last executing test programs: 9.135516747s ago: executing program 3 (id=35): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x200}, 0x1c) listen(r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000026c0)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x13}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x10}]}}}]}]}], {0x14}}, 0x78}, 0x1, 0x0, 0x0, 0x40000}, 0x8044) r4 = accept(r1, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)=ANY=[], 0xfffffdef}, 0x1, 0x0, 0x0, 0x2400c840}, 0x0) connect$unix(r4, 0x0, 0x0) 9.028658543s ago: executing program 2 (id=37): r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x1c0002, 0x0) write$vga_arbiter(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="6c6f636b20696f2b6d656d00d890c4c508df7c4972e3aaa30cbdaa8c3994196fb2a65b315e"], 0xc) write$vga_arbiter(r0, &(0x7f0000000040)=@other={'decodes', ' ', 'none'}, 0xd) 8.978544896s ago: executing program 2 (id=39): waitid(0x2, 0xffffffffffffffff, 0xfffffffffffffffe, 0x4, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYRESDEC], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x20, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0xc, 0x2, 0x0, 0x0, @str='nl80211\x00'}]}, 0x20}}, 0x0) 8.240649539s ago: executing program 3 (id=46): socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x11c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x4, 0x4, 0x4, 0x4, 0x1}, 0x48) socketpair(0x1, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000004000000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800"/16, @ANYRES32=r2, @ANYBLOB="0000000000000000b70300002000000085"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x31}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1a0000000000000000000000008000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000010000000000000001000018", @ANYRES32=r3], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x12}, 0x104101, 0x4, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000001c40)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000060000000400000000000007000000000000000061"], 0x0, 0x2a}, 0x28) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001000)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="010000000100"], 0x48) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a2, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={0x0, 0x0, 0x42, 0x0, 0x1, 0xe988}, 0x28) sendmsg$inet(r1, 0x0, 0x4008004) socketpair(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a2, &(0x7f0000000080)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000100)=0x8, 0x12) 7.846457553s ago: executing program 3 (id=48): socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x40000000000029a, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0xfffffffd, @empty}, 0x1c) r4 = dup(r3) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x1298c2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xfc, 0x19, 0x1, 0x70bd2d, 0x0, {{@in6=@loopback, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xc, 0x0, 0x0, 0x3, 0xffffffffffffffff}, {0x0, 0xa00, 0x407ffffffffffe, 0x800000000000002}, 0x1, 0x0, 0x1}, [@tmpl={0x44, 0x5, [{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, 0x0, 0x3c}, 0x2, @in=@empty, 0x3504, 0x4, 0x3, 0x0, 0x0, 0xfffffffe, 0x20000}]}]}, 0xfc}}, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d1) 6.888256158s ago: executing program 3 (id=49): socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000300020400bf050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)="d80000001e0081054e81f78206000000000000000a0014260360cf9808000f00245bde1625fcb8b20800094014000000035c0461c1d67f6f94007134cf6efb8000d74748420a963aa007a290457f01898102e807ad522a4807f13af8030ab316277ce07bbace8017cbec4c2ee5a7cef4090000001fb791433a5ee4ce1b14d6d930dfe1d9d322fe7c9f8716a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad909d5e1ca9781ed0bffece0b42a9eca0200e6d5d40dd6e4edef3d93452a92954b4337", 0xd5}], 0x1}, 0x40800) r3 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc909}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$inet(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000002c0)="5c00000014006b03000000d86e6c1d00028440fcffff564500004e23e3f58e76110165f450e71b0075e3002500028d459e37000f0000000000bf9367b47e51f60a64c9f4d4938037e786a6d0bdd700"/92, 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x4) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x2, 0x20010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8, 0x800000000000, 0x39}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r4) r5 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r5, 0x0, 0x2000488c) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000000c0)="6880a642beaf34317f0dd3122a90ad0d2b", 0x11}], 0x1}, 0x40000) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x6, 0x5, &(0x7f0000000040)) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r6, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0xc027, &(0x7f0000000340)=[{&(0x7f00000000c0)="97eb000014006bcd9e", 0xeb97}], 0x1, 0x0, 0x0, 0x1f000000}, 0x600) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) 6.829375012s ago: executing program 4 (id=51): r0 = syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x2000000, &(0x7f0000000b00), 0x1, 0x4cf, &(0x7f0000000b40)="$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") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400000014000103f70000000100000005"], 0x14}}, 0x4014) syz_emit_ethernet(0xae, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffff0180c200000086dd6000030800783a00fc00f000000000000000000000000000fe8000000000000000000200000000aa0200907800000000605b52ab00002b00fc000000000000000000000000000000fc0000000000000000000000000013000004040201000000fc020000000000000000000000000000fe880000000000000000000000000001880a000000000000c910fe8000000000000000000000000000bb000000000000"], 0x0) lsetxattr$security_capability(0x0, &(0x7f00000000c0), 0x0, 0x0, 0x3) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}, 0x102260, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x2, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f00000004c0)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "7c80690ea8c8123e", "f92dafad9e3b473a1eaac151fe41ea97", "ee367a98", "74aff2072572aca8"}, 0x28) r3 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={0x20440, 0xc, 0x5}, 0x18) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000006c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xf, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x5}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x8, &(0x7f00000003c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @tail_call, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}], &(0x7f0000000400)='syzkaller\x00', 0xd, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x1, 0x1, 0x8000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, r4], 0x0, 0x10, 0x7fffffff}, 0x94) linkat(r0, 0xffffffffffffffff, r3, &(0x7f0000000280)='./file0/../file0\x00', 0x1c00) writev(r2, &(0x7f0000002640)=[{&(0x7f0000000300)="fb5584", 0x3}], 0x1) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000680)=@gcm_128={{0x303}, "000037d7009400", "c0b6c5b29ca2b838d41ac2fc7ddf972d", "e9be1eae", "bb10000000000001"}, 0x28) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r5, 0x0, 0xf3a, 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x6a855000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x19, 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000100)=@sha1={0x1, "717695b9399c01999b09c3c80594bb87e0dc0cc2"}, 0x15, 0x0) 6.525735879s ago: executing program 3 (id=53): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x1, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r2 = syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x79af, 0x3180, 0x8000, 0x400048}, &(0x7f0000000340)=0x0, &(0x7f00000006c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0xc}) io_uring_enter(r2, 0x4c6e, 0xc67a, 0x8, 0x0, 0x0) io_uring_enter(r2, 0x627, 0x4c1, 0x43, 0x0, 0x0) 5.82549284s ago: executing program 4 (id=56): socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x11c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x4, 0x4, 0x4, 0x4, 0x1}, 0x48) socketpair(0x1, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000004000000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800"/16, @ANYRES32=r2, @ANYBLOB="0000000000000000b70300002000000085"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x31}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1a00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000010000000000000001000018", @ANYRES32=r3], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x12}, 0x104101, 0x4, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000001c40)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000006000000040000000000000700000000000000"], 0x0, 0x2a}, 0x28) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001000)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="010000000100"], 0x48) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a2, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={0x0, 0x0, 0x42, 0x0, 0x1, 0xe988}, 0x28) sendmsg$inet(r1, 0x0, 0x4008004) socketpair(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a2, &(0x7f0000000080)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000100)=0x8, 0x12) 5.48408054s ago: executing program 4 (id=58): socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x11c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x4, 0x4, 0x4, 0x4, 0x1}, 0x48) socketpair(0x1, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000004000000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800"/16, @ANYRES32=r2, @ANYBLOB="0000000000000000b70300002000000085"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x31}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1a00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x12}, 0x104101, 0x4, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000001c40)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000060000000400000000000007000000000000000061"], 0x0, 0x2a}, 0x28) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001000)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="010000000100"], 0x48) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a2, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={0x0, 0x0, 0x42, 0x0, 0x1, 0xe988}, 0x28) sendmsg$inet(r1, 0x0, 0x4008004) socketpair(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a2, &(0x7f0000000080)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0x8, 0x12) 5.356435078s ago: executing program 4 (id=60): syz_mount_image$vfat(&(0x7f0000000580), &(0x7f0000000180)='./file0\x00', 0x1000802, &(0x7f00000001c0)=ANY=[], 0x4, 0x24e, &(0x7f00000005c0)="$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") syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101b01) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='io.stat\x00', 0x275a, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) ioperm(0xc, 0x8, 0xa) mkdir(&(0x7f00000020c0)='./file0\x00', 0x98) lsetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)=@known='security.apparmor\x00', 0x0, 0x0, 0x1) clock_gettime(0x0, &(0x7f0000000140)) syz_mount_image$iso9660(&(0x7f0000000fc0), &(0x7f0000001000)='./file1\x00', 0x0, &(0x7f0000000d80)=ANY=[], 0x3, 