3723] R13: 00007f238acc6128 R14: 00007f238acc6090 R15: 00007ffeb1f67878 [ 41.299838][ T3723] [ 41.673269][ T3726] loop0: detected capacity change from 0 to 512 [ 41.816267][ T28] audit: type=1400 audit(1775557627.427:428): avc: denied { write } for pid=3731 comm="syz.3.75" name="sg0" dev="devtmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 41.903850][ T3734] program syz.3.75 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 41.915697][ T28] audit: type=1404 audit(1775557627.427:429): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 42.517326][ T3726] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 42.533557][ T3726] EXT4-fs (loop0): orphan cleanup on readonly fs [ 42.610922][ T3726] EXT4-fs (loop0): 1 orphan inode deleted [ 42.670148][ T3556] EXT4-fs error (device loop0): ext4_release_dquot:7062: comm kworker/u8:7: Failed to release dquot type 1 [ 42.720259][ T3556] loop0: lost filesystem error report for type 5 error -117 [ 42.734473][ T3774] netlink: 'syz.2.88': attribute type 1 has an invalid length. [ 42.744080][ T3726] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 42.837546][ T3726] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.345360][ T3801] __nla_validate_parse: 4 callbacks suppressed [ 43.345379][ T3801] netlink: 36 bytes leftover after parsing attributes in process `syz.2.99'. [ 43.890486][ T3822] syz.2.108 uses obsolete (PF_INET,SOCK_PACKET) [ 44.042594][ T3831] netlink: 4 bytes leftover after parsing attributes in process `syz.0.113'. [ 44.137790][ T3831] veth3: entered promiscuous mode [ 44.968878][ T35] IPVS: starting estimator thread 0... [ 45.060578][ T3850] IPVS: using max 2352 ests per chain, 117600 per kthread [ 45.165482][ T28] kauditd_printk_skb: 325 callbacks suppressed [ 45.165501][ T28] audit: type=1400 audit(1775557630.997:754): avc: denied { map_create } for pid=3856 comm="syz.4.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 45.215098][ T28] audit: type=1400 audit(1775557631.028:755): avc: denied { map_create } for pid=3856 comm="syz.4.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 45.261077][ T28] audit: type=1400 audit(1775557631.028:756): avc: denied { prog_load } for pid=3856 comm="syz.4.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 45.289993][ T28] audit: type=1400 audit(1775557631.028:757): avc: denied { create } for pid=3856 comm="syz.4.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 45.330051][ T28] audit: type=1400 audit(1775557631.028:758): avc: denied { create } for pid=3856 comm="syz.4.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=0 [ 45.372872][ T28] audit: type=1400 audit(1775557631.049:759): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.423073][ T28] audit: type=1400 audit(1775557631.070:760): avc: denied { create } for pid=3858 comm="syz.4.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 45.470547][ T28] audit: type=1400 audit(1775557631.154:761): avc: denied { create } for pid=3858 comm="syz.4.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 45.508259][ T28] audit: type=1400 audit(1775557631.165:762): avc: denied { prog_load } for pid=3858 comm="syz.4.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 45.768853][ T28] audit: type=1400 audit(1775557631.627:763): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.892591][ T3862] wireguard0: entered promiscuous mode [ 45.898112][ T3862] wireguard0: entered allmulticast mode [ 46.091358][ T3876] netlink: 12 bytes leftover after parsing attributes in process `syz.4.130'. [ 46.105187][ T3876] bridge: RTM_NEWNEIGH with invalid ether address [ 46.113523][ T3875] netlink: 12 bytes leftover after parsing attributes in process `syz.0.131'. [ 46.123104][ T3876] netlink: 12 bytes leftover after parsing attributes in process `syz.4.130'. [ 46.132787][ T3876] bridge: RTM_NEWNEIGH with invalid ether address [ 47.215872][ T3911] netlink: 12 bytes leftover after parsing attributes in process `syz.0.146'. [ 47.417299][ T3921] netlink: 4 bytes leftover after parsing attributes in process `syz.4.148'. [ 47.712770][ T3927] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3927 comm=syz.0.153 [ 48.112529][ T3956] xt_CT: No such helper "pptp" [ 48.507847][ T3960] netlink: 'syz.2.166': attribute type 1 has an invalid length. [ 49.939643][ T28] kauditd_printk_skb: 471 callbacks suppressed [ 49.939681][ T28] audit: type=1400 audit(1775557636.005:1235): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.996236][ T4029] netlink: 27 bytes leftover after parsing attributes in process `syz.4.196'. [ 50.013731][ T28] audit: type=1400 audit(1775557636.015:1236): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 50.099436][ T28] audit: type=1400 audit(1775557636.068:1237): avc: denied { read } for pid=4028 comm="syz.4.196" dev="nsfs" ino=4026532603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 50.156586][ T28] audit: type=1400 audit(1775557636.068:1238): avc: denied { open } for pid=4028 comm="syz.4.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 50.213773][ T28] audit: type=1400 audit(1775557636.078:1239): avc: denied { open } for pid=4028 comm="syz.4.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 50.270910][ T28] audit: type=1400 audit(1775557636.078:1240): avc: denied { open } for pid=4028 comm="syz.4.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 50.321132][ T28] audit: type=1400 audit(1775557636.078:1241): avc: denied { prog_load } for pid=4028 comm="syz.4.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 50.373824][ T28] audit: type=1400 audit(1775557636.078:1242): avc: denied { prog_load } for pid=4028 comm="syz.4.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 50.456475][ T28] audit: type=1400 audit(1775557636.089:1243): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 50.532151][ T28] audit: type=1400 audit(1775557636.089:1244): avc: denied { create } for pid=4032 comm="syz.4.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 51.207383][ T4074] netlink: 4 bytes leftover after parsing attributes in process `syz.1.211'. [ 51.268438][ T4074] team0: Port device team_slave_0 removed [ 51.520808][ T4084] futex_wake_op: syz.2.216 tries to shift op by 36; fix this program [ 51.680219][ T4095] bridge0: entered promiscuous mode [ 51.689834][ T4095] macvlan2: entered promiscuous mode [ 52.457196][ T4112] netlink: 12 bytes leftover after parsing attributes in process `syz.2.226'. [ 52.603826][ T4117] Zero length message leads to an empty skb [ 53.078700][ T4151] ipt_REJECT: ECHOREPLY no longer supported. [ 53.723056][ T4194] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 53.760991][ T4198] netlink: 16186 bytes leftover after parsing attributes in process `syz.4.264'. [ 53.873434][ T4205] batadv0: entered promiscuous mode [ 53.892811][ T4205] bond0: entered promiscuous mode [ 53.897882][ T4205] bond_slave_0: entered promiscuous mode [ 53.916236][ T4205] bond_slave_1: entered promiscuous mode [ 53.930226][ T4205] hsr1: entered allmulticast mode [ 53.955639][ T4205] batadv0: entered allmulticast mode [ 53.961917][ T4205] bond0: entered allmulticast mode [ 53.976507][ T4205] bond_slave_0: entered allmulticast mode [ 53.986140][ T4205] bond_slave_1: entered allmulticast mode [ 54.002091][ T4205] 8021q: adding VLAN 0 to HW filter on device hsr1 [ 54.201886][ T4223] veth1_macvtap: left promiscuous mode [ 54.270875][ T4223] macsec0: entered promiscuous mode [ 54.482863][ T4225] veth1_macvtap: entered promiscuous mode [ 54.488696][ T4225] macsec0: entered allmulticast mode [ 54.499667][ T4225] veth1_macvtap: entered allmulticast mode [ 54.665200][ T4238] netlink: 112 bytes leftover after parsing attributes in process `syz.4.279'. [ 54.711040][ T28] kauditd_printk_skb: 392 callbacks suppressed [ 54.711055][ T28] audit: type=1400 audit(1775557641.002:1637): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.795235][ T4242] netlink: 27 bytes leftover after parsing attributes in process `syz.4.281'. [ 54.823426][ T28] audit: type=1400 audit(1775557641.055:1638): avc: denied { read } for pid=4241 comm="syz.4.281" dev="nsfs" ino=4026532603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 54.879072][ T28] audit: type=1400 audit(1775557641.055:1639): avc: denied { open } for pid=4239 comm="syz.3.