last executing test programs: 10m34.946497466s ago: executing program 3 (id=337): r0 = shmget$private(0x0, 0x400000, 0x8, &(0x7f000000e000/0x400000)=nil) perf_event_open(&(0x7f00000003c0)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9ec4, 0x0, 0x0, 0x9}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x1, 0x0, 0x0, 0x1000000000004, 0x400, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc197, 0x2, @perf_config_ext={0x288}, 0xa216, 0x6, 0x11000, 0x4, 0x9484, 0x2001, 0x404, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$AUTOFS_IOC_PROTOVER(r1, 0x80049363, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) connect$netlink(r2, &(0x7f0000000280)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x28}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) signalfd4(r3, &(0x7f0000000280)={[0x7]}, 0x8, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x2, 0x3, 0x3, 0x1, 0x0, 0x40}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r5, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = syz_io_uring_setup(0x4b6, &(0x7f00000001c0)={0x0, 0x0, 0x400, 0x1, 0xf9}, &(0x7f0000ff0000), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_BUFFERS(r6, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r6, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x1, 0x0, 0x7, 0x2) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') preadv(r7, &(0x7f00000011c0)=[{&(0x7f00000014c0)=""/4096, 0x1000}], 0x1, 0x200000, 0x9) 10m33.298145823s ago: executing program 3 (id=346): pipe(&(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x19105d55dfc078f, 0x0, 0x11000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x800454e0, &(0x7f0000000140)=0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) rseq(0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r4, &(0x7f0000001e40)=[{{0x0, 0x0, &(0x7f0000001a40)=[{0x0}, {0x0}], 0x2}, 0x7}], 0x1, 0x100, &(0x7f0000002040)={0x0, 0x989680}) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(r0, 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) socket$key(0xf, 0x3, 0x2) bind$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r5, &(0x7f0000000480)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x4}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x4, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x32}, 0x2, @in=@private=0xa010100, 0x0, 0x0, 0x0, 0xb7, 0x2, 0xfffffffe}}, 0xe8) sendmmsg(r5, &(0x7f0000007fc0), 0x800001d, 0x1c) 10m32.882205449s ago: executing program 3 (id=349): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f00000004c0)={0x38, 0x1403, 0x1, 0x70bd2d, 0x0, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) prlimit64(r0, 0xc, &(0x7f0000000180)={0x8, 0x6}, &(0x7f0000000f80)) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r3, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x24, 0x4, 0x8, 0x201, 0x0, 0x0, {0xa, 0x0, 0x7}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8}]}, 0x24}}, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000480)='./file7\x00', 0x1000000, &(0x7f0000000000)={[{@noblock_validity}]}, 0x1, 0x49a, &(0x7f0000000cc0)="$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") r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x7}, [], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x7}}, 0x24, 0x3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file0\x00'}) syz_emit_ethernet(0x4e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd604dd70800180600fe80000000000002c897f01d232f2e92c86000"/55, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="60c200009078000003"], 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000640)=ANY=[@ANYBLOB="2000000010003904000000000000200000000000", @ANYRES32=0x0, @ANYBLOB="1000001900000000"], 0x20}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000280)='./file7\x00', 0x180c8, &(0x7f00000006c0)=ANY=[@ANYBLOB="6e66732c646f74732c636865636b3d7374726963742c646f74732c6572726f72733d72656d6f756e742d726f2c00fc403bb14281bbfb9b8213bd6284536d64789a24dd73b98b3e33cb47fed8a736464bb62e9e891aa832722dfc28bfa4489b3a127a503e72326b737d0f67c97be6f37ef46154dec39ef8718946ffc8cd4d735a0b101c1722477bbe2f923577ea51f7116f17c3ddf5c497fba2d0bb3272d123b31e9461d4e2d65a42e1174fa269de92e463fc1ca202650fe2628e15341e45dce6c0de2367bdb50cc5b2b462e1d45fc3265f1a88561ab6afb1b73a3b340b5c73055fc6e601843a59f3cdeb36991cfa985453287d4c9d2d6e21adddc57a607369c682e821b20dc0efd51d12f386f3f8e53c05e696e50c7c3f79b1b0bd7e5cfaf3f63d8949c8dd2fd94aa0f259a4cb9412c30c45f9d4d63d267d2a43f03a47fa56b3"], 0x1, 0x242, &(0x7f0000000300)="$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") r5 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0xa502) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5393, &(0x7f0000000000)) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000580)='./file7\x00', 0x1020423, 0x0, 0x0, 0x0, &(0x7f00000005c0)) 10m31.963734067s ago: executing program 3 (id=352): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001800dd8d2bbd700000000000020000000000000600000000040008806fedc5f08c2fb84649cfa092577688414476db5ff82805383aee5c019da8cd860e85e9acbe1b571e104d9b679af1cd5a533530d22af2fe194be372eea1ba51be590a5ba55ca329074ee5585a3c4703ecb4d7fee64a291f5b8e32aa6aa3e8d5069b4703fcba944831315c4d0d86247564ec2dc451048966cc9697f3410835e19a7171e176d3f9e608838dd748a7e38ab02c7b1835f03b5c7282dc713265f5e7dc43665435196f3ff1b705cecdbe3bb39f9756afb7b17f57a87e9b33d3b4"], 0x20}}, 0x0) r1 = fsopen(&(0x7f0000000100)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x20) write(0xffffffffffffffff, &(0x7f0000000140)="fc00000018000703ab092500090007000a070000000000060003369321000700ff2500000005d00000000000000398996c92773411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddefefe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf1587c3b41", 0xfc) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x3000046, &(0x7f0000000640)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@discard}, {@data_err_ignore}, {@grpquota}, {@noblock_validity}, {@lazytime}, {@bh}, {@errors_remount}]}, 0x1, 0x553, &(0x7f00000009c0)="$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") r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4df30c", 0x18, 0x6, 0xff, @empty, @local, {[], {{0x0, 0x4001, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x6, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f00000001c0), &(0x7f0000000140)=ANY=[], 0x841, 0x1) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)=[{{&(0x7f0000000300), 0x6e, &(0x7f0000000440)=[{&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)}], 0x2}}], 0x1, 0x10000, &(0x7f0000000500)={0x77359400}) creat(&(0x7f0000000040)='./bus\x00', 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x801400, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$setregs(0xd, r3, 0x1005, 0xfffffffffffffffe) r4 = open(&(0x7f0000000080)='./bus\x00', 0x4600, 0xe898d2275f586838) preadv2(r4, &(0x7f0000000980)=[{&(0x7f0000001200)=""/4096, 0xffffffa4}], 0x1, 0x8000, 0x9, 0x1b) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb0100180000800000000018000000180000000b0000000400000001000084fdf7ffff0a000000020000000200000000660030615f5f61006100"], 0x0, 0x3b}, 0x28) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB='X\x00'], 0x58}}, 0x40080) sendmsg$NFT_BATCH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010002000000000000000000000a18010000090a010400000000000008000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001cd40009800800014000000006c80002800c00018008000140000000032400018008000140000000070800014000000008080001400000000908000140000000080c000180080001400000000a24000180080001400000000608000140000000ff0800014000000002"], 0x140}}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) 10m31.716108259s ago: executing program 3 (id=355): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000000)={'macvlan0\x00', @ifru_settings={0x280, 0x801, @fr_pvc_info=&(0x7f0000000040)={0xe1, 'syzkaller0\x00'}}}}) 10m31.318720229s ago: executing program 3 (id=359): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80782, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x6) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0xffffffffffffff2c}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'ip6gretap0\x00', 0x0}) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000000)={@remote, r5}, 0x14) sendmsg$nl_route_sched(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newtfilter={0x24, 0x11, 0x1, 0x70bd24, 0x2000, {0x0, 0x0, 0x74, r5, {0x5, 0x10}, {0x1, 0xb}, {0xfff2, 0x10}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x14004804}, 0x840) r6 = io_uring_setup(0x4ff1, &(0x7f0000000040)={0x0, 0x835c, 0xf000, 0x20000a, 0x20002f3}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x800, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {0xd}, {0xe, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x40005}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r6, 0x2219, 0x7721, 0x16, 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x3) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000000)={0x4c, 0x14, 0x101, 0x70bd25, 0x25dfdbfd, {0x10, 0x1f, 0x8, 0x10, {0x4e26, 0x4e22, [0x3, 0x6, 0xf, 0xc3], [0x1cf9, 0xe, 0x40000000, 0x7], 0x0, [0x1, 0x7fffffff]}, 0x9, 0xc3}}, 0x4c}, 0x1, 0x0, 0x0, 0x40480cc}, 0x8010) 10m31.313388948s ago: executing program 32 (id=359): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80782, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x6) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0xffffffffffffff2c}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'ip6gretap0\x00', 0x0}) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000000)={@remote, r5}, 0x14) sendmsg$nl_route_sched(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newtfilter={0x24, 0x11, 0x1, 0x70bd24, 0x2000, {0x0, 0x0, 0x74, r5, {0x5, 0x10}, {0x1, 0xb}, {0xfff2, 0x10}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x14004804}, 0x840) r6 = io_uring_setup(0x4ff1, &(0x7f0000000040)={0x0, 0x835c, 0xf000, 0x20000a, 0x20002f3}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x800, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x1}, {0xd}, {0xe, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x40005}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r6, 0x2219, 0x7721, 0x16, 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x3) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000000)={0x4c, 0x14, 0x101, 0x70bd25, 0x25dfdbfd, {0x10, 0x1f, 0x8, 0x10, {0x4e26, 0x4e22, [0x3, 0x6, 0xf, 0xc3], [0x1cf9, 0xe, 0x40000000, 0x7], 0x0, [0x1, 0x7fffffff]}, 0x9, 0xc3}}, 0x4c}, 0x1, 0x0, 0x0, 0x40480cc}, 0x8010) 9m4.598959072s ago: executing program 0 (id=953): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x21, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0xe0442, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', &(0x7f0000000040)={0x591003, 0x0, 0xb}, 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x7, 0x81}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xb, 0xffffffffffffffff, 0x1) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0xc, &(0x7f0000000040)=0x7f, 0x4) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x20, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001a0001000000ff7f0000000080000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\b\x00', @ANYRES32=r1], 0x24}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f00000012c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$BPF_PROG_DETACH(0x1c, 0x0, 0x0) ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0x800, 0x1, 0x92}) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000, 0x100010, 0xffffffffffffffff, 0x8000000) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x11c, &(0x7f0000000240)=0x3, 0x0, 0x4) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="d80000001b00010000000000fdfffffffc000000000000000000000000000000200100000000000000000000000000004e240000000000010000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000ffffffffffffff7ffcffffffffffffff04000000000000000000000000000000fdffffffffffffff00000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000006fcffff00000000000003000000000000000000000000000c0008"], 0xd8}, 0x1, 0x0, 0x0, 0x40044}, 0x3c9b6ed2e8039f9a) epoll_wait(0xffffffffffffffff, &(0x7f00000001c0)=[{}, {}], 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'gretap0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="400d0000000000003000128008000100687372002400028008000200", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r4], 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x20008040) 9m3.850344377s ago: executing program 0 (id=955): msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xb) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f00000003c0)=[{0x2, 0x4, 0x800}], 0x1, 0x0) semop(r0, &(0x7f0000000140)=[{0x2, 0x43a, 0x1000}, {0x0, 0x6}, {0x3, 0x8}, {0x3, 0xd8, 0x800}, {0x2, 0x4, 0x800}, {0x0, 0x4, 0x1800}], 0x6) semtimedop(r0, &(0x7f0000000080)=[{0x1, 0x8000}], 0x1, 0x0) semop(r0, &(0x7f0000001240)=[{0x0, 0xffff, 0x1000}], 0x1) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$P9_RREADDIR(r3, &(0x7f0000000a00)={0x147, 0x29, 0x2, {0x401, [{{0x20, 0x1, 0x3}, 0x9, 0x4, 0x7, './file1'}, {{0x0, 0x4, 0x3}, 0x81, 0x7, 0x7, './file1'}, {{0x4, 0x3}, 0x1, 0xd, 0x7, './file1'}, {{0x20, 0x4, 0x3}, 0x7, 0x5, 0x7, './file1'}, {{0x0, 0x1, 0x7}, 0xfffffffffffffff8, 0xe, 0xd, './file1/file0'}, {{0x4, 0x0, 0x7}, 0x5, 0x7, 0x7, './file1'}, {{0x20, 0x2, 0x7}, 0x7da2, 0x7, 0x7, './file1'}, {{0x8, 0x3, 0x1}, 0x9, 0x1, 0x7, './file1'}, {{0x1}, 0xc095, 0x3, 0x7, './file1'}, {{0x10, 0x3, 0x1}, 0x0, 0x7f, 0x7, './file1'}]}}, 0x147) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000000)={r1, 0x1, 0x7, 0xa9ce00000000000}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0xd, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x2800050, &(0x7f0000003240)=ANY=[], 0x6, 0x342, &(0x7f0000000680)="$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") r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r8, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500000003f0001002cbd7000ffdbdf25010000003a0004"], 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x8000) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="580000000206010100000000000000000000000005000400000000000900020073797a32000000000500050002000000050001000600000011000300686173683a69702c2b49961f61a8706f7274000000000c0007800800"], 0x58}}, 0x0) r10 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r10, &(0x7f0000000600)={0x0, 0xfd, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) r11 = semget(0x2, 0x2, 0x2a1) semctl$SETALL(r11, 0x0, 0x11, &(0x7f0000000140)) ioctl$BTRFS_IOC_SYNC(r4, 0x9408, 0x0) 9m3.301315953s ago: executing program 0 (id=962): bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x2000, 0x0) pidfd_send_signal(r1, 0x14, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r2 = mq_open(&(0x7f0000000000)='!selinu\xff\x7f\x00\x00inux\x00T\x8b\xb5\xf3\xcb\xdd\xe3\xbf2\x86\x01\x84\xdd\x8a\x8f_l\xa1L\xb1\xef\xb2\xc9\xf7+C\xb2\x8e9\xb8\xec\x1a\xe5\xaeq\x8fZ\xff\xbcY+\xaf0<\xa3\xb8\"Zm\x1c\x18\x11\x93\xb5z \xc2\x8b\xa9\xc5\x9es\t\xfe\x002\xa0-\xaf\xcdP\x9f\xe5Iv\xce*\xa8\xa3\x14i\x05\x8f\x9b\x1eB\x9f\x9d#E\x19\xdc\xfe\xc7\xeb\xb5\xcd\xc8\xe2U\xce\x00\x00', 0x6e93ebbbcc0884f2, 0x2c, &(0x7f0000000300)={0x0, 0x1, 0x3}) mq_timedreceive(r2, &(0x7f0000000080)=""/225, 0xe1, 0x7e79ef8a, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x44) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = syz_io_uring_setup(0x117, &(0x7f0000000400)={0x0, 0x0, 0x10, 0x0, 0x3a2}, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffc00, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0xd, 0x4, &(0x7f0000000240)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x24}, [@call={0x85, 0x0, 0x0, 0x5d}]}, &(0x7f0000000040)='syzkaller\x00'}, 0x94) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x40, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x18}, 0x0, 0x40000, 0x1}) io_uring_enter(r3, 0x47f6, 0x80ffff, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='status\x00') setgroups(0x1, &(0x7f0000000340)=[0x0]) read$msr(r4, &(0x7f0000000d40)=""/26, 0x1a) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000180)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0xf8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xd0, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x44d92e21e165cb45, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x6a040000) 9m1.830846316s ago: executing program 0 (id=972): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[], 0x30}, 0x1, 0x0, 0x0, 0x4004885}, 0x8001) (async, rerun: 32) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) (async, rerun: 32) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$UHID_INPUT(r2, &(0x7f0000000e00)={0xfc, {"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", 0x1000}}, 0x1006) (async) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x0, &(0x7f0000000300)={[{@grpquota}, {@quota}, {@quota}, {}, {@dioread_lock}]}, 0xff, 0x4fa, &(0x7f00000005c0)="$eJzs3c9vG1kdAPCvnThx0uwmu+wBEOyW3YWCqjqJuxut9gDLCSFUCdEjSG1I3CiKHUexU5rQQ3rmikQlTnDkD+DcE3cuCG5cygGJHxGoQeLg1YwnqZvaTdQkdhR/PtJo3ps39fe9pvNe/U3iF8DQuhoRuxExFhF3I2I6u57LjvisfST3Pdt7uLS/93ApF63W7X/l0vbkWnT8mcSV7DWLEfGj70X8NPdy3Mb2ztpitVrZzOqzzdrGbGN758ZqbXGlslJZL5cX5hfmPrn5cfnMxvpebSwrffXpH3e/9fOkW1PZlc5xnKX20AuHcRKjEfGD8wg2ACPZeMYG3RFeSz4i3o6I99PnfzpG0q8mAHCZtVrT0ZrurAMAl10+zYHl8qUsFzAV+Xyp1M7hvROT+Wq90bx+r761vtzOlc1EIX9vtVqZy3KFM1HIJfX5tPy8Xj5SvxkRb0XEL8cn0nppqV5dHuR/fABgiF05sv7/d7y9/gMAl1xx0B0AAPrO+g8Aw8f6DwDDx/oPAMOnvf5PDLobAEAfef8PAMPH+g8AQ+WHt24lR2s/+/zr5fvbW2v1+zeWK421Um1rqbRU39wordTrK+ln9tSOe71qvb4x/1FsPZj59kajOdvY3rlTq2+tN++kn+t9p1JI79rtw8gAgF7eeu/JX3LJivzpRHpEx14OhYH2DDhv+UF3ABiYkUF3ABgYu33B8DrFe3zpAbgkumzR+4Jit18QarVarfPrEnDOrn1J/h+GVUf+308Bw5CR/4fhJf8Pw6vVyp10z/846Y0AwMUmxw/0+P7/29n5d9k3B36yfPSOx+fZKwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALjYDvb/LWV7gU9FPl8qRbwRETNRyN1brVbmIuLNiPjzeGE8qc8PuM8AwGnl/57L9v+6Nv3h1AtN7145LI5FxM9+fftXDxabzc0/RYzl/j1+cL35OLte7n/vAYDjHazT6bnjjfyzvYdLB0c/+/OP70ZEsR1/f28s9g/jj8Zoei5GISIm/5PL6m25jtzFaew+iogvdht/LqbSHEh759Oj8ZPYb/Q1fv6F+Pm0rX1O/i6+cAZ9gWHzJJl/Puv2/OXjanru/vwX0xnq9LL5L3mppf10Dnwe/2D+G+kx/109aYyP/vD9dmni5bZHEV8ejTiIvd8x/xzEz/WI/+EJ4//1K+++36ut9ZuIa9E9fmes2WZtY7axvXNjtba4UlmprJfLC/MLc5/c/Lg8m+aoZ3uvBv/89PqbvdqS8U/2iF88ZvxfP+H4f/v/uz/+2ivif/ODbvHz8c4r4idr4jdOGH9x8vfFXm1J/OUe4z/u63/9hPGf/m3npW3DAYDBaWzvrC1Wq5VNBYWLX0j+yV6AbnQtfKdfscaie9MvPmg/00eaWq3XitVrxjiLrBtwERw+9BHxv0F3BgAAAAAAAAAAAAAA6Kofv7E06DECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABweX0eAAD//19xzyM=") r3 = creat(&(0x7f0000000e40)='./file1\x00', 0x18) r4 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./bus\x00', 0x1a5c42, 0x2) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0xc, r1, 0x0, 0x100000000005e, 0x1, 0xfffffffffe000001}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfe58}, 0x94) (async) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) (async) ptrace$setregs(0xd, r5, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") ptrace$getregset(0x4205, r5, 0x200, &(0x7f0000000080)={&(0x7f00000000c0)=""/112, 0x70}) (async, rerun: 64) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000000016230000000000a000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380), 0x4001, 0x0) ioctl$XFS_IOC_FSGEOMETRY_V1(r3, 0x80705864, &(0x7f0000000d00)) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0xe, 0x0, &(0x7f00000003c0)="e02742e8680d0000978276fcf294", 0x0, 0x4002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) (async, rerun: 64) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) (async, rerun: 64) r8 = perf_event_open(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) (async) mount$9p_unix(0x0, 0x0, 0x0, 0x12934da, 0x0) (async) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000000)={[{@max_batch_time={'max_batch_time', 0x3d, 0x101}}, {@debug}, {@journal_dev={'journal_dev', 0x3d, 0x7}}]}, 0x1, 0x5fd, &(0x7f00000006c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x44002, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r9, &(0x7f0000004200)='t', 0x1) (async) sendmsg$key(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="020108001400000027bd7000fcdbdf250100140007000000056f166d8a00000002004e21ffffffff000000000000000002004e21ac1e010100000000000000000a000800180200008224e6dfc953096169edb8811f299d1cca37b3dbf7595eb880fd63464c7257a2f56afeba55c9ccb5cbfad2dc4760c3eda9e27aa83e16052f2edfd5a29a43f90129c59a0000000000020013000200000026bd700000000000"], 0xa0}}, 0x4000800) 9m1.705160867s ago: executing program 0 (id=973): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x1, 0x9}]}]}, {0x0, [0x5f, 0x2e, 0x61]}}, 0x0, 0x31, 0x0, 0x1, 0x8}, 0x28) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0xff, 0x7fff0000}]}) pivot_root(0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$rxrpc(0x21, 0x2, 0xa) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) unshare(0x68040200) syz_open_dev$tty20(0xc, 0x4, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000980)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) epoll_create(0x3ff) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x800000000000002, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x80, 0x1}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x8, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) ioctl$TCSETSW2(r2, 0x402c542c, &(0x7f00000001c0)={0xffbfff41, 0x4000403, 0x68, 0x17, 0x8, "ffffff7f87680000000000001000007fcb3678", 0x9, 0x202}) getsockopt$bt_hci(r1, 0x0, 0x3, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$TIOCSLCKTRMIOS(r5, 0x5457, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a300000000040000000030a01020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000000900010073797a300000000068000000060a010400000000000000000100000008000b40000000000900010073797a3000000000400004803c0001800a0001006c696d69740000002c0002800c000240000000008000000108000440000000010c0001"], 0xf0}}, 0x0) 9m1.455857758s ago: executing program 0 (id=977): ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020660b, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x42718, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x82}, 0x100b28, 0x5, 0x0, 0x8, 0x8, 0x6, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0xffffffff, 0x10000, 0xffffffff, 0x3, 0x0, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) close(0x3) socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) socket$unix(0x1, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) epoll_create1(0x0) r2 = inotify_init1(0x80800) dup(r2) socket$inet6_udp(0xa, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) socket(0x2, 0x80805, 0x0) socket(0x10, 0x803, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000003800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eb4}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x8, 0xdff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000040)=0x1, 0x4) 9m1.427581854s ago: executing program 33 (id=977): ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020660b, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x42718, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x82}, 0x100b28, 0x5, 0x0, 0x8, 0x8, 0x6, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0xffffffff, 0x10000, 0xffffffff, 0x3, 0x0, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) close(0x3) socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) socket$unix(0x1, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) epoll_create1(0x0) r2 = inotify_init1(0x80800) dup(r2) socket$inet6_udp(0xa, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) socket(0x2, 0x80805, 0x0) socket(0x10, 0x803, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000003800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eb4}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x8, 0xdff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000040)=0x1, 0x4) 7m10.305251845s ago: executing program 4 (id=1897): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1e0000000000000042060000"], 0x50) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, 0x0}, 0x20) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000980)='./file0\x00', 0x8000, &(0x7f0000000180)={[{@resuid}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}]}, 0x1, 0x519, &(0x7f00000009c0)="$eJzs3cFvI1cZAPBvJvE2u5tiFxAqlSgVLcpWsHbS0DZCCMoFTpWA5b6ExImi2HEUO2UTVZCK/wAhgcSJExck/gCkqgfEGVWqBBfEAQECIdjCAQnoII/HJevYSaBJnI1/P+mt35sZz/e9ifw8M56dCWBiPRURL0XEVEQ8GxHlYnpalDjole5yb99/daVbksiyO39JIimm9dfVbU9HxM3ibTMR8ZUvRnw9ORq3vbe/udxo1HeKdq3T3K619/ZvbzSX1+vr9a3FxYUXll5cen5pPiu8p35W+pUffeGzr3/yG7+9+6db3+ym9ZkPRSkG+nGWel0v5duir7uNds4j2BhMFf0pjTsRAABOpbuP//6I+Fi+/1+OqXxvbsDUODIDAAAAzkr2udn4VxKRAQAAAFdWGhGzkaTV4lqA2UjTa8W5gQ/GjbTRanc+sdba3VrtzouoRCld22jU54trhStRSrrtheIa2377uYH2YkQ8FhHfLV/P29WVVmN1zOc+AAAAYFLcHDj+/3s5zesnG/L/BAAAAIDLqzKyAQAAAFwVDvkBAADg6hs8/n99THkAAAAA5+JLL7/cLVn/+derr+ztbrZeub1ab29Wm7sr1ZXWznZ1vdVaz+/Z1zxpfY1Wa/tTsbV7r9aptzu19t7+3WZrd6tzd+OBR2ADAAAAF+ixj77xqyQiDj59PS9R3AcQ4AG/H3cCwFmaGncCwNi4izdMrlK/cm28eQDjk5ww38U7AADw8Jv78NHf//unAkpjzQw4b671AYDJ4/d/mFwlVwDCREsj4n296iOjlhn5+/8vThslyyLeLB+e4vwiAABcrNm8JGm1OA6YjTStViMejUgrUUrWNhr1+eL44Jfl0iPd9kL+zuTEa4YBAAAAAAAAAAAAAAAAAAAAAAAAgJ4sSyIDAAAArrSI9I9Jfjf/iLnyM7OD5weuJf8oxx+Kxg/ufO/ecqezs9Cd/tf8WV7XIqLz/TulfPpzIx8fBgAAAJy15GDkrN5xevG6cKFZAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAB3r7/6kq/XGTcP38+IirD4k/HTP46E6WIuPG3JKYPvS+JiKkziH/wWkQ8Pix+Eu9kWVYpshgW//o5x6/km2Z4/DQibp5BfJhkb3THn5eGff7SeCp/Hf75my7KezV6/EuLyI/n49yw8efRI2trDo3xxFs/qY2M/1rEE9PDx5/++JuMiP/0kbX9M8uyozG+9tX9/VHxsx9GzA39/kkeiFXrNLdr7b392xvN5fX6en1rcXHhhaUXl55fmq+tbTTqxb9DY3znIz9957j+3xgS/ze/7o2/x/X/mVErHfDvt+7d/0CvWhoW/9bTQ79/Z2JE/LT47vt4Ue/On+vXD3r1w5788ZtPHtf/1RHb/6S//61T9v/ZL3/7d6dcFAC4AO29/c3lRqO+c0xl5hTLPIyVn81cijT+x0r2rd5f7rLk8/9Wunur/53S79UlSOxQJbuwWFNxSbr8bmWswxIAAHAOfv7uTv+4MwEAAAAAAAAAAAAAAAAAAIDJdRG3ExuMeTCergIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHOs/AQAA//9GB9/T") bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), 0x800}, 0x38) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0xa8]}, 0x8, 0x800) r3 = syz_io_uring_setup(0xbd9, 0x0, &(0x7f0000000000)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) gettid() timer_create(0x3, 0x0, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x4004, @fd=r2, 0x7, 0x0}) io_uring_enter(r3, 0x847ba, 0x0, 0xe, 0x0, 0x0) r5 = syz_io_uring_setup(0x494, &(0x7f0000000400)={0x0, 0x2003f73, 0x100, 0x4, 0x1a}, &(0x7f0000000340)=0x0, &(0x7f0000000600)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_MADVISE={0x19, 0x2, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x14, 0x1}) io_uring_enter(r5, 0x3516, 0xf4f5, 0x401000, 0x0, 0x0) syz_read_part_table(0x1062, &(0x7f0000000000)="$eJzsz7FNBDEUBNC503rtDUgIth6agDYgJYJ6KICAapCgCqSVkQ01wAXvBSP90ciSw78qSbYl9/t1r+lr8vg6u9PbyBy997n7vBq5j6hrS2pOs/96LslNknUb51Pej9+Xl6TlfG4lbd41pedhrO7qz+Ijty9//2MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAuDzfAQAA//83nRHZ") ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) syz_io_uring_setup(0x49a, &(0x7f00000000c0)={0x0, 0x79af, 0x3180, 0x0, 0x40024e}, &(0x7f0000000340), 0x0) 7m9.760995721s ago: executing program 4 (id=1901): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x6, 0x8, &(0x7f0000006680)) ppoll(0x0, 0x700, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x3fffffffc, 0xffffffffffffffff}, 0x102802, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x100, 0xb5) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c000000020605000000000000000000000000070e0003006269746d61703a697000000005000400010000000900020073797a3000"], 0x6c}}, 0x8000) 7m9.690248001s ago: executing program 4 (id=1902): socket$inet_udp(0x2, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x0, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) clock_adjtime(0x0, &(0x7f0000000340)={0xffff, 0xb00, 0x0, 0x0, 0x6733, 0x401, 0x0, 0x0, 0xab5, 0x0, 0x3b9ac9ff, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfef, 0x0, 0x0, 0x1, 0xe52, 0x6}) 7m8.835237759s ago: executing program 4 (id=1911): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000e40)=ANY=[@ANYRES64, @ANYRES16=0x0], 0x24}, 0x1, 0x0, 0x0, 0x29201962041d01f2}, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xe000000000000002, 0xffffffffffffffff, 0x1) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) unshare(0x60000600) sync() sync() sync() syz_mount_image$ext4(&(0x7f00000005c0)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x10000, &(0x7f0000000640), 0x0, 0x5c5, &(0x7f0000001e00)="$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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r3 = dup(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) getpgrp(0x0) sendmsg$AUDIT_SET(r3, 0x0, 0x20040090) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x1040) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0xe, &(0x7f00000011c0)=ANY=[@ANYBLOB="b702000000000080bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000001e240000000000004504040001ffffff9404000001000a00b7040000000100006a0af2fe000000008500000078000000b70000000000000095000000000000009e17f199a68b061b93d83298a8cdda1ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97ce8df1bc9a0c4eeceb9171e43405d621ffbc9b0d8ca56b50f0c010d631f6dbc8486bc5d5bf2ca8285056892db03cf1c62dd7c08a90b189d190c341035de53a9a53608c10556e5734eb84049761451ce540c772e069f80cb201b2de17dfdb4b60939d5d6aed4062049b87e03e2cd18568136207304e26f7fcc059c062234d5595f6fbaa187b81d1106000000000f0000fd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8000000000000000b91c61bd99dc89f12907af7dccd106cb937b450f859ce8292a79c3e40000b59b0fc46d6cec3c080a882add4e1179bd4a44f231a2d73148be428ba953df4aece69311687f4122073a236c3a32efa04137d46f0247d2638da3261c8162bb7c7824be6195a66d2e17e122040e11001131ce319045e5b3334e68475ac3f46aa2837f9004600daded9b19b35eebe52613c346e255421b23a278fd00004270b1cd5fc9aa2286ccca37db965d9dd366598f5ec993cb0cf127e2a46cfbdf63eea190d86a4d1b75ae98480100d33128954a7d093a54f7e75b3753508ca3c41685d1e407315e59d626c23b3f89a926e9382966853774e7dd1f1a2177cdf2802237c177d543e8da47a01f05e117e53518270239b69c117e2637c31085f4d8a596b6edab26afaf6605b231199f38a6fc7eb83714387450ea18eafbace8eec18a4b2c442e7b88a7611c1283bec84e1715fb9f4fcaf52c08058fc4f21c0ad71adabdd850aed3feec6eaab347bdf474e17b9aa345d1e6e3bb83f90230bdf53e7d0e5c3f914d905422b83f30936674ba8f0bffaf2305c0972df71fe5f4e01506471e897bced7798509e64df360d95f9a4099f864b0ba45efbdbd1d9db21a1d5c065567fd70aae68096827fa5c2d9bd20292344c7dcf6241447cfbb05b5d0fdb4e08afbac5397b64aa369922ed7ed8918f97294b6854210d2b93aaf92159dbaa2f186d4a420c68d6baf1c31de4f0bf478bfd51bb1e96ea849a80ae5a89be7e38474c7aade344d68324f9e12a6b9770e6bd12ae69efffaee58040753701af84c2924c1b5aea1650f42c9ae9820a33095f062fb88313d035ea405515a61a4be64f9fa0985c5be592090cc48291004609fdac2ab6100000000000000a84570c7c00d647daf8af334050b61e9b2d3f0adad1d1ff47be19b8da2799e9ecef8efabe73f92dbd0760f8bbd9c710bd1371e2b5d9a2ea2190f5e4f5cd641cdfe5d89f84a368ef7e6ff1eacdc0ec9e97b8f9c9e314661ea0aa8a104008d188b66b3a4aedeed9df4238a08fc2fb1007233cc2c87fcaa0cccd8ec03444471c1dd660c73acc17bff740d199a7c0c52c63c0408b5158e0000000c275eedb02f141113cf2c55b2c08c2c68cc99d2bb5840fba332e1c82862ec9b90104c48e41d32a47ac94ddee815dba8aeb5d3121cf247a81aef7805b020e9eec44cbe3055be69fe066824ba2292b9cdce41635fc00df96fb10a3a8cc60c4a76c65ebbb0640e0a29de94edf5cbefac1c5fa96e7080af804b22cabce10ea52f1018527f4aa39cdafa3eff63de2a7f50d042667820f6f86f276afb2b81da301e031351ee13013137e9d5cec0c84d7e3f82c6fd12eb98f9ea654bcb9ce59a2015183c6e65bb0537e611b830d74c30fb8207fca0990acdbb51e4e234026e00000000b3ebae3eb52c140953a350fcf0124b1a30b1afc29ea56f8413686d912eb8118d73ef9c6d3843ebcb555301c0205dd3040000002e334319c8979c322e92fbc2c400009f2404b941553843de114fdb03c19d606bd760c40f7f28360820b82d548198041562bcbd9edce223b54cf3c35823f3c446f0a20160ac181c96606dbc967673aca98d6f5637b20fd2809a29ea5e40139a19415f7fc5d852209bdfed74008651752b5e052412d3e00a44417b7caf91a173925a66ee6e30723e73f3b7d66d2a5d09ff40c0bc6e7a5cfef7f327018578892a23014c3629f2e41af619f0d9f0ec8d551415051ff94391c03f3501c928ed7818af61729278f84d4730ef28af4c202e0f175e2a5cbddc8b973e2701b33f1b963025220c04817010b6fb70"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) write$tun(r2, &(0x7f0000000740)=ANY=[], 0x2e) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x17, 0x4, &(0x7f0000000700)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0xa, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000300)='.