0x7be, &(0x7f00000005c0)="$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") r1 = syz_clone(0xa8200780, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r2) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) r3 = syz_open_procfs(r1, &(0x7f0000000040)='status\x00') pread64(r3, &(0x7f0000000140)=""/25, 0x19, 0x4) 4.955100521s ago: executing program 4 (id=63): r0 = socket(0x1e, 0x4, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0x2}) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) r1 = socket(0x1e, 0x4, 0x0) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x0, 0x0, 0xffffffff}, 0x10) r3 = socket(0x1e, 0x4, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) socket$kcm(0x10, 0x2, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r5, 0x201, 0x400003, 0x0, {{}, {}, {0x8, 0x11, 0x2}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r6, 0xffffffffffffffff, 0x200000000000000) 4.651023288s ago: executing program 2 (id=68): syz_mount_image$iso9660(&(0x7f0000000380), &(0x7f00000000c0)='./file0\x00', 0x202819, &(0x7f0000000180)=ANY=[@ANYBLOB="6d61703d6f66662c6f76657272696465726f636b7065726d2c63720800742c757465382107d5e16964652c696f636861727365743d63703433372c6d61703d6f66662c6d6f64653d307830303030303438332c00"], 0xff, 0x55a, &(0x7f0000001f80)="$eJzs3V1v01gawPHHpV2irFShZYVQVeBQdqUileAkEBRx5XVO0gOJHdkOaq9QRVNUkcKKstK2Nyw37K40czv3zOV8iPlGaD7BaEa2k77QJJ6+0un8fxGcE/vY5zlu5KdO4xMBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABiuTXbLlrSNF5nSY3m1gK/tfu0v/WBBXJ3XzGmXxEr/ie5nFxPF13/6+7qa/F/czKbPpuVXFzkZPvP1648vjo5Mdh+TMCH8v0R97S5tf1qpdfrvj2pQM6hG5dHr2toz4S+aTkNrUzoq2qlYt9frIeqbpo6XA4j3VJuoJ3ID9S8e1cVq9Wy0oVlv+M1ak5TDxY+uley7Yp6UmhrJwh97/6TQugummbTeI2kTbw6bvMofiE+NZGKtNNSam291y1nDSBuVPwtjUpZjUp2qVQslkrFysPqw0e2PXlggf0FOdDi5F60+H06wbM3cDwT/fwvTTHiSUeWRA19uFKTQHxpjVjfN8j/f7+vx/a7N/8Psvz13dUzkuT/m+mzm6Py/4hYzu6xKVuyLa9kRXrSk668HdbKGozq8Ps/2lZn92iIFk+MhOKLkZY4yRLVX6KkKhWpiC3PZVHqEoqSuhhpipZQliWUSHTyinIlEC2OROJLIErmxZW7oqQoValKWZRoKciy+NIRTxpSEyfZy5qsJ8e9LMoaeQzX5ErSqDhyGPnBT6grpTGjJf/j+E7mxA2cgF8G+R8AAAAAAFxYVvLue3z9PyU3klrdNLX9tcMCAAAAAAAnKPnL/2xcTMW1G2Jx/Q8AAAAAwEVjJffYWSKSl1tpbU2s5HYp3gQAAAAAAOCCSP7+fzMukjlQbom1M6cK1/8AAAAAAFwQ/8ucYz9sX7Z+/EmCYMr60F76m7WRzM3rbFxKt7v05R6j+ow13d9JUlTSYnLS1bNWLm20Mwnm536xlhWHtRuAsxPAfw4TwNVJ+UZup21ur6bl6mBN2ku+bpq64PrNx0VxnOmJSC9F/3q9/m9Jhv9/rzVt5WS91y28eNNbTWL5EO/lw0Z/AsUD8yiOieVdMt9Ccs/F0BFPJTdi9PvNW7K23uvae8c/kW4+sb/H99Nj+vwoc2mruf6Mt/n948/FfRYLo0bfj6J4zJF/lDtpmzvzd9JiSBSlrChKe6MYfiyOH0U5K4ryMaMAgK9lLSMLWXIg7x7hLHe07C6HzO4fZT5tMz+TnFgnZ4ac0e2sM7p9zOz2w4HvQBqVY+N+v/0iq36KN/g0st+wWbLiQ3jp3cY/5drm1va99Y2Vl92X3delUrliP7DthyWZSobRL8g9AIAh9n7HjjU0/w9a/Pxd2vBg7n6QcVX9l52PFBTkhbyRnqzKQnK3QfKJg6G/EeT3fAxhIeOqNZ+kyfQbXhbGXNX9KbnLYbDf0ti2+2Mon/4PAgCAMzSXkYet7G/hsxYyrrv35/LxV8e7bYtnfCQAAPjj0MFnKx/91woC035erFaLTrSoVeC7T1Vgag2tjBfpwF10vIZW7cCPfNdvxpVnpqZDFXbabT+IVN0PVNsPzVIyfaDqf/V7qFuOFxl38Da263uR40aqZkJXtTv/aJpwUQfJxmFbu6ZuXCcyvqdCvxO4uqBUqPWehqamvcjUTVz1VDswLSfIqWd+s9PSqqZDNzDtyE93OOjLeHU/aCW7LXzlYw0AwHmxubX9aqXX6749xcrQjnNnPlQAANCXkaUBAAAAAAAAAAAAAAAAAAAAAMA5cBb3/1G54JXBVNDnJR4qJ1DJPHW8P/WTE4BT9WsAAAD//3nnTbg=") r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000400)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x131040, 0x81) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x80002, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x1b) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000100)=""/17, 0x11}], 0x1) getdents64(r0, &(0x7f0000000f80)=""/4096, 0x1000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018440000000000000c005e30e0a0302ba12d00005f00"/40], 0x0, 0x28, 0xa, 0x1}, 0x28) r2 = fsopen(&(0x7f0000001140)='hugetlbfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) fchdir(r3) utimensat(0xffffffffffffff9c, &(0x7f00000003c0)='.\x00', &(0x7f00000002c0)={{0x0, 0x3fffffff}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="4400000010000100"/20, @ANYRES32=r5, @ANYBLOB="00000000000000001c0012800b00010067656e65766500000c00028008000200ac1414bb080004"], 0x44}, 0x1, 0x2}, 0x40000) 4.587295102s ago: executing program 4 (id=69): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000400000000000000018dd5bf294944ecea000000040000000700000000613000"], 0x0, 0x34, 0x0, 0x1, 0x1}, 0x28) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x150, 0x1170, 0x1170, 0x150, 0x1170, 0x218, 0x1398, 0x1398, 0x218, 0x1398, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0x0, {}, [@common=@unspec=@devgroup={{0x38}, {0x5, 0xef4, 0x0, 0x4, 0x4}}, @inet=@rpfilter={{0x28}, {0xb}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast1, 'macvlan1\x00', {0xff}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_serviced\x00', 0x275a, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) mq_timedreceive(r1, &(0x7f00000000c0)=""/72, 0x48, 0xfd, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000400)=[{0x6, 0x1, 0x2, 0x7fff7ffc}]}) getrlimit(0x5, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0xe, 0x7fff0000}]}) ftruncate(0xffffffffffffffff, 0x51a9497) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) getsockopt(r3, 0x200000000114, 0x8, &(0x7f0000019580)=""/102394, &(0x7f0000000040)=0x18ffa) fcntl$setown(r1, 0x8, r2) fsetxattr(r1, &(0x7f0000000000)=@known='security.selinux\x00', &(0x7f0000000040)='\xe2\x8c_\xd4\xf8\xb7\xc1\xfc\vv\x91x%\x00r`hP*a\x83\x91@v\xca \xe1RD\xa1\xa3/\xe7\x91`', 0x23, 0x0) unshare(0x20060400) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x1012c2, 0x148) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x2) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001840), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0xd, 0x5, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f00000003c0)='GPL\x00', 0x7fff, 0x41, &(0x7f0000000440)=""/65, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0xd, 0x0, 0x6}, 0x10, 0x0, r4, 0x4, &(0x7f0000000580)=[r1, r4], &(0x7f0000000b80)=[{0x3, 0x1, 0x8, 0x2}, {0x3, 0x1, 0xa, 0xc}, {0x2, 0x2}, {0x1, 0x1}], 0x10, 0x8}, 0x94) r5 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0x3cfa, 0x0, 0x0, 0x3b6}, &(0x7f0000000000)=0x0, &(0x7f0000000280)=0x0) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r5, 0x47f6, 0x0, 0x2, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) 4.551956784s ago: executing program 32 (id=69): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000400000000000000018dd5bf294944ecea000000040000000700000000613000"], 0x0, 0x34, 0x0, 0x1, 0x1}, 0x28) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x150, 0x1170, 0x1170, 0x150, 0x1170, 0x218, 0x1398, 0x1398, 0x218, 0x1398, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0x0, {}, [@common=@unspec=@devgroup={{0x38}, {0x5, 0xef4, 0x0, 0x4, 0x4}}, @inet=@rpfilter={{0x28}, {0xb}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast1, 'macvlan1\x00', {0xff}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_serviced\x00', 0x275a, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) mq_timedreceive(r1, &(0x7f00000000c0)=""/72, 0x48, 0xfd, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000400)=[{0x6, 0x1, 0x2, 0x7fff7ffc}]}) getrlimit(0x5, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0xe, 0x7fff0000}]}) ftruncate(0xffffffffffffffff, 0x51a9497) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) getsockopt(r3, 0x200000000114, 0x8, &(0x7f0000019580)=""/102394, &(0x7f0000000040)=0x18ffa) fcntl$setown(r1, 0x8, r2) fsetxattr(r1, &(0x7f0000000000)=@known='security.selinux\x00', &(0x7f0000000040)='\xe2\x8c_\xd4\xf8\xb7\xc1\xfc\vv\x91x%\x00r`hP*a\x83\x91@v\xca \xe1RD\xa1\xa3/\xe7\x91`', 0x23, 0x0) unshare(0x20060400) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x1012c2, 0x148) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x2) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001840), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0xd, 0x5, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f00000003c0)='GPL\x00', 0x7fff, 0x41, &(0x7f0000000440)=""/65, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0xd, 0x0, 0x6}, 0x10, 0x0, r4, 0x4, &(0x7f0000000580)=[r1, r4], &(0x7f0000000b80)=[{0x3, 0x1, 0x8, 0x2}, {0x3, 0x1, 0xa, 0xc}, {0x2, 0x2}, {0x1, 0x1}], 0x10, 0x8}, 0x94) r5 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0x3cfa, 0x0, 0x0, 0x3b6}, &(0x7f0000000000)=0x0, &(0x7f0000000280)=0x0) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r5, 0x47f6, 0x0, 0x2, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) 4.415213382s ago: executing program 2 (id=71): syz_mount_image$vfat(&(0x7f0000000580), &(0x7f0000000180)='./file0\x00', 0x1000802, &(0x7f00000001c0)=ANY=[], 0x4, 0x24e, &(0x7f00000005c0)="$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") syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101b01) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='io.stat\x00', 0x275a, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000100)='./file0\x00', 0x5) ioperm(0xc, 0x8, 0xa) mkdir(&(0x7f00000020c0)='./file0\x00', 0x98) lsetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)=@known='security.apparmor\x00', 0x0, 0x0, 0x1) clock_gettime(0x0, &(0x7f0000000140)) setgroups(0x400000000000026f, &(0x7f0000000080)=[0x0, 0xee00]) r1 = syz_clone(0xa8200780, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r2) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) r3 = syz_open_procfs(r1, &(0x7f0000000040)='status\x00') pread64(r3, &(0x7f0000000140)=""/25, 0x19, 0x4) 4.096098431s ago: executing program 2 (id=72): r0 = epoll_create1(0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000003c0)={[{@resgid={'resgid', 0x3d, 0xee00}}, {}, {@grpquota}, {@nobarrier}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@stripe={'stripe', 0x3d, 0x2}}]}, 0x3, 0x572, &(0x7f00000006c0)="$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") r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r2, 0x8983, &(0x7f0000000000)={0x1, 'macvlan0\x00', {}, 0x5d}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x22) pwrite64(r3, &(0x7f0000000140)='2', 0xfdef, 0xfecc) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x4, 0x0, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sk_skb=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3003, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x2, 0x0, 0x0, 0x0, 0x100000000000009, 0x3c033, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0xffffffff, 0x3fff8000}, 0x10a102, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x400000000, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 3.711368343s ago: executing program 0 (id=73): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x2000000, &(0x7f0000000b00), 0x1, 0x4cf, &(0x7f0000000b40)="$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") r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1400000014000103f70000000100000005"], 0x14}}, 0x4014) syz_emit_ethernet(0xae, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffff0180c200000086dd6000030800783a00fc00f000000000000000000000000000fe8000000000000000000200000000aa0200907800000000605b52ab00002b00fc000000000000000000000000000000fc0000000000000000000000000013000004040201000000fc020000000000000000000000000000fe880000000000000000000000000001880a000000000000c910fe8000000000000000000000000000bb000000000000"], 0x0) lsetxattr$security_capability(0x0, &(0x7f00000000c0), 0x0, 0x0, 0x3) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}, 