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 54.937905][ T28] audit: type=1400 audit(1775557641.065:1640): avc: denied { open } for pid=4241 comm="syz.4.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 54.985345][ T28] audit: type=1400 audit(1775557641.118:1641): avc: denied { open } for pid=4241 comm="syz.4.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 55.052071][ T28] audit: type=1400 audit(1775557641.118:1642): avc: denied { prog_load } for pid=4241 comm="syz.4.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 55.099804][ T28] audit: type=1400 audit(1775557641.118:1643): avc: denied { prog_load } for pid=4241 comm="syz.4.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 55.156965][ T28] audit: type=1400 audit(1775557641.160:1644): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 55.213811][ T28] audit: type=1400 audit(1775557641.160:1645): avc: denied { open } for pid=4244 comm="syz.4.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 55.271296][ T28] audit: type=1400 audit(1775557641.569:1646): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 56.731437][ T4272] FAULT_INJECTION: forcing a failure. [ 56.731437][ T4272] name failslab, interval 1, probability 0, space 0, times 0 [ 56.744277][ T4272] CPU: 1 UID: 0 PID: 4272 Comm: syz.4.291 Not tainted syzkaller #0 PREEMPT(full) [ 56.744308][ T4272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 56.744320][ T4272] Call Trace: [ 56.744326][ T4272] [ 56.744333][ T4272] __dump_stack+0x1d/0x30 [ 56.744359][ T4272] dump_stack_lvl+0x95/0xd0 [ 56.744421][ T4272] dump_stack+0x15/0x1b [ 56.744442][ T4272] should_fail_ex+0x263/0x280 [ 56.744517][ T4272] ? __pfx_debugfs_alloc_inode+0x10/0x10 [ 56.744645][ T4272] should_failslab+0x8c/0xb0 [ 56.744670][ T4272] kmem_cache_alloc_lru_noprof+0x6c/0x410 [ 56.744697][ T4272] ? debugfs_alloc_inode+0x34/0x40 [ 56.744764][ T4272] ? __pfx_debugfs_alloc_inode+0x10/0x10 [ 56.744794][ T4272] debugfs_alloc_inode+0x34/0x40 [ 56.744868][ T4272] alloc_inode+0x40/0x170 [ 56.744906][ T4272] new_inode+0x1d/0xe0 [ 56.744935][ T4272] __debugfs_create_file+0x97/0x2b0 [ 56.744968][ T4272] debugfs_create_file_full+0x3f/0x60 [ 56.745067][ T4272] ? __pfx_macsec_setup+0x10/0x10 [ 56.745092][ T4272] ref_tracker_dir_debugfs+0x10e/0x220 [ 56.745129][ T4272] alloc_netdev_mqs+0x1a7/0xa40 [ 56.745239][ T4272] rtnl_create_link+0x239/0x720 [ 56.745270][ T4272] rtnl_newlink_create+0x174/0x650 [ 56.745301][ T4272] ? security_capable+0x7b/0x90 [ 56.745334][ T4272] ? netlink_ns_capable+0x86/0xa0 [ 56.745443][ T4272] rtnl_newlink+0x10a0/0x1330 [ 56.745476][ T4272] ? __memcg_slab_free_hook+0x14b/0x240 [ 56.745576][ T4272] ? __rcu_read_unlock+0x4e/0x70 [ 56.745597][ T4272] ? avc_has_perm_noaudit+0xab/0x130 [ 56.745706][ T4272] ? cred_has_capability+0x224/0x2a0 [ 56.745731][ T4272] ? selinux_capable+0x31/0x40 [ 56.745768][ T4272] ? security_capable+0x7b/0x90 [ 56.745793][ T4272] ? ns_capable+0x7c/0xb0 [ 56.745852][ T4272] ? __pfx_rtnl_newlink+0x10/0x10 [ 56.745876][ T4272] rtnetlink_rcv_msg+0x64b/0x720 [ 56.745995][ T4272] netlink_rcv_skb+0x123/0x220 [ 56.746031][ T4272] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 56.746063][ T4272] rtnetlink_rcv+0x1c/0x30 [ 56.746086][ T4272] netlink_unicast+0x5c0/0x690 [ 56.746186][ T4272] netlink_sendmsg+0x5c8/0x6f0 [ 56.746207][ T4272] ? __pfx_netlink_sendmsg+0x10/0x10 [ 56.746225][ T4272] ____sys_sendmsg+0x563/0x5b0 [ 56.746245][ T4272] ___sys_sendmsg+0x195/0x1e0 [ 56.746270][ T4272] __x64_sys_sendmsg+0xd4/0x160 [ 56.746343][ T4272] x64_sys_call+0x194c/0x3020 [ 56.746406][ T4272] do_syscall_64+0x12c/0x370 [ 56.746432][ T4272] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 56.746456][ T4272] RIP: 0033:0x7f4e62f6c819 [ 56.746476][ T4272] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 56.746507][ T4272] RSP: 