\x00', 0x100, 0x62) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0x40086610, &(0x7f00000004c0)={@id={0x2, 0x2000000, @b}}) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) close_range(r6, 0xffffffffffffffff, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000040900010073797a30000000008c000000090a010400000000000000000700000008000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d48001280140001800c000100636f756e7465720004000280200001800e000100636f6e6e6c696d69740000000c0002800800014000000008000001800b6fcf1a22796e736574000008000340000001"], 0xd4}, 0x1, 0x0, 0x0, 0x24004041}, 0x0) 7m8.471860913s ago: executing program 4 (id=1921): bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, [@generic={0x81, 0x1, 0x1, 0xac}]}, &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) getpid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="6c000000020601030000000600000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3100000000240007800c00028008000140ffffffff0c0001800800014080ffffff050014000200000005000500020000000500010006"], 0x6c}, 0x1, 0x0, 0x0, 0x4840}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x44, 0x9, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0xffff}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x39}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x10000082}, 0x4000080) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)={0x48, 0x2, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0xa}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x41) pread64(r4, &(0x7f00000024c0)=""/209, 0xd1, 0xa) r5 = open(&(0x7f0000000540)='./file2\x00', 0x108843, 0x11f) fcntl$setlease(r5, 0x400, 0x0) fcntl$setlease(r5, 0x400, 0x2) ioctl$F2FS_IOC_SET_COMPRESS_OPTION(r3, 0x4002f516, &(0x7f0000000040)={0xa6, 0x1}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) listxattr(0x0, 0x0, 0x0) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) 7m8.38686055s ago: executing program 4 (id=1924): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xc, 0xf, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x7b}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1b}}, {}, [], {{}, {0x6, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0xd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0}, 0x94) 6m53.334714525s ago: executing program 34 (id=1924): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xc, 0xf, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x7b}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1b}}, {}, [], {{}, {0x6, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0xd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0}, 0x94) 6m16.276150876s ago: executing program 2 (id=2465): sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x5, 0x4, 0x8001, 0x0, 0x80000000b49, 0x200000000002, 0x4, 0xa, 0x3}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x62c40, 0x0) r1 = eventfd2(0x800, 0x0) io_setup(0x81, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0xb, r0, 0x0, 0x0, 0x2000000000, 0x0, 0x1, r1}]) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x3000) ptrace$peek(0x2, r3, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="30000000200025a727bd7000fddbdf250a0000cdff0000010200010008000600000000000c0014006748a9152c"], 0x30}, 0x1, 0x0, 0x0, 0x4044890}, 0x80) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)={0x130, 0x12, 0x0, 0x101, 0x0, 0x25dfdbfe, {0x7, 0x0, 0x4}, [@generic="9abc14419291302082e55512ea6f653e78a6d64c0613da1690e14c77f5ae686b4acb12240e943720af6f7c8cc155c4bbab2afbf7ddb65ee021c3fb15fe17c1d110f18724bad69306363cabf06bb3a8325cdf451c0dcd5c3181bfef5eaa0e5fb18e96bcb071d492d6d0ff98bd3d0d2eb2bc9490a57fafcef476a1ad29d012ec8eadf6d77036a9774c479068d8bf9c4647b7da7cd4f74e6f66d84f53b00e8d908ba25d9c5bd2cd5c0da81e9d0efa937b07e6a7c0358e7cde20a7d1591bd14bfa2c6c57b605b1f4bb97d77297179b635a001bcc2da4", @nested={0x46, 0xe8, 0x0, 0x1, [@generic="81e1aa2be10d0f2d24687a9b83206a9cda2e2e99c228feaa45dbf9b2f342eb50ca4cd5136570dfdf325ef9a54b8be29d578f1debc3ada6cd9a00d9c5aa24b503925d"]}]}, 0x130}}, 0x0) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/tty/drivers\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x106f) 6m15.25988882s ago: executing program 2 (id=2480): close(0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="780000001000830404000000fedbdf2500007400", @ANYRES32=r2, @ANYBLOB="0008000007500500580012800b0001006272696467650000480002800500190002000000050017"], 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xa1}, 0x9}, 0x0) 6m15.259686s ago: executing program 2 (id=2481): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3000003, 0x10010, r0, 0x0) timer_create(0x6, &(0x7f0000003880)={0x0, 0x1d, 0x4}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[], 0x50) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000fc0)=@raw={'raw\x00', 0x8, 0x3, 0x4f0, 0x0, 0x11, 0x148, 0x0, 0x0, 0x458, 0x2a8, 0x2a8, 0x458, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x360, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x2, 0x0, 0x3f, 0x20000000, 0x20000000, 0x3, 0x7, 0x0, 0x40}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x5, 0x1ff, 0x2, 'snmp_trap\x00', 'syz1\x00', {0x100}}}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00', {}, {}, 0x32}, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1, [0x4, 0x0, 0x2, 0x3, 0x0, 0x5], 0x0, 0x1}, {0x0, [0x6, 0x4, 0x2, 0x2, 0x982848c96d6a0d38], 0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x550) timer_settime(0x0, 0x1, &(0x7f000000b100)={{}, {0x0, 0x989680}}, 0x0) 6m15.108524187s ago: executing program 2 (id=2482): pipe(&(0x7f0000019480)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000740)="dcf00630ec", 0x5}], 0x1, 0x3) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={r0}, 0x4) close(r1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0xfff0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000080)={0x3, 0x1c, 0x0, 0x2e696, 0x0, "00120dd608f500001e20000080c90a008000"}) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0x80) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000300)=0x1, 0x4) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYRES16=r0], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0xa02, 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x8, &(0x7f0000000100), 0x1, 0x5a2, &(0x7f0000000180)="$eJzs3U9sG1UaAPBvxnbTP9lNVtqVdlc9VLtIRarqJP0DhVN7RVSq1AMSF4gcN6rixFWcQBNFIr1XiB4QoF7KDQ4cQRw4IC4cuXIBcUaqaARS0wMYOR6naeoUJ8RxiX8/yfF788b+3pvx9+IZzcgB9K1jjT9pxH8i4lISMbShLR9Z47HmeqsrS6UHK0ulJOr1yz8lkUTE/ZWlUmv9JHs+EhHLEfHviPiqEHEiXX/LA61CbWFxarxSKc9m9ZG56WsjtYXFk1enxyfLk+WZ08+/cPbcmbNjp8Y2dvdBfWOtsL2x3vz+1ts3v3npzq2PPzm6XHp3PInzMZi1bRzHbmpuk0Kc37T8TDeC9VDS6w6wI7kszxup9K8YilyW9e3UN04OA3vSPaCL6gMR9XUbikAfSCQ99KnW94DG8W/rsZffP+5eaB6ANOKuriyV3oql4WZLvnluIg6uHZsc/jl55Mikcbw5vJcdZV9avhERo/n845//JPv87dzobnSQrvryQnNHPb7/0/X5J9rMP4Otc6d/Umv+W83mv9U28XNbzH+XOozx66s/fLBl/BsD8d+28ZP1+Emb+GlEvN5h/NuvfH5uq7b6hxHHo338luTJ54dHrlytlEebf9vG+OL40Re3Hn/E4S3iN8/ZHlzryMbxH8j6lHY4/s++/vR/y0+I/+z/n7z/223/QxHxTofx/3H/o5e3art7I7nX+Baw3f2fRCHudBj/ufPHvsuKzhoCAAAAAAAAAMAuSteuZUvS4no5TYvF5j28/4zDaaVamztxpTo/M9G85m04CmnrSquhZj1p1Mey63Fb9VOb6qdzWcDcobV6sVStTPR47AAAAAAAAAAAAAAAAAAAAPC0OLLp/v9fcmv3/2/+uWpgv9r6J7+B/U7+Q/96NP+TnvUD2Hv+/0Pfqst/6F/yH/qX/If+Jf+hf8l/6F/yH/qX/AcAAAAAAAAAAAAAAAAAAAAAAAAAgK64dPFi41F/sLJUatQn8gvzU9U3Tk6Ua1PF6flSsVSdvVacrFYnK+ViqTr9R++XVKvXRmNm/vrIXLk2N1JbWHxtujo/0/pN0XKh6yMCAAAAAAAAAAAAAAAAAACAv57BtUeSFiMKzXqaFosRf4uI4SSSK1cr5dGI+HtEfJsrDDTqY73uNAAAAAAAAAAAAAAAAAAAAOwztYXFqfFKpTzbvUI+C9XFEJ0X8ttZOSKWd7cbjXfc9qsK2Qbs8abbH4Xc0/E5fPoLPZyUAAAAAAAAAAAAAAAAAACgTz286bfTV/zW3Q4BAAAAAAAAAAAAAAAAAABAX0p/TCKi8Tg+9Mzg5tYDyWpu7Tki3rx9+b3r43Nzs2ON5ffWl8+9ny0/tf6y/N6OAehEK0/TiGjkMQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPBQbWFxarxSKc/usDDQwTq9HiMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADATvweAAD//7M9zgI=") mlockall(0x2) r3 = shmget$private(0x0, 0x400000, 0x8, &(0x7f000000e000/0x400000)=nil) shmctl$SHM_LOCK(r3, 0xb) shmat(r3, &(0x7f0000ffd000/0x1000)=nil, 0x7000) r4 = openat(r1, &(0x7f0000000040)='./file1\x00', 0x42, 0x10a) socket$igmp(0x2, 0x3, 0x2) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x27, 0x2, 0x0, 0x0, 0x0, 0x4000000000000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x1a2d, 0x0, 0x7fc, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(r5, &(0x7f0000000440)=[{&(0x7f0000000080)=""/121, 0x900}], 0x1, &(0x7f0000000500)=[{&(0x7f0000001700)=""/4095, 0xfffffeb6}], 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, 0x0, &(0x7f0000000300)='GPL\x00', 0x4}, 0x94) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) pwrite64(r4, &(0x7f0000000780)='\"', 0x1, 0x4fed0) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) 6m13.89586788s ago: executing program 2 (id=2500): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/4\x00') getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x4) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x0, @void}, 0x10) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x2, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)={0x40, r4, 0x1, 0x1070bd0c, 0x4, {0x5}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0xaa8}, @L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}, @L2TP_ATTR_PEER_COOKIE={0xc}]}, 0x40}, 0x1, 0x0, 0x0, 0x40811}, 0x20) read$watch_queue(r0, &(0x7f0000000a00)=""/253, 0xfd) 6m13.368716639s ago: executing program 2 (id=2507): r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000001440)={0x0, @tipc=@nameseq={0x1e, 0x1, 0x1, {0x41, 0x2}}, @xdp={0x2c, 0x2, 0x0, 0x2d}, @nfc={0x27, 0x0, 0x1, 0x1}, 0xff17, 0x0, 0x0, 0x0, 0x401, 0x0, 0x6, 0x6}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x40) io_setup(0x3, &(0x7f0000000100)=0x0) io_getevents(r3, 0x6, 0x2, &(0x7f0000000340)=[{}, {}], 0x0) r4 = semget$private(0x0, 0x1, 0x802328a64d691f38) semop(r4, &(0x7f00000002c0)=[{0x0, 0x800, 0x800}, {0x2, 0x3}, {0x1, 0xaa8}, {0x3, 0x8, 0x800}, {0x2, 0x8, 0xc00}, {0x1, 0x6}, {0x3, 0x3}], 0x7) io_pgetevents(r3, 0x2, 0x0, &(0x7f0000000240), 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) io_submit(r3, 0x1, &(0x7f0000000580)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x101, r5, 0x0, 0x0, 0x4}]) io_submit(r3, 0x2, &(0x7f0000000180)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0xfff, r5, 0x0, 0x0, 0x5}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x9, r5, 0x0, 0x0, 0x6}]) syz_open_dev$mouse(&(0x7f0000000300), 0x2, 0x2082) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000020000000000000000000000850000002f000000180100002020752500000000002020207b1af8ff00000000bfa101000000000007010000f8ff1cffb702000008000000b70300000400000085000000b400000095"], &(0x7f0000000180)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x81}, 0x94) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x6, 0xe, 0x13e, 0x89, 0xffffffff, 0x2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xa7, 0x0, &(0x7f0000000200)="e30080670000ec67838717bd86dde148f0630962bb87dd44fe42904fcee14db4241544716b9ea42231ed3373a3e299531fd05dacf5bb80b4b7ee0fae7aea53492b18c3e6c807bc4b5d29a0ed834a6bd8c6f412bd3fca85921504f64d9161c6e3fa3b66840b6554128686e23595ee8cbe9d0137923b47ce083b3f6179c269f30e1d4fca495e440c205ffafda026330afd9efaebd879e4010632a46ab83f66f97214caeccd21b76d", 0x0, 0x7ffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xd}, 0x50) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000030605000000000020000000000000000500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x24044091}, 0x40010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="580000000206030000000000000000000300000705000100070000000900020073797a31000000000c00078008001240000000050500050002000000050004000100000011000300686173683a69702c706f7274"], 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x20004000) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070088000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x90) sendmsg$nl_generic(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="2000f3ff0007ebffcd000000000000000400100000"], 0x20}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYRESHEX=r6], 0x0, 0x37, 0x0, 0x0, 0x0, 0x10000}, 0x28) socket(0x29, 0x80000, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000a00)=ANY=[@ANYBLOB="f000000010000100000000000076476119e18991c30100000000fcf700000000000014bb00f0ff00000000ffff00000000000000000000000a00410064000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414bb0000000000000000000000000000000032000000ac1414bb000000000000000000000000ffffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff00000000000000000000000800000000000200000000000000000000000000000200000000000000000000000a000000cd000000000000000c8c99abbe50fc"], 0xf0}}, 0x0) 6m13.338043364s ago: executing program 35 (id=2507): r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000001440)={0x0, @tipc=@nameseq={0x1e, 0x1, 0x1, {0x41, 0x2}}, @xdp={0x2c, 0x2, 0x0, 0x2d}, @nfc={0x27, 0x0, 0x1, 0x1}, 0xff17, 0x0, 0x0, 0x0, 0x401, 0x0, 0x6, 0x6}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x40) io_setup(0x3, &(0x7f0000000100)=0x0) io_getevents(r3, 0x6, 0x2, &(0x7f0000000340)=[{}, {}], 0x0) r4 = semget$private(0x0, 0x1, 0x802328a64d691f38) semop(r4, &(0x7f00000002c0)=[{0x0, 0x800, 0x800}, {0x2, 0x3}, {0x1, 0xaa8}, {0x3, 0x8, 0x800}, {0x2, 0x8, 0xc00}, {0x1, 0x6}, {0x3, 0x3}], 0x7) io_pgetevents(r3, 0x2, 0x0, &(0x7f0000000240), 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) io_submit(r3, 0x1, &(0x7f0000000580)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x101, r5, 0x0, 0x0, 0x4}]) io_submit(r3, 0x2, &(0x7f0000000180)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0xfff, r5, 0x0, 0x0, 0x5}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x9, r5, 0x0, 0x0, 0x6}]) syz_open_dev$mouse(&(0x7f0000000300), 0x2, 0x2082) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000020000000000000000000000850000002f000000180100002020752500000000002020207b1af8ff00000000bfa101000000000007010000f8ff1cffb702000008000000b70300000400000085000000b400000095"], &(0x7f0000000180)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x81}, 0x94) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x6, 0xe, 0x13e, 0x89, 0xffffffff, 0x2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xa7, 0x0, &(0x7f0000000200)="e30080670000ec67838717bd86dde148f0630962bb87dd44fe42904fcee14db4241544716b9ea42231ed3373a3e299531fd05dacf5bb80b4b7ee0fae7aea53492b18c3e6c807bc4b5d29a0ed834a6bd8c6f412bd3fca85921504f64d9161c6e3fa3b66840b6554128686e23595ee8cbe9d0137923b47ce083b3f6179c269f30e1d4fca495e440c205ffafda026330afd9efaebd879e4010632a46ab83f66f97214caeccd21b76d", 0x0, 0x7ffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xd}, 0x50) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000030605000000000020000000000000000500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x24044091}, 0x40010) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="580000000206030000000000000000000300000705000100070000000900020073797a31000000000c00078008001240000000050500050002000000050004000100000011000300686173683a69702c706f7274"], 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x20004000) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070088000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x90) sendmsg$nl_generic(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="2000f3ff0007ebffcd000000000000000400100000"], 0x20}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYRESHEX=r6], 0x0, 0x37, 0x0, 0x0, 0x0, 0x10000}, 0x28) socket(0x29, 0x80000, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000a00)=ANY=[@ANYBLOB="f000000010000100000000000076476119e18991c30100000000fcf700000000000014bb00f0ff00000000ffff00000000000000000000000a00410064000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414bb0000000000000000000000000000000032000000ac1414bb000000000000000000000000ffffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff00000000000000000000000800000000000200000000000000000000000000000200000000000000000000000a000000cd000000000000000c8c99abbe50fc"], 0xf0}}, 0x0) 4m12.088281118s ago: executing program 8 (id=3113): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f0000000180), 0xfe, 0x59c, &(0x7f0000001840)="$eJzs3U9oHGUbAPBnZrNN/+T70g++Dz6lh6JChdJN0j9aPbVXsVDoQfCiYbMNJZtsySbahIDpvYg9iEov9aYHj4oHD+LFo1cvimeh2KDQ9KArm51N03S3bmI2W7O/H0z2fWdm93nfmX3e7AwzTAB962j9TxrxVERcTCKGNywbiGzh0cZ6qytLxfsrS8UkarVLvySRRMS9laVic/0kez0UEcsR8f+I+CYfcTxd/8h9zUJ1YXFqvFwuzWb1kbnpqyPVhcUTV6bHJ0uTpZlTL7505uzpM2MnxzY2935tYy2/tb7e+PHmuze+e+X2zU8/O7JcfH88iXMxlC3b2I+d1Ngm+Ti3af7pbgTroaTXDWBbclme11PpfzEcuSzrW6ltHBwGd6V5QBfVBiNq6zYUgT6QSHroU83fAfXj3+a0m78/7pxvHIDU466uLBXfiWb8gca5idi/dmxy8NfkoSOT+vHm4d1sKHvS8vWIGB0YePT7n2Tfv+0b3YkG0lVfn2/sqEf3f7o+/kSL8Weoee70b2qOf6vZ+LfaIn6uzfh3scMYv7/+00dt418fjKdbxk/W4yct4qcR8WaH8W+99uXZdstqH0cci9bxm5LHnx8euXylXBpt/G0Z46tjR15u3/+Ig23iN87Z7l9ryMb+78valHbY/y++/fyZ5cfEf/7Zx+//Vtv/QES812H8/9z75NV2y+5cT+7WfwVsdf8nkY/bHcZ/4dzRH7Kis4YAAAAAAAAAALCD0rVr2ZK0sF5O00KhcQ/vf+NgWq5U545frszPTDSueTsc+bR5pdVwo57U62PZ9bjN+slN9VO5LGDuwFq9UKyUJ3rcdwAAAAAAAAAAAAAAAAAAAHhSHNp0//9vubX7/zc/rhrYq9o/8hvY6+Q/9K+H8z/pWTuA3ef/P/StmvyH/iX/oX/Jf+hf8h/6l/yH/iX/oX/JfwAAAAAAAAAAAAAAAAAAAAAAAAAA6IqLFy7Up9r9laVivT4xsDA/VXnrxESpOlWYni8WipXZq4XJSmWyXCoUK9N/9XlJpXJ1NGbmr43MlapzI9WFxTemK/MzzWeKlvJd7xEAAAAAAAAAAAAAAAAAAAD88wytTUlaiMg36mlaKET8KyIOJ5FcvlIujUbEvyPi+1x+sF4f63WjAQAAAAAAAAAAAAAAAAAAYI+pLixOjZfLpdnuFQayUF0M0XlhYCsrR8Tyzjaj/olbflc+24A93nR7o5B7Mr6HT36hh4MSAAAAAAAAAAAAAAAAAAD0qQc3/Xb6jj+62yAAAAAAAAAAAAAAAAAAAADoS+nPSUTUp2PDzw1tXrovWc2tvUbE27cufXBtfG5udqw+/+76/LkPs/kne9F+oFPNPE0jop7HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwAPVhcWp8XK5NLvNwmAH6/S6jwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADb8WcAAAD//y4WzlE=") ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000080)=0x5) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r0, &(0x7f0000000140)='2', 0xfdef, 0xc00) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x187042, 0x15) pwrite64(r1, &(0x7f0000000140)='2', 0xfdef, 0xe7c) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000280)=ANY=[@ANYBLOB="35e4000000000000070000000000000003"]) 4m11.599882093s ago: executing program 8 (id=3117): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$rxrpc(0x21, 0x2, 0xa) getsockopt$bt_hci(r2, 0x0, 0x3, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001140)='/proc/bus/input/handlers\x00', 0x0, 0x0) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000140)=""/4078, 0xfee}], 0x1, 0x18, 0x207fff) setreuid(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x5c}}, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000740)=ANY=[@ANYBLOB="44000000090605000000000000000000010000050900020073797a30000006000500010007000000080009400000000114000880100007800a001100b4"], 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x44000) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000030605000000000000000000000000000500010007", @ANYRES8=0x0, @ANYRESDEC=r1], 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20008050) 4m10.335110648s ago: executing program 8 (id=3123): r0 = dup(0xffffffffffffffff) write$UHID_INPUT(r0, &(0x7f0000001040)={0xfc, {"a2e3ad0e090d07f9505e1a1887f70706d038e7fd7fc6e5539b203c0a8b089b3f32356c030890e0879b0af8c6e70a9b334a959b6196048ed30af3988f7ef31952013fffe8d178708c523c921b1b5b31070d0773180acd3b78130daa61d8e8048001005802b77f07227227b7ba67e0e78657a6f5c2a874e62a9ccdc0d31a0c9f318c0da1993bd160e233df4a62179c6f30e065cd5b91cd0ae193973735b36d5b1b63dd1c00305d3f46635eb016d5b1dda98e2d749be7bd1df1fb3b231fdcdb5075a9aaa1b469c3090000000000000075271b286329d169934288fd789aa37d6e98b224fd44b65b31334ffc55cc82cd3ac32ecdb08ced6f9081b4dd0d8b38f3cd4498bee800490841bdb114f6b76383709d8f5c55432a909fda039aec54a1236e80f6a8abadeafb2ff7949d1f416e56c71b1931870262f5e801119242ca026bfcc21e7e7daf2451138e645bb80c617669314e2fbe70de98ec76a9e40dad47f36fd9f7d0d42a4b5f1185ccdcf16ff46295d8a0fa17713c5802630933a9a34af674f3f39fe23491237c08822dec110911e893d0a8c4f677747abc360934b82910ff85bfd995083bba2987a67399eac427d145d546a40b9f6ff14ac488ec130fb3850a27af9544ae15a7e454dea05918b41243513f000000000000000a3621c56cea8d20fa911a0c41db6ebe8cac64f17679141d54b34bbc9963ac4f4bb3309603f1d4ab966203861b5b15a841f2b575a8bd0d78248ebe4d9a80002695104f674c2431dca141fae269cab70e9a66f3c3a9a63e9639e1f59c0ede26c6b5d74b078a5e15c31634e5ae098ce9ee70771a0000119a867e1088334975e9f73483b6a62fa678ca14ffd9f9db2a7869d85864056526f889af43a6056080572286522449df466c632b3570243f989cce7cd9f465e41e610c20d80421d653a5520000008213b704c7fb082ff27590678ef9f190bae97909507041d860420c5664b27921b14dc18892fd32d0ad7bc946813591ad8deff4b05f60cea0da7710ac0000000000008000bea37ce0d0d4aa202f928f28381aab144a5d429a04a6a2b83c7068ae949ed06e288e810bac9c76600025e19c907f8ea2e2010000ef8271a179c1389dbdfffe492f21579d2c15b8c70cdb1c332d86d87341432750861ec2bc3451edca194b221cfec4603d276bbaa1dfa6d4fb8a48a76eafc9a9a0270e4c10d64cd5a62427264f2377fe763c43470833ac96c45f357cbbaba8f1b1fdcc7cbb61a7cdb9744ed7f9129aede2be21ccfdc4e9134f8684b3a4f354da9a795e96334e207dff70f1988037b2ed3aaf575c0b88d8f146684078416d59fdee5325928974d12dad99dac44c3f0008047096a44002bebc2420aed92fa9b6578b4779415d4ac01b75d5495c118045651cf41c2fc48b778efa5ea5677747430af4162b987b80c3e001cd34e5c92f76cc4c24eeb8bc4e9ac2aed9e53803ed0ca4ae1b9737d214060005ea6f1783e287b3bee96e3a726eafe2fdfaa78d1f48c13b64df07847754b8400daaa69bf5c8f4350aeae9ca1207e78283cd0b20ceb360c7e658828163e2d25c4aa348561f927e88f63aa70e73a5e69b3df3495903f06572e1e007fa55a2999f596d067312f5779e8dbfdcf3427138f3d444d2639a10477f9bec4b0bbb6e3c04be68981f392203dd0ee3ef478e16dacfc5e3e03cf7ab8e3902f1b0ff034ef655b253ca509383815b1b6fc6522d4e4fdc11a48cf42d48604675fde2b94cf00500a2690891abf8ab9c015073014d9e08d4338b8780bdecd436cf0541359bafff845237f104b96210403b2de9efed496f42355bc7872c827467cfa5c4e72730d56bd068ed211cf847535edecb7b373f78b095b68441a34cb51682a8ae4d24ad0465f3927f889b813076038e79a7962fb385a882e8020f06c4c2ba1dd5cac7c18876da865d258734dd73583df292892448039ef799cf0630becdcce04579b5561dc825ab829827945e020c1f67ee615feb6243378e0610060f02cca4e91b2f001edb3d78fb4b55668dda93aec92a5de203717aa49c2d284acfabe262fccfcbb2b75a2183c46eb65ca8104e1b4da7fbb77ab2fc043aead87c32ab875ee7c2e7b7019c982c04000000000000005c0c7dcee8fe6516a328032f88c042891824659e9e94265c803b35ee5f83a2b210520106b8a358b50ab7a1fa89af9c251fe5294b3d1802d5676d95f160ec97b1ad94872cb2044642c37b4a6cc6c04effc1672db7e4b68d787d9a7a508ae54b3cd7369dde50e8c77d95a3d361c040babb171607caac2a3559ad4f75465f49c0d0ae3716db6e00cb11db4a5fade2a57c10238e204a67737c3b42aae501b20f7694a00f16e2d0174035a2c22656dc29880acebdbe8ddbd75c2f998d8ac2dfad2ba3a504777b6b45a45957f24d758ed024b3849c11d412a2a03b4047497022d9c30e23ef4df5c89644f48bb536f7945b5dd7bcddff754413d135273ea8e75f22f216c6b9990ae71806f2c00b4025c48b75c0f73cdb9a7b8fa367b50028067e7f16f4dd569d462f4f19eacdb3ed70eeebb4483f8fd777d443e8b40427db6fe29068c0ca3d2414442e8f3a154704b0e51bc664a137b26be719f4f7c9a5678a674dfc95df80c1ce375dd649c8c704e509bd88c8e63d8c7dd66adcc9f68a75b9397b035153faf46366e7205dd8d6f37525c1a0e94610dd94323f6c15d085197149bfd6655548cfd9c52c9711937f79abb1a124f1210465483cd3b2d78378cfb85ed82e7da0f6eb6d279f2ae455925d0f6f1ba571eba281f2a654fb39ddff3b484439ff158e7c5419e037f3e3ad038f2211f1033195563c7f93cd54b9094f226e783271e1e5a2a2c10712eab625d64931cd4ffe6738d97b9b5ef828ee9fb059fc01af0e79c1e14b1d25988c69a399567c1d93768f7971d31488b8658a20878b7c1dd7ba02fc42939dde3d4a3339a65d5062c59c51097b40517705da56e9ebf0afa53282bf86dbb58c548069ff6eb95aade7cc66d7bbef724779ca1f731b3346ff177050373d79ff7b3e7f9bc0c1b4b266a8878b90baaa039d3e3b63979ac3df6e6f4859afd50238c7547a39b60810938044ae185d2ba3e00a4e73676864ae090d81eaee5ee6cf1d0ab378dd4dd891e937c2ea5410e0513005000000000000003911fab964c271550027697b52160687461602f88df165d884b36ec2b6c25a2f33c715687e9d4afb96d6861a43ddbd8db411d8fe995754bd9cf32fce1e31919c4b2082fb0a30b9deae84bed4b28045634073c9c58c89d9e99c81769177c6d594f88a4facfd4c735a20307c737afa2d60399473296b831dbd933d93994ba3064279b10ea0c5833f41f157ea2302993dbe433b1aa3a3766d5439020484f4113c4c859465c3b415c3432f81db8719539d5bf372aaaea1cc43a6c5cbe59758bfee2916580dac4b008e595f437491d87abed02cefcd9db53d94d02daee67918e5d6787463183b4b87c1050000002f7809959bc048850613d17ca51055f2f416a44fe180d2d50c312cca7cb14a2bdc331f57a9817139a206fc76957227fff72de20a4b8e3737fbb42913777c06376f799eba367e21f94ca598705f5dcb767d6f0900d6b0f6095e53c4c4234d0c1fbe434f6ab8f43c0013ee93b83946ee7759e89d7bdd1a32d7b311711b757fe33c06d21a35810d8fe98b27faea8aa12bc8716eefc5c97c45ac33eeec964c5214bc3a9359bdea1cccab94f15e36319cb34ebcacedb82c2ed3de5a8a8f0011e8f74e82d7f96093530e76692839d7961939adfdeeeaff19d11efcafb6d546fef271e89d6cc2389e81ff58cefcce3fbf4625a7e7de40e42e07b34449e15e065cc7340002000000000000f288a4510de03dab19d26285eda89156d50dd385a60333ba5bbf5d77cd7007ad1519ad5470de3dd6d6080cafccf8a97406bb6b68a1f0c4549820a73c880f475f732ae00398e8bd1f4108b7807fb33b72685ec37a2d3f766413a60459516246e5a1d998a2017aef0948a68cf255235ab80dd349e891aef595dc4d470e8ac32a308e15fc37d06aeac289c0523f483e1ff7408c6087f1ab652f2ef91d4f2b01987b0f46da034e5c3f745a7ee8101a3934c54e240100c0275e2d0687dc746b0827cbf652f406c6b95f2722e58c05f7524e2126596e1cd7655b904801784c416b22f73d324678e2724f43f1fe687c7e8a60c28b82b6528341b648cdd56fed7cdcbb1575912d5ecd36dea3bca0b7427d8392c6289455e842729251ae033a9e02210e62df0546a74b333a1c48f95fd54acba0ea42e45c1d58efeee305415cc19451432c6f14c27693102a3cd84857cd6586fc5ca9a93eb0145fac0662ff86107f998a8ef7df8aa14046c55b03d3d47f88a8d60f7774a2ee08758897fb411a94b3c2fc5d5f0db42c0456ec015f08e5247d33ae2d35603ff8454c16f8342856935125102bb784ed7148b6ce431b63ee356b0c785f2f47b90e29389f22fc5b59a70efaea2bd40195af4486220d702e30bfc43c10ec23ea6283994a7dde4dcb61fea6b651fb1d62458d0741a12830052fcc460db043afe525629b40d7cee458ffff5e930ed624806c43a006e39336d07c2b8081c128ad2706f48261f7897484c297a1a6613bc18f5a38d442768af39e088a2a3d152ef95ff569e76db2391f4509d7f339d92fdb4a898a33a6d88e7cfe0e0000000000d80a4fe654578376e599aff3565b1d531f30912b9945fc83d38a155d5284edb44a78f615255490a4b621501f2a9e4d24624c4dac9274118c67584f5d374755534d7f68f679c4ff516a9c861a0e7e65868fcb2bf1cb9aea4e05df72279fdb0d2b9e935c5af3cf474bed79d6c248c1f5aea4b8b32c5d295e57079d0fe662a46b7f71cd47744db86c50b7c971d90295bf840262bf89394b3e0691953264d2700c838fa2c7b3425260f59554e542ccea39cb313b0000000000004ca7c12f45858d6284ca6270d6b2f0e58fded8a7b4a302a97bc641df07720ba2b26bbfcc807ca0abb1b44322269c21c5ec68cb068ea88067d905ea917bb03eefdaebdeabf2d0dce80997c915c8949de992587c2cb5fe36d7d3e5db21b094b8b77940b5f077e5f84c96ec664b72934b99b3109af65d77e86abd6859cddf4bbae1f0930462df15fddbc48562ea3511a8065ef028cf12f14dcf6ebecd8d884836174faf1aa609e5f1ee1162dfa13bdc1fa7cfaadba85c72e9758f03a755d0be53f8d2a1dfb1c68cc164b0a0780d971a96ea2c4d4ca0398c2235980a9307b3d5bd3b01faffd0a5dbed2881a9700af561ac8c6b00000000000000f96f06817fb903729a7db6daf60af93109eb1dee72e4363f51af62af6fb2a6df3bec89822a7a0b678058fa3fef86faec216eb6992162f8dcbf719c148cd2f9c55f4901203a9a8a2c3e90f3943dbc10360a1a49700d1dfbf66d69f6fbaf506c8bcce8bb0d872a02238926407a4eddd5d0fc5a752f9000000000000000000000000000000000000000000000000001040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000", 