0x102260, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x2, @loopback}, 0x1c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000100)=@sha1={0x1, "717695b9399c01999b09c3c80594bb87e0dc0cc2"}, 0x15, 0x0) 3.675131105s ago: executing program 1 (id=74): r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000000400000008"], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xfc, 0x0, 0x40, 0x7fff, 0x2, 0x3e, 0xfffbffed, 0x294, 0x40, 0x1dd, 0xf, 0x0, 0x38, 0x1, 0x0, 0x2}, [{0x3, 0x83, 0x4, 0xd, 0x1c8, 0xe6, 0x1004, 0x3}]}, 0x78) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f0000000240), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) socket$netlink(0x10, 0x3, 0x6) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x4}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1, 0x0, 0x2}, {{@in6=@dev, 0x0, 0x32}, 0x0, @in=@private=0xa010100, 0x0, 0x0, 0x0, 0xb7, 0xc4, 0xfffffffe}}, 0xe8) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x1c) 3.434695649s ago: executing program 1 (id=75): socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100}, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xd, 0xf, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x346affff, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0xbb}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0xba}}}, &(0x7f00000001c0)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x1000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000001a300)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x6, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x24}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="75746638006d61703d6f983c756661703d6e6f726d616c2c6909000000f2ff00003dda5de4d586f0df206d65656b416d6f64653d3078303030303010303071303030303030302c73657373696f6e3d307830faffffff30303030303030f4e4b4f82c6d61736b3d4d4159574b50be30c8486470722677b93165cfe6f62127553b2017754598752d977369672c7063723d303030303030303030303030303030303030332c64566e745f6d6561737572652c00000000000000006bbf4d6406b59dbc529c00000000000000fada265ab14119997600a2299d2c35a2efc1bf037787a0d801f26d335ef2ba9ac2423a358ccbb776b21e1d3b", @ANYRESDEC=0x0, @ANYRESHEX], 0xfe, 0x677, &(0x7f0000000c00)="$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") r4 = open(&(0x7f0000000140)='.\x00', 0x8000, 0x112) getdents(r4, &(0x7f0000000900)=""/193, 0xe1) getdents(r4, &(0x7f0000001fc0)=""/184, 0xb8) 3.207369322s ago: executing program 2 (id=76): pipe(&(0x7f00000001c0)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = open(&(0x7f0000000080)='./file1\x00', 0x21a47f, 0x106) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r1, 0x5000) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040)=0x2, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001800010900000000fcdbdf2502180010fe0300090000000008000100ac141400080006"], 0x2c}}, 0x0) close(r2) rt_sigprocmask(0x2, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) getpgrp(r3) prlimit64(0x0, 0xe, &(0x7f0000000100)={0x8, 0x531}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xe, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000087000003d0301000000000095000000000000006926000000000000bf67000000000000150a00000fff07003506000043fe0000160600000ee60000bf050000000000001f620000000000006507000000000000460700004c0000000f72000000000000bf5400000000000007040000f0fff8ffad420100000000009500000000000000050000000000000095"], &(0x7f0000000100)='GPL\x00', 0xb, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x26}, 0x94) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, 0x3b) 3.206994203s ago: executing program 33 (id=76): pipe(&(0x7f00000001c0)) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = open(&(0x7f0000000080)='./file1\x00', 0x21a47f, 0x106) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r1, 0x5000) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040)=0x2, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001800010900000000fcdbdf2502180010fe0300090000000008000100ac141400080006"], 0x2c}}, 0x0) close(r2) rt_sigprocmask(0x2, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) getpgrp(r3) prlimit64(0x0, 0xe, &(0x7f0000000100)={0x8, 0x531}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xe, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000087000003d0301000000000095000000000000006926000000000000bf67000000000000150a00000fff07003506000043fe0000160600000ee60000bf050000000000001f620000000000006507000000000000460700004c0000000f72000000000000bf5400000000000007040000f0fff8ffad420100000000009500000000000000050000000000000095"], &(0x7f0000000100)='GPL\x00', 0xb, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x26}, 0x94) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, 0x3b) 2.688857013s ago: executing program 0 (id=78): socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x11c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x4, 0x4, 0x4, 0x4, 0x1}, 0x48) socketpair(0x1, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000004000000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800"/16, @ANYRES32=r2, @ANYBLOB="0000000000000000b70300002000000085"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x31}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1a00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000010000000000000001000018", @ANYRES32=r3], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x12}, 0x104101, 0x4, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000001c40)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000060000000400000000000007000000000000000061"], 0x0, 0x2a}, 0x28) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000001000)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="010000000100"], 0x48) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a2, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={0x0, 0x0, 0x42, 0x0, 0x1, 0xe988}, 0x28) sendmsg$inet(r1, 0x0, 0x4008004) socketpair(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a2, &(0x7f0000000080)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000100)=0x8, 0x12) 2.487254415s ago: executing program 1 (id=79): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = getpgrp(0x0) sched_setaffinity(r0, 0x0, 0x0) prlimit64(r0, 0xe, &(0x7f0000000100)={0x8, 0x80000100008a}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = getpid() sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, 0x0, 0x34040040) sched_setscheduler(r1, 0x2, &(0x7f0000000000)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r2, 0x1, 0x0) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00', 0x4}) write$sndseq(r4, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32}], 0xffc8) 2.39453338s ago: executing program 0 (id=80): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x200}, 0x1c) listen(r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000026c0)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}}], {0x14}}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x8044) r4 = accept(r1, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)=ANY=[], 0xfffffdef}, 0x1, 0x0, 0x0, 0x2400c840}, 0x0) connect$unix(r4, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 2.185855842s ago: executing program 1 (id=81): socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x40000000000029a, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0xfffffffd, @empty}, 0x1c) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x1298c2, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xfc, 0x19, 0x1, 0x70bd2d, 0x0, {{@in6=@loopback, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x30, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xc, 0x0, 0x0, 0x3, 0xffffffffffffffff}, {0x0, 0xa00, 0x407ffffffffffe, 0x800000000000002}, 0x1, 0x0, 0x1}, [@tmpl={0x44, 0x5, [{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, 0x0, 0x3c}, 0x2, @in=@empty, 0x3504, 0x4, 0x3, 0x0, 0x0, 0xfffffffe, 0x20000}]}]}, 0xfc}}, 0x0) ftruncate(r4, 0x200004) sendfile(0xffffffffffffffff, r4, 0x0, 0x80001d00c0d1) 1.458733904s ago: executing program 0 (id=82): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r5, 0x10e, 0xc, &(0x7f0000000640)=0x4, 0x4) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x1a, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2309e}, 0x94) setsockopt$inet_buf(r6, 0x0, 0x10, &(0x7f0000000140), 0x0) sendmsg$netlink(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000780)=ANY=[@ANYBLOB="1c0000005e0001"], 0x1c}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000240)=r4, 0x4) sendmsg$inet6(r3, &(0x7f0000003100)={&(0x7f0000000180)={0xa, 0x4e21, 0x1, @mcast1, 0x2}, 0x1c, &(0x7f0000000000)=[{&(0x7f0000000200)="8000e859667fbc13", 0x8}], 0x1}, 0x8050) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000580)='./file0\x00', 0x2000006, &(0x7f0000000280)=ANY=[@ANYBLOB='utf8=0,uni_xlate=0,shortname=winnt,rodir,codepage=862,shortname=lower,quiet,shortname=winnt,shortname=win95,iocharset=cp932,rodir,\x00ni_xlate=1,nonumtail=0,shortname=winnt,nonumtail=0,\x00'], 0x25, 0x365, &(0x7f0000000a00)="$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") r7 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) r8 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r7, &(0x7f0000000040)={0x10000000}) r9 = open(&(0x7f0000000140)='.\x00', 0x8000, 0x112) getdents(r9, 0x0, 0x0) r10 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r10, &(0x7f0000000180)={&(0x7f00000002c0)={0x2, 0x3, @multicast2}, 0x10, &(0x7f0000000480)=[{0x0}, {0x0}, {&(0x7f0000000600)="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", 0x5c1}], 0x3, &(0x7f0000000240)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @empty}}}], 0x20}, 0x2400c004) 995.649542ms ago: executing program 1 (id=83): r0 = epoll_create1(0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000003c0)={[{@resgid={'resgid', 0x3d, 0xee00}}, {}, {@grpquota}, {@nobarrier}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@stripe={'stripe', 0x3d, 0x2}}]}, 0x3, 0x572, &(0x7f00000006c0)="$eJzs3c9rHFUcAPDvbJL+1qZQinqQQA9WajdN4o8KQutRtFjQe12SaSjZdEt2U5pYaHuwIF6kCCIWxD/Au8fiH6B/RUELRUrQg5fIbGbbbZLNJunWbJ3PB6Z9b2ayb96++b79zs4uG0BhjWT/lCJejoivk4iDbdsGI984srLf0sNrk9mSxPLyJ38mkeTrWvsn+f/788pLEfHLFxHHS2vbrS8szlSq1XQur482Zi+P1hcWT1ycrUyn0+ml8YmJU29NjL/7zts96+vr5/7+7uO7H5z66ujStz/dP3Q7iTNxIN/W3o+ncKO9MhIj+XMyFGdW7TjWg8b6SbLTB8C2DORxPhTZHHAwBvKoB/7/rkfEMlBQifiHgmrlAa1r+x5dBz83Hry/cgG0tv+DK++NxJ7mtdG+peSJK6Psene4B+1nbfz8x53b2RJd3oe43oP2AFpu3IyIk4ODa+e/JJ//tu9k883jja1uo2ivP7CT7mb5zxvr5T+lR/lPrJP/7F8ndreje/yX7vegmY6y/O+9dfPfR1PX8EBee6GZ8w0lFy5W05MR8WJEHIuh3Vl9o/s5p5buLXfa1p7/ZUvWfisXzI/j/uDuJ/9mqtKoPE2f2z24GfHK4/w3iTXz/55mrrt6/LPn41xW+PXLrm0cSe+82mlb9/63630GvPxjxGvrjv/jO1rJxvcnR5vnw2jrrFjrr1tHfuvU/tb633vZ+O/buP/DSfv92vrW2/hhzz9pp23bPf93JZ82y7vydVcrjcbcWMSu5KO168cf/22r3to/6/+xoxvPf+ud/3sj4rNN9v/W4Vsdd+2H8Z/a0vhvvXDvw8+/79T+5sb/zWbpWL5mM/PfZg/waZ47AAAAAAAA6DeliDgQSan8qFwqlcsrn+84HPtK1Vq9cfxCbf7SVDS/KzscQ6XWne6DbZ+HGMs/D9uqj6+qT0TEoYj4ZmBvs16erFWndrrzAAAAAAAAAAAAAAAAAAAA0Cf2d/j+f+b3gZ0+OuCZ85PfUFxd478Xv/QE9CWv/1Bc4h+KS/xDcYl/KC7xD8Ul/qG4xD8Ul/gHAAAAAAAAAAAAAAAAAAAAAAAAAACAnjp39my2LC89vDaZ1aeuLMzP1K6cmErrM+XZ+cnyZG3ucnm6VpuupuXJ2my3x6vWapfHxmP+6mgjrTdG6wuL52dr85ca5y/OVqbT8+nQf9IrAAAAAAAAAAAAAAAAAAAAeL7UFxZnKtVqOqfQsXA6+uIwtl1Iuo3y6fxk2NIjR14Y3PkOKjyDwg5PTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADQ5t8AAAD//8nLNLM=") r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r2, 0x8983, &(0x7f0000000000)={0x1, 