002b:00007f4e619c7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 56.746547][ T4272] RAX: ffffffffffffffda RBX: 00007f4e631e5fa0 RCX: 00007f4e62f6c819 [ 56.746561][ T4272] RDX: 0000000000000000 RSI: 0000200000000380 RDI: 0000000000000005 [ 56.746574][ T4272] RBP: 00007f4e619c7090 R08: 0000000000000000 R09: 0000000000000000 [ 56.746589][ T4272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 56.746604][ T4272] R13: 00007f4e631e6038 R14: 00007f4e631e5fa0 R15: 00007ffee9bdaf78 [ 56.746640][ T4272] [ 56.746674][ T4272] debugfs: out of free dentries, can not create file 'netdev@ffff88811b352560' [ 57.009715][ T4275] netlink: 27 bytes leftover after parsing attributes in process `syz.1.292'. [ 57.305689][ T4293] netlink: 16 bytes leftover after parsing attributes in process `syz.2.299'. [ 57.456830][ T4293] bond1: option broadcast_neighbor: mode dependency failed, not supported in mode balance-rr(0) [ 57.615299][ T4293] bond1 (unregistering): Released all slaves [ 57.656917][ T4299] netlink: 12 bytes leftover after parsing attributes in process `syz.0.300'. [ 57.718792][ T4302] netlink: 12 bytes leftover after parsing attributes in process `syz.2.303'. [ 57.750771][ T4307] netlink: 27 bytes leftover after parsing attributes in process `syz.2.305'. [ 57.871047][ T4316] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(6) [ 57.877695][ T4316] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 57.885304][ T4316] vhci_hcd vhci_hcd.0: Device attached [ 57.909153][ T4316] vhci_hcd vhci_hcd.0: pdev(0) rhport(1) sockfd(8) [ 57.915753][ T4316] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 57.928407][ T4316] vhci_hcd vhci_hcd.0: Device attached [ 57.947232][ T4316] vhci_hcd vhci_hcd.0: pdev(0) rhport(2) sockfd(10) [ 57.953870][ T4316] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 58.023541][ T4316] vhci_hcd vhci_hcd.0: Device attached [ 58.052263][ T4320] vhci_hcd: connection closed [ 58.052492][ T69] vhci_hcd vhci_hcd.0: stop threads [ 58.052584][ T69] vhci_hcd vhci_hcd.0: release socket [ 58.052598][ T69] vhci_hcd vhci_hcd.0: disconnect device [ 58.052618][ T4317] vhci_hcd: connection closed [ 58.081845][ T69] vhci_hcd vhci_hcd.0: stop threads [ 58.081868][ T69] vhci_hcd vhci_hcd.0: release socket [ 58.081884][ T69] vhci_hcd vhci_hcd.0: disconnect device [ 58.093468][ T4332] @ÿ: renamed from veth0_vlan (while UP) [ 58.196153][ T4322] vhci_hcd: connection closed [ 58.196415][ T1271] vhci_hcd vhci_hcd.0: stop threads [ 58.196483][ T1271] vhci_hcd vhci_hcd.0: release socket [ 58.196505][ T1271] vhci_hcd vhci_hcd.0: disconnect device [ 58.390432][ T4347] netlink: 12 bytes leftover after parsing attributes in process `syz.3.314'. [ 58.705818][ T4352] netlink: 'syz.3.316': attribute type 5 has an invalid length. [ 58.717224][ T4352] ip6erspan0: entered promiscuous mode [ 58.819679][ T4355] netlink: 27 bytes leftover after parsing attributes in process `syz.3.317'. [ 59.480722][ T28] kauditd_printk_skb: 355 callbacks suppressed [ 59.480741][ T28] audit: type=1400 audit(1775557646.011:2002): avc: denied { remount } for pid=4381 comm="syz.3.328" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 59.975342][ T28] audit: type=1400 audit(1775557646.525:2003): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 60.042771][ T28] audit: type=1400 audit(1775557646.536:2004): avc: denied { read } for pid=4384 comm="syz.1.329" name="event2" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 60.072174][ T4386] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x1f [ 60.115497][ T28] audit: type=1400 audit(1775557646.567:2005): avc: denied { create } for pid=4384 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 60.175107][ T28] audit: type=1400 audit(1775557646.567:2006): avc: denied { create } for pid=4384 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 60.233525][ T28] audit: type=1400 audit(1775557646.620:2007): avc: denied { create } for pid=4384 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 60.271573][ T28] audit: type=1400 audit(1775557646.620:2008): avc: denied { read } for pid=4384 comm="syz.1.329" dev="nsfs" ino=4026532510 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 60.309639][ T28] audit: type=1400 audit(1775557646.641:2009): avc: denied { create } for pid=4384 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 60.519027][ T28] audit: type=1400 audit(1775557647.103:2010): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 60.557771][ T4388] netlink: 28 bytes leftover after parsing attributes in process `syz.3.330'. [ 60.585106][ T4388] netlink: 36 bytes leftover after parsing attributes in process `syz.3.330'. [ 60.585679][ T28] audit: type=1400 audit(1775557647.155:2011): avc: denied { create } for pid=4387 comm="syz.3.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 61.234701][ T4407] netlink: 'syz.0.338': attribute type 1 has an invalid length. [ 61.310580][ T4407] netlink: 28 bytes leftover after parsing attributes in process `syz.0.338'. [ 61.464144][ T4421] netlink: 'syz.3.344': attribute type 7 has an invalid length. [ 62.002816][ T4433] netlink: 'syz.1.349': attribute type 1 has an invalid length. [ 62.065893][ T4433] bond1: entered promiscuous mode [ 62.079980][ T4440] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31768 sclass=netlink_route_socket pid=4440 comm=syz.3.351 [ 62.097557][ T4433] bond1: entered allmulticast mode [ 62.114060][ T4443] netlink: 4 bytes leftover after parsing attributes in process `syz.1.349'. [ 62.150068][ T4433] 8021q: adding VLAN 0 to HW filter on device bond1 [ 62.225742][ T4438] erspan1: entered allmulticast mode [ 62.252046][ T4438] bond1: (slave erspan1): making interface the new active one [ 62.269791][ T4438] erspan1: entered promiscuous mode [ 62.280676][ T4438] bond1: (slave erspan1): Enslaving as an active interface with an up link [ 62.322972][ T4443] bond1 (unregistering): (slave erspan1): Releasing active interface [ 62.347871][ T4443] erspan1: left promiscuous mode [ 62.366814][ T4443] bond1 (unregistering): Released all slaves [ 62.420165][ T4450] netlink: 27 bytes leftover after parsing attributes in process `syz.0.355'. [ 62.437691][ T4438] syz.1.349 (4438) used greatest stack depth: 9320 bytes left [ 63.200659][ T4478] bond1 (unregistering): Released all slaves [ 63.256172][ T4464] ================================================================== [ 63.264315][ T4464] BUG: KCSAN: data-race in shmem_file_splice_read / shmem_file_splice_read [ 63.272947][ T4464] [ 63.275388][ T4464] write to 0xffff88811604fe28 of 8 bytes by task 4467 on cpu 0: [ 63.283139][ T4464] shmem_file_splice_read+0x470/0x600 [ 63.288542][ T4464] splice_direct_to_actor+0x26e/0x670 [ 63.293936][ T4464] do_splice_direct+0x119/0x1a0 [ 63.298826][ T4464] do_sendfile+0x382/0x650 [ 63.303254][ T4464] __x64_sys_sendfile64+0x105/0x150 [ 63.308460][ T4464] x64_sys_call+0x2dc4/0x3020 [ 63.313169][ T4464] do_syscall_64+0x12c/0x370 [ 63.317855][ T4464] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 63.323842][ T4464] [ 63.326182][ T4464] write to 0xffff88811604fe28 of 8 bytes by task 4464 on cpu 1: [ 63.333903][ T4464] shmem_file_splice_read+0x470/0x600 [ 63.339292][ T4464] splice_direct_to_actor+0x26e/0x670 [ 63.344670][ T4464] do_splice_direct+0x119/0x1a0 [ 63.349526][ T4464] do_sendfile+0x382/0x650 [ 63.353948][ T4464] __x64_sys_sendfile64+0x105/0x150 [ 63.359587][ T4464] x64_sys_call+0x2dc4/0x3020 [ 63.364330][ T4464] do_syscall_64+0x12c/0x370 [ 63.368930][ T4464] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 63.374831][ T4464] [ 63.377159][ T4464] value changed: 0x000000000002e308 -> 0x000000000002e312 [ 63.384266][ T4464] [ 63.386651][ T4464] Reported by Kernel Concurrency Sanitizer on: [ 63.392806][ T4464] CPU: 1 UID: 0 PID: 4464 Comm: syz.1.362 Not tainted syzkaller #0 PREEMPT(full) [ 63.402009][ T4464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 63.412066][ T4464] ================================================================== [ 63.435568][ T4484] netlink: 27 bytes leftover after parsing attributes in process `syz.4.367'.