0x1000}}, 0x1006) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f00000001c0)={0x9, 0x8000, 0x80000001, 0x4, 0xa, 0xfffffffffffffff8}) 4m10.289130321s ago: executing program 8 (id=3125): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2b, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) ioctl$PPPIOCGIDLE64(0xffffffffffffffff, 0x8010743f, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x50}}, 0x0) r4 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@hci, 0x80, 0x0, 0xffffffffffffffe2}, 0x1f00) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) socket$nl_route(0x10, 0x3, 0x0) close(0x4) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000000000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x1c, 0x7, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, 0x0, 0x20000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x2}) 4m10.163904191s ago: executing program 8 (id=3130): ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000000400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a30"], 0x84}, 0x1, 0x0, 0x0, 0x24040089}, 0x20008000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000001000010422bd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="2b0300000040000014001280090001007663616e0000000004000280080029008682"], 0x3c}}, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2050061, &(0x7f0000000bc0)) 4m7.913915916s ago: executing program 8 (id=3132): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000000000a2c000000060a09040000000000000000020000000900010073797a30000000000900020073797a3200000000140000001100010000000000000000000000000afaac705017b3934edc1a1eb1137d7eef2972cac9dceab6470f0dadab6430042d87016d95508b4ef8eb59f6ecfbe221865d5caa043a25f716e4a48e600da722646864c400c26b59bc2c65488100"/160], 0x54}}, 0x0) 3m52.824947885s ago: executing program 36 (id=3132): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000000000a2c000000060a09040000000000000000020000000900010073797a30000000000900020073797a3200000000140000001100010000000000000000000000000afaac705017b3934edc1a1eb1137d7eef2972cac9dceab6470f0dadab6430042d87016d95508b4ef8eb59f6ecfbe221865d5caa043a25f716e4a48e600da722646864c400c26b59bc2c65488100"/160], 0x54}}, 0x0) 12.363963021s ago: executing program 7 (id=4958): socket(0x28, 0x5, 0x0) r0 = socket(0x28, 0x5, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x2000400c) listen(r0, 0x4) socket$vsock_stream(0x28, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x1}, 0x71) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x8591, 0xa88, 0x4, 0x5, 0x0, 0x40, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfb6}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000840)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x700}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@jmp={0x5, 0x1, 0x0, 0xa, 0xa, 0xfffffffffffffff5, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0xb, 0x100a, &(0x7f00000009c0)=""/4106, 0x41100, 0xd}, 0x94) sendmsg$inet(r2, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000001480)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xa}}], 0x18}, 0x0) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x2}, 0x40000300) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) 11.439332579s ago: executing program 7 (id=4967): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="0b000000050000000c0000000000008001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1, 0xd, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000020000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f0ffffffb703000008000000b704000001000000850000000300000085000000d000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) mknodat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0xc0e99db6de761fc6, 0xa774) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x641, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2c41, 0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$FIGETBSZ(r4, 0x2, &(0x7f00000001c0)) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000280)={r2, r0}, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0xfff, 0x2, {0x3, 0x2, 0x1, 0x2, 0x2c}}) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r5 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, 0x0, &(0x7f0000000140)) 10.504246725s ago: executing program 7 (id=4977): bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x6, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x6}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x89f9b000) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)=@newqdisc={0xb0, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x84, 0x2, [@TCA_HTB_DIRECT_QLEN={0x8, 0x5, 0x8}, @TCA_HTB_INIT={0x18, 0x2, {0x3, 0x80000001}}, @TCA_HTB_DIRECT_QLEN={0xfffffffffffffe27, 0x5, 0xf}, @TCA_HTB_DIRECT_QLEN={0x8, 0x5, 0x6}, @TCA_HTB_INIT={0x18, 0x2, {0x3, 0xfffffffb, 0x7fffffff}}, @TCA_HTB_INIT={0x18, 0x2, {0x3, 0x8, 0x3}}, @TCA_HTB_DIRECT_QLEN={0x8, 0x5, 0x80000001}, @TCA_HTB_INIT={0x18, 0x2, {0x3, 0x9, 0xffb}}]}}]}, 0xb0}}, 0x20000000) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendto$inet6(r3, 0x0, 0x0, 0x4c881, &(0x7f0000000540)={0xa, 0x4e24, 0x10, @mcast2}, 0x1c) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) r5 = dup(r4) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000dc0)={0x0, 0x4, 0x0, 0x0, 0x1b, "0062ba7d820700000000000000000000096304"}) r7 = syz_open_pts(r4, 0x80) dup3(r7, r4, 0x80000) read(r4, &(0x7f00000005c0)=""/228, 0xe4) ioctl$TCSETSW2(r5, 0x402c542c, &(0x7f00000001c0)={0x3, 0x2, 0x2, 0xfbdfffd3, 0x3, "65bd219f000062f800", 0xfffff7a4, 0xc}) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r8, 0x1, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) write$9p(r5, &(0x7f0000001200)='\x00', 0x1) vmsplice(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000900)="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", 0xfffffffffffffefd}, {&(0x7f0000000240)="4b5f2a45fc76e01326714e9d060a67261313afbde29fa3dd0349a4015ea9ed0afc212a6db30e29e41693330783b2b56aae55e07663e8c2227396c1dafe44e5f7cce42384de1d1631e9eab7e04aa14ac92b8e697c5368735b8f760e5a51b50b19108e7cfbf5f58920624a7fedfb941e98296e307f277b95", 0x77}, {&(0x7f0000000780)="35ffd919c63a04852175546d41b9565291fad490cea7b81c34789ade47814d64c6c3bc0cbc6d21a460d6adea75b49e2cc6a525fc269bf3b2efea0335b009830b7605285d412f84ee54ebdb4133d4308f4ce06d01f6dc7b05ef3293c200d35ed6dd56b3ec64fb27a591b7052897b5e0a94bc5164028", 0x75}, {&(0x7f0000000800)="b52632edae341a1f081a8b8a309f6a3a22049537fb030148716b89e981bf128d838c808ca27e4ca9390ef533e5ec0571b7cb10c8fba24a2ce042312fadd1d70447540bb070532fb163a6b6fde3faaff5adc80d2f88e0bf1e9fb347efa0ae2c59c8c88c1309d655c8691b0ec1442f0a4a353b353d2a5b79c66e63cae270f9a1c0015486182fa1a71830065fa35ebb63b08f5b345c6c33b1dc826837dc489311bb114b5f7d7941641efc54ea5c34b16bb2687b9b3235e36b2251b046c2c808400dcfa93dfb591e88c431b5fbbc8fa002618b7e801406fc3798465169b3fda5a847758d04265a75599ed99ac5d2dbd6c349e327", 0xf2}], 0x4, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000a80)={{{@in6=@empty, @in6=@private0, 0x4e21, 0xd, 0x4e20, 0x0, 0x2, 0x80, 0xa0, 0x88}, {0x31, 0x7ff, 0x9, 0x590, 0x2c, 0x5, 0x45bd, 0x4}, {0xfff, 0xdf33, 0xfffffffffffffffc, 0x7}, 0xffff, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@rand_addr=0x64010100, 0x4d2, 0xff}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3507, 0x3, 0x1, 0x1, 0x4, 0x7fffffff, 0x3}}, 0xe8) sendmmsg$inet6(r6, &(0x7f000000b940), 0x0, 0x2404c010) sendmmsg$inet6(r3, &(0x7f0000003740)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000000c0)="9789b5f1c62a351627e8c11b9db6dddea9b66ff406916e6a5a5ce4cbd789ab3227360cf436ff0c787562ea6502aaf9b563b73774e76966a6cddd0a4fec26188f47687d2e579e712223ed93b19064b38a1887cc2e725d446d3a3182b1eb6ac512db57006eff3ab4b751d39dc8d87647e1887b9f6ff2b5d74b25fd770b238d3a6346916499aad4aa8db80a1b30f1ff2845", 0x90}, {&(0x7f0000001140)="e030c99805dc7726f59b02babcdc5f29777c1ab4bc293a559fff4138dc013ddcfc305a5db9cc7ecd71df63fbec0f988102af01d7788998385e4661ebb653677f5e0836b3e1546635b68962999f012887a116a8fb4057f5d897bbd526165d51c2c4e4cba975cdbdccc0f0ad5dd81c775045c2f2a067fce8ee09cc7cae34b516a74b3008f67d92d33c525b6cd706fdb2b061403e233fd8b36b1e91913e69c1fc41692838585dd2a18b6aa0a0dea200146e821a63799e5f84ba202a74213479868f7ebc079101a30e810b024154b9245dd154baa091a32e28f2ded22910f60bc037a121ec9681a2cf331b4966bb7cd549a08ed3b3354dc9aaf95f8bcfaead3bbf677653db2681395f2af577a9d03a6ae2e69cfec13aced0bee6484545610fc61580b276622a101b94886d6aa3ba081123dfe48df05acbc57d49802d27264fa2b679d538955907d000974e5d1ba5497656d194806bf9143add3159a1bb08e5d9103f5a858af1a1b245652dd2076c7c6127324dd9970b86c99ffa945677ade14cc1f6826efc302e0a2b5f150edef4b31f77fc5346ca03a31039834ab0e76bbb2e3f491b70fed4ab418d8d9b6342e7ef71a42a63b893cc4f5c34a2beaa6d523521c227ee45abc0f87612691f3c7f05b9be2f7755a8f21eb9ea65291fc2e020fd709452d7e6280aebff13f3c9687d5b372c18b46da02e650be48c3435c6431b1e330dbd87f8395a022bd3f9e586a45ef615b8edbf15c4fe4a6fcc10bb5a2b33e9c2371058f9422f74ff536fd1b30a583d67c7837fec2b197be4b85c61e3b2854384b093d299653c80c93d896d0e678b6ce0064f24aae2221212eb30894e8560fb1c7e37015e1870d58c60d3cd5b5c78e5450387bb7439471adb07e5656e0ae46db93d2462a73751d8049610daf75164bc7acdc3a6834675bac74389a576fa94471a9ed5048afaab580a46f00cad4a876ce4b6e160c36c3f2ca11a2448708958454133690e2e6209990d29f4926c07466ead7207e9e1e513bce0641c359cebb4bbd0667ba85e9f70b08c26b7848c9ae61daf20f592160967e39f6b32855aa6e71d346e81dda6f98c37ac6ff7d4d6a5e61c33a28fd8eb71d7ba87e6f4235aa7d9d87ca536aac6a7c6a258f1d813fdaee55847938bcbf88be65d9cf13241fbc30164fd9e69a56b83adbb4b17d4a6c79e2e5a8c243f6686cfb3052ac29c143cbd15c62c487da200d1645c713ce1a8321fc0cbde021a35c398e6409372a91813bd6c3ffac5b6fe1e9f4a62ae64744f082913f5919922b152020217554d163d021ea10673f4a3fc3bdd4d45ba5e92e7c01c440a9eec33556f840ee5353c9f91c8b62f607c231166ebb40df2710647f650dd06b96c738143a63ae8d23907be4b0a19e9922fa4f475e611131ee7407a2a13909ed333ccb9c272624381e91071676cf756155df93b6691eab5a9702c0695c7429658c25ed13a707248e86b4f2ea24229da08de5b91d484ab6a4eccf00630a360619708f4fbdf9de460b00781109af41dab55ed996b72f30376e67190ba9abf56fb2d7cb20c09d4d08e91487f4d9ae9e3bd626749ac379fe0d1dfd923a822b99bb32a7f1a079267ff1bd42982f83bd466088202ef5b1478f20de69303445d236cfbd3077e44a329381b2f1b0bc558028e6c98a6256cbc168f82cc54debb25a58d8b810dc3184ddf5eef5f31eae8e16d21176089d5ed916ee0599b460809faee419b746304df86a032cfe9fa566cb501344ac0f790d5297af712ec6849e2b69c", 0x4ea}], 0x2}}], 0x1, 0x84) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x8, 0x0, 0x0, 0x480000000000000b, 0x9729, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x76, 0xffffffffffffff0c}, 0x13f9e, 0x0, 0x0, 0x0, 0x8002, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0900000002000000080000004000000042"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r9}, 0x38) 9.857006975s ago: executing program 7 (id=4993): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) unshare(0x62040200) socket$l2tp6(0xa, 0x2, 0x73) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x13, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32, @ANYBLOB="0000000000000000b704000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x17, 0x21, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1000}, {}, {}, [@call={0x85, 0x0, 0x0, 0x3d}, @map_fd, @generic={0x9, 0x8, 0x5, 0x12aa, 0x5}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000600)='GPL\x00', 0xfffffff8, 0x59, &(0x7f0000000780)=""/89, 0x41000, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000a00)={0x3, 0x5, 0x8, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000b80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x94) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000680)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r2, @ANYBLOB], 0x78}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x14010, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)={0x60, 0x9, 0x6, 0x801, 0x0, 0x0, {0x7}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x38, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @private0}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0xe1f}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x88}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x800000}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x10000042}, 0x90) 8.871999914s ago: executing program 9 (id=4997): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000006040), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 8.744017004s ago: executing program 9 (id=5000): r0 = socket(0x10, 0x3, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) setgroups(0x0, 0x0) setregid(0xffffffffffffffff, r2) r3 = socket(0x1e, 0x80001, 0x0) r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb801b, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7a, 0x0, @perf_config_ext={0x1, 0xf60e}, 0xb093, 0x800000, 0x43a1bd76, 0x2, 0x6, 0x6, 0x8, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) gettid() mount$9p_tcp(&(0x7f0000000580), &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600), 0x820, &(0x7f0000000640)=ANY=[@ANYRESHEX, @ANYRESDEC=r1, @ANYBLOB]) syz_open_dev$loop(0x0, 0xee8, 0x5042) accept4$nfc_llcp(r3, &(0x7f00000001c0), &(0x7f0000000240)=0x60, 0x1000) openat$ptp0(0xffffffffffffff9c, 0x0, 0x40, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/53, 0x35}, 0x2}], 0x1, 0x820b, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x2409c8c1, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) sendto$inet6(r6, &(0x7f0000000e80)="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", 0x5c6, 0x6d91fb6102d8910c, 0x0, 0xfffffffffffffe38) sendto$inet6(r6, 0x0, 0x80000, 0x0, 0x0, 0x0) 8.611712284s ago: executing program 9 (id=5005): r0 = socket(0x11, 0x3, 0x10001) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x30) r1 = socket(0x10, 0x80002, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, 0x0, 0x0) connect$unix(r3, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$nl_route_sched(r1, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x10, 0x13, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6622b533, 0x0, 0x0, 0x0, 0x6}, [@printk={@llx, {0x3, 0x0, 0x3, 0xa, 0x0}, {0x5}, {0x6, 0x0, 0x2}, {}, {}, {0x85, 0x0, 0x0, 0x8}}, @printk={@p, {0x5, 0x3, 0x6, 0xa, 0x1, 0xfff5}}]}, &(0x7f0000000200)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') preadv(r5, &(0x7f0000001440)=[{&(0x7f0000000000)=""/175, 0xaf}, {&(0x7f0000000100)=""/163, 0xa3}, {&(0x7f00000014c0)=""/4107, 0x100b}, {&(0x7f00000001c0)=""/166, 0xa6}, {&(0x7f00000012c0)=""/232, 0xe8}, {&(0x7f00000013c0)=""/72, 0x48}], 0x6, 0xe, 0x2000051b) 6.142203704s ago: executing program 9 (id=5011): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000006040), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 5.373409176s ago: executing program 9 (id=5014): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x40024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = socket(0x2a, 0x2, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x20040845}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0xa) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}, {0x10, 0xf}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48048}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0xfffa, 0xd}, {}, {0x1c, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_FLAGS={0x8, 0x16, 0x12}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24000804}, 0x24000000) r4 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r4, &(0x7f00000002c0), 0x40000000000009f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r8, 0xc004743e, 0x0) readv(r8, &(0x7f0000000080)=[{0x0}], 0x1) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x1208002, &(0x7f0000000100)={[{@grpquota}, {@delalloc}, {@resuid}, {@debug}, {@dioread_nolock}, {}, {@nomblk_io_submit}, {@noauto_da_alloc}]}, 0x1, 0x5e1, &(0x7f0000000bc0)="$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") symlink(&(0x7f0000000900)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000780)=ANY=[@ANYRES32=r7, @ANYRES32=r9, @ANYBLOB="0500000000000000000000007fbdbc14e20210cb166f7b79973be48736643064742be19767a0430a96dcf0b515ae937d0766f0784068d6bfbf853d90f76bf6cad413542521645a211e634acf1327a0e96a42f4b3d8e2b2418a4276c2e2eddce5607525809deeae6cc46d26e53547056ef5303cb81c0f8f2694ad16044e6348bacb7a9c28bc03db61de13436ff3", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) r10 = syz_open_dev$evdev(0x0, 0x0, 0x0) syz_usb_disconnect(r10) syz_usb_connect(0x6, 0x24, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r7}, &(0x7f00000006c0), &(0x7f0000000700)=r6}, 0x20) sendmsg$inet(r5, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) socket$key(0xf, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) 5.124695248s ago: executing program 7 (id=5020): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80782, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c0000001000ffff26bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="151700000000000014001280090001007663616e47396e340400028008001f0000010000"], 0x3c}, 0x1, 0x0, 0x0, 0x24004844}, 0x8000002) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000100)='^', 0x1) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000000314000128bd7000ffdbdf250900020073797a300000000008004100727865001400330070696d367265673000000000000000000900020073797a310000000008024100727865001400330062726964676530000000000000000000"], 0x60}}, 0x4) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x1fc, 0x3}, 0x102802, 0x2e, 0x0, 0x3, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) rt_sigqueueinfo(0x0, 0x15, &(0x7f0000000040)={0x239, 0x0, 0xfffffeff}) r3 = socket$isdn_base(0x22, 0x3, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0x2, 0x4e23, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x3}, 0x1c) connect$inet6(r4, &(0x7f00000001c0)={0xa, 0x4e63, 0x0, @mcast2, 0x26}, 0x1c) r5 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r5, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e230e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac710aa7d0000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) write(r3, 0x0, 0xfd7e) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x20, r7, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40010}, 0x810) connect$inet6(r4, &(0x7f00000003c0)={0xa, 0x4e20, 0xb2e9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1d58}, 0x1c) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) ppoll(&(0x7f0000000000)=[{r1, 0x4000}, {r1, 0x4}, {r1, 0x85b0}, {r1, 0x9000}], 0x4, &(0x7f0000000080)={0x77359400}, &(0x7f0000000140)={[0x26]}, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x3, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020642500000000202020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000005000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r8, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000fc0)="d2ff03076003008cb89e08f086dd", 0x0, 0xd5b5, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x4c) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x0, 0x3938700}, {r9, r10+10000000}}, 0x0) 4.886140271s ago: executing program 7 (id=5022): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x40024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = socket(0x2a, 0x2, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x20040845}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0xa) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}, {0x10, 0xf}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48048}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0xfffa, 0xd}, {}, {0x1c, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_FLAGS={0x8, 0x16, 0x12}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24000804}, 0x24000000) r4 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r4, &(0x7f00000002c0), 0x40000000000009f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f0000000400000004000000120000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r8, 0xc004743e, 0x0) readv(r8, &(0x7f0000000080)=[{0x0}], 0x1) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x1208002, &(0x7f0000000100)={[{@grpquota}, {@delalloc}, {@resuid}, {@debug}, {@dioread_nolock}, {}, {@nomblk_io_submit}, {@noauto_da_alloc}]}, 0x1, 0x5e1, &(0x7f0000000bc0)="$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") symlink(&(0x7f0000000900)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000780)=ANY=[@ANYRES32=r7, @ANYRES32=r9, @ANYBLOB="0500000000000000000000007fbdbc14e20210cb166f7b79973be48736643064742be19767a0430a96dcf0b515ae937d0766f0784068d6bfbf853d90f76bf6cad413542521645a211e634acf1327a0e96a42f4b3d8e2b2418a4276c2e2eddce5607525809deeae6cc46d26e53547056ef5303cb81c0f8f2694ad16044e6348bacb7a9c28bc03db61de13436ff3", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) r10 = syz_open_dev$evdev(0x0, 0x0, 0x0) syz_usb_disconnect(r10) syz_usb_connect(0x6, 0x24, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r7}, &(0x7f00000006c0), &(0x7f0000000700)=r6}, 0x20) sendmsg$inet(r5, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) socket$key(0xf, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) 1.327060964s ago: executing program 1 (id=5036): r0 = io_uring_setup(0x4a86, &(0x7f0000000300)={0x0, 0x4178, 0x40, 0x8001002, 0x112}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000006040), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) close_range(r0, 0xffffffffffffffff, 0x0) 1.325327923s ago: executing program 9 (id=5037): r0 = socket(0xa, 0x5, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000200)=""/60, 0x3c) mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) syz_genetlink_get_family_id$smc(0x0, r0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2e, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$FS_IOC_FSGETXATTR(r1, 0x400455c8, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) syz_usb_connect(0x3, 0x36, 0x0, 0x0) inotify_init() r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = dup(r2) write$UHID_INPUT(r3, &(0x7f0000004000)={0xf, {"a2e3ad21ed0d09f90750090987f70906d038e7ff7fc6e5539b0d3d0e8b089b39326d63060890e0878f0e1ac6e7049b334a959b669a240d5b67f3988f7ef319520100ffe8d178708c523c921b1b5b31070b07580936cd3b78130daa61d8e8043f00005802b77f07227227b7ba67e0e78657a6f5c2a874e62a9ccdc0d31a0c9f318c0da1993bd160e233df4a62179c6f30e065cd5b91cd0ae193973735b36d5b1b63dd1c00305d3f46635eb016d5b1dda98e2d749be7bd1df1fb3b231fdcdb5075a9aaa1b469c3090000000000000075271b286329d169934288fd789aa37d6e98b224fd44b65b31334ffc55cc82cd3ac32ecdb08ced6f9081b4dd0d8b38f3cd4498bee800490841bdb114f6b76383701d8f5c55432a909fda039aec54a1236e80f6a8abadea7662496bddbb42be6bfb2f17959d1f416e56c71b1931870262f5e801119242ca026bfc821e7e7daf2451138e645bb80c617669314e2fbe70de98ec76a9e40dad47f36fd9f7d0d42a4b5f1185ccdcf16ff46295d8a0fa17713c5802630933a9a34af674f3f39fe23491237c08822dec110911e893d0a8c4f677747abc360934b82910ff85bfd995083bba2987a67399eac427d145d546a40b9f6ff14ac488ec130fb3850a27af9544ae15a7e454dea05918b41243513f000000000000000a3621c56cea8d20fa911a0c41db6ebe8cac64f17679141d54b34bbc9963ac4f4bb3309603f1d4ab966203861b5b15a841f2b575a8bd0d78248ebe4d9a80002695104f674c2431dca141fae269cab70e9a66f3c3a9a63e9639e1f59c0ede26c6b5d74b078a5e15771aaa18119a867e1088334975e9f73483b6a62fa678ca14ffd9f9db2a7869d85864056526f889af43a6056080572286522449df466c632b3570243f989cce7cd9f465e41e610c20d80421d653a5520000008213b704c7fb082ff27590678ef9f190bae97909507041d860420c5664b27921b14dc1db8892fd32d0ad7bad8deff4b05f60cea0da7710ac0000000000008000bea37ce0d0d4aa202f928f28381aab144a5d429a04a6a2b83c7068ae949ed06e288e810bac9c76600025e19c907f8ea2e2010000008271a1f5f8528f227e79c1389dbdfffe492f21579d2c15b8c70cdb1c332d86d87341432750861ec2bc3451edca194b221cfec4603d276bbaa1dfa6d4fb8a48a76eafc9a9a0270e4c10d64cd5a62427264f2377fe763c43470833ac96c45f357cbbaba8f1b1fdcc7cbb61a7cdb9744ed7f9129aede2be21ccfdc4e9134f8684b3a4f354da9a795e96334e207dff70f1988037b2ed3aaf575c0b88d8f146684078416d59fdee5325928974d12dad99dac44c3f0008047096a44002bebc2420aed92fa9b6578b4779415d4ac01b75d5495c118045651cf41c2fc48b778efa5ea5677747430af4162b987b80c3e001cd34e5c92f76cc4c24eeb8bc4e9ac2aed9e53803ed0ca4ae3a9737d214060005ea6f1783e287b3bee96e3a726eafe2fdfaa78d1f48c13b64df07847754b8400daaa69bf5c8f4350aeae9ca1207e78283cd0b20ceb360c7e658828163e2d25c4aa348561f927e88f63aa70e73a5e69b3df3495903f06572e1e007fa55a2999f596d067312f5779e8dbfdcf3427138f3d444d2639a10477f9bec4b0bbb6e3c04be68981f392203dd0ee3ef478e16dacfc5e3e03cf7ab8e3902f1b0ff034ef655b253ca509383815b1b6fc6522d4e4fdc11a48cf42d48604675fde2b94cf00500a2690891abf8ab9c015073014d9e08d4338b8780bdecd436cf0541359bafffa45237f104b96210403b2de9efed496f42355bc7872c827467cfa5c4e72730d56bd068ed211cf847535edecb7b373f78b095b68441a34cb51682a8ae4d24ad0465f3927f889b813076038e79a7962fb385a882e8020f06c4c2ba1dd5cac7c18876da865d258734dd73583df292892448039ef799cf0630becdcce04579b5561dc825ab829827945e020c1f67ee615feb6243378e0610060f02cca4e91b2f001edb3d78fb4b55668dda93aec92a5de203717aa49c2d284acfabe262fccfcbb2b75a2183c46eb65ca8104e1b4da7fbb77ab2fc043aead87c32ab875ee7c2e7b7019c982cd3b43eaeb1a5fb135c0c7dcee8fe6516a328032f88c042891824659e9e94265c803b35ee5f83a2b210520106b8a358b50ab7a1fa89af9c251fe5294b3d1802d5676d95f160ec97b1ad94872cb2044642c37b4a6cc6c04effc1672db7e4b6080000007a508ae54b3cd7369dde50e8c77d95a3d361c040babb171607caac2a3559ad4f75465f49c0d0ae3716db6e00cb11db4a5fade2a57c10238e204a67737c3b42aae501b20f7694a00f16e2d0174035a2c22656dc29880acebdbe8ddbd75c2f998d8ac2dfad2ba3a504767b6b45a45957f24d758ed024b3849c11d412a2a03b4047497022d9c30e23ef4df5c89644f48bb536f7945b59d7bcddff754413d135273ea8e75f22f216c6b9990ae71806f2c00b4025c48b75c0f73cdb9a7b8fa367b50028067e7f16f4dd569d462f4f19eacdb3ed70eeebb4483f8fd777d443e8b40427db6fe29068c0ca3d2414442e8f3a154704b0e51bc664a137b26be719f4f7c9a5678a674dfc95df80b9ce375dd649c8c704e509bd88c8e63d8c7dd67071115c8982ba46af4d6adcc9f68a75b9397b035153faf46366e7205dd8d6f37525c1a0e94610dd94323f6c15d085197149bfd6655548cfd9c52c9711937f79abb1a124f1210465483cd3b2d78378cfb85ed82e7da0f6eb6d279f2ae455925d0f6f1ba571eba281f2a654fb39ddff3b484439ff158e7c5419e037f3e3ad038f2211f1033195563c7f93cd54b9094f226e783271e1e5a2a2c10712eab625d64931cd4ffe6738d97b9b5ef828ee9fb06ffc01af0e79c1e14b1d25988c69a399567c1d93768f7971d31488b8658a20878b7c1dd7ba02fc42939dde3d4a3339a65d507dc59c51097b40517705da56e9ebf0afa53282bf86dbb58c548069ff6eb95aade7cc66d7bbef724779ca1f731b3346ff177050373d79ff7b3e7f9bc0c1b4b266a8878b90baaa039d3e3b63979ac3df6e6f4859afd50238c7547a39b60810938044ae185d2ba3e00a4e73676864ae090d81eaee5ee6cf1d0ab378dd4dd891e937c2ea5410e0513005000000000000003911fab964c271550027697b52160687461602f88df165d884b36ec2b6c25a2f33c715687e9d4afb96d6861aca47da73d6f3144345f48843dd014e5c5ad8fe995754bd9cf32fce1e31919c4b2082fb0a30b9deae84bed4b28045634073c9c58c89d9e99c81769177c6d594f88a4facfd4c735a20307c737afa2d60399473296b831dbd933d93994ba3064279b10ea0c5833f41f157ea2302993dbe433b1aa3a3766d5439020484f4113c4c859465c3b415c3432f81db8719539d5bf372aaaea1cc43a6c5cbe59758bfee2916580dac4b008e595f437491d87abed02cefcd9db53d94d02daee67918e5d6787463183b4b87c1050000002f7809959bc048850613d17ca51055f2f416a44fe180d2d50c312cca7cb14a2bdc331f57a9817139a206fc76957227ffff2de20a4b8e3737fbb42913777c06376f799eba367e21f94ca598705f5dcb767d6f0900d6b0f6095e53c4c4234d0c1fbe434f6ab8f43c0013ee93b83946ee7759e89d7bdd1a32d7b311711b757fe43c06d21a35810d8fe98b27faea8aa12bc8716eefc5c97c45ac33eeec964c5214bc3a9359bdea1cccab94f15e36319cb34ebcacedb82c2ed3de5a8a8f0011e8f74e82d7f96093530e76692839d7961939adfdeeeaff19d11efcafb6d546fef271e89d6cc2389e81ff58cefcce3fbf4625a7e7de40e42e07b34449e15e065cc7340002000000000000f288a4510de03dab19d26285eda89156d50dd385a60333ba5bbf5d77cd7007ad1519ad5470de3dd6d6080cafccf8a97406bb6b68a1f0c4549820a73c880f475f732ae00398e8bd1f4108b7807fb33b72685ec37a2d3f766413a60459516246e5a1d998a2017aef0948a68cf255315ab80dd349e891aef595dc4d470e8ac32a308e15fc37d06aeac289c0523f483e1ff7408c6087f1ab652f2ef91d4f2b01987b0f46da034e5c3f745a7ee8101a3934c54e24b48ec0275e2d0687dc746b0827cbf652f406c6b95f2722e58c05f752ce2126596e1cd7655b904801784c416b22f73d324678e2724f43f1fe687c7e8a60c28b82b6528341b648cdd56fed7cdcbb15da202d5ecd36dea3bca0b7427d8392c6289455e8f8d2ab2242729251ae033a9e02210e62df0546a74b333a1c48f95fd54acb5741259e8c5488efeee327415cc19451432c6f14c27693102a3cd84857cd6586fc5ca9a93eb0145fac0662ff86107f998a8ef7df8aa14046c55b03d3d47f88a8d60f7774a2ee08758897fb411a94b3c2fc5d5f0db42c0456ec015f08e5247d33ae2d35603ff8454c16f8342856935125102bb784ed7148b6ce431b63ee356b0c785f2f47b90e29389f22fc5b59a70efaea2bd40195af4486220d702e30bfc43c10ec23ea6283994a7dde4dcb61fea6b651fb1d62458d0741a12830052fcc460db043afe525629b40d7cee458e4cb5e930ed624806c43a006e39336d07c2b8081c128ad2706f48261f7897484c297a1a6613bc18f5a38d442768af38041efe03d152ef95ff569e76db2391f4509d7f339d92fdb4a89364949da398000000000000000d80a4fe654578376e599aff3565b1d531f30912b9945030b81ea9935fd46edb44a78f615255490a4b621501f2a9e4d24624c4dac9274118c67584f5d374755534d7f68f679c4ff516a9c861a0e7e65868fcb2bf1cb9aea4e05df72279fdb0d2b9e935c5af3cf474bed79dfc248c1f5aea4b8b32c5d295e57079d0fe662a46b7f71cd47744db86c50b704c971d90295c7b2c7439a2d78ccfa79b5fc2bff6bbf840262bf89394b3e0691953264d2700c838fa2c7b3425260f59554e502dcea39cb313b0000000000004ca7c12f45858d6284ca6270d6b2f0e58fded8a7b4a302a97bc641df07720ba2b26bbfcc807ca0abb1b44322269c21c5ec68cb068ea88067d905ea917bb03eefdaebdeabf2d0dce80997c915c8949de992587c2cb5fe36d7d3e5db21b094b8b77940b5f07722e47a08d367e5f84c96ec664b72934b99b3109af65d77e86abd6859cddf4bbae1f0930462df15fddbc48562ea3511a8065ef028cf12f14dcf6ebecd8d884836174faf1aa609e5f1ee1162dfa13bdc1fa7cfaadba85c72e9758f03a755d0be53f8d2a1dfb1c68cc164b0a0780d971a96ea2c4d4ca0398c2235980a9307b3d5bd3b01faffd0a5dbed2881a9700af561ac8c6b00000000000000f96f06817fb903729a7db6ff957697c9ede7885d94ffb0969be0daf60af93109eb1dee72e4363f51af62af6fb2a6df3bec89822a7a0b678058fa3fef86faec216eb6992162f8dcbf719c148cd2f9c55f4901203a9a8a2c3e90f3943dbc10360a1a49700d1dfbf66d69f6fbaf506c8bcce8bb0d872a02238926407a4eddd5d0fc5a752f9000", 