'macvlan0\x00', {}, 0x5d}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x22) pwrite64(r3, &(0x7f0000000140)='2', 0xfdef, 0xfecc) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x4, 0x0, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sk_skb=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3003, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x2, 0x0, 0x0, 0x0, 0x100000000000009, 0x3c033, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0xffffffff, 0x3fff8000}, 0x10a102, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x400000000, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x6, 0x40, 0x3, 0x0, 0x4000000000, 0x101d0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x100882, 0x7ff, 0x6, 0x3, 0xb, 0x7, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12011, r6, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 562.716557ms ago: executing program 0 (id=84): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x13840a0463d03d9, &(0x7f0000000440)=ANY=[@ANYRESHEX=0x0], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x12, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="4c00000010004b0422000000000000007a000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002c0012800b00010062726964676500001c00028008000400000000000800150000000000050016"], 0x4c}, 0x1, 0x0, 0x0, 0x200400a0}, 0x0) syslog(0x9, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="200000006800e9780000000000000016f4df580000000010080005"], 0x20}}, 0x20040040) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_RESP(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x14, 0x0, 0x4, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f00000008c0), r6) r7 = open(&(0x7f0000000000)='./file1\x00', 0x4e043, 0x36d) ftruncate(r7, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f0000000200)={[{@jqfmt_vfsv1}, {@errors_remount}, {@quota}, {@noauto_da_alloc}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@nodelalloc}, {@noauto_da_alloc}, {@stripe={'stripe', 0x3d, 0x85}}, {@orlov}]}, 0xfc, 0x57e, &(0x7f0000000cc0)="$eJzs3V1rW2UcAPD/SV/2qutgDPVCBrtwMpeurS8TBOel6HCg9zOkWRlNl9GkY60Dtwt3440MQcSB+AG893L4BfwUAx0MGUUvRIic9KRL26RZu8xky+8HaZ/nvPQ5/zznf/o8OQkJYGgdS3/kIl6OiG+SiEMt60YjW3lsbbvVh9eL6SOJev3TP5NIsmXN7ZPs94Gs8lJE/PpVxMnc1naryyvzhXK5tJjVJ2sLVyaryyunLi0U5kpzpcvTMzNn3pqZfvedt3sW6+vn//7+k7sfnvn6+Op3P98/fDuJs3EwW9caxxO40Vo5Vvg3K43F2U0bTvWgsUGS9PsA2JWRLM/HIr0GHIqRLOuB59+XEVEHhlQi/2FINccBzbl9j+bBz4wHH6xNgBqxj7fGP7r22kjsbcyN9q8mG2ZG6Xx3ogftp2388sed2+kjtn8dYl+XOsCO3LgZEadHR7de/5Ps+rd7pxsvHm9vcxvD9v8H+uluOv55o934L7c+/ok2458DbXJ3N7rnf+5+D5rpKB3/vdd2/Lt+6ZoYyWovNMZ8Y8nFS+XS6Yh4MSJORL3rrY8zq/fqnda1jv/WxoDXi82xYHYc90f3bNxntlArRMT4LkPe4MHNiFdG28WfrPd/0qb/0+fj/GO2cbR059VO6zbHn7a/Mf6nq/5TxGtt+/9Rtybb35+cbJwPk82zYqu/bh39rVP7/Y4/7f/928c/kbTer63uvI0f9/5T6rSue/ztz//x5LNGuZkE1wq12uJUxHjy8dbl04/2bdab26fxnzi+/fWv3fmfTr4+f8z4bx251XHTQej/2R31f0shfZI3LmlbuPfRFz90av/x+v/NRulEtiS7/rWXnSvbHM6GwpM+fwAAAAAAADBIchFxMJJcfr2cy+Xza+/vOBL7c+VKtXbyYmXp8mw0Pis7EWO55p3uQy3vh5jK3g/brE9vqs9ExOGI+HZkX6OeL1bKs/0OHgAAAAAAAAAAAAAAAAAAAAbEgQ6f/0/9PtLvowOeusYXG+zp91EA/dD1K/978U1PwEDqmv/Ac0v+w/CS/zC85D8ML/kPw0v+w/CS/zC85D8AAAAAAAAAAAAAAAAAAAAAAAAAAAD01Plz59JHffXh9WJan726vDRfuXpqtlSdzy8sFfPFyuKV/FylMlcu5YuVhW5/r1ypXJmajqVrk7VStTZZXV65sFBZuly7cGmhMFe6UBr7X6ICAAAAAAAAAAAAAAAAAACAZ0t1eWW+UC6XFhU6Ft6PgTiMpxngml3tPjooUSh0KNzMundne/XxogQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAm/wXAAD//zjKLhg=") chdir(&(0x7f0000000000)='./file0\x00') r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r9 = syz_genetlink_get_family_id$nbd(&(0x7f0000000e00), r6) r10 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) setsockopt$bt_BT_CHANNEL_POLICY(r8, 0x112, 0xa, &(0x7f0000000340)=0x6, 0x4) sendmsg$NLBL_MGMT_C_ADD(r10, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x0, 0xe701ac47a3d23ecd}, 0x14}}, 0x20040084) sendmsg$NBD_CMD_CONNECT(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x28, r9, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$NBD_CMD_STATUS(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x78, r9, 0x300, 0x70bd27, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}, @NBD_ATTR_SOCKETS={0x10, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8}}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xe000000}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}]}, 0x78}, 0x1, 0x0, 0x0, 0x8004}, 0x0) 452.779633ms ago: executing program 1 (id=85): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x2}, 0x50) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x30e, &(0x7f0000000f00)="$eJzs3E1rE10UwPGTNEnTlHayeHhEQXrRjW6GNu7FIC2IAUttxBcQp81EQ8akZEIlIrZduXEhfggXpcvuCtov0I07V27cdSO4sAtxJDOTl7aJrWnSWPv/QZlD7j0z9+Y24dyBzPbdN0/zWVvPGmUJRpUERER2ROISlJqAfwy6cUSaLcvl4W+fzt++d/9mMpWanFFqKjl7JaGUGh17/+zFkN9tY1C24g+3vya+bP2/dXb75+yTnK1ytioUy8pQc8XPZWPOMlUmZ+d1paYt07BNlSvYZslrd5ZELFNlreLCQkUZhcxIbKFk2rYyChWVNyuqXFTlUkUZj41cQem6rkZigoOkV2dmjGSHyfNdHgx6pFRKGgMiMrSvJb3alwEBAIC+8uv/erUfrJb0ndT/oZb1/9qFzfLwnfVRv/7fiFTrf5Gm+v9R41ymygTr9X9URBr1f9HbH3S7/t9fEZ1sr3cvjjhOPYy06n+k+h8nRLX+j/mfX9fKg7VxN6D+BwAAAAAAAAAAAAAAAAAAAADgJNhxHM1xHM07DvivOtqgiETdX5B47X0eJnpk9/o3/lj/06Hx4I7QqIj1ajG9mPaOfodNEbHElHHR5If7/+CrxpFl5XZSVXH5YC35+UuLae+7JJmVnJs/IZrE9+Y7ztSN1OSE8uzOD0usOT8hmvzXOj+xNz9cPUbk0sWmfF00+TgvRbEk4/8yrpb/ckKp67dSe64/5PYDAAAAAOBfoKu6+v59sLld39/u7Y+9dm9/HZLW9we8/fV4y/19SM6F+jVrAAAAAABOF7vyPG9YllnqUbAiIj2+RJugNsPDZtUekNumT0AC7Zq6ENQu3ll6dWxdG0/4UO9YsKOhjkX+cFFaBrXbRu36yHQnZ3Y0kaO+h2fevvv++z7enTGRw5zw6nr0gJl2GkQOmmn42L6AAAAAABybRtFfe+VafwcEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMApdByP4uv3HAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIC/xa8AAAD//46ZAFE=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x12) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r3, &(0x7f0000004200)='t', 0x1) sendfile(r3, r2, 0x0, 0x3ffff) write(r1, &(0x7f0000000a00)="c7", 0x1) sendfile(r1, r0, 0x0, 0x3ffff) sendfile(r1, r0, 0x0, 0x7ffff000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_uring_register$IORING_REGISTER_FILES_UPDATE2(0xffffffffffffffff, 0xd, &(0x7f0000000140)={0x7, 0x0, 0x0, 0x0}, 0x20) io_uring_register$IORING_REGISTER_FILES_UPDATE2(0xffffffffffffffff, 0xe, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0}, 0x20) 150.737461ms ago: executing program 3 (id=86): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000500)=[@in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e23, 0x8, @private2}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e22, 0x6, @local, 0x362f}, @in6={0xa, 0x4e24, 0xa98d, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @in={0x2, 0x4e23, @local}], 0x84) syz_clone3(&(0x7f00000002c0)={0x8040000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xce}, 0x28) socket(0x10, 0x803, 0x0) sendmsg$nl_xfrm(r0, 0x0, 0x8008010) syz_emit_ethernet(0x46, &(0x7f0000000180)={@broadcast, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x1, 0x6, "fbddf0", 0x10, 0x3a, 0xff, @local, @private2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x11, 0xe, 0xc18, 0x5932}}}}}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffe, 0x0, 0x2, 0x80000011, 0x6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000015c0), 0x80, 0x0) r4 = socket(0x840000000002, 0x3, 0x100) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(r4, &(0x7f0000005240), 0x4000095, 0x0) 0s ago: executing program 0 (id=87): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x2}, 0x50) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x30e, &(0x7f0000000f00)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x12) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r3, &(0x7f0000004200)='t', 0x1) sendfile(r3, r2, 0x0, 0x3ffff) write(r1, &(0x7f0000000a00)="c7", 0x1) sendfile(r1, r0, 0x0, 0x3ffff) sendfile(r1, r0, 0x0, 0x7ffff000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = io_uring_setup(0x21dd, &(0x7f0000000340)={0x0, 0x7604, 0x0, 0x2, 0xd5}) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r4, 0xe, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0}, 0x20) kernel console output (not intermixed with test programs): avc: denied { search } for pid=3195 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.628954][ T28] audit: type=1400 audit(1771308870.975:65): avc: denied { search } for pid=3195 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.652050][ T28] audit: type=1400 audit(1771308870.985:66): avc: denied { read open } for pid=3196 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.1.162' (ED25519) to the list of known hosts. [ 29.893660][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 29.893678][ T28] audit: type=1400 audit(1771308878.305:70): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 29.922778][ T28] audit: type=1400 audit(1771308878.335:71): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.925138][ T3301] cgroup: Unknown subsys name 'net' [ 29.950398][ T28] audit: type=1400 audit(1771308878.365:72): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.084677][ T3301] cgroup: Unknown subsys name 'cpuset' [ 30.090794][ T3301] cgroup: Unknown subsys name 'rlimit' [ 30.202686][ T28] audit: type=1400 audit(1771308878.615:73): avc: denied { setattr } for pid=3301 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.226054][ T28] audit: type=1400 audit(1771308878.615:74): avc: denied { create } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.255084][ T28] audit: type=1400 audit(1771308878.615:75): avc: denied { write } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.275576][ T28] audit: type=1400 audit(1771308878.615:76): avc: denied { read } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.294089][ T3304] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 30.296108][ T28] audit: type=1400 audit(1771308878.645:77): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 30.329387][ T28] audit: type=1400 audit(1771308878.645:78): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 30.352662][ T28] audit: type=1400 audit(1771308878.665:79): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 30.383377][ T3301] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 32.317786][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 32.371501][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 32.389043][ T3324] chnl_net:caif_netlink_parms(): no params data found [ 32.424640][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.431701][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.438933][ T3319] bridge_slave_0: entered allmulticast mode [ 32.445410][ T3319] bridge_slave_0: entered promiscuous mode [ 32.456170][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 32.465648][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 32.478834][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.486006][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.493122][ T3319] bridge_slave_1: entered allmulticast mode [ 32.499544][ T3319] bridge_slave_1: entered promiscuous mode [ 32.569022][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.579384][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.598594][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.605686][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.612788][ T3314] bridge_slave_0: entered allmulticast mode [ 32.619353][ T3314] bridge_slave_0: entered promiscuous mode [ 