0x1000}}, 0x1006) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'ipvlan1\x00'}) open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) 1.246421131s ago: executing program 1 (id=5040): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp', 0x5) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000f00)="8995b3c271bab84f6e841cd28301f2e02519276836b2ab14ba300f39a71758d74d011771db342aa6df71dc54faabe6ccc2dae1fdf17d4c74618af0933c8c800ec3ce49bd4af9b8cf0b15e8ad756f12238f6649d204a1065dad7cffef082a59ee2b21eb73656d3dc03547888735", 0x6d, 0x4c840, 0x0, 0x0) 1.138563205s ago: executing program 1 (id=5043): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000740)=ANY=[@ANYBLOB="44000000090605000000000000000000010000050900020073797a30000006000500010007000000080009400000000114000880"], 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x44000) 1.079904696s ago: executing program 1 (id=5044): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000100)=0x8001, 0x4) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x40000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000300)={0x3, 0x1, {0x2, 0x2, 0x5, 0x3, 0x1}}) syz_read_part_table(0x5d9, &(0x7f0000000000)="$eJzs0r9rW1cUB/DzXqsoHYJECKTQpRCTSU2KlhQqUYpRhRcnhLRk6D+QDIUEOngwUpXMaTJ1s/GPgvFiOrSToUONZTAuyJORV4+lg+miobwi67nFNW0H125tPp9B993vu0fnXu4LzrU0fs6yLImIrHiYfZG/iXjy7t9Xf7zc+Gji7Xsf3n8QkcTjiJh85/F3wzdJvuLwX7/J53fz+USx2pvbHN9fLm/d2O6OLaQRhWF+KSLaw/r2Yul4vyTeP/mRuUBW6uulZ8+fNl9M1R/tNKf3Cnn+6s58rfXT9drDdPRNraa/l/zxFBs//Nv9L+f5zJVbhW5vUN3I55XkSFly0r78P6z8mg29mQ3v/4PpvdlrnX5nMHlzqXC7crW/1np5cNPf/1V54Uw3CwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXGgr9fXSs+dP04jIXhtFjbe+bHz26s58rfXJ9drDdBSupqfav/liqv5opzm9N9Z77+sfs8sxc+VWoXtpUN3I11WSI2Wt09kNZ+3P9z97rdPvDCZvLn1+u3K1v9Z6mXz1ZLju9f96owAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAudH4ZTci7j+ISOLTiBhPy4vDPCtGlHePr79bHI0TxWpvbnN8f7m8dWO7O7ZwL89X04h2vHHw/O3B79RhaWk0FEZDOyLS0z0b/+y3AAAA///EuoFM") bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x7, @empty, 0x8009}, 0x1c) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000180)=@can_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0x1d, 0x1, 0x3}, [@CGW_LIM_HOPS={0x5, 0xd, 0x5}]}, 0x1c}}, 0x0) sendmmsg$inet6(r0, &(0x7f0000000480)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0xb, @loopback, 0x1}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000140)='2', 0x1}], 0x1}}], 0x1, 0x8000) socket$inet6_sctp(0xa, 0x1, 0x84) (async) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000100)=0x8001, 0x4) (async) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x40000) (async) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000300)={0x3, 0x1, {0x2, 0x2, 0x5, 0x3, 0x1}}) (async) syz_read_part_table(0x5d9, &(0x7f0000000000)="$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") (async) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x7, @empty, 0x8009}, 0x1c) (async) socket$nl_route(0x10, 0x3, 0x0) (async) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000180)=@can_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0x1d, 0x1, 0x3}, [@CGW_LIM_HOPS={0x5, 0xd, 0x5}]}, 0x1c}}, 0x0) (async) sendmmsg$inet6(r0, &(0x7f0000000480)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0xb, @loopback, 0x1}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000140)='2', 0x1}], 0x1}}], 0x1, 0x8000) (async) 906.964899ms ago: executing program 1 (id=5045): syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) sync_file_range(r0, 0x8, 0x30, 0x5) move_mount(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x252) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r3 = dup2(r2, r2) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) write$binfmt_misc(r3, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x2000)=nil, 0x8000000, 0x4) ptrace$setregs(0xffffffffffffffff, r1, 0xfffffffffffffffe, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x3fffffffc}, 0x0, 0x4, 0x0, 0x3, 0x1000, 0x8001, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) iopl(0x3) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) r4 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) shutdown(r5, 0x2) r6 = fsmount(r4, 0x1, 0x70) fchdir(r6) socket$caif_stream(0x25, 0x1, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x4b2}, 0x38) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000340)=[@in6={0xa, 0x4e23, 0x1, @mcast2, 0x8}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, '\x00', 0xb}, 0x9db6}, @in6={0xa, 0x4e22, 0x800, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}, @in={0x2, 0x4e23, @rand_addr=0x64010102}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}, @in6={0xa, 0x4e20, 0x1, @mcast1}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e23, 0x1fe, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x7}, @in={0x2, 0x4e22, @empty}], 0xcc) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r7 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) ioctl$USBDEVFS_IOCTL(r7, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_DISCSIGNAL(r7, 0x8010550e, &(0x7f0000000140)={0x0, 0x0}) 701.609217ms ago: executing program 1 (id=5046): unshare(0x28000600) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000140)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x98, &(0x7f00000001c0)=""/152, 0x41000, 0x21}, 0x94) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) syz_read_part_table(0x5e4, &(0x7f0000000000)="$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") mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x2, 0xff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000540)=@filter={'filter\x00', 0x42, 0x4, 0x298, 0xffffffff, 0x2a8, 0x210, 0x2a8, 0xffffffff, 0xffffffff, 0x378, 0x378, 0x378, 0xffffffff, 0x4, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_to_batadv\x00', 'wlan0\x00', {}, {0xff}, 0x84, 0x2, 0x2}, 0x0, 0x70, 0x98, 0x0, {0x100000000000000}}, @REJECT={0x28}}, {{@ip={@loopback, @rand_addr=0x64010101, 0xffffff00, 0xff000000, 'geneve0\x00', 'macvlan0\x00', {0xff}, {}, 0x2e, 0x0, 0x4}, 0x0, 0x70, 0x98}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x10, 0x9, 0x2}}}, {{@ip={@private=0xa010101, @loopback, 0xff, 0xff000000, 'bond0\x00', 'dvmrp0\x00', {}, {}, 0x2f, 0x0, 0x21}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0xd, 0x8, [0x8, 0x27, 0x3d, 0x16, 0x13, 0xe, 0x2d, 0x21, 0x2d, 0x32, 0x3f, 0x20, 0x28, 0x18, 0x22, 0x12], 0x0, 0x0, 0x6}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f8) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000200)=@mangle={'mangle\x00', 0x1f, 0x6, 0x6b8, 0x1d8, 0x1d8, 0x0, 0x1d8, 0xe8, 0x5e8, 0x5e8, 0x5e8, 0x5e8, 0x5e8, 0x6, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [0x0, 0xff], [0xff0000ff, 0x4de325748c9179dc, 0xffffffff, 0xff000000], 'wlan1\x00', 'wlan0\x00', {}, {0xff}, 0x6, 0x0, 0x2, 0x4}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x5, 0x8, @ipv4=@dev={0xac, 0x14, 0x14, 0x15}, 0x4e21}}}, {{@ipv6={@remote, @local, [0xff, 0xffffff00], [0xffffff00, 0xffffff00, 0xff, 0xff], 'veth1_macvtap\x00', 'erspan0\x00', {0xff}, {}, 0x87, 0x7f, 0x4, 0x2}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@mcast1, 0x33, 0x23, 0x8}}}, {{@ipv6={@remote, @private1={0xfc, 0x1, '\x00', 0x1}, [0xffffff00, 0xffffff00, 0xffffff00], [0x0, 0xffffffff, 0xffffffff, 0xff], 'pimreg\x00', 'pimreg0\x00', {0xff}, {0xff}, 0x0, 0x49, 0x1, 0x54}, 0x0, 0x208, 0x248, 0x0, {}, [@common=@rt={{0x138}, {0x80000000, [0x64b3d7eb, 0x4], 0xd3, 0x21, 0x0, [@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @loopback, @empty, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @remote, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, @mcast2, @private1, @mcast2, @private1, @private1, @private1={0xfc, 0x1, '\x00', 0x1}], 0x10}}, @inet=@rpfilter={{0x28}, {0x2}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x8, 0xffffffff, 0x7, 0x76be0f9b, 0x7, 0x8, 0x4, 0x733]}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x6}}]}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x5c, 0xf7}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x1, 0x9, 0x1}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x653afb6a7eb5282b) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x1) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x103a42, 0x0) ioctl$TIOCSTI(r5, 0x5412, &(0x7f0000000200)=0xdd) move_mount(r4, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) bind$inet(r0, &(0x7f0000000980)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f0000000940)='\x00', 0x89901) move_mount(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', r4, &(0x7f0000000100)='./file0\x00', 0x230) 345.419853ms ago: executing program 5 (id=5051): setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000002280)={0x0, 0x0}, 0x10) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000a40)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000c319b2afffba969b38cf4de343a00d1d011b97d0cb91b70fcb0f374ca29506a7ba68bbd0fc635434ec92e2e725028fc0e886fd8b49765629039740b70ff58edde9d0bd920be2648b33a3a53724d7a4fd1cc896f8a7bbfe55dd39e358d4401e4a86d2661bdc5cb5ff3881ced037b6cc0f0d9b5bc650b6b03f86dfc3e3e87b94abf06de190ee6800b18be11eaa2caa8d693f4850697195a482277f4702ed368f320c72c8d29385b526efc0763aae61c145cd34289cdfddd2deddbc77de3c1372787d82a2bb00df"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@broadcast, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@empty}}, &(0x7f0000000040)=0xe8) getresgid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) setresgid(0x0, 0xee01, r3) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r2, r3, 0x800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001080)={r1, 0xe0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000021c0), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) 335.775511ms ago: executing program 6 (id=5052): getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000180)=""/214, &(0x7f0000000080)=0xd6) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000000201010100000000000000000200000004000180180002801400018008000100b04c94a708000200ac1414aa140019800800010004000000080002"], 0x44}}, 0x0) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4044d, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x2, 0x7, 0x9, 0xd, 0xf18, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x10, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x102260, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=@updpolicy={0x17c, 0x19, 0x1, 0x0, 0x10, {{@in=@multicast1, @in=@remote, 0x4e22, 0xb, 0xffff, 0x0, 0xa, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {0x1, 0x9, 0x80}}, [@tmpl={0xc4, 0x5, [{{@in6=@private0, 0x0, 0x3c}, 0x0, @in=@rand_addr=0x64010101, 0x34ff, 0x0, 0x2}, {{@in=@local, 0x0, 0x3c}, 0x0, @in6=@loopback, 0xfffffffd, 0x0, 0x3, 0x0, 0x800, 0x800}, {{@in=@multicast1, 0x4d4, 0x2b}, 0x0, @in=@local, 0x4, 0x0, 0x1, 0x8, 0x0, 0x0, 0x400}]}]}, 0x17c}}, 0x0) socket(0x400000000010, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) fsopen(&(0x7f0000000180)='proc\x00', 0x1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000006311a4000000000085100000020000008500000008000000950000ca0f0000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x9, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x6}, 0x70) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x42002) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) 278.458942ms ago: executing program 5 (id=5053): r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) close(r0) syz_open_dev$evdev(&(0x7f0000000000), 0xb, 0x80) r1 = epoll_create1(0x80000) mount$9p_fd(0x1000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000480), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 277.963942ms ago: executing program 6 (id=5054): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2b, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) ioctl$PPPIOCGIDLE64(0xffffffffffffffff, 0x8010743f, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="50000000000000000000050005000a000000050001000700000005000c00020000000900020073797a3100000000150003006861702c706f72742c6e65740000000065597df6c4a94412c77853ac8a922027d6d933c3c74aef2b5593b8613204f6ddf0c86cc8670ce11b07ffec2bd4fc9095c9c7685853acdb414ec08e72a2e20217091a3559be28a7b117091c42a2e36665a4fd1c9549e54b95a0af358204af2a981b5e5dc93924306ba7302cf8c96f8780044c9fa8128644504f75c61e74492bf288b5c681f023ffbf68eba32e0e43589229b4de2e1dd0c846a131619c9c6aacce16e64786399a2c748e12a27a0000000000000000000000000000ede8f9824bbdbd89eb8be45411a75fb4dab793cadd5ca5b6536afe18b4f06cb6ddc3120eddfcdcedd3bbd7f51f9cbf587dbb47c14818ed8d4002fff7080be5dfc45422459492de29d3cb19ade6cbd6a847e82f5d30489870ddb533ee0e65a5fc14979140d1c112caec222fbc1af63f99d252d15fa13103b480a642c938b8019b9d6276dcaf5a328734d820a80110598efa142c9a28500aff5a9f035dfe3cde03c5137a1a64c9e785fb49da98bd2267f95d4644027ebcf940b1320f55cf7a78"], 0x50}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@hci, 0x80, 0x0, 0xffffffffffffffe2}, 0x1f00) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) socket$nl_route(0x10, 0x3, 0x0) close(0x4) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000000000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, 0x0, 0x20000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x2}) 216.093223ms ago: executing program 5 (id=5055): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}, 0x102260, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80c0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0xa, 0x300) socket$packet(0x11, 0xa, 0x300) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000f40)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="259a53f271a76d2688ca4c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x68180, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6f, 0x1, @perf_config_ext={0x3fffffffb}, 0xc0c8, 0x0, 0x0, 0x3, 0x9, 0x8001, 0x7fff}, 0x0, 0xff6fffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000140)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x7ff, 0x2, 0x3b}, 0x1c) r1 = socket(0x400000000010, 0x3, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000100000000000000", @ANYRES32, @ANYBLOB="c905000000000000000000000000800000000000", @ANYRES32, @ANYRES32, @ANYBLOB="000000000500"/28], 0x50) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x3, 0x8}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) 178.917957ms ago: executing program 5 (id=5056): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000009c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="5dcf9ebb76b40eef428d3339b2b897ecc394344cc3b0bc78149c60a5f921e17728752deaeb6bae6517d29b366351b8b29c08d18e342e35a2c00752dc8264b47cc2435d38ee8c877275823ba25cb8f7c41fd7c003b93a0aa8ebe8c40fd48b6f8b4f6d51ff4112b2ad3cc72bce1d8fd072340cd3e9f0de4c99baa92586ac41658948f48e0b233d1496e8383ade8f7f05887de4fa0c0f424cb76704c7867ba1231518a2360ada85e14fe35420efc0779da074dc64", 0xb3, r1) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x40, 0x6, 0x1, 0x3, @remote, @mcast2, 0x7, 0x1, 0x5, 0x6c4}}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000100)={@remote, @remote, r2}, 0xc) writev(r0, &(0x7f0000000000), 0x0) shutdown(r0, 0x1) 169.908495ms ago: executing program 6 (id=5057): r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$XFS_IOC_GETBMAP(r1, 0xc0205826, &(0x7f0000000040)={0x7, 0x7, 0xffffffff7fffffff, 0x7, 0x7fffffff}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000080)={{0x0, 0x4fa4, 0x532c, 0x8245, 0x7, 0x6, 0xffffffffffffffff, 0x8000, 0x9, 0x7, 0x7, 0x5, 0x8000000000000001, 0x0, 0x496}, 0x8, [0x0]}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f0000000100)={r2, 0x9f0}) ioctl$USBDEVFS_ALLOW_SUSPEND(r0, 0x5522) r3 = getpgrp(0x0) timer_create(0x1, &(0x7f0000001100)={0x0, 0x27, 0x2, @tid=r3}, &(0x7f0000001140)) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) getresuid(&(0x7f0000001240), &(0x7f0000001280)=0x0, &(0x7f00000012c0)) getresgid(&(0x7f0000001300)=0x0, &(0x7f0000001340), &(0x7f0000001380)) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000013c0)=0x0) stat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f00000014c0)=[0xee00, 0xee00, 0xee00, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) r9 = io_uring_setup(0x2688, &(0x7f0000001500)={0x0, 0xd860, 0x4000, 0x0, 0xe0, 0x0, r0}) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000001600)=[{{&(0x7f0000001180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001200), 0x0, &(0x7f0000001580)=[@cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}, @cred={{0x1c, 0x1, 0x2, {r3, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, r8}}}, @rights={{0x20, 0x1, 0x1, [r9, r1, r10, r0]}}], 0x80, 0x20044080}}], 0x1, 0x4800) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000001640)) unshare(0x20280) recvmmsg(r1, &(0x7f0000006f80)=[{{&(0x7f0000001680)=@nfc, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001700)=""/15, 0xf}, {&(0x7f0000001740)=""/125, 0x7d}, {&(0x7f00000017c0)=""/103, 0x67}, {&(0x7f0000001840)=""/212, 0xd4}, {&(0x7f0000001940)=""/93, 0x5d}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/100, 0x64}], 0x7}, 0x4}, {{&(0x7f0000002ac0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000002c00)=[{&(0x7f0000002b40)=""/68, 0x44}, {&(0x7f0000002bc0)=""/10, 0xa}], 0x2, &(0x7f0000002c40)=""/178, 0xb2}, 0x7}, {{&(0x7f0000002d00)=@x25={0x9, @remote}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002d80)=""/69, 0x45}, {&(0x7f0000002e00)=""/82, 0x52}, {&(0x7f0000002e80)=""/4096, 0x1000}, {&(0x7f0000003e80)=""/19, 0x13}, {&(0x7f0000003ec0)=""/4, 0x4}, {&(0x7f0000003f00)=""/100, 0x64}], 0x6, &(0x7f0000004000)=""/99, 0x63}, 0x7}, {{&(0x7f0000004080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000004140)=[{&(0x7f0000004100)=""/6, 0x6}], 0x1, &(0x7f0000004180)}, 0x1d}, {{&(0x7f00000041c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000004240)=""/203, 0xcb}, {&(0x7f0000004340)=""/233, 0xe9}, {&(0x7f0000004440)=""/4096, 0x1000}, {&(0x7f0000005440)=""/217, 0xd9}, {&(0x7f0000005540)=""/255, 0xff}, {&(0x7f0000005640)=""/18, 0x12}, {&(0x7f0000005680)=""/164, 0xa4}], 0x7, &(0x7f00000057c0)=""/4096, 0x1000}, 0x1d}, {{&(0x7f00000067c0)=@nfc, 0x80, &(0x7f0000006c00)=[{&(0x7f0000006840)=""/69, 0x45}, {&(0x7f00000068c0)=""/187, 0xbb}, {&(0x7f0000006980)=""/179, 0xb3}, {&(0x7f0000006a40)=""/98, 0x62}, {&(0x7f0000006ac0)=""/221, 0xdd}, {&(0x7f0000006bc0)=""/4, 0x4}], 0x6}, 0xfa29}, {{&(0x7f0000006c80)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000006e80)=[{&(0x7f0000006d00)}, {&(0x7f0000006d40)=""/209, 0xd1}, {&(0x7f0000006e40)}], 0x3, &(0x7f0000006ec0)=""/160, 0xa0}, 0x2}], 0x7, 0x40000001, &(0x7f0000007140)={0x0, 0x989680}) r12 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg(r12, &(0x7f0000007b80)={&(0x7f0000007180)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x80, &(0x7f0000007680)=[{&(0x7f0000007200)="578d2e137f3621ef71c8d93f8484bd797db23e894c2e1d6aa05e46f206b4c4de32c6b87ee84c65ae0e05f5566201976f4139aae5b9eab8c99716c2", 0x3b}, {&(0x7f0000007240)="8ed2e0ecbe6a45965b0d3fa697ac9dfdf9b4503ac7c9fb7f3df33095459bdd644155cccff66e37d7e2fe0baab102809a640af1e0779cf67bfb14b87d39eda6bbce7937d4134985398dc65d21a2a6cdd9601f42bff386f1e96832dcb9ebf285744fdf84e759cda1a6aea834661efc6a53bb86cbc5f5de9402ea783256b8cbfc9fbf6173f67f93ddd43bb9ae0af4f69a41fa2fa6c258e874420abfaefbfa8e1e2fa290b34cd3e2a1e082de6b40dab43ede6bc54d0cbc84d86f35619c3ec969b8ca7ae4c28db8707e464c9e141beda70058c21f41f1fabbb87832bf339f586e1b4bb130ed6b5f", 0xe5}, {&(0x7f0000007340)="9c08fb5cddff7cf44acf92f849dadfe6f12457", 0x13}, {&(0x7f0000007380)="988f6e0b59f20aec7b97149ccaa0729340ef46d843fa409b6c1afdc7d4ae9a26cc8e73cfff59470f32ef0ee5566f63b8907ae88f1b0e034cbd923a44149a135111c249e24c8847fc2ecb2a1072d7ff09818120519a253041730263158f701b4f8c1140ac2ad3ba2338d23f7d877ab4", 0x6f}, {&(0x7f0000007400)="71a5fbca2c3922f37d45afdde5327aad5859c82fcb2be0f81648f2f3baba469fff93840dfdf9dcecec1a69271b79d1730b563dac6f9fd53f055da80631842e35095b69b376daf5d4d12730e94ec86081587e8999087580bc075528e1740925d6c32e41d6f082a25c13dca2e60ae4238dede739b6ab1e90b7fbfde1869e7287ed417b39d2aa97821bd14b6404a2ae7268e3e130527c7bc008b15ac2eae5e574f1d6ef9de0271843a1ab1dfaa5380da1d72b9e65720ebfd18e0a6e90adee1eab89", 0xc0}, {&(0x7f00000074c0)="3ee3933e505aae449c62696c55581b56d38cec992241484909f07653a8318a1cf66e01e7e794c12635e75def0f53003e588f75d7ce0fa3bc261db94d85c591e7f19cb5a276c67012cd169106bf153e75f139641004f289f061df65ccdfb74a3940cbc2a6dc0dcfc52ce16176151936679857833269b34a3b0ccee85232924d153033", 0x82}, {&(0x7f0000007580)="72e21794f9b6f87e158d42c2801780a47c068e4ee6b81c1b0723437f789c776a3539ace0ad71a9e4373625c169ce57dd15c2e797dda4261ebc93a9919f", 0x3d}, {&(0x7f00000075c0)="77a9f9dc15bca22a7df5c70db44c7805fa3d8b3eb8e08cde2d30eeedd754eaf56a4e998b549dafefd6997c5650a65f8f3fbf39e74d386563f76c8f5f2ec738044d3d0ee81c0a6a5cb9f45ce121bca7da58550b219cde5eb725eb149fae6cd28a479818b0798905c2b48b7d26e3ea99fc835f6299c8284d35e896fb7ff4fc90d596e451564de947c155c5eb2e00cfa5b15c1de07686a70bee4f31", 0x9a}], 0x8, &(0x7f0000007700)=[{0x38, 0x1, 0x3, "15c104d3813cfa8dd0ed7fa6c53562e29667b45c97d9cb85967f42ba575c5af992dfbc21d0536c"}, {0x20, 0x10c, 0xe, "576ffba20bfee92ce3738060657575cf"}, {0xb8, 0x117, 0xfe56, "77bc4423bb45ba44f87eea0210af173175f9401931745f66f81fb02a6043f2ab86e7a83ee7aa204a2d2a26da071861e55cb7caf6625811f24b92300d947974731d186f6dd9f302726ce1a644cc71c6534b30233a7ebe7f33022fc4ad5ba4f7abd7f2c60779a4d77826bd5aadd00f474199553d901a6e7484e50982fe96ee7adbb1526ba43e278b441a7d049ba6690078d34d090a3fc68a9a4426923f75f8734fb2d804cec23f1f00"}, {0x90, 0x11b, 0x10001, "079a59a0defa418324e1229214b58e2325723596a50ceb0db19a95393b68d810aae0bf23c6adbe86f5e2fa39cec7735c3b378ca8990291d30ca6fd87d98ec3d94d3f1dc0af0f1ed25136a25e78540ec811092bdfdf549ca6edaf6e8e338bb8ea63e2aa7f8a29747bbbb2d1480fb3a9e159c10838c8a9295668"}, {0xb0, 0x109, 0x400, "364293dac2462bf872dd7f3e5eaca943d9d93b30d01735537883e8f28f83e7f5c2c25adf59f6ddfb0bd96afdcf75a09fff7b53f1aad2b5b1fb128d5ced7572874315e50564ded37e95d69c46dd51742ea8bc4a9db7ca04536552d30ccdf7e562ad37d177cad8d7530eae49df552c430eb9258a691977556bc256213eaa224f1e45b446386261d0ac428a9d7ec94ee41d04de2b1c206481f4ad7eb7715a5acc92"}, {0xc8, 0x115, 0x7, "c1586b36840ef5ae8d2ca73e1719444e1a672a87bef5134087ca57ef05abdc41b50162012193314c185f212322043e8a70aba770df3b772d672c842eb0498be712e3f6c167a05b7de0b0846ecba5dae92158c3e5199038a5cb616637c93430f96df899aa385bb0e09c2868756f59600dd190e6d668ee66941ff674c896205589330024047c270ff437ba4552158d266c1d5da8555c49dee726733cd7fcdc8c032bef42492c3d7ea56df6f7b071038c295010b9fb69"}, {0xa8, 0x1, 0x9, "31c39a5f1828099d2cf550abcc089c006953418b2d1f0a1633ca62e23f35b0189265688044778dae6022bbbd476a53aad978185a7ba150c24306b7613ae1868f54e8b7ea2ea8d59c64c77338cb560bca07ae34a71d0e89ddb7edad2c07dfd15b254117cc342cc3ce7817a102ea8116bf56484f5a03df1cd5b470fa81b438d79362afe2e13e15ec2785de01c1bd6919219b91f3a3198715"}, {0x48, 0x108, 0x7, "2558e46b7f1b210cb1725fed1158f70947ad155959487a8232d2cac6eec367281edabbc5b5bc8a0c82ce6503fc21d840ec15aba38fa69c"}, {0x60, 0x6, 0xac, "74108c9476e91e275f584aea637f127f303d23a9e3e00c67aebc623e43bdd7b280644678252e8024531d460debcbf80b4f4789c814766a6622b72ccc1f866925743498f130c2a6ef53ddf3cbbba394"}], 0x468}, 0x20000000) getegid() lgetxattr(&(0x7f0000007bc0)='./file0\x00', &(0x7f0000007c00)=@known='trusted.overlay.nlink\x00', &(0x7f0000007c40)=""/70, 0x46) ioctl$sock_proto_private(r0, 0x89e1, &(0x7f0000007cc0)="ae682107258272a1287c63ec391b53717714b17902d296c4a05dd5129e3f20e4fb01d1915f02a9e5564ad30a3daed03bed0f2365313b48fbcfe2f4fc2928287cc3ed0d1a02c3d781e2329f50e0a360925ba9d608626499ee99ac0aa9af37ed8b9593e153f6eccb2d4ed7d4c64a9a012de9f13806fc154c8709eb24e2d61244ea237c3b345857333cb3585f88c47e7156ab3e96b5acdac0c46f5717c10a91a69b441c3ae8a6ac7c09f1b29c4e842451a4d8dcce2749fb66cdae628148589a6e1cdf03b251a15c17ee") ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000007dc0)='+:+!\x00') r13 = syz_genetlink_get_family_id$devlink(&(0x7f0000007e40), r11) sendmsg$DEVLINK_CMD_RATE_SET(r0, &(0x7f0000007f00)={&(0x7f0000007e00)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000007ec0)={&(0x7f0000007e80)={0x2c, r13, 0x100, 0x70bd29, 0x25dfdbff, {}, [@DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x7}, @DEVLINK_ATTR_RATE_TX_MAX={0xc, 0xa7, 0x8000}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x800) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000007f40)={r0, 0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000007f80)={r0, r14}, 0xc) 96.354464ms ago: executing program 6 (id=5058): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 96.256104ms ago: executing program 6 (id=5059): r0 = io_uring_setup(0x4a86, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000006040), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) close_range(r0, 0xffffffffffffffff, 0x0) 83.969453ms ago: executing program 6 (id=5060): timerfd_gettime(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) recvmmsg(r2, &(0x7f0000002800)=[{{0x0, 0x0, &(0x7f0000002200)=[{0x0}, {0x0}, {&(0x7f0000002100)=""/212, 0xd4}], 0x3}, 0xa}], 0x1, 0x0, 0x0) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x23}, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x4, "7b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af", "584cbf2649a50f2dbc43efa8698d0a881c51852e4451b57d037ad3c045942824251d7d17b5191584bcd4fbe40a23424d", "bcfd56f1375461caaa2f19935e6996c7096ffeeb0300000000000064", {"9a3bfbc1f39cb307b3472eb9cdb042d2", "643fcbb2c5a57df67d544af6e8dafe09"}}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x8, 0x0, 0x0, 0x41100}, 0x94) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x7}, 0x94) r4 = socket$isdn(0x22, 0x3, 0x24) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) bind$isdn(r4, &(0x7f0000000580)={0x22, 0x6, 0x3, 0x3, 0x6}, 0x6) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x2d, "b0defc6a7c19c42a465ea1ccb65e4b30f33745d8e32bd30030a53974b5cfc351546392fe54b88193ead2342207"}, &(0x7f0000000200)=0x35) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000340)={r6, 0x1}, &(0x7f0000000540)=0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0xffffffffffffff9d, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = socket$rds(0x15, 0x5, 0x0) bind$rds(r7, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) sendmsg$inet(r7, &(0x7f0000000480)={&(0x7f0000000000)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f00000001c0)="91cfdfefdb", 0x1a000}], 0x1}, 0x0) sendmsg$rds(r7, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x801}, 0x0) fsopen(&(0x7f0000000100)='configfs\x00', 0x0) 74.337781ms ago: executing program 5 (id=5061): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5000000010008105e9c51c000000000000000000", @ANYRES32=r2, @ANYBLOB="01000000000000002800128009000100766c616e000000001800028006000100000000000c0002000c0000000d00000008000500", @ANYRES64=r0], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r3 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r3, 0x65, 0x1, &(0x7f0000000080), 0x1d0) bind$can_raw(r3, &(0x7f0000000000), 0x10) socket$can_raw(0x1d, 0x3, 0x1) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fremovexattr(r4, &(0x7f0000000040)=@known='system.posix_acl_default\x00') 0s ago: executing program 5 (id=5062): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="2400000001040102000000c9fd"], 0x24}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgrp(0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x100}, 0x204, 0x0, 0x43a1bd78, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="4001000016000100000000000000000000000000000000000000000000000000ac1e00010000000000000000000000000000000000030000000080803a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe80000000000000000000000000003d000004d633000000e00000010002000000000000000000000000000000000000000000000000000080000000000000000000000000000000ffffffffffffffff01000000000000000600000000000000d306000000000000000000000000000000000000000000000200000000000000fcfffffffffffbff000000000000000006000000000000000000000000000002be0000000000000000000000b1a001004800d2"], 0x140}, 0x1, 0x0, 0x0, 0x40040}, 0x0) kernel console output (not intermixed with test programs): __sys_bpf+0x5e1/0x7e0 [ 574.052042][T20299] __x64_sys_bpf+0x41/0x50 [ 574.052081][T20299] x64_sys_call+0x10cb/0x3020 [ 574.052115][T20299] do_syscall_64+0x12c/0x370 [ 574.052173][T20299] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 574.052273][T20299] RIP: 0033:0x7f58eda0c629 [ 574.052291][T20299] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 574.052376][T20299] RSP: 002b:00007f58ec467028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 574.052402][T20299] RAX: ffffffffffffffda RBX: 00007f58edc85fa0 RCX: 00007f58eda0c629 [ 574.052420][T20299] RDX: 0000000000000020 RSI: 0000200000000680 RDI: 0000000000000002 [ 574.052433][T20299] RBP: 00007f58ec467090 R08: 0000000000000000 R09: 0000000000000000 [ 574.052447][T20299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 574.052463][T20299] R13: 00007f58edc86038 R14: 00007f58edc85fa0 R15: 00007ffef6b4b538 [ 574.052586][T20299] [ 574.290526][T20307] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3892'. [ 574.290734][T20308] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3892'. [ 574.310399][T20307] macvlan2: entered promiscuous mode [ 574.315813][T20307] macvlan2: entered allmulticast mode [ 574.321385][T20307] veth0_virt_wifi: entered allmulticast mode [ 575.130564][ T8656] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 575.335403][ T7939] usb usb6-port1: unable to enumerate USB device [ 576.327630][T20353] Cannot find add_set index 0 as target [ 576.598863][T20360] loop5: detected capacity change from 0 to 1024 [ 576.663831][T20360] EXT4-fs: Ignoring removed nomblk_io_submit option [ 576.899811][T20360] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=e855c01c, mo2=0003] [ 576.915414][T20360] System zones: 0-1, 3-36 [ 576.979336][T20360] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 577.036553][T20377] netlink: 8 bytes leftover after parsing attributes in process `syz.6.3915'. [ 577.082257][T20381] loop9: detected capacity change from 0 to 512 [ 577.102653][T20381] EXT4-fs error (device loop9): ext4_read_inode_bitmap:139: comm syz.9.3916: Invalid inode bitmap blk 4 in block_group 0 [ 577.121599][T20381] loop9: lost filesystem error report for type 5 error -117 [ 577.122503][T20381] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 577.233263][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 577.233325][ T28] audit: type=1400 audit(2000000677.930:9698): avc: denied { append } for pid=20384 comm="syz.7.3917" name="001" dev="devtmpfs" ino=168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 577.269925][ T28] audit: type=1400 audit(2000000677.970:9699): avc: denied { read } for pid=20384 comm="syz.7.3917" name="mISDNtimer" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 577.320851][ T28] audit: type=1400 audit(2000000677.990:9700): avc: denied { open } for pid=20384 comm="syz.7.3917" path="/dev/mISDNtimer" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 577.432609][T20385] netlink: 15 bytes leftover after parsing attributes in process `syz.7.3917'. [ 577.573642][ T28] audit: type=1400 audit(2000000678.270:9701): avc: denied { unlink } for pid=8656 comm="syz-executor" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=2981 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 577.707190][ T28] audit: type=1400 audit(2000000678.410:9702): avc: denied { bind } for pid=20391 comm="syz.7.3919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 577.743006][T20392] lo speed is unknown, defaulting to 1000 [ 577.747137][ T28] audit: type=1400 audit(2000000678.410:9703): avc: denied { name_bind } for pid=20391 comm="syz.7.3919" src=18978 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 577.768816][T20392] lo speed is unknown, defaulting to 1000 [ 577.791185][ T28] audit: type=1400 audit(2000000678.410:9704): avc: denied { node_bind } for pid=20391 comm="syz.7.3919" saddr=172.20.20.170 src=18978 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 577.858851][T20396] loop7: detected capacity change from 0 to 512 [ 577.919388][T20394] lo speed is unknown, defaulting to 1000 [ 577.925934][T20394] lo speed is unknown, defaulting to 1000 [ 577.932285][T20396] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=e002e028, mo2=0002] [ 577.944883][T20396] System zones: 0-2, 18-18, 34-34 [ 577.970538][T20396] EXT4-fs error (device loop7): ext4_mb_generate_buddy:1315: group 0, block bitmap and bg descriptor inconsistent: 42 vs 41 free clusters [ 577.990215][T17715] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 578.001775][T20396] EXT4-fs (loop7): Remounting filesystem read-only [ 578.004966][ C0] EXT4-fs (loop7): error count since last fsck: 1 [ 578.014983][ C0] EXT4-fs (loop7): initial error at time 2000000678: ext4_mb_generate_buddy:1315 [ 578.024144][ C0] EXT4-fs (loop7): last error at time 2000000678: ext4_mb_generate_buddy:1315 [ 578.058438][T20396] EXT4-fs (loop7): 1 truncate cleaned up [ 578.064582][T20396] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 578.091209][ T5366] Quota error (device loop7): dquot_write_dquot: Can't write quota structure (error -30). Quota may get out of sync! [ 578.095278][T20396] ext4 filesystem being mounted at /379/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 578.109343][ T5366] EXT4-fs (loop7): Quota write (off=5120, len=1024) cancelled because transaction is not started [ 578.131111][ T5366] Quota error (device loop7): write_blk: dquota write failed [ 578.141361][T20404] netlink: 52 bytes leftover after parsing attributes in process `syz.1.3921'. [ 578.142324][ T5366] Quota error (device loop7): remove_free_dqentry: Can't write block (5) with free entries [ 578.150737][T20404] netlink: 52 bytes leftover after parsing attributes in process `syz.1.3921'. [ 578.161504][ T5366] EXT4-fs (loop7): Quota write (off=5120, len=1024) cancelled because transaction is not started [ 578.181364][ T5366] EXT4-fs (loop7): Quota write (off=8, len=24) cancelled because transaction is not started [ 578.265745][T13470] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 578.424624][T20410] FAULT_INJECTION: forcing a failure. [ 578.424624][T20410] name failslab, interval 1, probability 0, space 0, times 0 [ 578.479710][T20410] CPU: 1 UID: 0 PID: 20410 Comm: syz.9.3924 Tainted: G W syzkaller #0 PREEMPT(full) [ 578.479751][T20410] Tainted: [W]=WARN [ 578.479758][T20410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 578.479772][T20410] Call Trace: [ 578.479780][T20410] [ 578.479857][T20410] __dump_stack+0x1d/0x30 [ 578.479892][T20410] dump_stack_lvl+0x95/0xd0 [ 578.479929][T20410] dump_stack+0x15/0x1b [ 578.479982][T20410] should_fail_ex+0x263/0x280 [ 578.480006][T20410] should_failslab+0x8c/0xb0 [ 578.480056][T20410] kmem_cache_alloc_lru_noprof+0x6c/0x410 [ 578.480114][T20410] ? __d_alloc+0x37/0x340 [ 578.480150][T20410] __d_alloc+0x37/0x340 [ 578.480184][T20410] ? default_pointer+0xf2/0x5e0 [ 578.480219][T20410] d_alloc+0x2e/0x100 [ 578.480302][T20410] lookup_one_qstr_excl+0x99/0x250 [ 578.480337][T20410] start_dirop+0x3e/0x70 [ 578.480370][T20410] simple_start_creating+0xa2/0xd0 [ 578.480441][T20410] debugfs_start_creating+0xda/0x150 [ 578.480469][T20410] __debugfs_create_file+0x70/0x2b0 [ 578.480496][T20410] debugfs_create_file_full+0x3f/0x60 [ 578.480640][T20410] ? __pfx_sl_setup+0x10/0x10 [ 578.480663][T20410] ref_tracker_dir_debugfs+0x10e/0x220 [ 578.480750][T20410] alloc_netdev_mqs+0x1a7/0xa40 [ 578.480784][T20410] slip_open+0x2d1/0x930 [ 578.480804][T20410] ? vfree+0x295/0x3a0 [ 578.480835][T20410] ? up_write+0x18/0x60 [ 578.480913][T20410] tty_ldisc_open+0x5d/0xb0 [ 578.480942][T20410] tty_set_ldisc+0x1db/0x380 [ 578.480965][T20410] tiocsetd+0x51/0x60 [ 578.480989][T20410] tty_ioctl+0xa78/0xb80 [ 578.481012][T20410] ? __pfx_tty_ioctl+0x10/0x10 [ 578.481076][T20410] __se_sys_ioctl+0xce/0x140 [ 578.481112][T20410] __x64_sys_ioctl+0x43/0x50 [ 578.481147][T20410] x64_sys_call+0x1563/0x3020 [ 578.481209][T20410] do_syscall_64+0x12c/0x370 [ 578.481287][T20410] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 578.481310][T20410] RIP: 0033:0x7f9f5944c629 [ 578.481327][T20410] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 578.481347][T20410] RSP: 002b:00007f9f57ea7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 578.481369][T20410] RAX: ffffffffffffffda RBX: 00007f9f596c5fa0 RCX: 00007f9f5944c629 [ 578.481460][T20410] RDX: 0000200000000280 RSI: 0000000000005423 RDI: 0000000000000005 [ 578.481475][T20410] RBP: 00007f9f57ea7090 R08: 0000000000000000 R09: 0000000000000000 [ 578.481489][T20410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 578.481503][T20410] R13: 00007f9f596c6038 R14: 00007f9f596c5fa0 R15: 00007ffdade871f8 [ 578.481526][T20410] [ 578.486123][T20423] loop6: detected capacity change from 0 to 512 [ 578.754575][T10147] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 578.797027][T20423] EXT4-fs (loop6): revision level too high, forcing read-only mode [ 578.806525][T20423] EXT4-fs (loop6): orphan cleanup on readonly fs [ 578.949837][T20423] EXT4-fs error (device loop6): ext4_acquire_dquot:7001: comm syz.6.3930: Failed to acquire dquot type 1 [ 578.979596][T20423] loop6: lost filesystem error report for type 5 error -5 [ 578.981042][T20423] EXT4-fs (loop6): Remounting filesystem read-only [ 578.988265][ C1] EXT4-fs (loop6): error count since last fsck: 1 [ 578.988281][ C1] EXT4-fs (loop6): initial error at time 2000000679: ext4_acquire_dquot:7001 [ 578.988304][ C1] EXT4-fs (loop6): last error at time 2000000679: ext4_acquire_dquot:7001 [ 579.043645][T20423] EXT4-fs (loop6): 1 truncate cleaned up [ 579.065700][T20423] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 579.204255][T20423] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35 sclass=netlink_route_socket pid=20423 comm=syz.6.3930 [ 579.250982][T20423] netlink: 96 bytes leftover after parsing attributes in process `syz.6.3930'. [ 579.317767][T20466] xt_hashlimit: invalid interval [ 579.338252][T20423] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 579.347937][T20467] netlink: 52 bytes leftover after parsing attributes in process `syz.5.3936'. [ 579.386848][T20467] netlink: 52 bytes leftover after parsing attributes in process `syz.5.3936'. [ 579.998853][T20507] loop5: detected capacity change from 0 to 1024 [ 580.018168][T20507] EXT4-fs: Ignoring removed nomblk_io_submit option [ 580.070667][T20507] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=e855c01c, mo2=0003] [ 580.097783][T20507] System zones: 0-1, 3-36 [ 580.109664][T20507] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 580.127743][T20497] loop7: detected capacity change from 0 to 1024 [ 580.150801][T20497] EXT4-fs: Ignoring removed nomblk_io_submit option [ 580.249924][T20497] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=e855c01c, mo2=0003] [ 580.260518][T20497] System zones: 0-1, 3-36 [ 580.303286][T20497] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 580.504716][T20520] loop9: detected capacity change from 0 to 1024 [ 580.521234][T20520] EXT4-fs: Ignoring removed nobh option [ 580.528809][T20520] EXT4-fs (loop9): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 580.557368][T20520] EXT4-fs error (device loop9): ext4_ext_check_inode:521: inode #11: comm syz.9.3944: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 32512(32512) [ 580.577429][T20520] loop9: lost file I/O error report for ino 11 type 5 pos 0x0 len 0x0 error -117 [ 580.579874][T20520] EXT4-fs error (device loop9): ext4_orphan_get:1396: comm syz.9.3944: couldn't read orphan inode 11 (err -117) [ 580.590127][ C1] EXT4-fs (loop9): error count since last fsck: 1 [ 580.590292][ C1] EXT4-fs (loop9): initial error at time 2000000681: ext4_ext_check_inode:521: inode 11 [ 580.590433][ C1] EXT4-fs (loop9): last error at time 2000000681: ext4_ext_check_inode:521: inode 11 [ 580.631668][T20520] loop9: lost filesystem error report for type 5 error -117 [ 580.643329][T20520] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 580.668037][T20530] lo speed is unknown, defaulting to 1000 [ 580.675605][T20530] lo speed is unknown, defaulting to 1000 [ 580.971799][T20536] EXT4-fs error (device loop9): ext4_read_block_bitmap_nowait:483: comm syz.9.3944: Invalid block bitmap block 0 in block_group 0 [ 580.990570][T20536] EXT4-fs error (device loop9): ext4_acquire_dquot:7001: comm syz.9.3944: Failed to acquire dquot type 0 [ 581.206299][T17715] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 581.765772][T13470] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 582.332403][T20559] loop9: detected capacity change from 0 to 8192 [ 582.385598][T15849] loop9: p2 p3 p4 < > [ 582.389812][T15849] loop9: partition table partially beyond EOD, truncated [ 582.407255][T15849] loop9: p2 size 590592 extends beyond EOD, truncated [ 582.425176][T15849] loop9: p3 start 4294967295 is beyond EOD, truncated [ 582.439437][T15849] loop9: p4 start 117440516 is beyond EOD, truncated [ 582.449358][T20559] loop9: p2 p3 p4 < > [ 582.453686][T20559] loop9: partition table partially beyond EOD, truncated [ 582.461056][T20559] loop9: p2 size 590592 extends beyond EOD, truncated [ 582.468741][T20559] loop9: p3 start 4294967295 is beyond EOD, truncated [ 582.475636][T20559] loop9: p4 start 117440516 is beyond EOD, truncated [ 582.563193][T15849] udevd[15849]: inotify_add_watch(7, /dev/loop9p2, 10) failed: No such file or directory [ 582.596767][T15849] udevd[15849]: inotify_add_watch(7, /dev/loop9p2, 10) failed: No such file or directory [ 582.719939][T20568] netlink: 'syz.6.3957': attribute type 29 has an invalid length. [ 582.951424][T10147] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 583.395557][T20568] No such timeout policy "syz1" [ 583.497884][T20576] Set syz1 is full, maxelem 0 reached [ 583.589778][T20580] xt_TCPMSS: Only works on TCP SYN packets [ 583.702891][ T28] kauditd_printk_skb: 16 callbacks suppressed [ 583.702910][ T28] audit: type=1400 audit(2000000684.400:9712): avc: denied { write } for pid=20587 comm="syz.6.3963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 583.712507][T20582] loop9: detected capacity change from 0 to 1024 [ 583.775388][T20582] EXT4-fs: Ignoring removed nomblk_io_submit option [ 583.855979][T20582] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=e855c01c, mo2=0003] [ 583.875378][T20582] System zones: 0-1, 3-36 [ 584.022196][T20582] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 584.675267][ T3407] usb usb6-port1: attempt power cycle [ 586.027223][T17715] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 586.154546][ T28] audit: type=1400 audit(2000000686.850:9713): avc: denied { connect } for pid=20697 comm="syz.5.3977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 586.230157][T20695] loop9: detected capacity change from 0 to 1024 [ 586.272743][T20695] EXT4-fs: Ignoring removed nomblk_io_submit option [ 586.325545][T20695] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=e855c01c, mo2=0003] [ 586.344845][T20695] System zones: 0-1, 3-36 [ 586.382900][T20695] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 586.525170][ T3407] usb usb6-port1: unable to enumerate USB device [ 586.596790][T20707] netlink: 68 bytes leftover after parsing attributes in process `syz.7.3978'. [ 586.996467][ T28] audit: type=1400 audit(2000000687.690:9714): avc: denied { create } for pid=20716 comm="syz.7.3981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 587.017722][T20719] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3982'. [ 587.060100][ T28] audit: type=1326 audit(2000000687.690:9715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20718 comm="syz.1.3982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 587.113783][ T28] audit: type=1326 audit(2000000687.690:9716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20718 comm="syz.1.3982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 587.138016][ T28] audit: type=1326 audit(2000000687.690:9717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20718 comm="syz.1.3982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 587.183349][ T28] audit: type=1326 audit(2000000687.690:9718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20718 comm="syz.1.3982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 587.210580][ T28] audit: type=1326 audit(2000000687.690:9719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20718 comm="syz.1.3982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 587.244521][ T28] audit: type=1326 audit(2000000687.690:9720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20718 comm="syz.1.3982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 587.269397][ T28] audit: type=1326 audit(2000000687.690:9721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20718 comm="syz.1.3982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f9fb751dec7 code=0x7ffc0000 [ 587.327961][T20723] loop6: detected capacity change from 0 to 1024 [ 587.344530][T20723] EXT4-fs: Ignoring removed nomblk_io_submit option [ 587.394025][T20723] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=e855c01c, mo2=0003] [ 587.404066][T20723] System zones: 0-1, 3-36 [ 587.432468][T20723] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 588.027155][T17715] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 588.109308][T20748] sch_tbf: burst 4398 is lower than device lo mtu (11337746) ! [ 588.167382][T20753] netlink: 8 bytes leftover after parsing attributes in process `syz.9.3987'. [ 588.200483][T20757] loop7: detected capacity change from 0 to 512 [ 588.210285][T20757] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 588.222136][T20757] EXT4-fs (loop7): 1 truncate cleaned up [ 588.228625][T20757] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 588.514982][T20757] loop7: detected capacity change from 512 to 0 [ 588.552657][ T5366] EXT4-fs error (device loop7): __ext4_get_inode_loc_noinmem:4905: inode #18: block 9: comm kworker/u8:23: unable to read itable block [ 588.566755][ T5366] Buffer I/O error on dev loop7, logical block 1, lost sync page write [ 588.575393][ T5366] EXT4-fs (loop7): I/O error while writing superblock [ 588.582683][T13470] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 588.593180][T13470] Buffer I/O error on dev loop7, logical block 1, lost sync page write [ 588.601782][T13470] EXT4-fs (loop7): I/O error while writing superblock [ 588.704842][T20772] loop7: detected capacity change from 0 to 1024 [ 588.721810][T20772] EXT4-fs: Ignoring removed nomblk_io_submit option [ 588.735973][T20772] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=e855c01c, mo2=0003] [ 588.746886][T20772] System zones: 0-1, 3-36 [ 588.756553][T20772] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 588.827071][T20775] lo speed is unknown, defaulting to 1000 [ 588.833464][T20775] lo speed is unknown, defaulting to 1000 [ 589.128131][T20780] FAULT_INJECTION: forcing a failure. [ 589.128131][T20780] name failslab, interval 1, probability 0, space 0, times 0 [ 589.141191][T20780] CPU: 1 UID: 0 PID: 20780 Comm: syz.5.3999 Tainted: G W syzkaller #0 PREEMPT(full) [ 589.141225][T20780] Tainted: [W]=WARN [ 589.141232][T20780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 589.141248][T20780] Call Trace: [ 589.141257][T20780] [ 589.141268][T20780] __dump_stack+0x1d/0x30 [ 589.141314][T20780] dump_stack_lvl+0x95/0xd0 [ 589.141343][T20780] dump_stack+0x15/0x1b [ 589.141373][T20780] should_fail_ex+0x263/0x280 [ 589.141475][T20780] should_failslab+0x8c/0xb0 [ 589.141501][T20780] kmem_cache_alloc_noprof+0x66/0x400 [ 589.141526][T20780] ? skb_clone+0x151/0x1f0 [ 589.141614][T20780] skb_clone+0x151/0x1f0 [ 589.141651][T20780] __netlink_deliver_tap+0x2c9/0x500 [ 589.141685][T20780] netlink_unicast+0x66b/0x690 [ 589.141801][T20780] netlink_sendmsg+0x5c8/0x6f0 [ 589.141834][T20780] ? __pfx_netlink_sendmsg+0x10/0x10 [ 589.141865][T20780] ____sys_sendmsg+0x5af/0x600 [ 589.141922][T20780] ___sys_sendmsg+0x195/0x1e0 [ 589.141968][T20780] __x64_sys_sendmsg+0xd4/0x160 [ 589.142043][T20780] x64_sys_call+0x194c/0x3020 [ 589.142185][T20780] do_syscall_64+0x12c/0x370 [ 589.142232][T20780] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 589.142261][T20780] RIP: 0033:0x7f01ee31c629 [ 589.142281][T20780] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 589.142375][T20780] RSP: 002b:00007f01ecd77028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 589.142439][T20780] RAX: ffffffffffffffda RBX: 00007f01ee595fa0 RCX: 00007f01ee31c629 [ 589.142507][T20780] RDX: 0000000000000040 RSI: 00002000000038c0 RDI: 0000000000000021 [ 589.142524][T20780] RBP: 00007f01ecd77090 R08: 0000000000000000 R09: 0000000000000000 [ 589.142541][T20780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 589.142558][T20780] R13: 00007f01ee596038 R14: 00007f01ee595fa0 R15: 00007ffeaa083ba8 [ 589.142635][T20780] [ 589.597197][ T28] kauditd_printk_skb: 58 callbacks suppressed [ 589.597214][ T28] audit: type=1400 audit(2000000690.300:9780): avc: denied { ioctl } for pid=20782 comm="syz.5.4000" path="socket:[71970]" dev="sockfs" ino=71970 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 589.646616][T20783] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4000'. [ 589.777937][T20783] netlink: 68 bytes leftover after parsing attributes in process `syz.5.4000'. [ 589.788212][T20783] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4000'. [ 589.858435][ T28] audit: type=1400 audit(2000000690.560:9781): avc: denied { execute } for pid=20786 comm="syz.5.4001" name="file0" dev="tmpfs" ino=3000 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 589.859094][T20787] Invalid argument reading file caps for ./file0 [ 589.890763][ T28] audit: type=1400 audit(2000000690.560:9782): avc: denied { execute_no_trans } for pid=20786 comm="syz.5.4001" path="/567/file0" dev="tmpfs" ino=3000 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 590.353738][T13470] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 590.625338][ T8656] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 590.709072][T20803] SELinux: failed to load policy [ 590.905829][T20819] loop7: detected capacity change from 0 to 128 [ 590.915128][T20819] FAT-fs (loop7): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 591.150204][T20827] loop5: detected capacity change from 0 to 512 [ 591.241601][T20827] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 591.356925][T20827] ext4 filesystem being mounted at /571/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 591.368020][T20834] netlink: 'syz.7.4017': attribute type 29 has an invalid length. [ 591.692362][T20827] netlink: 'syz.5.4016': attribute type 4 has an invalid length. [ 591.700180][T20827] netlink: 'syz.5.4016': attribute type 2 has an invalid length. [ 591.745683][T20834] No such timeout policy "syz1" [ 591.897535][T10147] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 591.962716][T20846] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 592.102706][T20846] SELinux: failed to load policy [ 592.365400][ T28] audit: type=1400 audit(2000000693.070:9783): avc: denied { bind } for pid=20860 comm="syz.1.4026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 592.520110][ T28] audit: type=1400 audit(2000000693.090:9784): avc: denied { listen } for pid=20860 comm="syz.1.4026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 592.545315][ T28] audit: type=1400 audit(2000000693.090:9785): avc: denied { accept } for pid=20860 comm="syz.1.4026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 592.626389][T20867] netlink: 16 bytes leftover after parsing attributes in process `syz.9.4028'. [ 592.723924][ T28] audit: type=1400 audit(2000000693.420:9786): avc: denied { read } for pid=20872 comm="syz.5.4031" name="event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 592.768311][T20876] A link change request failed with some changes committed already. Interface ip6gre0 may have been left with an inconsistent configuration, please check. [ 592.795217][T20874] A link change request failed with some changes committed already. Interface ip6gre0 may have been left with an inconsistent configuration, please check. [ 592.815849][T20875] FAULT_INJECTION: forcing a failure. [ 592.815849][T20875] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 592.829790][T20875] CPU: 1 UID: 0 PID: 20875 Comm: syz.6.4030 Tainted: G W syzkaller #0 PREEMPT(full) [ 592.829909][T20875] Tainted: [W]=WARN [ 592.829920][T20875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 592.829937][T20875] Call Trace: [ 592.829946][T20875] [ 592.829958][T20875] __dump_stack+0x1d/0x30 [ 592.829994][T20875] dump_stack_lvl+0x95/0xd0 [ 592.830101][T20875] dump_stack+0x15/0x1b [ 592.830131][T20875] should_fail_ex+0x263/0x280 [ 592.830234][T20875] should_fail+0xb/0x20 [ 592.830258][T20875] should_fail_usercopy+0x1a/0x20 [ 592.830375][T20875] _copy_from_user+0x1c/0xb0 [ 592.830409][T20875] do_ip_vs_set_ctl+0x1a4/0xa60 [ 592.830446][T20875] ? do_ip_setsockopt+0x1af1/0x2290 [ 592.830475][T20875] nf_setsockopt+0x199/0x1b0 [ 592.830534][T20875] ip_setsockopt+0x102/0x110 [ 592.830563][T20875] tcp_setsockopt+0x98/0xb0 [ 592.830665][T20875] sock_common_setsockopt+0x69/0x80 [ 592.830687][T20875] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 592.830709][T20875] smc_setsockopt+0x183/0x750 [ 592.830730][T20875] ? __pfx_smc_setsockopt+0x10/0x10 [ 592.830750][T20875] __sys_setsockopt+0x184/0x200 [ 592.830836][T20875] __x64_sys_setsockopt+0x64/0x80 [ 592.830865][T20875] x64_sys_call+0x2327/0x3020 [ 592.830894][T20875] do_syscall_64+0x12c/0x370 [ 592.830935][T20875] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 592.831004][T20875] RIP: 0033:0x7f292842c629 [ 592.831021][T20875] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 592.831040][T20875] RSP: 002b:00007f2926e7f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 592.831113][T20875] RAX: ffffffffffffffda RBX: 00007f29286a5fa0 RCX: 00007f292842c629 [ 592.831128][T20875] RDX: 000000000000048b RSI: 0000000000000000 RDI: 0000000000000005 [ 592.831142][T20875] RBP: 00007f2926e7f090 R08: 0000000000000018 R09: 0000000000000000 [ 592.831155][T20875] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 592.831170][T20875] R13: 00007f29286a6038 R14: 00007f29286a5fa0 R15: 00007ffed29fa788 [ 592.831216][T20875] [ 592.832440][ T28] audit: type=1400 audit(2000000693.530:9787): avc: denied { validate_trans } for pid=20872 comm="syz.5.4031" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 593.176954][ T28] audit: type=1400 audit(2000000693.870:9788): avc: denied { accept } for pid=20885 comm="syz.1.4034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 593.243550][ T28] audit: type=1400 audit(2000000693.870:9789): avc: denied { listen } for pid=20885 comm="syz.1.4034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 593.302286][T20899] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 593.332836][T20899] SELinux: failed to load policy [ 593.714277][T20912] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4042'. [ 594.094179][T20916] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20916 comm=syz.5.4036 [ 594.353208][T20928] FAULT_INJECTION: forcing a failure. [ 594.353208][T20928] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 594.366565][T20928] CPU: 0 UID: 0 PID: 20928 Comm: syz.5.4047 Tainted: G W syzkaller #0 PREEMPT(full) [ 594.366605][T20928] Tainted: [W]=WARN [ 594.366615][T20928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 594.366630][T20928] Call Trace: [ 594.366638][T20928] [ 594.366647][T20928] __dump_stack+0x1d/0x30 [ 594.366702][T20928] dump_stack_lvl+0x95/0xd0 [ 594.366726][T20928] dump_stack+0x15/0x1b [ 594.366801][T20928] should_fail_ex+0x263/0x280 [ 594.366845][T20928] should_fail+0xb/0x20 [ 594.366864][T20928] should_fail_usercopy+0x1a/0x20 [ 594.366891][T20928] _copy_from_user+0x1c/0xb0 [ 594.366981][T20928] __sys_bpf+0x183/0x7e0 [ 594.367014][T20928] __x64_sys_bpf+0x41/0x50 [ 594.367054][T20928] x64_sys_call+0x10cb/0x3020 [ 594.367147][T20928] do_syscall_64+0x12c/0x370 [ 594.367185][T20928] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 594.367211][T20928] RIP: 0033:0x7f01ee31c629 [ 594.367231][T20928] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 594.367290][T20928] RSP: 002b:00007f01ecd77028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 594.367311][T20928] RAX: ffffffffffffffda RBX: 00007f01ee595fa0 RCX: 00007f01ee31c629 [ 594.367355][T20928] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 594.367369][T20928] RBP: 00007f01ecd77090 R08: 0000000000000000 R09: 0000000000000000 [ 594.367382][T20928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 594.367396][T20928] R13: 00007f01ee596038 R14: 00007f01ee595fa0 R15: 00007ffeaa083ba8 [ 594.367423][T20928] [ 594.563094][T20930] netlink: 48 bytes leftover after parsing attributes in process `syz.7.4048'. [ 594.615268][T20933] x_tables: unsorted underflow at hook 2 [ 594.865130][T20949] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 594.876249][T20949] SELinux: failed to load policy [ 594.907078][T20955] netlink: 12 bytes leftover after parsing attributes in process `syz.7.4056'. [ 594.918128][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 594.918148][ T28] audit: type=1400 audit(2000000695.610:9794): avc: denied { create } for pid=20952 comm="syz.7.4056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 594.947569][ T28] audit: type=1400 audit(2000000695.610:9795): avc: denied { getopt } for pid=20952 comm="syz.7.4056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 594.967769][ T28] audit: type=1400 audit(2000000695.610:9796): avc: denied { read } for pid=20952 comm="syz.7.4056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 595.012217][T20958] loop7: detected capacity change from 0 to 164 [ 595.019801][T20958] ISOFS: unable to read i-node block [ 595.025036][ T28] audit: type=1400 audit(2000000695.720:9797): avc: denied { map } for pid=20959 comm="syz.6.4058" path="socket:[72265]" dev="sockfs" ino=72265 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 595.025955][ T28] audit: type=1400 audit(2000000695.720:9798): avc: denied { accept } for pid=20959 comm="syz.6.4058" path="socket:[72265]" dev="sockfs" ino=72265 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 595.065127][T20958] ISOFS: root inode is unusable. Disabling Rock Ridge and switching to Joliet. [ 595.152631][ T28] audit: type=1400 audit(2000000695.800:9799): avc: denied { mount } for pid=20957 comm="syz.7.4057" name="/" dev="loop7" ino=1920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 595.183003][T20966] ISOFS: unable to read i-node block [ 595.235054][ T28] audit: type=1400 audit(2000000695.900:9800): avc: denied { unmount } for pid=13470 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 595.316139][T20974] loop7: detected capacity change from 0 to 512 [ 595.387731][ T28] audit: type=1400 audit(2000000695.900:9801): avc: denied { write } for pid=20963 comm="syz.6.4059" name="file0" dev="tmpfs" ino=3107 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 595.404363][T20974] EXT4-fs (loop7): 1 truncate cleaned up [ 595.411108][ T28] audit: type=1400 audit(2000000695.900:9802): avc: denied { open } for pid=20963 comm="syz.6.4059" path="/582/file0" dev="tmpfs" ino=3107 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 595.439547][T20974] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 595.457799][ T28] audit: type=1400 audit(2000000695.900:9803): avc: denied { ioctl } for pid=20963 comm="syz.6.4059" path="/582/file0" dev="tmpfs" ino=3107 ioctlcmd=0x301 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 595.536909][T13470] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 595.754276][T20983] netlink: 14 bytes leftover after parsing attributes in process `syz.5.4065'. [ 595.856051][T20983] bond0 (unregistering): Released all slaves [ 595.981905][T20989] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 595.991925][T20989] SELinux: failed to load policy [ 596.655771][T21014] xt_TCPMSS: Only works on TCP SYN packets [ 597.873426][T21031] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4078'. [ 598.284607][T21042] raw_sendmsg: syz.6.4082 forgot to set AF_INET. Fix it! [ 598.376146][T21045] loop7: detected capacity change from 0 to 128 [ 598.488455][ T3407] usb usb6-port1: attempt power cycle [ 598.500651][T21045] netlink: 40 bytes leftover after parsing attributes in process `syz.7.4083'. [ 599.208467][T21081] 9p: Bad value for 'wfdno' [ 599.213594][T21080] lo speed is unknown, defaulting to 1000 [ 599.275533][T21080] lo speed is unknown, defaulting to 1000 [ 599.787596][T21100] netlink: 36 bytes leftover after parsing attributes in process `syz.9.4101'. [ 600.053545][ T28] kauditd_printk_skb: 55 callbacks suppressed [ 600.053562][ T28] audit: type=1400 audit(2000000700.750:9857): avc: denied { read } for pid=21123 comm="syz.7.4111" name="sg0" dev="devtmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 600.094571][T21124] program syz.7.4111 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 600.103672][ T28] audit: type=1400 audit(2000000700.790:9858): avc: denied { connect } for pid=21122 comm="syz.1.4110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 600.135023][ T28] audit: type=1400 audit(2000000700.830:9859): avc: denied { getattr } for pid=21127 comm="syz.6.4112" path=2F7365637265746D656D202864656C6574656429 dev="secretmem" ino=73184 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 600.632063][ T3407] usb usb6-port1: unable to enumerate USB device [ 600.837305][T21152] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 600.847042][T21152] SELinux: failed to load policy [ 600.875685][T21155] loop9: detected capacity change from 0 to 512 [ 600.886173][T21155] EXT4-fs error (device loop9): ext4_mb_generate_buddy:1315: group 0, [ 600.886197][T21148] 9p: Bad value for 'rfdno' [ 600.899135][T21155] block bitmap and bg descriptor inconsistent: 219 vs 220 free clusters [ 600.914629][ T28] audit: type=1400 audit(2000000701.610:9860): avc: denied { connect } for pid=21147 comm="syz.1.4118" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 600.934973][ C1] EXT4-fs (loop9): error count since last fsck: 1 [ 600.941764][ C1] EXT4-fs (loop9): initial error at time 2000000701: ext4_mb_generate_buddy:1315 [ 600.950954][ C1] EXT4-fs (loop9): last error at time 2000000701: ext4_mb_generate_buddy:1315 [ 600.960284][T21155] EXT4-fs (loop9): Remounting filesystem read-only [ 600.967112][T21155] EXT4-fs (loop9): 1 truncate cleaned up [ 600.973438][T21155] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 600.997673][ T28] audit: type=1400 audit(2000000701.700:9861): avc: denied { bind } for pid=21154 comm="syz.9.4121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 601.035504][T17715] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 601.078037][T21162] netlink: 52 bytes leftover after parsing attributes in process `syz.1.4124'. [ 601.094677][T21162] netlink: 52 bytes leftover after parsing attributes in process `syz.1.4124'. [ 601.718497][T21178] netlink: 'syz.1.4128': attribute type 7 has an invalid length. [ 601.729497][ T28] audit: type=1400 audit(2000000702.430:9862): avc: denied { ioctl } for pid=21177 comm="syz.1.4128" path="socket:[73256]" dev="sockfs" ino=73256 ioctlcmd=0x89e3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 601.771810][ T28] audit: type=1400 audit(2000000702.470:9863): avc: denied { connect } for pid=21180 comm="syz.1.4129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 601.906944][T21189] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 601.916818][T21189] SELinux: failed to load policy [ 601.952296][T21193] vhci_hcd vhci_hcd.4: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 601.976962][T21193] netlink: 'syz.7.4134': attribute type 21 has an invalid length. [ 601.985472][T21193] netlink: 132 bytes leftover after parsing attributes in process `syz.7.4134'. [ 601.994657][T21195] netlink: 8 bytes leftover after parsing attributes in process `syz.9.4135'. [ 602.020655][ T28] audit: type=1400 audit(2000000702.720:9864): avc: denied { write } for pid=21194 comm="syz.9.4135" path="socket:[73299]" dev="sockfs" ino=73299 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 602.074968][ T28] audit: type=1400 audit(2000000702.720:9865): avc: denied { read } for pid=21194 comm="syz.9.4135" laddr=172.20.20.170 lport=19692 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 602.091534][T21197] netlink: 52 bytes leftover after parsing attributes in process `syz.7.4136'. [ 602.125575][ T28] audit: type=1400 audit(2000000702.720:9866): avc: denied { ioctl } for pid=21194 comm="syz.9.4135" path="/dev/sg0" dev="devtmpfs" ino=137 ioctlcmd=0x5393 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 602.151877][T21203] netlink: 52 bytes leftover after parsing attributes in process `syz.7.4136'. [ 602.418072][T21209] loop7: detected capacity change from 0 to 512 [ 602.728787][T21228] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 602.738569][T21228] SELinux: failed to load policy [ 602.749732][T21209] EXT4-fs (loop7): 1 orphan inode deleted [ 602.787722][T21209] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 603.150233][T21244] netlink: 52 bytes leftover after parsing attributes in process `syz.1.4151'. [ 603.160139][T21244] netlink: 52 bytes leftover after parsing attributes in process `syz.1.4151'. [ 603.245417][T21241] ipvlan1: entered promiscuous mode [ 603.250820][T21241] ipvlan1: entered allmulticast mode [ 603.256419][T21241] veth0_vlan: entered allmulticast mode [ 603.394545][T13470] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 603.539539][T21259] SELinux: ebitmap: truncated map [ 603.545310][T21259] SELinux: failed to load policy [ 603.570123][T21262] FAULT_INJECTION: forcing a failure. [ 603.570123][T21262] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 603.583604][T21262] CPU: 1 UID: 0 PID: 21262 Comm: syz.6.4158 Tainted: G W syzkaller #0 PREEMPT(full) [ 603.583647][T21262] Tainted: [W]=WARN [ 603.583687][T21262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 603.583704][T21262] Call Trace: [ 603.583713][T21262] [ 603.583752][T21262] __dump_stack+0x1d/0x30 [ 603.583795][T21262] dump_stack_lvl+0x95/0xd0 [ 603.583827][T21262] dump_stack+0x15/0x1b [ 603.583857][T21262] should_fail_ex+0x263/0x280 [ 603.583887][T21262] should_fail+0xb/0x20 [ 603.584011][T21262] should_fail_usercopy+0x1a/0x20 [ 603.584123][T21262] _copy_from_user+0x1c/0xb0 [ 603.584179][T21262] __sys_bpf+0x183/0x7e0 [ 603.584215][T21262] __x64_sys_bpf+0x41/0x50 [ 603.584259][T21262] x64_sys_call+0x10cb/0x3020 [ 603.584299][T21262] do_syscall_64+0x12c/0x370 [ 603.584347][T21262] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 603.584371][T21262] RIP: 0033:0x7f292842c629 [ 603.584453][T21262] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 603.584472][T21262] RSP: 002b:00007f2926e7f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 603.584572][T21262] RAX: ffffffffffffffda RBX: 00007f29286a5fa0 RCX: 00007f292842c629 [ 603.584588][T21262] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000008 [ 603.584602][T21262] RBP: 00007f2926e7f090 R08: 0000000000000000 R09: 0000000000000000 [ 603.584644][T21262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 603.584700][T21262] R13: 00007f29286a6038 R14: 00007f29286a5fa0 R15: 00007ffed29fa788 [ 603.584722][T21262] [ 603.822330][T21276] netlink: 52 bytes leftover after parsing attributes in process `syz.7.4163'. [ 603.832122][T21276] netlink: 52 bytes leftover after parsing attributes in process `syz.7.4163'. [ 603.905700][T21285] loop9: detected capacity change from 0 to 128 [ 603.928148][T21285] FAT-fs (loop9): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 604.111710][T21286] lo speed is unknown, defaulting to 1000 [ 604.117899][T21286] lo speed is unknown, defaulting to 1000 [ 604.189706][T21286] chnl_net:caif_netlink_parms(): no params data found [ 604.242952][T21286] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.279728][T21286] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.341691][T21286] bridge_slave_0: entered allmulticast mode [ 604.371579][T21286] bridge_slave_0: entered promiscuous mode [ 604.491085][T21286] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.498689][T21286] bridge0: port 2(bridge_slave_1) entered disabled state [ 604.508698][T21286] bridge_slave_1: entered allmulticast mode [ 604.515542][T21286] bridge_slave_1: entered promiscuous mode [ 604.576905][T21286] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 604.619778][T21286] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 604.649013][T21286] team0: Port device team_slave_0 added [ 604.658190][T21316] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 604.664042][T21286] team0: Port device team_slave_1 added [ 604.673685][T21316] SELinux: failed to load policy [ 604.710802][T21286] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 604.718143][T21286] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 604.745246][T21286] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 604.758788][T21286] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 604.765956][T21286] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 604.792137][T21286] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 604.823308][T21286] hsr_slave_0: entered promiscuous mode [ 604.829796][T21286] hsr_slave_1: entered promiscuous mode [ 604.835817][T21286] debugfs: 'hsr0' already exists in 'hsr' [ 604.841625][T21286] Cannot create hsr debugfs directory [ 604.986645][T17320] SELinux: failure in sel_netif_sid_slow(), invalid network interface (13) [ 605.242707][T21340] FAULT_INJECTION: forcing a failure. [ 605.242707][T21340] name failslab, interval 1, probability 0, space 0, times 0 [ 605.255534][T21340] CPU: 0 UID: 0 PID: 21340 Comm: syz.1.4176 Tainted: G W syzkaller #0 PREEMPT(full) [ 605.255570][T21340] Tainted: [W]=WARN [ 605.255579][T21340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 605.255596][T21340] Call Trace: [ 605.255605][T21340] [ 605.255615][T21340] __dump_stack+0x1d/0x30 [ 605.255644][T21340] dump_stack_lvl+0x95/0xd0 [ 605.255675][T21340] dump_stack+0x15/0x1b [ 605.255704][T21340] should_fail_ex+0x263/0x280 [ 605.255726][T21340] should_failslab+0x8c/0xb0 [ 605.255750][T21340] kmem_cache_alloc_noprof+0x66/0x400 [ 605.255785][T21340] ? anon_vma_clone+0xc8/0x430 [ 605.255820][T21340] anon_vma_clone+0xc8/0x430 [ 605.255855][T21340] __split_vma+0x2c0/0x640 [ 605.255882][T21340] ? mas_find+0x5d5/0x700 [ 605.255908][T21340] vms_gather_munmap_vmas+0x2bc/0x850 [ 605.255950][T21340] do_vmi_align_munmap+0x1e1/0x400 [ 605.256000][T21340] do_vmi_munmap+0x1da/0x220 [ 605.256041][T21340] mremap_to+0x136/0x440 [ 605.256071][T21340] __se_sys_mremap+0x667/0xb50 [ 605.256108][T21340] ? mutex_unlock+0x4e/0x90 [ 605.256135][T21340] ? fput+0x8f/0xc0 [ 605.256159][T21340] ? ksys_write+0x194/0x1a0 [ 605.256194][T21340] __x64_sys_mremap+0x67/0x80 [ 605.256215][T21340] x64_sys_call+0x29db/0x3020 [ 605.256243][T21340] do_syscall_64+0x12c/0x370 [ 605.256287][T21340] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 605.256312][T21340] RIP: 0033:0x7f9fb751c629 [ 605.256328][T21340] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 605.256347][T21340] RSP: 002b:00007f9fb5f35028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 605.256367][T21340] RAX: ffffffffffffffda RBX: 00007f9fb7796180 RCX: 00007f9fb751c629 [ 605.256383][T21340] RDX: 0000000000003000 RSI: 0000000000004000 RDI: 0000200000e8f000 [ 605.256397][T21340] RBP: 00007f9fb5f35090 R08: 0000200000ffc000 R09: 0000000000000000 [ 605.256412][T21340] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002 [ 605.256429][T21340] R13: 00007f9fb7796218 R14: 00007f9fb7796180 R15: 00007ffcbc3eb838 [ 605.256457][T21340] [ 605.477047][ T3407] usb usb6-port1: attempt power cycle [ 605.484935][ T906] bond0 (unregistering): Released all slaves [ 605.556337][ T906] tipc: Left network mode [ 605.592384][ T906] IPVS: stopping master sync thread 8765 ... [ 606.077948][T21359] netlink: 27 bytes leftover after parsing attributes in process `syz.1.4178'. [ 606.370635][ T906] veth1_to_team (unregistering): left allmulticast mode [ 607.345263][T21357] lo speed is unknown, defaulting to 1000 [ 607.402105][T21286] 8021q: adding VLAN 0 to HW filter on device bond0 [ 607.440336][T21286] 8021q: adding VLAN 0 to HW filter on device team0 [ 607.473853][T20112] bridge0: port 1(bridge_slave_0) entered blocking state [ 607.481256][T20112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 607.496037][ T3593] bridge0: port 2(bridge_slave_1) entered blocking state [ 607.503170][ T3593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 607.521351][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 607.521372][ T28] audit: type=1400 audit(2000000964.219:9878): avc: denied { egress } for pid=17315 comm="kworker/1:10" daddr=ff02::16 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 607.588782][T21286] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 607.605002][ T28] audit: type=1400 audit(2000000964.219:9879): avc: denied { sendto } for pid=17315 comm="kworker/1:10" daddr=ff02::16 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 607.730589][T21286] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 607.927952][T21395] loop7: detected capacity change from 0 to 1024 [ 607.935836][T21395] EXT4-fs: Ignoring removed nomblk_io_submit option [ 607.942719][T21395] EXT4-fs: inline encryption not supported [ 608.835329][T21395] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 608.858789][ T28] audit: type=1400 audit(2000000965.559:9880): avc: denied { read write } for pid=21374 comm="syz.7.4181" name="file1" dev="loop7" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 609.172577][ T3407] usb usb6-port1: unable to enumerate USB device [ 609.192874][ T28] audit: type=1400 audit(2000000965.559:9881): avc: denied { open } for pid=21374 comm="syz.7.4181" path="/433/file1/file1" dev="loop7" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 610.108397][T21286] veth0_vlan: entered promiscuous mode [ 610.124573][T21286] veth1_vlan: entered promiscuous mode [ 610.143098][T21286] veth0_macvtap: entered promiscuous mode [ 610.167399][T21286] veth1_macvtap: entered promiscuous mode [ 610.179730][T21286] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 610.195630][T21286] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 610.247331][T21437] xt_hashlimit: size too large, truncated to 1048576 [ 610.269289][ T28] audit: type=1400 audit(2000000966.969:9882): avc: denied { mounton } for pid=21286 comm="syz-executor" path="/root/syzkaller.vtF4Mg/syz-tmp" dev="sda1" ino=2061 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 610.317002][ T28] audit: type=1400 audit(2000000966.969:9883): avc: denied { mount } for pid=21286 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 610.370692][ T28] audit: type=1400 audit(2000000966.969:9884): avc: denied { mounton } for pid=21286 comm="syz-executor" path="/root/syzkaller.vtF4Mg/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 610.400337][T21446] lo speed is unknown, defaulting to 1000 [ 610.457958][ T28] audit: type=1400 audit(2000000966.969:9885): avc: denied { mounton } for pid=21286 comm="syz-executor" path="/root/syzkaller.vtF4Mg/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=74832 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 610.577554][T13470] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 610.585039][ T28] audit: type=1400 audit(2000000966.999:9886): avc: denied { mounton } for pid=21286 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 610.658113][ T28] audit: type=1400 audit(2000000966.999:9887): avc: denied { mount } for pid=21286 comm="syz-executor" name="/" dev="gadgetfs" ino=4838 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 611.047967][T21477] netlink: 20 bytes leftover after parsing attributes in process `syz.6.4190'. [ 611.097366][T21479] SELinux: ebitmap: truncated map [ 611.102669][T21479] SELinux: failed to load policy [ 611.138204][ T7939] usb usb6-port1: attempt power cycle [ 611.481681][T21486] loop9: detected capacity change from 0 to 1024 [ 611.541102][T21486] EXT4-fs: Ignoring removed nomblk_io_submit option [ 611.633206][T21486] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=e855c01c, mo2=0003] [ 611.642736][T21486] System zones: 0-1, 3-36 [ 611.695768][T21486] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 613.027564][T21511] lo speed is unknown, defaulting to 1000 [ 613.236185][T17715] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 613.297391][T21518] netlink: 20 bytes leftover after parsing attributes in process `syz.7.4202'. [ 613.355232][ T7939] usb usb6-port1: unable to enumerate USB device [ 615.140543][T21543] lo speed is unknown, defaulting to 1000 [ 615.193706][ T3591] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 615.240110][ T3591] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 615.298177][ T3591] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 615.359322][ T3591] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 615.385617][T21543] chnl_net:caif_netlink_parms(): no params data found [ 615.411340][T21559] netlink: 20 bytes leftover after parsing attributes in process `syz.6.4214'. [ 615.458433][T21543] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.466022][T21543] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.473567][T21543] bridge_slave_0: entered allmulticast mode [ 615.485896][T21543] bridge_slave_0: entered promiscuous mode [ 615.494190][T21555] loop7: detected capacity change from 0 to 1024 [ 615.496334][T21543] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.518405][T21555] EXT4-fs: Ignoring removed nomblk_io_submit option [ 615.565121][T21543] bridge0: port 2(bridge_slave_1) entered disabled state [ 615.585137][T21543] bridge_slave_1: entered allmulticast mode [ 615.591726][T21543] bridge_slave_1: entered promiscuous mode [ 615.676098][T21555] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=e855c01c, mo2=0003] [ 615.705637][T21555] System zones: 0-1, 3-36 [ 615.869479][T21555] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 616.198116][ T3591] bond1 (unregistering): Released all slaves [ 616.207385][ T3591] bond2 (unregistering): Released all slaves [ 616.217657][T21543] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 616.255367][T21543] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 616.277268][T21543] team0: Port device team_slave_0 added [ 616.284343][T21543] team0: Port device team_slave_1 added [ 616.304539][T21543] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 616.311804][T21543] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 616.338653][T21543] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 616.349775][ T3591] tipc: Left network mode [ 616.355350][T21543] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 616.362455][T21543] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 616.388949][T21543] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 616.415790][ T3591] hsr_slave_0: left promiscuous mode [ 616.432253][ T3591] veth1_macvtap: left promiscuous mode [ 616.443406][ T3591] veth0_macvtap: left promiscuous mode [ 616.455900][ T3591] veth1_vlan: left promiscuous mode [ 616.468953][ T3591] veth0_vlan: left promiscuous mode [ 617.071085][ T3591] veth1_to_team (unregistering): left allmulticast mode [ 617.123469][T21543] hsr_slave_0: entered promiscuous mode [ 617.129570][T21543] hsr_slave_1: entered promiscuous mode [ 617.135662][T21543] debugfs: 'hsr0' already exists in 'hsr' [ 617.141539][T21543] Cannot create hsr debugfs directory [ 617.258142][T21543] 8021q: adding VLAN 0 to HW filter on device bond0 [ 617.274208][T21543] 8021q: adding VLAN 0 to HW filter on device team0 [ 617.285126][T19462] bridge0: port 1(bridge_slave_0) entered blocking state [ 617.292331][T19462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 617.306837][ T906] bridge0: port 2(bridge_slave_1) entered blocking state [ 617.314060][ T906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 617.427151][T21543] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 617.441688][ T3591] IPVS: stop unused estimator thread 0... [ 617.582266][T13470] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 617.673767][T21665] netlink: 12 bytes leftover after parsing attributes in process `syz.9.4225'. [ 617.766343][T21543] veth0_vlan: entered promiscuous mode [ 617.788046][T21543] veth1_vlan: entered promiscuous mode [ 617.818714][T21543] veth0_macvtap: entered promiscuous mode [ 617.836842][T21543] veth1_macvtap: entered promiscuous mode [ 617.861120][T21543] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 617.956000][T21543] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 617.965623][T17318] usb usb6-port1: attempt power cycle [ 618.002175][T21682] loop9: detected capacity change from 0 to 128 [ 618.061742][T21682] FAT-fs (loop9): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 618.078083][T21682] FAT-fs (loop9): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 618.540492][T21701] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 619.686727][T21725] netlink: 12 bytes leftover after parsing attributes in process `syz.9.4235'. [ 619.865409][T17318] usb usb6-port1: unable to enumerate USB device [ 621.262417][T21763] netlink: 12 bytes leftover after parsing attributes in process `syz.6.4247'. [ 621.309641][T21765] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4248'. [ 621.325500][T21765] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 621.656896][T21791] netlink: 12 bytes leftover after parsing attributes in process `syz.6.4259'. [ 621.789890][ T28] audit: type=1400 audit(2000001234.487:9888): avc: denied { bind } for pid=21796 comm="syz.6.4261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 621.856140][ T28] audit: type=1400 audit(2000001234.487:9889): avc: denied { write } for pid=21796 comm="syz.6.4261" path="socket:[76285]" dev="sockfs" ino=76285 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 622.140018][T21812] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4267'. [ 622.620543][T21842] netlink: 12 bytes leftover after parsing attributes in process `syz.9.4272'. [ 622.651329][T21844] netlink: 'syz.9.4273': attribute type 2 has an invalid length. [ 622.659355][T21844] netlink: 60 bytes leftover after parsing attributes in process `syz.9.4273'. [ 622.814994][ T28] audit: type=1400 audit(2000001235.367:9890): avc: denied { setopt } for pid=21843 comm="syz.9.4273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 623.255384][T17311] usb usb6-port1: attempt power cycle [ 623.272246][T21877] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4278'. [ 624.707295][T21948] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4295'. [ 624.717267][T21948] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4295'. [ 625.135181][T17311] usb usb6-port1: unable to enumerate USB device [ 625.305378][ T28] audit: type=1400 audit(2000001238.007:9891): avc: denied { write } for pid=21967 comm="syz.9.4302" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 625.379834][ T28] audit: type=1400 audit(2000001238.027:9892): avc: denied { ioctl } for pid=21967 comm="syz.9.4302" path="/dev/raw-gadget" dev="devtmpfs" ino=142 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 626.184972][ T28] audit: type=1400 audit(2000001238.877:9893): avc: denied { override_creds } for pid=21981 comm="syz.7.4306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 626.293446][T21995] netlink: 16 bytes leftover after parsing attributes in process `syz.7.4308'. [ 626.310964][T21995] netlink: 16 bytes leftover after parsing attributes in process `syz.7.4308'. [ 626.800824][ T28] audit: type=1400 audit(2000001239.497:9894): avc: denied { ioctl } for pid=22012 comm="syz.5.4315" path="socket:[76710]" dev="sockfs" ino=76710 ioctlcmd=0x5882 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 626.830643][ T28] audit: type=1400 audit(2000001239.497:9895): avc: denied { setopt } for pid=22012 comm="syz.5.4315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 627.065294][T17311] usb usb6-port1: attempt power cycle [ 627.391956][T22027] FAULT_INJECTION: forcing a failure. [ 627.391956][T22027] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 627.405584][T22027] CPU: 0 UID: 0 PID: 22027 Comm: syz.1.4320 Tainted: G W syzkaller #0 PREEMPT(full) [ 627.405625][T22027] Tainted: [W]=WARN [ 627.405633][T22027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 627.405716][T22027] Call Trace: [ 627.405726][T22027] [ 627.405739][T22027] __dump_stack+0x1d/0x30 [ 627.405774][T22027] dump_stack_lvl+0x95/0xd0 [ 627.405821][T22027] dump_stack+0x15/0x1b [ 627.405843][T22027] should_fail_ex+0x263/0x280 [ 627.405867][T22027] should_fail+0xb/0x20 [ 627.405891][T22027] should_fail_usercopy+0x1a/0x20 [ 627.405944][T22027] _copy_to_user+0x20/0xa0 [ 627.405980][T22027] bpf_test_finish+0x1a2/0x510 [ 627.406013][T22027] ? ktime_get+0x1eb/0x210 [ 627.406042][T22027] bpf_prog_test_run_flow_dissector+0x2c9/0x360 [ 627.406147][T22027] ? __pfx_bpf_prog_test_run_flow_dissector+0x10/0x10 [ 627.406187][T22027] bpf_prog_test_run+0x204/0x340 [ 627.406261][T22027] __sys_bpf+0x52e/0x7e0 [ 627.406289][T22027] __x64_sys_bpf+0x41/0x50 [ 627.406349][T22027] x64_sys_call+0x10cb/0x3020 [ 627.406380][T22027] do_syscall_64+0x12c/0x370 [ 627.406497][T22027] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 627.406526][T22027] RIP: 0033:0x7f9fb751c629 [ 627.406547][T22027] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 627.406571][T22027] RSP: 002b:00007f9fb5f77028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 627.406595][T22027] RAX: ffffffffffffffda RBX: 00007f9fb7795fa0 RCX: 00007f9fb751c629 [ 627.406682][T22027] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 627.406700][T22027] RBP: 00007f9fb5f77090 R08: 0000000000000000 R09: 0000000000000000 [ 627.406716][T22027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 627.406729][T22027] R13: 00007f9fb7796038 R14: 00007f9fb7795fa0 R15: 00007ffcbc3eb838 [ 627.406767][T22027] [ 627.740362][T22031] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4321'. [ 627.811633][T22033] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4321'. [ 629.685039][T22127] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4334'. [ 629.694495][T22127] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4334'. [ 629.731116][T22131] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4336'. [ 629.776856][T22133] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4337'. [ 629.786331][ T28] audit: type=1400 audit(2000001242.487:9896): avc: denied { bind } for pid=22132 comm="syz.5.4337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 630.275163][T17311] usb usb6-port1: unable to enumerate USB device [ 630.321194][T22148] FAULT_INJECTION: forcing a failure. [ 630.321194][T22148] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 630.334619][T22148] CPU: 0 UID: 0 PID: 22148 Comm: syz.6.4342 Tainted: G W syzkaller #0 PREEMPT(full) [ 630.334649][T22148] Tainted: [W]=WARN [ 630.334655][T22148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 630.334700][T22148] Call Trace: [ 630.334707][T22148] [ 630.334715][T22148] __dump_stack+0x1d/0x30 [ 630.334740][T22148] dump_stack_lvl+0x95/0xd0 [ 630.334824][T22148] dump_stack+0x15/0x1b [ 630.334843][T22148] should_fail_ex+0x263/0x280 [ 