32.630248][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.637530][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.644667][ T3314] bridge_slave_1: entered allmulticast mode [ 32.651123][ T3314] bridge_slave_1: entered promiscuous mode [ 32.657465][ T3324] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.664540][ T3324] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.671668][ T3324] bridge_slave_0: entered allmulticast mode [ 32.678186][ T3324] bridge_slave_0: entered promiscuous mode [ 32.702598][ T3324] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.709689][ T3324] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.716859][ T3324] bridge_slave_1: entered allmulticast mode [ 32.723350][ T3324] bridge_slave_1: entered promiscuous mode [ 32.732782][ T3319] team0: Port device team_slave_0 added [ 32.739327][ T3319] team0: Port device team_slave_1 added [ 32.753858][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.760952][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.768081][ T3317] bridge_slave_0: entered allmulticast mode [ 32.774496][ T3317] bridge_slave_0: entered promiscuous mode [ 32.799706][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.809095][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.816298][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.823461][ T3317] bridge_slave_1: entered allmulticast mode [ 32.829995][ T3317] bridge_slave_1: entered promiscuous mode [ 32.846109][ T3324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.861377][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.870564][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.877723][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.884996][ T3313] bridge_slave_0: entered allmulticast mode [ 32.891524][ T3313] bridge_slave_0: entered promiscuous mode [ 32.901981][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.909103][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.916455][ T3313] bridge_slave_1: entered allmulticast mode [ 32.922895][ T3313] bridge_slave_1: entered promiscuous mode [ 32.929911][ T3324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.939291][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.946259][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.972266][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.992612][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.014968][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.021910][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.047832][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.059280][ T3314] team0: Port device team_slave_0 added [ 33.066002][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.085769][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.098399][ T3314] team0: Port device team_slave_1 added [ 33.104882][ T3324] team0: Port device team_slave_0 added [ 33.115888][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.135616][ T3324] team0: Port device team_slave_1 added [ 33.141979][ T3317] team0: Port device team_slave_0 added [ 33.153693][ T3313] team0: Port device team_slave_0 added [ 33.168349][ T3317] team0: Port device team_slave_1 added [ 33.183504][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.190548][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.216551][ T3324] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.228003][ T3313] team0: Port device team_slave_1 added [ 33.233844][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.240871][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.266837][ T3324] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.277870][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.284860][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.310815][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.343902][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.351023][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.376952][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.398891][ T3319] hsr_slave_0: entered promiscuous mode [ 33.404939][ T3319] hsr_slave_1: entered promiscuous mode [ 33.416269][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.423218][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.449567][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.461341][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.468411][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.494414][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.505811][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.512906][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.538857][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.550601][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.557618][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.583623][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.636558][ T3324] hsr_slave_0: entered promiscuous mode [ 33.642537][ T3324] hsr_slave_1: entered promiscuous mode [ 33.648740][ T3324] debugfs: 'hsr0' already exists in 'hsr' [ 33.654547][ T3324] Cannot create hsr debugfs directory [ 33.661984][ T3317] hsr_slave_0: entered promiscuous mode [ 33.667976][ T3317] hsr_slave_1: entered promiscuous mode [ 33.673925][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 33.679688][ T3317] Cannot create hsr debugfs directory [ 33.708404][ T3314] hsr_slave_0: entered promiscuous mode [ 33.714916][ T3314] hsr_slave_1: entered promiscuous mode [ 33.720773][ T3314] debugfs: 'hsr0' already exists in 'hsr' [ 33.726749][ T3314] Cannot create hsr debugfs directory [ 33.739039][ T3313] hsr_slave_0: entered promiscuous mode [ 33.745253][ T3313] hsr_slave_1: entered promiscuous mode [ 33.751123][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 33.756998][ T3313] Cannot create hsr debugfs directory [ 33.953182][ T3324] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 33.961921][ T3324] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 33.972791][ T3324] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 33.981467][ T3324] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 34.001344][ T3317] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 34.010122][ T3317] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 34.019240][ T3317] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 34.031162][ T3317] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 34.066179][ T3319] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 34.075796][ T3319] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 34.091144][ T3319] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 34.099865][ T3319] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 34.131080][ T3314] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 34.140961][ T3314] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 34.150678][ T3314] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 34.163524][ T3314] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 34.193300][ T3324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.200797][ T3313] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 34.209753][ T3313] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 34.218860][ T3313] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 34.228230][ T3313] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 34.263639][ T3324] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.273591][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.293614][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.300780][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.312496][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.319616][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.347497][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.357917][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.371177][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.393301][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.403059][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.410227][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.418975][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.426056][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.445090][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.452211][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.460928][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.468012][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.522486][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.538167][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.565587][ T3324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.576909][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.584136][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.619408][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.626577][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.649370][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.680606][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.687699][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.698338][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.705433][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.754573][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.771491][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.866988][ T3324] veth0_vlan: entered promiscuous mode [ 34.882053][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.917071][ T3324] veth1_vlan: entered promiscuous mode [ 34.923980][ T3317] veth0_vlan: entered promiscuous mode [ 34.946635][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.955787][ T3317] veth1_vlan: entered promiscuous mode [ 34.981789][ T3319] veth0_vlan: entered promiscuous mode [ 34.997910][ T3324] veth0_macvtap: entered promiscuous mode [ 35.012779][ T3317] veth0_macvtap: entered promiscuous mode [ 35.023673][ T3317] veth1_macvtap: entered promiscuous mode [ 35.035124][ T3324] veth1_macvtap: entered promiscuous mode [ 35.046227][ T3319] veth1_vlan: entered promiscuous mode [ 35.062711][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.071601][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.084309][ T3314] veth0_vlan: entered promiscuous mode [ 35.093064][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.107044][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.115003][ T3314] veth1_vlan: entered promiscuous mode [ 35.121168][ T288] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.130178][ T288] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.143785][ T288] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.172229][ T30] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.181243][ T30] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.198865][ T30] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.208784][ T30] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.222532][ T3314] veth0_macvtap: entered promiscuous mode [ 35.238086][ T30] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.246233][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 35.246280][ T28] audit: type=1400 audit(1771308883.655:90): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/root/syzkaller.G8oWka/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 35.257421][ T3314] veth1_macvtap: entered promiscuous mode [ 35.285278][ T28] audit: type=1400 