630.334946][T22148] should_fail+0xb/0x20 [ 630.334974][T22148] should_fail_usercopy+0x1a/0x20 [ 630.334996][T22148] _copy_from_user+0x1c/0xb0 [ 630.335020][T22148] ___sys_sendmsg+0xc1/0x1e0 [ 630.335125][T22148] __x64_sys_sendmsg+0xd4/0x160 [ 630.335153][T22148] x64_sys_call+0x194c/0x3020 [ 630.335178][T22148] do_syscall_64+0x12c/0x370 [ 630.335216][T22148] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 630.335236][T22148] RIP: 0033:0x7ff96133c629 [ 630.335250][T22148] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 630.335354][T22148] RSP: 002b:00007ff95fd8f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 630.335372][T22148] RAX: ffffffffffffffda RBX: 00007ff9615b5fa0 RCX: 00007ff96133c629 [ 630.335433][T22148] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000003 [ 630.335445][T22148] RBP: 00007ff95fd8f090 R08: 0000000000000000 R09: 0000000000000000 [ 630.335456][T22148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 630.335467][T22148] R13: 00007ff9615b6038 R14: 00007ff9615b5fa0 R15: 00007ffc033f1278 [ 630.335486][T22148] [ 630.627734][T22158] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4347'. [ 630.644571][T22158] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4347'. [ 630.849374][T22174] FAULT_INJECTION: forcing a failure. [ 630.849374][T22174] name failslab, interval 1, probability 0, space 0, times 0 [ 630.899831][T22174] CPU: 1 UID: 0 PID: 22174 Comm: syz.6.4353 Tainted: G W syzkaller #0 PREEMPT(full) [ 630.899920][T22174] Tainted: [W]=WARN [ 630.899989][T22174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 630.900005][T22174] Call Trace: [ 630.900012][T22174] [ 630.900019][T22174] __dump_stack+0x1d/0x30 [ 630.900056][T22174] dump_stack_lvl+0x95/0xd0 [ 630.900086][T22174] dump_stack+0x15/0x1b [ 630.900147][T22174] should_fail_ex+0x263/0x280 [ 630.900183][T22174] should_failslab+0x8c/0xb0 [ 630.900208][T22174] kmem_cache_alloc_node_noprof+0x6d/0x460 [ 630.900233][T22174] ? __alloc_skb+0x2d6/0x690 [ 630.900261][T22174] __alloc_skb+0x2d6/0x690 [ 630.900346][T22174] ? nfs_mknod+0x210/0x2c0 [ 630.900378][T22174] ? __alloc_skb+0x200/0x690 [ 630.900412][T22174] create_monitor_ctrl_event+0x33/0x190 [ 630.900453][T22174] mgmt_cmd_complete+0x12c/0x210 [ 630.900565][T22174] read_unconf_index_list+0x274/0x2a0 [ 630.900604][T22174] hci_mgmt_cmd+0x7f5/0x8a0 [ 630.900642][T22174] hci_sock_sendmsg+0x518/0x910 [ 630.900699][T22174] ? __pfx_hci_sock_sendmsg+0x10/0x10 [ 630.900754][T22174] sock_write_iter+0x32a/0x360 [ 630.900858][T22174] ? __pfx_sock_write_iter+0x10/0x10 [ 630.900898][T22174] vfs_write+0x5a6/0x9f0 [ 630.900947][T22174] ksys_write+0xdc/0x1a0 [ 630.900982][T22174] __x64_sys_write+0x40/0x50 [ 630.901074][T22174] x64_sys_call+0x27e1/0x3020 [ 630.901153][T22174] do_syscall_64+0x12c/0x370 [ 630.901194][T22174] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 630.901224][T22174] RIP: 0033:0x7ff96133c629 [ 630.901307][T22174] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 630.901326][T22174] RSP: 002b:00007ff95fd8f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 630.901391][T22174] RAX: ffffffffffffffda RBX: 00007ff9615b5fa0 RCX: 00007ff96133c629 [ 630.901410][T22174] RDX: 0000000000000006 RSI: 0000200000000040 RDI: 0000000000000005 [ 630.901428][T22174] RBP: 00007ff95fd8f090 R08: 0000000000000000 R09: 0000000000000000 [ 630.901442][T22174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 630.901455][T22174] R13: 00007ff9615b6038 R14: 00007ff9615b5fa0 R15: 00007ffc033f1278 [ 630.901545][T22174] [ 631.171009][ T28] audit: type=1400 audit(2000001243.867:9897): avc: denied { write } for pid=22175 comm="syz.6.4354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 631.207899][ T28] audit: type=1400 audit(2000001243.897:9898): avc: denied { cpu } for pid=22175 comm="syz.6.4354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 631.311419][T22177] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 0) [ 631.320328][T22177] SELinux: failed to load policy [ 633.202984][T22228] hub 8-0:1.0: USB hub found [ 633.227454][T22228] hub 8-0:1.0: 8 ports detected [ 633.258234][T22232] netlink: 'syz.9.4374': attribute type 1 has an invalid length. [ 633.277678][T22232] 8021q: adding VLAN 0 to HW filter on device bond1 [ 633.299428][T22232] bond1: (slave gretap1): making interface the new active one [ 633.308066][T22232] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 633.739216][T22245] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4378'. [ 634.004446][T22260] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4385'. [ 634.038409][T22260] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 634.048813][T22260] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 634.059728][ T28] audit: type=1400 audit(2000001246.757:9899): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=38508 daddr=10.128.0.20 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 634.094846][T22260] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 634.104767][T22260] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 637.894580][T22294] netlink: 104 bytes leftover after parsing attributes in process `syz.1.4396'. [ 637.950092][T22306] netlink: 40 bytes leftover after parsing attributes in process `syz.1.4401'. [ 641.396359][T22348] netlink: 104 bytes leftover after parsing attributes in process `syz.5.4412'. [ 641.634963][ T28] audit: type=1400 audit(2000001254.327:9900): avc: denied { ioctl } for pid=22366 comm="syz.5.4419" path="socket:[78494]" dev="sockfs" ino=78494 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 641.787442][ T28] audit: type=1400 audit(2000001254.487:9901): avc: denied { bind } for pid=22373 comm="syz.9.4420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 641.862215][ T28] audit: type=1400 audit(2000001254.557:9902): avc: denied { setopt } for pid=22366 comm="syz.5.4419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 642.680682][T22389] netlink: 104 bytes leftover after parsing attributes in process `syz.9.4424'. [ 642.784432][ T28] audit: type=1400 audit(2000001255.477:9903): avc: denied { map } for pid=22390 comm="syz.9.4425" path="/dev/tty4" dev="devtmpfs" ino=22 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 643.052439][T22408] netlink: 60 bytes leftover after parsing attributes in process `syz.5.4431'. [ 643.062814][T22408] netlink: 60 bytes leftover after parsing attributes in process `syz.5.4431'. [ 644.126050][T22429] netlink: 104 bytes leftover after parsing attributes in process `syz.9.4435'. [ 644.834493][T22455] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 644.918308][T22455] netlink: 100 bytes leftover after parsing attributes in process `syz.1.4446'. [ 644.997174][ T28] audit: type=1400 audit(2000001257.697:9904): avc: denied { mount } for pid=22457 comm="syz.9.4447" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 646.767692][T22486] dvmrp6: entered allmulticast mode [ 647.508570][T22512] netlink: 'syz.7.4462': attribute type 5 has an invalid length. [ 649.462393][ T28] audit: type=1400 audit(2000001262.127:9905): avc: denied { read } for pid=22523 comm="syz.9.4468" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 649.493949][ T28] audit: type=1400 audit(2000001262.127:9906): avc: denied { open } for pid=22523 comm="syz.9.4468" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 650.489559][ T28] audit: type=1400 audit(2000001263.187:9907): avc: denied { name_connect } for pid=22540 comm="syz.9.4472" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 650.559128][ T10] hid-generic 000B:20800:0005.0003: unknown main item tag 0x0 [ 650.575089][ T10] hid-generic 000B:20800:0005.0003: unknown main item tag 0x0 [ 650.589374][ T10] hid-generic 000B:20800:0005.0003: unknown main item tag 0x0 [ 650.607306][ T10] hid-generic 000B:20800:0005.0003: unknown main item tag 0x0 [ 650.625079][ T10] hid-generic 000B:20800:0005.0003: unknown main item tag 0x0 [ 650.637284][ T10] hid-generic 000B:20800:0005.0003: unknown main item tag 0x0 [ 650.645800][ T10] hid-generic 000B:20800:0005.0003: unknown main item tag 0x0 [ 650.654062][ T10] hid-generic 000B:20800:0005.0003: unknown main item tag 0x0 [ 650.662121][ T10] hid-generic 000B:20800:0005.0003: unknown main item tag 0x0 [ 650.670396][ T10] hid-generic 000B:20800:0005.0003: unknown main item tag 0x0 [ 650.680618][ T10] hid-generic 000B:20800:0005.0003: hidraw0: HID v0.00 Device [syz0] on syz1 [ 650.792511][T17313] usb usb6-port1: attempt power cycle [ 653.705642][T17313] usb usb6-port1: unable to enumerate USB device [ 653.854386][T22628] netlink: 104 bytes leftover after parsing attributes in process `syz.7.4488'. [ 655.888107][T22668] xt_hashlimit: size too large, truncated to 1048576 [ 657.338447][T22699] 8021q: adding VLAN 0 to HW filter on device bond0 [ 657.370430][T22699] 8021q: adding VLAN 0 to HW filter on device team0 [ 657.387877][T22699] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 657.414526][T22701] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 657.454383][T22706] FAULT_INJECTION: forcing a failure. [ 657.454383][T22706] name failslab, interval 1, probability 0, space 0, times 0 [ 657.474585][T22699] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4514'. [ 657.483797][T22706] CPU: 1 UID: 0 PID: 22706 Comm: syz.5.4515 Tainted: G W syzkaller #0 PREEMPT(full) [ 657.483887][T22706] Tainted: [W]=WARN [ 657.483902][T22706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 657.483915][T22706] Call Trace: [ 657.483922][T22706] [ 657.483930][T22706] __dump_stack+0x1d/0x30 [ 657.483999][T22706] dump_stack_lvl+0x95/0xd0 [ 657.484078][T22706] dump_stack+0x15/0x1b [ 657.484101][T22706] should_fail_ex+0x263/0x280 [ 657.484142][T22706] should_failslab+0x8c/0xb0 [ 657.484163][T22706] kmem_cache_alloc_noprof+0x66/0x400 [ 657.484187][T22706] ? skb_clone+0x151/0x1f0 [ 657.484230][T22706] skb_clone+0x151/0x1f0 [ 657.484278][T22706] __netlink_deliver_tap+0x2c9/0x500 [ 657.484309][T22706] ? netlink_attachskb+0x2e2/0x660 [ 657.484336][T22706] netlink_sendskb+0x126/0x150 [ 657.484364][T22706] netlink_unicast+0x2a2/0x690 [ 657.484410][T22706] netlink_ack+0x4c8/0x500 [ 657.484501][T22706] netlink_rcv_skb+0x192/0x220 [ 657.484529][T22706] ? __pfx_genl_rcv_msg+0x10/0x10 [ 657.484568][T22706] genl_rcv+0x28/0x40 [ 657.484661][T22706] netlink_unicast+0x5c0/0x690 [ 657.484699][T22706] netlink_sendmsg+0x5c8/0x6f0 [ 657.484741][T22706] ? __pfx_netlink_sendmsg+0x10/0x10 [ 657.484778][T22706] ____sys_sendmsg+0x5af/0x600 [ 657.484810][T22706] ___sys_sendmsg+0x195/0x1e0 [ 657.484910][T22706] __x64_sys_sendmsg+0xd4/0x160 [ 657.484953][T22706] x64_sys_call+0x194c/0x3020 [ 657.484987][T22706] do_syscall_64+0x12c/0x370 [ 657.485107][T22706] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 657.485130][T22706] RIP: 0033:0x7f470ccac629 [ 657.485175][T22706] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 657.485210][T22706] RSP: 002b:00007f470b707028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 657.485235][T22706] RAX: ffffffffffffffda RBX: 00007f470cf25fa0 RCX: 00007f470ccac629 [ 657.485325][T22706] RDX: 0000000000000000 RSI: 0000200000000540 RDI: 0000000000000003 [ 657.485342][T22706] RBP: 00007f470b707090 R08: 0000000000000000 R09: 0000000000000000 [ 657.485359][T22706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 657.485376][T22706] R13: 00007f470cf26038 R14: 00007f470cf25fa0 R15: 00007ffdaec7c678 [ 657.485470][T22706] [ 657.684639][ T7938] usb usb6-port1: attempt power cycle [ 657.755218][T22701] netlink: 20 bytes leftover after parsing attributes in process `syz.1.4514'. [ 657.783975][ T28] audit: type=1400 audit(2000001270.467:9908): avc: denied { lock } for pid=22697 comm="syz.1.4514" path="socket:[79107]" dev="sockfs" ino=79107 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 657.844381][T22699] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 657.946377][T22708] netlink: 52 bytes leftover after parsing attributes in process `syz.9.4516'. [ 657.965433][T22708] netlink: 52 bytes leftover after parsing attributes in process `syz.9.4516'. [ 657.998206][ T28] audit: type=1400 audit(2000001270.697:9909): avc: denied { read } for pid=22711 comm="syz.5.4518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 658.157875][ T28] audit: type=1400 audit(2000001270.847:9910): avc: denied { getopt } for pid=22711 comm="syz.5.4518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 658.182289][ T28] audit: type=1400 audit(2000001270.847:9911): avc: denied { read } for pid=22711 comm="syz.5.4518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 658.202030][ T28] audit: type=1400 audit(2000001270.857:9912): avc: denied { shutdown } for pid=22711 comm="syz.5.4518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 658.892373][ T28] audit: type=1400 audit(2000001271.557:9913): avc: denied { watch_reads } for pid=22727 comm="syz.5.4522" path="/62" dev="tmpfs" ino=331 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 658.936963][ T28] audit: type=1400 audit(2000001271.557:9914): avc: denied { connect } for pid=22727 comm="syz.5.4522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 659.407681][ T28] audit: type=1326 audit(2000001272.077:9915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22747 comm="syz.9.4528" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9f5944c629 code=0x7ffc0000 [ 659.431458][ T28] audit: type=1326 audit(2000001272.077:9916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22747 comm="syz.9.4528" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9f5944c629 code=0x7ffc0000 [ 659.452784][T22752] netlink: 52 bytes leftover after parsing attributes in process `syz.9.4529'. [ 659.455683][ T28] audit: type=1326 audit(2000001272.077:9917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22747 comm="syz.9.4528" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9f5944c629 code=0x7ffc0000 [ 659.486311][T22752] netlink: 52 bytes leftover after parsing attributes in process `syz.9.4529'. [ 659.601408][T22763] netlink: 12 bytes leftover after parsing attributes in process `syz.7.4534'. [ 660.114461][T22760] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4533'. [ 660.143533][T22760] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4533'. [ 660.196808][T22765] netlink: 'syz.6.4533': attribute type 2 has an invalid length. [ 660.229974][T22765] netlink: 'syz.6.4533': attribute type 11 has an invalid length. [ 660.269386][T22765] netlink: 132 bytes leftover after parsing attributes in process `syz.6.4533'. [ 660.322077][T22785] netlink: 68 bytes leftover after parsing attributes in process `syz.7.4540'. [ 660.499822][T22794] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4544'. [ 660.685592][ T7938] usb usb6-port1: unable to enumerate USB device [ 660.767579][T22800] netlink: 52 bytes leftover after parsing attributes in process `syz.6.4546'. [ 660.798321][T22800] netlink: 52 bytes leftover after parsing attributes in process `syz.6.4546'. [ 661.451774][T17316] kernel read not supported for file /sysvipc/sem (pid: 17316 comm: kworker/1:11) [ 662.150393][T22839] FAULT_INJECTION: forcing a failure. [ 662.150393][T22839] name failslab, interval 1, probability 0, space 0, times 0 [ 662.163297][T22839] CPU: 1 UID: 0 PID: 22839 Comm: syz.6.4557 Tainted: G W syzkaller #0 PREEMPT(full) [ 662.163368][T22839] Tainted: [W]=WARN [ 662.163376][T22839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 662.163391][T22839] Call Trace: [ 662.163398][T22839] [ 662.163406][T22839] __dump_stack+0x1d/0x30 [ 662.163504][T22839] dump_stack_lvl+0x95/0xd0 [ 662.163530][T22839] dump_stack+0x15/0x1b [ 662.163663][T22839] should_fail_ex+0x263/0x280 [ 662.163687][T22839] should_failslab+0x8c/0xb0 [ 662.163748][T22839] kmem_cache_alloc_noprof+0x66/0x400 [ 662.163767][T22839] ? skb_clone+0x151/0x1f0 [ 662.163793][T22839] skb_clone+0x151/0x1f0 [ 662.163818][T22839] __netlink_deliver_tap+0x2c9/0x500 [ 662.163888][T22839] netlink_unicast+0x66b/0x690 [ 662.163951][T22839] netlink_sendmsg+0x5c8/0x6f0 [ 662.164000][T22839] ? __pfx_netlink_sendmsg+0x10/0x10 [ 662.164026][T22839] ____sys_sendmsg+0x5af/0x600 [ 662.164056][T22839] ___sys_sendmsg+0x195/0x1e0 [ 662.164080][T22839] ? path_openat+0x1b01/0x2050 [ 662.164207][T22839] __sys_sendmmsg+0x185/0x320 [ 662.164244][T22839] __x64_sys_sendmmsg+0x57/0x70 [ 662.164271][T22839] x64_sys_call+0x27aa/0x3020 [ 662.164361][T22839] do_syscall_64+0x12c/0x370 [ 662.164395][T22839] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 662.164445][T22839] RIP: 0033:0x7ff96133c629 [ 662.164460][T22839] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 662.164477][T22839] RSP: 002b:00007ff95fd8f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 662.164496][T22839] RAX: ffffffffffffffda RBX: 00007ff9615b5fa0 RCX: 00007ff96133c629 [ 662.164569][T22839] RDX: 040000000000009f RSI: 00002000000002c0 RDI: 0000000000000003 [ 662.164582][T22839] RBP: 00007ff95fd8f090 R08: 0000000000000000 R09: 0000000000000000 [ 662.164593][T22839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 662.164615][T22839] R13: 00007ff9615b6038 R14: 00007ff9615b5fa0 R15: 00007ffc033f1278 [ 662.164634][T22839] [ 662.633391][T22865] ipvlan1: entered promiscuous mode [ 662.638876][T22865] ipvlan1: entered allmulticast mode [ 662.644282][T22865] veth0_vlan: entered allmulticast mode [ 664.465912][ T28] kauditd_printk_skb: 27 callbacks suppressed [ 664.465932][ T28] audit: type=1400 audit(2000001277.167:9945): avc: denied { mounton } for pid=22926 comm="syz.9.4592" path="/syzcgroup/unified/syz9" dev="cgroup2" ino=306 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 664.504982][T22929] tmpfs: Bad value for 'mpol' [ 664.762373][ T28] audit: type=1326 audit(2000001277.457:9946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22940 comm="syz.1.4596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 664.787373][T22941] audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 [ 664.815140][T22941] audit: out of memory in audit_log_start [ 664.841676][ T28] audit: type=1326 audit(2000001277.487:9947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22940 comm="syz.1.4596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 664.913428][ T28] audit: type=1326 audit(2000001277.487:9948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22940 comm="syz.1.4596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f9fb74dcece code=0x7ffc0000 [ 664.941246][T22943] netlink: 'syz.1.4597': attribute type 1 has an invalid length. [ 664.949256][T22943] netlink: 'syz.1.4597': attribute type 2 has an invalid length. [ 664.971017][T22943] SELinux: Context : is not valid (left unmapped). [ 664.990228][ T28] audit: type=1326 audit(2000001277.487:9949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22940 comm="syz.1.4596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f9fb74dcece code=0x7ffc0000 [ 665.063365][ T28] audit: type=1326 audit(2000001277.517:9950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22940 comm="syz.1.4596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f9fb74dcece code=0x7ffc0000 [ 665.092805][ T28] audit: type=1326 audit(2000001277.517:9951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22940 comm="syz.1.4596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f9fb74dcece code=0x7ffc0000 [ 665.139498][ T28] audit: type=1326 audit(2000001277.517:9952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22940 comm="syz.1.4596" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f9fb74dcece code=0x7ffc0000 [ 666.479625][T22970] wg1: entered allmulticast mode [ 666.495444][T22972] ipvlan1: entered promiscuous mode [ 666.501012][T22972] ipvlan1: entered allmulticast mode [ 666.506463][T22972] veth0_vlan: entered allmulticast mode [ 667.024804][T22998] __nla_validate_parse: 4 callbacks suppressed [ 667.031327][T22998] netlink: 12 bytes leftover after parsing attributes in process `syz.7.4617'. [ 667.650370][T23006] netlink: 68 bytes leftover after parsing attributes in process `syz.1.4620'. [ 668.206287][T23028] netlink: 52 bytes leftover after parsing attributes in process `syz.1.4629'. [ 668.215336][T23028] netlink: 56 bytes leftover after parsing attributes in process `syz.1.4629'. [ 669.523489][ T28] kauditd_printk_skb: 81 callbacks suppressed [ 669.523508][ T28] audit: type=1400 audit(2000001282.217:10034): avc: denied { bind } for pid=23065 comm="syz.9.4642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 669.655218][ T28] audit: type=1400 audit(2000001282.347:10035): avc: denied { write } for pid=23065 comm="syz.9.4642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 669.801111][T23079] netlink: 35 bytes leftover after parsing attributes in process `syz.9.4645'. [ 669.851102][T23079] netlink: 8 bytes leftover after parsing attributes in process `syz.9.4645'. [ 669.954666][T23089] netlink: 24 bytes leftover after parsing attributes in process `syz.7.4650'. [ 670.940450][ T28] audit: type=1400 audit(2000001283.637:10036): avc: denied { connect } for pid=23118 comm="syz.6.4658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 675.556531][ T28] audit: type=1326 audit(2000001288.257:10037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23234 comm="syz.7.4693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58eda0c629 code=0x7ffc0000 [ 675.582820][T23235] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4693'. [ 675.601054][ T28] audit: type=1326 audit(2000001288.277:10038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23234 comm="syz.7.4693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58eda0c629 code=0x7ffc0000 [ 675.625902][ T28] audit: type=1326 audit(2000001288.277:10039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23234 comm="syz.7.4693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58eda0c629 code=0x7ffc0000 [ 675.652966][ T28] audit: type=1326 audit(2000001288.277:10040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23234 comm="syz.7.4693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58eda0c629 code=0x7ffc0000 [ 675.705229][ T28] audit: type=1326 audit(2000001288.277:10041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23234 comm="syz.7.4693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=12 compat=0 ip=0x7f58eda0c629 code=0x7ffc0000 [ 675.749148][ T28] audit: type=1326 audit(2000001288.277:10042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23234 comm="syz.7.4693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58eda0c629 code=0x7ffc0000 [ 675.786296][ T28] audit: type=1326 audit(2000001288.277:10043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23234 comm="syz.7.4693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58eda0c629 code=0x7ffc0000 [ 675.810173][ T28] audit: type=1326 audit(2000001288.277:10045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23234 comm="syz.7.4693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f58eda0c629 code=0x7ffc0000 [ 675.834191][ T28] audit: type=1326 audit(2000001288.277:10046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23234 comm="syz.7.4693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58eda0c629 code=0x7ffc0000 [ 675.857849][ T28] audit: type=1326 audit(2000001288.277:10047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23234 comm="syz.7.4693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58eda0c629 code=0x7ffc0000 [ 676.158190][T23243] netlink: 52 bytes leftover after parsing attributes in process `syz.1.4696'. [ 677.555868][T23281] FAULT_INJECTION: forcing a failure. [ 677.555868][T23281] name failslab, interval 1, probability 0, space 0, times 0 [ 677.597062][T23281] CPU: 1 UID: 0 PID: 23281 Comm: syz.5.4709 Tainted: G W syzkaller #0 PREEMPT(full) [ 677.597098][T23281] Tainted: [W]=WARN [ 677.597107][T23281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 677.597164][T23281] Call Trace: [ 677.597172][T23281] [ 677.597181][T23281] __dump_stack+0x1d/0x30 [ 677.597208][T23281] dump_stack_lvl+0x95/0xd0 [ 677.597248][T23281] dump_stack+0x15/0x1b [ 677.597274][T23281] should_fail_ex+0x263/0x280 [ 677.597306][T23281] should_failslab+0x8c/0xb0 [ 677.597343][T23281] __kmalloc_node_track_caller_noprof+0xc3/0x560 [ 677.597377][T23281] ? sidtab_sid2str_get+0xa0/0x130 [ 677.597409][T23281] kmemdup_noprof+0x2b/0x70 [ 677.597443][T23281] sidtab_sid2str_get+0xa0/0x130 [ 677.597500][T23281] security_sid_to_context_core+0x1eb/0x2e0 [ 677.597549][T23281] security_sid_to_context+0x27/0x40 [ 677.597582][T23281] avc_audit_post_callback+0x10f/0x540 [ 677.597614][T23281] ? audit_log_lsm_data+0xb3e/0xbb0 [ 677.597728][T23281] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 677.597762][T23281] common_lsm_audit+0x1ba/0x230 [ 677.597820][T23281] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 677.597872][T23281] slow_avc_audit+0x14c/0x190 [ 677.597902][T23281] avc_has_perm+0x144/0x190 [ 677.597936][T23281] selinux_socket_sendmsg+0x192/0x1c0 [ 677.598025][T23281] security_socket_sendmsg+0x44/0x80 [ 677.598118][T23281] ____sys_sendmsg+0x361/0x600 [ 677.598160][T23281] ___sys_sendmsg+0x195/0x1e0 [ 677.598262][T23281] __x64_sys_sendmsg+0xd4/0x160 [ 677.598327][T23281] x64_sys_call+0x194c/0x3020 [ 677.598365][T23281] do_syscall_64+0x12c/0x370 [ 677.598418][T23281] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 677.598457][T23281] RIP: 0033:0x7f470ccac629 [ 677.598474][T23281] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 677.598499][T23281] RSP: 002b:00007f470b707028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 677.598526][T23281] RAX: ffffffffffffffda RBX: 00007f470cf25fa0 RCX: 00007f470ccac629 [ 677.598545][T23281] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 677.598611][T23281] RBP: 00007f470b707090 R08: 0000000000000000 R09: 0000000000000000 [ 677.598624][T23281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 677.598637][T23281] R13: 00007f470cf26038 R14: 00007f470cf25fa0 R15: 00007ffdaec7c678 [ 677.598664][T23281] [ 678.945413][T23305] netlink: 140 bytes leftover after parsing attributes in process `syz.5.4716'. [ 679.570971][T23326] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4723'. [ 682.374241][T23374] program syz.9.4734 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 682.472392][T23377] pimreg: entered allmulticast mode [ 682.511975][T23377] pimreg: left allmulticast mode [ 684.111435][T23424] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4753'. [ 684.135211][T23426] FAULT_INJECTION: forcing a failure. [ 684.135211][T23426] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 684.175994][T23426] CPU: 0 UID: 0 PID: 23426 Comm: syz.5.4754 Tainted: G W syzkaller #0 PREEMPT(full) [ 684.176036][T23426] Tainted: [W]=WARN [ 684.176046][T23426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 684.176103][T23426] Call Trace: [ 684.176112][T23426] [ 684.176120][T23426] __dump_stack+0x1d/0x30 [ 684.176158][T23426] dump_stack_lvl+0x95/0xd0 [ 684.176190][T23426] dump_stack+0x15/0x1b [ 684.176272][T23426] should_fail_ex+0x263/0x280 [ 684.176302][T23426] should_fail+0xb/0x20 [ 684.176324][T23426] should_fail_usercopy+0x1a/0x20 [ 684.176387][T23426] _copy_from_user+0x1c/0xb0 [ 684.176423][T23426] ___sys_sendmsg+0xc1/0x1e0 [ 684.176474][T23426] __x64_sys_sendmsg+0xd4/0x160 [ 684.176511][T23426] x64_sys_call+0x194c/0x3020 [ 684.176546][T23426] do_syscall_64+0x12c/0x370 [ 684.176610][T23426] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 684.176633][T23426] RIP: 0033:0x7f470ccac629 [ 684.176650][T23426] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 684.176747][T23426] RSP: 002b:00007f470b707028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 684.176771][T23426] RAX: ffffffffffffffda RBX: 00007f470cf25fa0 RCX: 00007f470ccac629 [ 684.176789][T23426] RDX: 0000000000008000 RSI: 0000200000000040 RDI: 0000000000000003 [ 684.176831][T23426] RBP: 00007f470b707090 R08: 0000000000000000 R09: 0000000000000000 [ 684.176844][T23426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 684.176858][T23426] R13: 00007f470cf26038 R14: 00007f470cf25fa0 R15: 00007ffdaec7c678 [ 684.176878][T23426] [ 684.375161][T23431] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4756'. [ 684.836804][T23442] bond2: entered promiscuous mode [ 684.852307][T23442] 8021q: adding VLAN 0 to HW filter on device bond2 [ 685.520351][T23467] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4772'. [ 685.628186][T23480] SELinux: policydb magic number 0x8 does not match expected magic number 0xf97cff8c [ 685.648068][T23480] SELinux: failed to load policy [ 685.750757][T23487] netlink: 20 bytes leftover after parsing attributes in process `syz.6.4780'. [ 685.807989][T23493] FAULT_INJECTION: forcing a failure. [ 685.807989][T23493] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 685.823898][T23493] CPU: 0 UID: 0 PID: 23493 Comm: syz.6.4782 Tainted: G W syzkaller #0 PREEMPT(full) [ 685.823932][T23493] Tainted: [W]=WARN [ 685.823940][T23493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 685.823954][T23493] Call Trace: [ 685.823961][T23493] [ 685.824047][T23493] __dump_stack+0x1d/0x30 [ 685.824076][T23493] dump_stack_lvl+0x95/0xd0 [ 685.824100][T23493] dump_stack+0x15/0x1b [ 685.824122][T23493] should_fail_ex+0x263/0x280 [ 685.824177][T23493] should_fail+0xb/0x20 [ 685.824203][T23493] should_fail_usercopy+0x1a/0x20 [ 685.824271][T23493] _copy_to_user+0x20/0xa0 [ 685.824308][T23493] simple_read_from_buffer+0xb5/0x130 [ 685.824338][T23493] proc_fail_nth_read+0x10e/0x150 [ 685.824415][T23493] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 685.824449][T23493] vfs_read+0x1ab/0x7f0 [ 685.824486][T23493] ? __rcu_read_unlock+0x4e/0x70 [ 685.824549][T23493] ? __fget_files+0x184/0x1c0 [ 685.824573][T23493] ? mutex_lock+0x57/0x90 [ 685.824729][T23493] ksys_read+0xdc/0x1a0 [ 685.824773][T23493] __x64_sys_read+0x40/0x50 [ 685.824828][T23493] x64_sys_call+0x2886/0x3020 [ 685.824900][T23493] do_syscall_64+0x12c/0x370 [ 685.825004][T23493] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 685.825099][T23493] RIP: 0033:0x7ff9612fcece [ 685.825118][T23493] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 685.825142][T23493] RSP: 002b:00007ff95fd8efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 685.825168][T23493] RAX: ffffffffffffffda RBX: 00007ff95fd8f6c0 RCX: 00007ff9612fcece [ 685.825187][T23493] RDX: 000000000000000f RSI: 00007ff95fd8f0a0 RDI: 0000000000000003 [ 685.825203][T23493] RBP: 00007ff95fd8f090 R08: 0000000000000000 R09: 0000000000000000 [ 685.825216][T23493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 685.825271][T23493] R13: 00007ff9615b6038 R14: 00007ff9615b5fa0 R15: 00007ffc033f1278 [ 685.825316][T23493] [ 686.537656][T23524] 9p: Bad value for 'wfdno' [ 686.698880][ T28] kauditd_printk_skb: 377 callbacks suppressed [ 686.698896][ T28] audit: type=1400 audit(2000001299.397:10424): avc: denied { read } for pid=23527 comm="syz.6.4792" name="usbmon7" dev="devtmpfs" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 686.757376][ T28] audit: type=1400 audit(2000001299.397:10425): avc: denied { open } for pid=23527 comm="syz.6.4792" path="/dev/usbmon7" dev="devtmpfs" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 687.112781][T23553] netlink: 20 bytes leftover after parsing attributes in process `syz.7.4803'. [ 687.215957][T23556] netlink: 24 bytes leftover after parsing attributes in process `syz.7.4803'. [ 687.225183][T23556] netlink: 60 bytes leftover after parsing attributes in process `syz.7.4803'. [ 687.234194][T23556] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4803'. [ 687.247041][T23556] openvswitch: netlink: Flow actions attr not present in new flow. [ 687.407034][T23553] netlink: 56 bytes leftover after parsing attributes in process `syz.7.4803'. [ 687.669861][T23567] netlink: 44 bytes leftover after parsing attributes in process `syz.5.4806'. [ 687.694795][T23567] syzkaller0: entered promiscuous mode [ 687.700746][ T28] audit: type=1400 audit(2000001300.387:10426): avc: denied { relabelfrom } for pid=23566 comm="syz.5.4806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 687.744623][T23567] syzkaller0: entered allmulticast mode [ 687.750468][ T28] audit: type=1400 audit(2000001300.387:10427): avc: denied { relabelto } for pid=23566 comm="syz.5.4806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 687.843723][T23572] FAULT_INJECTION: forcing a failure. [ 687.843723][T23572] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 687.882297][T23572] CPU: 0 UID: 0 PID: 23572 Comm: syz.9.4808 Tainted: G W syzkaller #0 PREEMPT(full) [ 687.882330][T23572] Tainted: [W]=WARN [ 687.882409][T23572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 687.882426][T23572] Call Trace: [ 687.882434][T23572] [ 687.882443][T23572] __dump_stack+0x1d/0x30 [ 687.882478][T23572] dump_stack_lvl+0x95/0xd0 [ 687.882527][T23572] dump_stack+0x15/0x1b [ 687.882550][T23572] should_fail_ex+0x263/0x280 [ 687.882578][T23572] should_fail+0xb/0x20 [ 687.882618][T23572] should_fail_usercopy+0x1a/0x20 [ 687.882718][T23572] _copy_to_user+0x20/0xa0 [ 687.882753][T23572] simple_read_from_buffer+0xb5/0x130 [ 687.882776][T23572] proc_fail_nth_read+0x10e/0x150 [ 687.882813][T23572] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 687.882900][T23572] vfs_read+0x1ab/0x7f0 [ 687.882938][T23572] ? __rcu_read_unlock+0x4e/0x70 [ 687.882959][T23572] ? __fget_files+0x184/0x1c0 [ 687.882992][T23572] ? mutex_lock+0x57/0x90 [ 687.883029][T23572] ksys_read+0xdc/0x1a0 [ 687.883061][T23572] __x64_sys_read+0x40/0x50 [ 687.883093][T23572] x64_sys_call+0x2886/0x3020 [ 687.883207][T23572] do_syscall_64+0x12c/0x370 [ 687.883254][T23572] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 687.883281][T23572] RIP: 0033:0x7f9f5940cece [ 687.883302][T23572] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 687.883347][T23572] RSP: 002b:00007f9f57ea6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 687.883451][T23572] RAX: ffffffffffffffda RBX: 00007f9f57ea76c0 RCX: 00007f9f5940cece [ 687.883470][T23572] RDX: 000000000000000f RSI: 00007f9f57ea70a0 RDI: 0000000000000015 [ 687.883486][T23572] RBP: 00007f9f57ea7090 R08: 0000000000000000 R09: 0000000000000000 [ 687.883511][T23572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 687.883525][T23572] R13: 00007f9f596c6038 R14: 00007f9f596c5fa0 R15: 00007ffdade871f8 [ 687.883553][T23572] [ 688.281005][T23586] syzkaller0: entered promiscuous mode [ 688.288812][T23586] syzkaller0: entered allmulticast mode [ 688.838689][ T28] audit: type=1326 audit(2000001301.537:10428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23593 comm="syz.6.4817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff96133c629 code=0x7ffc0000 [ 688.893016][ T28] audit: type=1326 audit(2000001301.537:10429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23593 comm="syz.6.4817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff96133c629 code=0x7ffc0000 [ 688.943836][ T28] audit: type=1326 audit(2000001301.537:10430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23593 comm="syz.6.4817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff96133c629 code=0x7ffc0000 [ 689.014373][T23599] bond2: option tlb_dynamic_lb: invalid value (2) [ 689.021647][T23599] bond2 (unregistering): Released all slaves [ 689.138085][ T28] audit: type=1326 audit(2000001301.537:10431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23593 comm="syz.6.4817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=12 compat=0 ip=0x7ff96133c629 code=0x7ffc0000 [ 689.177947][T23606] __nla_validate_parse: 1 callbacks suppressed [ 689.177971][T23606] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4821'. [ 689.192414][ T28] audit: type=1326 audit(2000001301.537:10432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23593 comm="syz.6.4817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff96133c629 code=0x7ffc0000 [ 689.232457][T23606] netlink: 20 bytes leftover after parsing attributes in process `syz.5.4821'. [ 689.241581][ T28] audit: type=1326 audit(2000001301.537:10433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23593 comm="syz.6.4817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff96133c629 code=0x7ffc0000 [ 689.265648][T23606] sit0: Master is either lo or non-ether device [ 691.039545][T23647] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4832'. [ 691.098312][T23648] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=23648 comm=syz.9.4830 [ 691.335190][ T3407] usb usb6-port1: attempt power cycle [ 691.483698][ T10] kernel read not supported for file /sysvipc/sem (pid: 10 comm: kworker/0:1) [ 691.617461][T23676] 9p: Bad value for 'wfdno' [ 692.756613][ T28] kauditd_printk_skb: 149 callbacks suppressed [ 692.756628][ T28] audit: type=1400 audit(2000001305.457:10583): avc: denied { create } for pid=23698 comm="syz.7.4850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 692.791030][ T28] audit: type=1400 audit(2000001305.487:10584): avc: denied { sys_admin } for pid=23698 comm="syz.7.4850" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 692.895019][T23707] netlink: 48 bytes leftover after parsing attributes in process `syz.1.4851'. [ 693.175183][ T3407] usb usb6-port1: unable to enumerate USB device [ 693.962163][ T3407] kernel read not supported for file /sysvipc/sem (pid: 3407 comm: kworker/0:3) [ 694.732534][ T28] audit: type=1326 audit(2000001307.427:10585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23775 comm="syz.6.4880" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff96133c629 code=0x0 [ 694.911842][T23781] tmpfs: Unknown parameter 'eF' [ 695.097823][ T28] audit: type=1400 audit(2000001307.787:10586): avc: denied { map } for pid=23785 comm="syz.5.4883" path="/dev/usbmon0" dev="devtmpfs" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 695.638836][T23806] tipc: Enabling of bearer rejected, failed to enable media [ 695.839975][T23822] IPVS: Error connecting to the multicast addr [ 696.112930][T23836] netlink: 'syz.5.4896': attribute type 27 has an invalid length. [ 696.166596][ T28] audit: type=1400 audit(2000001309.870:10587): avc: denied { shutdown } for pid=23830 comm="syz.5.4896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 696.200491][T23836] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.207851][T23836] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.271397][T23836] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 696.283003][T23836] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 696.644194][T23839] 8021q: adding VLAN 0 to HW filter on device bond0 [ 696.676898][T23839] 8021q: adding VLAN 0 to HW filter on device team0 [ 696.686912][T23839] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 696.748619][ T28] audit: type=1326 audit(2000001310.450:10588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23844 comm="syz.1.4900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 696.782590][ T28] audit: type=1326 audit(2000001310.450:10589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23844 comm="syz.1.4900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 696.813620][ T28] audit: type=1326 audit(2000001310.470:10590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23844 comm="syz.1.4900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=173 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 696.857345][ T28] audit: type=1326 audit(2000001310.470:10591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23844 comm="syz.1.4900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 696.893766][ T28] audit: type=1326 audit(2000001310.470:10592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23844 comm="syz.1.4900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 697.853851][ T28] kauditd_printk_skb: 38 callbacks suppressed [ 697.853866][ T28] audit: type=1326 audit(2000001311.550:10631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23882 comm="syz.1.4910" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 697.885837][ T28] audit: type=1326 audit(2000001311.560:10632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23882 comm="syz.1.4910" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 697.890725][T23883] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4910'. [ 697.912103][ T28] audit: type=1326 audit(2000001311.590:10633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23882 comm="syz.1.4910" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 697.942438][ T28] audit: type=1326 audit(2000001311.590:10634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23882 comm="syz.1.4910" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 697.966417][ T28] audit: type=1326 audit(2000001311.590:10635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23882 comm="syz.1.4910" exe="/root/syz-executor" sig=0 arch=c000003e syscall=12 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 697.990278][ T28] audit: type=1326 audit(2000001311.590:10636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23882 comm="syz.1.4910" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 698.035790][ T28] audit: type=1326 audit(2000001311.590:10637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23882 comm="syz.1.4910" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 698.206368][T23890] netlink: 20 bytes leftover after parsing attributes in process `syz.6.4912'. [ 698.238787][ T28] audit: type=1326 audit(2000001311.590:10638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23882 comm="syz.1.4910" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 698.304920][T23890] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4912'. [ 698.464216][ T28] audit: type=1326 audit(2000001311.590:10639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23882 comm="syz.1.4910" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 698.504917][ T28] audit: type=1326 audit(2000001311.590:10640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23882 comm="syz.1.4910" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 698.620471][T23909] sch_tbf: peakrate 5120 is lower than or equals to rate 5120 ! [ 698.749849][T23922] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 701.075007][T23941] netlink: 28 bytes leftover after parsing attributes in process `syz.5.4929'. [ 702.592775][T23992] netlink: 24 bytes leftover after parsing attributes in process `syz.5.4942'. [ 702.868993][ T28] kauditd_printk_skb: 52 callbacks suppressed [ 702.869013][ T28] audit: type=1400 audit(2000001316.570:10693): avc: denied { bind } for pid=24006 comm="syz.7.4949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 703.062439][T24012] SELinux: failed to load policy [ 705.800451][ T28] audit: type=1326 audit(2000001319.500:10694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24090 comm="syz.5.4976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f470ccac629 code=0x7ffc0000 [ 705.853571][ T28] audit: type=1326 audit(2000001319.540:10695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24090 comm="syz.5.4976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f470ccac629 code=0x7ffc0000 [ 705.927499][ T28] audit: type=1326 audit(2000001319.540:10696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24090 comm="syz.5.4976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=27 compat=0 ip=0x7f470ccac629 code=0x7ffc0000 [ 705.972131][ T28] audit: type=1326 audit(2000001319.540:10697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24090 comm="syz.5.4976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f470ccac629 code=0x7ffc0000 [ 706.021424][ T28] audit: type=1326 audit(2000001319.540:10698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24090 comm="syz.5.4976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f470ccac629 code=0x7ffc0000 [ 706.077556][T24101] batadv_slave_0: entered promiscuous mode [ 706.100516][ T28] audit: type=1326 audit(2000001319.540:10699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24090 comm="syz.5.4976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f470ccac629 code=0x7ffc0000 [ 706.183505][ T28] audit: type=1326 audit(2000001319.540:10700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24090 comm="syz.5.4976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f470ccac629 code=0x7ffc0000 [ 706.211851][T24093] netlink: 96 bytes leftover after parsing attributes in process `syz.7.4977'. [ 706.238946][ T28] audit: type=1326 audit(2000001319.540:10701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24090 comm="syz.5.4976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f470ccac629 code=0x7ffc0000 [ 706.246998][T24111] netlink: 32 bytes leftover after parsing attributes in process `syz.1.4984'. [ 706.264724][ T28] audit: type=1326 audit(2000001319.540:10702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24090 comm="syz.5.4976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f470ccac629 code=0x7ffc0000 [ 706.350418][T24118] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 706.404125][T24123] sctp: [Deprecated]: syz.1.4988 (pid 24123) Use of struct sctp_assoc_value in delayed_ack socket option. [ 706.404125][T24123] Use struct sctp_sack_info instead [ 707.338479][T24133] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 707.708088][T24171] netlink: 'syz.6.5002': attribute type 1 has an invalid length. [ 707.857954][T24175] IPVS: Scheduler module ip_vs_ not found [ 707.885717][ T28] kauditd_printk_skb: 64 callbacks suppressed [ 707.885735][ T28] audit: type=1326 audit(2000001321.590:10767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24174 comm="syz.1.5004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 707.951622][ T28] audit: type=1326 audit(2000001321.590:10768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24174 comm="syz.1.5004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 708.005047][ T28] audit: type=1326 audit(2000001321.620:10769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24174 comm="syz.1.5004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 708.519233][T24187] unsupported nla_type 210 [ 709.494711][T24187] netlink: 8 bytes leftover after parsing attributes in process `syz.6.5007'. [ 709.503668][T24187] netlink: 312 bytes leftover after parsing attributes in process `syz.6.5007'. [ 709.980353][ T28] audit: type=1326 audit(2000001321.620:10770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24174 comm="syz.1.5004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 710.004430][ T28] audit: type=1326 audit(2000001321.620:10771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24174 comm="syz.1.5004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 710.019214][T24190] netlink: 'syz.1.5008': attribute type 10 has an invalid length. [ 710.033019][ T28] audit: type=1326 audit(2000001321.620:10772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24174 comm="syz.1.5004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 710.060070][ T28] audit: type=1326 audit(2000001321.620:10773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24174 comm="syz.1.5004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 710.083817][ T28] audit: type=1326 audit(2000001321.620:10774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24174 comm="syz.1.5004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 710.107636][ T28] audit: type=1326 audit(2000001321.620:10775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24174 comm="syz.1.5004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 710.144715][T24190] team0: Device vxcan1 is of different type [ 710.172848][ T28] audit: type=1326 audit(2000001321.620:10776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24174 comm="syz.1.5004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fb751c629 code=0x7ffc0000 [ 710.702546][ T3407] kernel read not supported for file /sysvipc/sem (pid: 3407 comm: kworker/0:3) [ 713.912386][T24269] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5031'. [ 715.226573][T24304] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 715.257622][T24304] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 715.290569][ T3591] Bluetooth: hci0: Frame reassembly failed (-84) [ 715.526210][T24286] chnl_net:caif_netlink_parms(): no params data found [ 715.611623][T24286] bridge0: port 1(bridge_slave_0) entered blocking state [ 715.619164][T24286] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.626478][T24286] bridge_slave_0: entered allmulticast mode [ 715.633292][T24286] bridge_slave_0: entered promiscuous mode [ 715.640385][T24286] bridge0: port 2(bridge_slave_1) entered blocking state [ 715.648078][T24286] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.657976][T24286] bridge_slave_1: entered allmulticast mode [ 715.672800][T24286] bridge_slave_1: entered promiscuous mode [ 715.698714][T24286] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 715.709430][T24286] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 715.729111][T24286] team0: Port device team_slave_0 added [ 715.735846][T24286] team0: Port device team_slave_1 added [ 715.753160][T24286] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 715.760225][T24286] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 715.786361][T24286] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 715.798318][T24286] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 715.805334][T24286] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 715.831619][T24286] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 715.860157][T24286] hsr_slave_0: entered promiscuous mode [ 715.866276][T24286] hsr_slave_1: entered promiscuous mode [ 715.872226][T24286] debugfs: 'hsr0' already exists in 'hsr' [ 715.878192][T24286] Cannot create hsr debugfs directory [ 715.957405][T24286] bridge0: port 2(bridge_slave_1) entered blocking state [ 715.964565][T24286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 715.972148][T24286] bridge0: port 1(bridge_slave_0) entered blocking state [ 715.979325][T24286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 716.018153][T24286] 8021q: adding VLAN 0 to HW filter on device bond0 [ 716.030484][T24286] 8021q: adding VLAN 0 to HW filter on device team0 [ 716.046033][ T3593] bridge0: port 1(bridge_slave_0) entered disabled state [ 716.060422][ T3593] bridge0: port 2(bridge_slave_1) entered disabled state [ 716.086559][ T5068] bridge0: port 1(bridge_slave_0) entered blocking state [ 716.093727][ T5068] bridge0: port 1(bridge_slave_0) entered forwarding state [ 716.116500][ T3593] bridge0: port 2(bridge_slave_1) entered blocking state [ 716.123615][ T3593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 716.213527][T24286] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 716.376827][T24286] veth0_vlan: entered promiscuous mode [ 716.385448][T24286] veth1_vlan: entered promiscuous mode [ 716.403736][T24286] veth0_macvtap: entered promiscuous mode [ 716.412639][T24286] veth1_macvtap: entered promiscuous mode [ 716.432599][T24286] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 716.558636][T24383] ================================================================== [ 716.566787][T24383] BUG: KCSAN: data-race in page_pool_put_unrefed_netmem / page_pool_refill_alloc_cache [ 716.576461][T24383] [ 716.578813][T24383] write to 0xffff88811b96e300 of 8 bytes by task 24392 on cpu 1: [ 716.586557][T24383] page_pool_refill_alloc_cache+0x2a5/0x3c0 [ 716.592481][T24383] page_pool_alloc_pages+0xd0/0x130 [ 716.597692][T24383] bpf_test_run_xdp_live+0x66c/0x1360 [ 716.603188][T24383] bpf_prog_test_run_xdp+0x57b/0xa10 [ 716.608501][T24383] bpf_prog_test_run+0x204/0x340 [ 716.613474][T24383] __sys_bpf+0x52e/0x7e0 [ 716.617729][T24383] __x64_sys_bpf+0x41/0x50 [ 716.622197][T24383] x64_sys_call+0x10cb/0x3020 [ 716.627018][T24383] do_syscall_64+0x12c/0x370 [ 716.631661][T24383] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 716.637588][T24383] [ 716.639934][T24383] read to 0xffff88811b96e300 of 8 bytes by task 24383 on cpu 0: [ 716.647590][T24383] page_pool_put_unrefed_netmem+0x38b/0x4b0 [ 716.653508][T24383] napi_pp_put_page+0xe9/0x200 [ 716.658288][T24383] skb_release_data+0x624/0x670 [ 716.663171][T24383] __kfree_skb+0x44/0x150 [ 716.667515][T24383] sk_skb_reason_drop+0xbd/0x290 [ 716.672479][T24383] udp_recvmsg+0x115/0xa90 [ 716.676916][T24383] inet_recvmsg+0x143/0x290 [ 716.681459][T24383] sock_recvmsg+0xf6/0x160 [ 716.685900][T24383] ____sys_recvmsg+0xf5/0x280 [ 716.690619][T24383] ___sys_recvmsg+0x11f/0x3b0 [ 716.695343][T24383] do_recvmmsg+0x1ef/0x560 [ 716.700023][T24383] __x64_sys_recvmmsg+0xe5/0x170 [ 716.705020][T24383] x64_sys_call+0x80f/0x3020 [ 716.709744][T24383] do_syscall_64+0x12c/0x370 [ 716.714379][T24383] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 716.720369][T24383] [ 716.722712][T24383] value changed: 0xffffea0004746c80 -> 0x0000000000000000 [ 716.729824][T24383] [ 716.732162][T24383] Reported by Kernel Concurrency Sanitizer on: [ 716.738325][T24383] CPU: 0 UID: 0 PID: 24383 Comm: syz.6.5060 Tainted: G W syzkaller #0 PREEMPT(full) [ 716.749301][T24383] Tainted: [W]=WARN SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 716.753143][T24383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 716.763207][T24383] ================================================================== [ 716.781383][ T28] kauditd_printk_skb: 46 callbacks suppressed [ 716.781399][ T28] audit: type=1400 audit(2000001586.475:10823): avc: denied { write } for pid=3302 comm="syz-executor" path="pipe:[1577]" dev="pipefs" ino=1577 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 717.056036][T20114] bridge_slave_1: left allmulticast mode [ 717.061770][T20114] bridge_slave_1: left promiscuous mode [ 717.075019][T20114] bridge0: port 2(bridge_slave_1) entered disabled state [ 717.085923][T20114] bridge_slave_0: left allmulticast mode [ 717.091650][T20114] bridge_slave_0: left promiscuous mode [ 717.105996][T20114] bridge0: port 1(bridge_slave_0) entered disabled state [ 717.206835][T20114] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 717.217015][T20114] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 717.226886][T20114] bond0 (unregistering): Released all slaves [ 717.260355][T20114] hsr_slave_0: left promiscuous mode [ 717.266184][T20114] hsr_slave_1: left promiscuous mode [ 717.271887][T20114] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 717.279620][T20114] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 717.305003][T24313] Bluetooth: hci0: command 0x1003 tx timeout [ 717.305053][ T3623] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 717.324635][T20114] team0 (unregistering): Port device team_slave_1 removed [ 717.336736][T20114] team0 (unregistering): Port device team_slave_0 removed [ 717.667573][T20114] bridge_slave_1: left allmulticast mode [ 717.673234][T20114] bridge_slave_1: left promiscuous mode [ 717.679200][T20114] bridge0: port 2(bridge_slave_1) entered disabled state [ 717.687002][T20114] bridge_slave_0: left allmulticast mode [ 717.692719][T20114] bridge_slave_0: left promiscuous mode [ 717.698675][T20114] bridge0: port 1(bridge_slave_0) entered disabled state [ 717.707726][T20114] bridge_slave_1: left allmulticast mode [ 717.713376][T20114] bridge_slave_1: left promiscuous mode [ 717.719587][T20114] bridge0: port 2(bridge_slave_1) entered disabled state [ 717.727624][T20114] bridge_slave_0: left allmulticast mode [ 717.733276][T20114] bridge_slave_0: left promiscuous mode [ 717.739200][T20114] bridge0: port 1(bridge_slave_0) entered disabled state [ 717.747697][T20114] bridge_slave_1: left allmulticast mode [ 717.753370][T20114] bridge_slave_1: left promiscuous mode [ 717.759297][T20114] bridge0: port 2(bridge_slave_1) entered disabled state [ 717.767660][T20114] bridge_slave_0: left allmulticast mode [ 717.773321][T20114] bridge_slave_0: left promiscuous mode [ 717.779099][T20114] bridge0: port 1(bridge_slave_0) entered disabled state [ 717.876898][T20114] bond1 (unregistering): (slave gretap1): Releasing active interface [ 717.890698][T20114] dvmrp6 (unregistering): left allmulticast mode [ 718.008052][T20114] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 718.017999][T20114] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 718.027827][T20114] bond0 (unregistering): Released all slaves [ 718.037117][T20114] bond1 (unregistering): Released all slaves [ 718.045879][T20114] bond2 (unregistering): Released all slaves [ 718.127111][T20114] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 718.137086][T20114] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 718.146634][T20114] bond0 (unregistering): Released all slaves [ 718.191633][T20114] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 718.201719][T20114] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 718.212139][T20114] bond0 (unregistering): Released all slaves [ 718.241051][T20114] tipc: Left network mode [ 718.250944][T20114] hsr_slave_0: left promiscuous mode [ 718.256933][T20114] hsr_slave_1: left promiscuous mode [ 718.262649][T20114] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 718.270123][T20114] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 718.277747][T20114] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 718.285205][T20114] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 718.294747][T20114] hsr_slave_0: left promiscuous mode [ 718.301442][T20114] hsr_slave_1: left promiscuous mode [ 718.307180][T20114] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 718.314653][T20114] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 718.322891][T20114] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 718.332509][T20114] hsr_slave_0: left promiscuous mode [ 718.338468][T20114] hsr_slave_1: left promiscuous mode [ 718.352762][T20114] veth1_macvtap: left promiscuous mode [ 718.358297][T20114] veth0_macvtap: left promiscuous mode [ 718.363806][T20114] veth1_vlan: left promiscuous mode [ 718.369086][T20114] veth0_vlan: left promiscuous mode [ 718.374941][T20114] veth1_macvtap: left promiscuous mode [ 718.380515][T20114] veth0_macvtap: left promiscuous mode [ 718.386183][T20114] veth1_vlan: left promiscuous mode [ 718.391498][T20114] veth0_vlan: left promiscuous mode [ 718.397147][T20114] veth1_macvtap: left promiscuous mode [ 718.402709][T20114] veth0_macvtap: left promiscuous mode [ 718.408314][T20114] veth1_vlan: left promiscuous mode [ 718.413545][T20114] veth0_vlan: left promiscuous mode [ 718.551272][T20114] team0 (unregistering): Port device team_slave_1 removed [ 718.561737][T20114] team0 (unregistering): Port device team_slave_0 removed [ 718.591359][T20114] team0 (unregistering): Port device dummy0 removed [ 718.628919][T20114] team0 (unregistering): Port device team_slave_1 removed [ 718.639163][T20114] team0 (unregistering): Port device team_slave_0 removed [ 718.700592][T20114] team0 (unregistering): Port device team_slave_1 removed [ 718.710570][T20114] team0 (unregistering): Port device team_slave_0 removed