audit(1771308883.695:91): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 35.286353][ T3319] veth0_macvtap: entered promiscuous mode [ 35.308040][ T28] audit: type=1400 audit(1771308883.695:92): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/root/syzkaller.G8oWka/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 35.320513][ T3313] veth0_vlan: entered promiscuous mode [ 35.350561][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.363304][ T3319] veth1_macvtap: entered promiscuous mode [ 35.372861][ T3313] veth1_vlan: entered promiscuous mode [ 35.374802][ T28] audit: type=1400 audit(1771308883.695:93): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 35.399450][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.410094][ T28] audit: type=1400 audit(1771308883.695:94): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/root/syzkaller.G8oWka/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 35.412234][ T3317] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 35.437653][ T28] audit: type=1400 audit(1771308883.695:95): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/root/syzkaller.G8oWka/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=5277 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 35.483867][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.513668][ T3313] veth0_macvtap: entered promiscuous mode [ 35.522192][ T28] audit: type=1400 audit(1771308883.705:96): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 35.543831][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.554167][ T288] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.558710][ T28] audit: type=1400 audit(1771308883.765:97): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 35.590606][ T3313] veth1_macvtap: entered promiscuous mode [ 35.601436][ T288] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.604489][ T28] audit: type=1400 audit(1771308883.765:98): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="gadgetfs" ino=5280 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 35.633415][ T30] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.655056][ T28] audit: type=1400 audit(1771308883.915:99): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 35.787923][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.826007][ T30] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.836847][ T30] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.853290][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.863878][ T30] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.634498][ T30] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.643546][ T30] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.122613][ T36] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.142189][ T36] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.170204][ T36] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.195077][ T36] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.706918][ T3499] syzkaller0: entered promiscuous mode [ 37.712541][ T3499] syzkaller0: entered allmulticast mode [ 38.090708][ T3502] SELinux: security_context_str_to_sid (Eá…) failed with errno=-22 [ 38.617288][ T3510] : port 1(gretap0) entered blocking state [ 38.653196][ T3510] : port 1(gretap0) entered disabled state [ 38.680006][ T3510] gretap0: entered allmulticast mode [ 38.694316][ T3510] gretap0: entered promiscuous mode [ 38.728131][ T3512] syzkaller0: entered promiscuous mode [ 38.753998][ T3512] syzkaller0: entered allmulticast mode [ 38.989995][ T3517] netlink: 96 bytes leftover after parsing attributes in process `syz.4.13'. [ 39.039490][ T3517] netlink: 'syz.4.13': attribute type 9 has an invalid length. [ 39.284371][ T3524] loop1: detected capacity change from 0 to 256 [ 39.328883][ T3524] FAT-fs (loop1): codepage cp862 not found [ 39.438675][ T3529] loop2: detected capacity change from 0 to 256 [ 39.856092][ T3529] FAT-fs (loop2): codepage cp862 not found [ 39.888288][ C1] hrtimer: interrupt took 37590 ns [ 39.932980][ T3539] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=none:owns=io+mem [ 39.958737][ T3540] loop4: detected capacity change from 0 to 1024 [ 39.984773][ T3540] EXT4-fs: Ignoring removed orlov option [ 39.997187][ T3540] EXT4-fs (loop4): stripe (133) is not aligned with cluster size (16), stripe is disabled [ 40.067210][ T3540] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.084398][ T3543] netlink: 'syz.0.19': attribute type 9 has an invalid length. [ 40.122017][ T3548] loop2: detected capacity change from 0 to 128 [ 40.126175][ T3540] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.146408][ T3548] ======================================================= [ 40.146408][ T3548] WARNING: The mand mount option has been deprecated and [ 40.146408][ T3548] and is ignored by this kernel. Remove the mand [ 40.146408][ T3548] option from the mount to silence this warning. [ 40.146408][ T3548] ======================================================= [ 40.267068][ T3540] netlink: 'syz.4.17': attribute type 4 has an invalid length. [ 40.325333][ T3554] syzkaller0: entered promiscuous mode [ 40.330916][ T3554] syzkaller0: entered allmulticast mode [ 40.352274][ T3554] 0: reclassify loop, rule prio 0, protocol 800 [ 40.359122][ T28] kauditd_printk_skb: 58 callbacks suppressed [ 40.359136][ T28] audit: type=1400 audit(1771308888.765:158): avc: denied { setopt } for pid=3553 comm="syz.1.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 40.425636][ T3560] loop0: detected capacity change from 0 to 512 [ 41.499978][ T28] audit: type=1400 audit(1771308889.085:159): avc: denied { connect } for pid=3556 comm="syz.4.23" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 41.521143][ T28] audit: type=1400 audit(1771308889.085:160): avc: denied { write } for pid=3556 comm="syz.4.23" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 41.535057][ T3560] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.565983][ T28] audit: type=1400 audit(1771308889.935:161): avc: denied { create } for pid=3572 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 41.738352][ T3560] ext4 filesystem being mounted at /6/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 41.854144][ T28] audit: type=1400 audit(1771308890.245:162): avc: denied { create } for pid=3575 comm="syz.3.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 41.862527][ T3560] EXT4-fs error (device loop0): ext4_xattr_block_get:597: inode #15: comm syz.0.24: corrupted xattr block 33: invalid ea_ino [ 41.888752][ T3577] syzkaller0: entered promiscuous mode [ 41.894291][ T3577] syzkaller0: entered allmulticast mode [ 41.903788][ T28] audit: type=1400 audit(1771308890.255:163): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 41.942584][ T28] audit: type=1400 audit(1771308890.265:164): avc: denied { tracepoint } for pid=3559 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 41.963748][ T3560] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop0 ino=15 [ 41.983934][ T28] audit: type=1400 audit(1771308890.265:165): avc: denied { setopt } for pid=3575 comm="syz.3.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 42.005090][ T28] audit: type=1400 audit(1771308890.275:166): avc: denied { add_name } for pid=3559 comm="syz.0.24" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 42.016916][ T3584] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 42.025889][ T3560] EXT4-fs error (device loop0): ext4_xattr_block_get:597: inode #15: comm syz.0.24: corrupted xattr block 33: invalid ea_ino [ 42.053215][ T3585] Zero length message leads to an empty skb [ 42.062280][ T28] audit: type=1400 audit(1771308890.275:167): avc: denied { create } for pid=3559 comm="syz.0.24" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 42.140220][ T3589] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 42.159762][ T3589] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 42.169758][ T3560] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop0 ino=15 [ 42.191154][ T3589] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 42.200171][ T3589] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 42.214285][ T3560] EXT4-fs error (device loop0): ext4_xattr_block_get:597: inode #15: comm syz.0.24: corrupted xattr block 33: invalid ea_ino [ 42.266361][ T3560] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop0 ino=15 [ 42.293768][ T3598] syzkaller0: entered promiscuous mode [ 42.300221][ T3598] syzkaller0: entered allmulticast mode [ 42.407364][ T3605] EXT4-fs error (device loop0): ext4_mb_generate_buddy:1315: group 0, block bitmap and bg descriptor inconsistent: 96 vs 65376 free clusters [ 42.450715][ T3607] syzkaller0: entered promiscuous mode [ 42.456332][ T3607] syzkaller0: entered allmulticast mode [ 42.614120][ T3614] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=none,decodes=none:owns=io+mem [ 42.632146][ T3616] loop4: detected capacity change from 0 to 512 [ 42.678578][ T3616] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 42.708561][ T3616] ext4 filesystem being mounted at /12/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 42.787870][ T3616] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #15: comm syz.4.38: corrupted xattr block 33: invalid ea_ino [ 42.804706][ T3616] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=15 [ 42.823869][ T3616] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #15: comm syz.4.38: corrupted xattr block 33: invalid ea_ino [ 42.845357][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.867428][ T3625] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1315: group 0, block bitmap and bg descriptor inconsistent: 96 vs 65376 free clusters [ 42.890574][ T3616] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=15 [ 42.917152][ T3616] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #15: comm syz.4.38: corrupted xattr block 33: invalid ea_ino [ 42.930930][ T3616] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=15 [ 42.959190][ T50] nci: nci_rsp_packet: unknown rsp opcode 0xc02 [ 42.977161][ T3634] syzkaller0: entered promiscuous mode [ 42.984768][ T3634] syzkaller0: entered allmulticast mode [ 43.007307][ T3324] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.070569][ T3637] loop4: detected capacity change from 0 to 164 [ 43.125523][ T3637] A link change request failed with some changes committed already. Interface geneve0 may have been left with an inconsistent configuration, please check. [ 43.357237][ T3643] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 43.366880][ T3643] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 43.393722][ T3643] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 43.411552][ T3643] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 43.631003][ T3650] : port 1(gretap0) entered blocking state [ 43.644251][ T3650] : port 1(gretap0) entered disabled state [ 43.654228][ T3650] gretap0: entered allmulticast mode [ 43.665230][ T3650] gretap0: entered promiscuous mode [ 44.181391][ T3656] loop0: detected capacity change from 0 to 256 [ 44.453977][ T3656] FAT-fs (loop0): codepage cp862 not found [ 44.744964][ T3643] syz.4.44 (3643) used greatest stack depth: 9992 bytes left [ 44.755560][ T3663] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 44.763086][ T3663] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 44.781532][ T3663] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 44.794661][ T3663] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 44.817883][ T3665] loop4: detected capacity change from 0 to 512 [ 44.845741][ T3662] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 44.855579][ T3662] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 44.866272][ T3665] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 44.881466][ T3662] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 44.891364][ T3662] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 44.898770][ T3665] ext4 filesystem being mounted at /15/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 44.982935][ T3665] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #15: comm syz.4.51: corrupted xattr block 33: invalid ea_ino [ 45.009670][ T3665] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=15 [ 45.063766][ T3665] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #15: comm syz.4.51: corrupted xattr block 33: invalid ea_ino [ 45.102286][ T3665] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=15 [ 45.204189][ T3665] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #15: comm syz.4.51: corrupted xattr block 33: invalid ea_ino [ 45.256060][ T3665] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=15 [ 45.351098][ T3690] netlink: 96 bytes leftover after parsing attributes in process `syz.0.54'. [ 45.396904][ T3690] netlink: 'syz.0.54': attribute type 9 has an invalid length. [ 45.521065][ T3665] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1315: group 0, block bitmap and bg descriptor inconsistent: 96 vs 65376 free clusters [ 45.696882][ T3694] loop0: detected capacity change from 0 to 1024 [ 45.730348][ T3694] EXT4-fs: Ignoring removed orlov option [ 45.784772][ T3324] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 45.802314][ T3694] EXT4-fs (loop0): stripe (133) is not aligned with cluster size (16), stripe is disabled [ 45.856857][ T3694] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 45.891479][ T3628] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 45.927692][ T3701] loop1: detected capacity change from 0 to 512 [ 45.959026][ T3702] : port 1(gretap0) entered blocking state [ 45.968396][ T3694] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 45.984716][ T3702] : port 1(gretap0) entered disabled state [ 45.990765][ T3702] gretap0: entered allmulticast mode [ 46.020185][ T3701] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 46.032457][ T3702] gretap0: entered promiscuous mode [ 46.041195][ T3701] ext4 filesystem being mounted at /11/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 46.114317][ T3701] EXT4-fs error (device loop1): ext4_xattr_block_get:597: inode #15: comm syz.1.57: corrupted xattr block 33: invalid ea_ino [ 46.127691][ T3701] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop1 ino=15 [ 46.140122][ T3701] EXT4-fs error (device loop1): ext4_xattr_block_get:597: inode #15: comm syz.1.57: corrupted xattr block 33: invalid ea_ino [ 46.154155][ T3701] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop1 ino=15 [ 46.165685][ T3701] EXT4-fs error (device loop1): ext4_xattr_block_get:597: inode #15: comm syz.1.57: corrupted xattr block 33: invalid ea_ino [ 46.167328][ T3706] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1315: group 0, block bitmap and bg descriptor inconsistent: 96 vs 65376 free clusters [ 46.218798][ T3701] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop1 ino=15 [ 46.285738][ T3713] loop4: detected capacity change from 0 to 256 [ 46.307826][ T3711] loop0: detected capacity change from 0 to 1024 [ 46.315088][ T3713] FAT-fs (loop4): Directory bread(block 1285) failed [ 46.335299][ T28] kauditd_printk_skb: 16 callbacks suppressed [ 46.335312][ T28] audit: type=1400 audit(1771308894.755:184): avc: denied { write } for pid=3712 comm="syz.4.60" name="001" dev="devtmpfs" ino=168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 46.339698][ T3711] EXT4-fs: Ignoring removed orlov option [ 46.373633][ T3317] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.384935][ T3713] FAT-fs (loop4): Directory bread(block 1285) failed [ 46.391738][ T3713] FAT-fs (loop4): Directory bread(block 1285) failed [ 46.408671][ T3711] EXT4-fs (loop0): stripe (2) is not aligned with cluster size (16), stripe is disabled [ 46.424293][ T3713] FAT-fs (loop4): Directory bread(block 1285) failed [ 46.440961][ T3713] FAT-fs (loop4): Directory bread(block 1285) failed [ 46.451745][ T3711] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 46.464638][ T3713] FAT-fs (loop4): Directory bread(block 1285) failed [ 46.475569][ T3715] netlink: 96 bytes leftover after parsing attributes in process `syz.1.61'. [ 46.494463][ T3713] FAT-fs (loop4): FAT read failed (blocknr 1281) [ 46.510222][ T3713] FAT-fs (loop4): Directory bread(block 1285) failed [ 46.539638][ T28] audit: type=1400 audit(1771308894.945:185): avc: denied { ioctl } for pid=3710 comm="syz.0.59" path="socket:[5777]" dev="sockfs" ino=5777 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 46.571898][ T3715] netlink: 'syz.1.61': attribute type 9 has an invalid length. [ 46.663727][ T3324] FAT-fs (loop4): Directory bread(block 1285) failed [ 46.670610][ T28] audit: type=1400 audit(1771308894.945:186): avc: denied { read write } for pid=3710 comm="syz.0.59" name="file1" dev="loop0" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 46.718938][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.733672][ T28] audit: type=1400 audit(1771308894.945:187): avc: denied { open } for pid=3710 comm="syz.0.59" path="/14/file1/file1" dev="loop0" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 46.786965][ T28] audit: type=1400 audit(1771308895.055:188): avc: denied { mounton } for pid=3712 comm="syz.4.60" path="/proc/52/task" dev="proc" ino=4708 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 46.827774][ T3725] loop0: detected capacity change from 0 to 128 [ 46.866799][ T3729] loop1: detected capacity change from 0 to 128 [ 46.884121][ T28] audit: type=1400 audit(1771308895.195:189): avc: denied { create } for pid=3722 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 46.984618][ T3734] loop2: detected capacity change from 0 to 164 [ 46.987333][ T50] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.008782][ T28] audit: type=1400 audit(1771308895.425:190): avc: denied { mount } for pid=3733 comm="syz.2.68" name="/" dev="hugetlbfs" ino=5803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 47.045098][ T3734] A link change request failed with some changes committed already. Interface geneve0 may have been left with an inconsistent configuration, please check. [ 47.134168][ T50] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.223341][ T50] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.239482][ T3745] loop2: detected capacity change from 0 to 256 [ 47.309366][ T3745] FAT-fs (loop2): Directory bread(block 1285) failed [ 47.319759][ T50] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.366076][ T3745] FAT-fs (loop2): Directory bread(block 1285) failed [ 47.391012][ T3745] FAT-fs (loop2): Directory bread(block 1285) failed [ 47.410209][ T3745] FAT-fs (loop2): Directory bread(block 1285) failed [ 47.453275][ T3751] FAT-fs (loop2): Directory bread(block 1285) failed [ 47.465473][ T3745] FAT-fs (loop2): Directory bread(block 1285) failed [ 47.472559][ T3745] FAT-fs (loop2): FAT read failed (blocknr 1281) [ 47.479430][ T3745] FAT-fs (loop2): Directory bread(block 1285) failed [ 47.515972][ T3319] FAT-fs (loop2): Directory bread(block 1285) failed [ 47.528447][ T50] bridge_slave_1: left allmulticast mode [ 47.594426][ T50] bridge_slave_1: left promiscuous mode [ 47.600429][ T50] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.609058][ T50] bridge_slave_0: left allmulticast mode [ 47.615070][ T50] bridge_slave_0: left promiscuous mode [ 47.620872][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.636950][ T50] gretap0: left allmulticast mode [ 47.655812][ T50] gretap0: left promiscuous mode [ 47.665264][ T50] : port 1(gretap0) entered disabled state [ 47.927179][ T3754] loop0: detected capacity change from 0 to 512 [ 47.979084][ T50] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 47.989791][ T50] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 47.999893][ T50] bond0 (unregistering): Released all slaves [ 48.015827][ T3754] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 48.056171][ T3754] ext4 filesystem being mounted at /16/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 48.078911][ T50] hsr_slave_0: left promiscuous mode [ 48.084756][ T50] hsr_slave_1: left promiscuous mode [ 48.104254][ T50] veth1_macvtap: left promiscuous mode [ 48.109840][ T50] veth0_macvtap: left promiscuous mode [ 48.123094][ T3763] EXT4-fs error (device loop0): ext4_mb_generate_buddy:1315: group 0, block bitmap and bg descriptor inconsistent: 96 vs 65376 free clusters [ 48.124271][ T50] veth1_vlan: left promiscuous mode [ 48.142817][ T50] veth0_vlan: left promiscuous mode [ 48.478027][ T50] team0 (unregistering): Port device team_slave_1 removed [ 48.541816][ T3780] Unable to read rock-ridge attributes [ 48.550835][ T3780] Unable to read rock-ridge attributes [ 48.557932][ T3780] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 48.566283][ T28] audit: type=1400 audit(1771308896.965:191): avc: denied { mount } for pid=3768 comm="syz.1.75" name="/" dev="loop1" ino=1792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 48.607485][ T50] team0 (unregistering): Port device team_slave_0 removed [ 48.931559][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 48.970056][ T3740] chnl_net:caif_netlink_parms(): no params data found [ 49.015424][ T28] audit: type=1400 audit(1771308897.425:192): avc: denied { perfmon } for pid=3790 comm="syz.0.78" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 49.081783][ T3740] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.094167][ T28] audit: type=1400 audit(1771308897.455:193): avc: denied { bpf } for pid=3790 comm="syz.0.78" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 49.124191][ T3740] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.153435][ T3740] bridge_slave_0: entered allmulticast mode [ 49.380720][ T3740] bridge_slave_0: entered promiscuous mode [ 49.387692][ T3740] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.394888][ T3740] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.402045][ T3740] bridge_slave_1: entered allmulticast mode [ 49.614612][ T3740] bridge_slave_1: entered promiscuous mode [ 50.363238][ T3740] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.488077][ T3824] set_capacity_and_notify: 1 callbacks suppressed [ 50.488106][ T3824] loop0: detected capacity change from 0 to 256 [ 50.667528][ T3740] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.680751][ T3824] FAT-fs (loop0): codepage cp862 not found [ 50.803724][ T3829] loop1: detected capacity change from 0 to 1024 [ 50.850782][ T3829] EXT4-fs: Ignoring removed orlov option [ 50.906206][ T3829] EXT4-fs (loop1): stripe (2) is not aligned with cluster size (16), stripe is disabled [ 50.920714][ T50] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 50.935743][ T3829] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 50.959282][ T3740] team0: Port device team_slave_0 added [ 51.051119][ T3740] team0: Port device team_slave_1 added [ 51.098016][ T50] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 51.148047][ T3837] loop0: detected capacity change from 0 to 1024 [ 51.168618][ T3317] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.188929][ T3837] EXT4-fs: Ignoring removed orlov option [ 51.214346][ T3837] EXT4-fs (loop0): stripe (133) is not aligned with cluster size (16), stripe is disabled [ 51.229646][ T3839] loop1: detected capacity change from 0 to 128 [ 51.274356][ T50] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 51.277869][ T3837] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 51.301657][ T3837] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.301715][ T3740] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 51.318081][ T3740] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 51.344725][ T3740] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 51.367724][ T3740] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 51.377949][ T3740] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 51.406834][ T3740] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 51.429044][ T50] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 51.458671][ T3836] netlink: 'syz.0.84': attribute type 4 has an invalid length. [ 51.496401][ T3740] hsr_slave_0: entered promiscuous mode [ 51.502697][ T3740] hsr_slave_1: entered promiscuous mode [ 51.508835][ T3740] debugfs: 'hsr0' already exists in 'hsr' [ 51.514885][ T3740] Cannot create hsr debugfs directory [ 51.631083][ T3782] chnl_net:caif_netlink_parms(): no params data found [ 51.656291][ T3855] loop0: detected capacity change from 0 to 128 [ 51.822517][ T3782] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.842078][ T3782] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.849544][ T3782] bridge_slave_0: entered allmulticast mode [ 51.862699][ T3782] bridge_slave_0: entered promiscuous mode [ 51.894510][ T3782] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.904146][ T3782] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.911687][ T3782] bridge_slave_1: entered allmulticast mode [ 51.946394][ T3782] bridge_slave_1: entered promiscuous mode [ 52.020407][ T36] ================================================================== [ 52.028562][ T36] BUG: KCSAN: data-race in copy_folio_from_iter_atomic / copy_folio_from_iter_atomic [ 52.038073][ T36] [ 52.040422][ T36] write to 0xffff8881276ae225 of 2 bytes by task 3865 on cpu 0: [ 52.048077][ T36] copy_folio_from_iter_atomic+0x75f/0x1170 [ 52.054018][ T36] generic_perform_write+0x2c1/0x490 [ 52.059349][ T36] __generic_file_write_iter+0x9e/0x120 [ 52.064952][ T36] generic_file_write_iter+0x8d/0x310 [ 52.070366][ T36] iter_file_splice_write+0x6bc/0xa80 [ 52.075789][ T36] direct_splice_actor+0x156/0x2a0 [ 52.080945][ T36] splice_direct_to_actor+0x311/0x670 [ 52.086538][ T36] do_splice_direct+0x119/0x1a0 [ 52.091434][ T36] do_sendfile+0x382/0x650 [ 52.095874][ T36] __x64_sys_sendfile64+0x105/0x150 [ 52.101132][ T36] x64_sys_call+0x2dc4/0x3020 [ 52.105847][ T36] do_syscall_64+0x12c/0x370 [ 52.110480][ T36] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 52.116576][ T36] [ 52.118938][ T36] read to 0xffff8881276ae200 of 512 bytes by task 36 on cpu 1: [ 52.122056][ T50] bridge_slave_1: left allmulticast mode [ 52.126942][ T36] copy_folio_from_iter_atomic+0x75f/0x1170 [ 52.126984][ T36] generic_perform_write+0x2c1/0x490 [ 52.133364][ T50] bridge_slave_1: left promiscuous mode [ 52.138537][ T36] shmem_file_write_iter+0xc5/0xf0 [ 52.138571][ T36] lo_rw_aio+0x67d/0x730 [ 52.158933][ T36] loop_process_work+0x56c/0xac0 [ 52.163905][ T36] loop_workfn+0x31/0x40 [ 52.167867][ T50] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.168185][ T36] process_scheduled_works+0x4de/0x9e0 [ 52.180740][ T36] worker_thread+0x581/0x770 [ 52.185385][ T36] kthread+0x22a/0x280 [ 52.189491][ T36] ret_from_fork+0x150/0x360 [ 52.194123][ T36] ret_from_fork_asm+0x1a/0x30 [ 52.198931][ T36] [ 52.201281][ T36] Reported by Kernel Concurrency Sanitizer on: [ 52.207489][ T36] CPU: 1 UID: 0 PID: 36 Comm: kworker/u8:2 Not tainted syzkaller #0 PREEMPT(full) SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 52.217084][ T36] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 52.227310][ T36] Workqueue: loop0 loop_workfn [ 52.232214][ T36] ================================================================== [ 52.324259][ T50] bridge_slave_0: left allmulticast mode [ 52.329982][ T50] bridge_slave_0: left promiscuous mode [ 52.367988][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.517383][ T50] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 52.527272][ T50] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 52.537004][ T50] bond0 (unregistering): Released all slaves [ 52.545693][ T3782] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.617400][ T50] hsr_slave_0: left promiscuous mode [ 52.623521][ T50] hsr_slave_1: left promiscuous mode [ 52.629910][ T50] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 52.637612][ T50] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 52.645392][ T50] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 52.652856][ T50] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 52.663883][ T50] veth1_macvtap: left promiscuous mode [ 52.669611][ T50] veth0_macvtap: left promiscuous mode [ 52.676985][ T50] veth1_vlan: left promiscuous mode [ 52.682226][ T50] veth0_vlan: left promiscuous mode [ 52.804292][ T50] team0 (unregistering): Port device team_slave_1 removed [ 52.814685][ T50] team0 (unregistering): Port device team_slave_0 removed [ 53.142062][ T50] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 53.197674][ T50] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 53.247930][ T50] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 53.287254][ T50] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 53.371814][ T50] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 53.417273][ T50] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 53.467982][ T50] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 53.517581][ T50] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 53.605023][ T50] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 53.657147][ T50] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 53.696917][ T50] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 53.747743][ T50] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 53.813601][ T50] bridge_slave_1: left allmulticast mode [ 53.819337][ T50] bridge_slave_1: left promiscuous mode [ 53.825702][ T50] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.833874][ T50] bridge_slave_0: left allmulticast mode [ 53.839639][ T50] bridge_slave_0: left promiscuous mode [ 53.845397][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.854020][ T50] gretap0: left allmulticast mode [ 53.859241][ T50] gretap0: left promiscuous mode [ 53.864449][ T50] : port 1(gretap0) entered disabled state [ 53.871617][ T50] bridge_slave_1: left allmulticast mode [ 53.877451][ T50] bridge_slave_1: left promiscuous mode [ 53.883151][ T50] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.891455][ T50] bridge_slave_0: left allmulticast mode [ 53.898448][ T50] bridge_slave_0: left promiscuous mode [ 53.904249][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.912600][ T50] bridge_slave_1: left allmulticast mode [ 53.918362][ T50] bridge_slave_1: left promiscuous mode [ 53.924322][ T50] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.932184][ T50] bridge_slave_0: left allmulticast mode [ 53.937956][ T50] bridge_slave_0: left promiscuous mode [ 53.943612][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.952267][ T50] bridge_slave_1: left allmulticast mode [ 53.958061][ T50] bridge_slave_1: left promiscuous mode [ 53.963783][ T50] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.971738][ T50] bridge_slave_0: left allmulticast mode [ 53.977518][ T50] bridge_slave_0: left promiscuous mode [ 53.983277][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.992065][ T50] bridge_slave_1: left allmulticast mode [ 53.997787][ T50] bridge_slave_1: left promiscuous mode [ 54.003450][ T50] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.011309][ T50] bridge_slave_0: left allmulticast mode [ 54.017035][ T50] bridge_slave_0: left promiscuous mode [ 54.022664][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.030916][ T50] gretap0: left allmulticast mode [ 54.036026][ T50] gretap0: left promiscuous mode [ 54.041108][ T50] : port 1(gretap0) entered disabled state [ 54.226922][ T50] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 54.237038][ T50] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 54.247151][ T50] bond0 (unregistering): Released all slaves [ 54.326130][ T50] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 54.335903][ T50] bond0 (unregistering): Released all slaves [ 54.386565][ T50] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 54.396476][ T50] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 54.405685][ T50] bond0 (unregistering): Released all slaves [ 54.496319][ T50] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 54.506185][ T50] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 54.517987][ T50] bond0 (unregistering): Released all slaves [ 54.699021][ T50] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 54.708997][ T50] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 54.718553][ T50] bond0 (unregistering): Released all slaves [ 54.777076][ T50] hsr_slave_0: left promiscuous mode [ 54.782757][ T50] hsr_slave_1: left promiscuous mode [ 54.791784][ T50] hsr_slave_0: left promiscuous mode [ 54.798046][ T50] hsr_slave_1: left promiscuous mode [ 54.803619][ T50] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 54.811789][ T50] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 54.821401][ T50] hsr_slave_0: left promiscuous mode [ 54.827431][ T50] hsr_slave_1: left promiscuous mode [ 54.835357][ T50] hsr_slave_0: left promiscuous mode [ 54.840919][ T50] hsr_slave_1: left promiscuous mode [ 54.855896][ T50] veth1_macvtap: left promiscuous mode [ 54.861420][ T50] veth0_macvtap: left promiscuous mode [ 54.867320][ T50] veth1_vlan: left promiscuous mode [ 54.872584][ T50] veth0_vlan: left promiscuous mode [ 54.878415][ T50] veth1_macvtap: left promiscuous mode [ 54.883950][ T50] veth0_macvtap: left promiscuous mode [ 54.890050][ T50] veth1_vlan: left promiscuous mode [ 54.896060][ T50] veth0_vlan: left promiscuous mode [ 54.901961][ T50] veth1_macvtap: left promiscuous mode [ 54.907885][ T50] veth0_macvtap: left promiscuous mode [ 54.913483][ T50] veth1_vlan: left promiscuous mode [ 54.918774][ T50] veth0_vlan: left promiscuous mode [ 55.051966][ T50] team0 (unregistering): Port device team_slave_1 removed [ 55.061528][ T50] team0 (unregistering): Port device team_slave_0 removed [ 55.139149][ T50] team0 (unregistering): Port device team_slave_1 removed [ 55.148972][ T50] team0 (unregistering): Port device team_slave_0 removed [ 55.207138][ T50] team0 (unregistering): Port device team_slave_1 removed [ 55.216986][ T50] team0 (unregistering): Port device team_slave_0 removed [ 55.275702][ T50] team0 (unregistering): Port device team_slave_1 removed [ 55.285572][ T50] team0 (unregistering): Port device team_slave_0 removed