last executing test programs: 6.169415894s ago: executing program 1 (id=63): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001d80)={'bond_slave_1\x00', &(0x7f0000001d40)=@ethtool_cmd={0x15, 0x9, 0x3, 0x0, 0x9, 0x0, 0x0, 0xb, 0x80, 0x0, 0x4b59, 0xa, 0x0, 0x0, 0x1}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000000c0)=@bpf_lsm={0x3, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41100, 0x27, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_tables_targets\x00') preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000000)=""/6, 0x6}], 0x1, 0x410, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000180)=0x80, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000040000000181100", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x19000, 0x1000000300) perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xa) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x31, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001300050022bd7000ffdbdf2507000000", @ANYRES32=r6, @ANYBLOB="800800000311000014001a80100004800c000880"], 0x34}, 0x1, 0x0, 0x0, 0x24040010}, 0x20000040) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x2, 0x3, 0x3, 0x1, 0x4, 0x6, 0xffffffffffffffff}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x10}]}, &(0x7f0000000200)='syzkaller\x00', 0x3ff, 0x74, &(0x7f0000000500)=""/116, 0x40f00, 0x10, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000580)=[{0x1, 0x4, 0x6, 0x3}, {0x1, 0x5, 0x6, 0x5}, {0x5, 0x3, 0x9, 0x5}, {0x1, 0x5, 0x7, 0x7}, {0x2, 0x4, 0xb, 0x2}], 0x10, 0xe4d2}, 0x94) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00304, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={&(0x7f0000000000), 0x0, 0x0, 0x0, 0x101, r4}, 0x38) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x8) pselect6(0xa0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x80000000000300, 0x0, 0x0, 0x4, 0x80000000000}, 0x0, &(0x7f0000000100)={0x8, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0) 5.211412591s ago: executing program 1 (id=69): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001d80)={'bond_slave_1\x00', &(0x7f0000001d40)=@ethtool_cmd={0x15, 0x9, 0x3, 0x0, 0x9, 0x0, 0x0, 0xb, 0x80, 0x0, 0x4b59, 0xa, 0x0, 0x0, 0x1}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000000c0)=@bpf_lsm={0x3, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41100, 0x27, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_tables_targets\x00') preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000000)=""/6, 0x6}], 0x1, 0x410, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000180)=0x80, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000040000000181100", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x19000, 0x1000000300) perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xa) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x31, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001300050022bd7000ffdbdf2507000000", @ANYRES32, @ANYBLOB="800800000311000014001a80100004800c000880"], 0x34}, 0x1, 0x0, 0x0, 0x24040010}, 0x20000040) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x2, 0x3, 0x3, 0x1, 0x4, 0x6, 0xffffffffffffffff}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x10}]}, &(0x7f0000000200)='syzkaller\x00', 0x3ff, 0x74, &(0x7f0000000500)=""/116, 0x40f00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000580)=[{0x1, 0x4, 0x6, 0x3}, {0x1, 0x5, 0x6, 0x5}, {0x5, 0x3, 0x9, 0x5}, {0x1, 0x5, 0x7, 0x7}, {0x2, 0x4, 0xb, 0x2}], 0x10, 0xe4d2}, 0x94) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00304, 0x17) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={&(0x7f0000000000), 0x0, 0x0, 0x0, 0x101, r4}, 0x38) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x8) pselect6(0xa0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x80000000000300, 0x0, 0x0, 0x4, 0x80000000000}, 0x0, &(0x7f0000000100)={0x8, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0) 5.164728544s ago: executing program 2 (id=72): setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x1, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000bd500020050000009500000000000000fd46b8bf205bdf98befdb91c2d4c692a71d2986fab4a5c7a86797603a63345279b399d0a05854dd249fb29c5733a5da15635eb4a4bc54f0ec8416a312410958d29835ce6ee71a46d38e7ea78133aa5cac3047b50f028ded627a14b36b4a5f185ca15076bad27577cda8bcf7d5e068648c82c9bd6ec5f92c2b54c09718a12b3749b1ada6f05a20427070b6a34416197391b1c63ecfc50266aaaa5559a1cd81c5a756e163e583636246381c41110b9b298f0306ed2de54e1a89a79a8ae068f4eb6e55dd6a71ea7b468f6a62c25a02d7952b930f65b93"], &(0x7f0000000040)='GPL\x00'}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000500)) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x8024) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x4e20, 0xfffffffe, @empty, 0x8}}}, 0x108) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000280)=0xc9, 0x4) readv(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0x80}}, 0x0) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="500000000206030000000000000000000d0000000c000300686173683a69700005000400000000000900020073797a31000000000c000780080008400000005d05000500020000000500010006"], 0x50}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000740)={0x40, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty=0xfffffffe}}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x8}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x10000047}, 0x4000084) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1c}, 0x1, 0x0, 0x0, 0x20000005}, 0x80) socket$inet6_tcp(0xa, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4d2f02, 0x0) 4.381588963s ago: executing program 0 (id=76): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4110, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0, 0x0, r0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x17440000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3003, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = io_uring_setup(0x650b, &(0x7f0000000180)={0x0, 0x2c3f, 0x0, 0x21, 0xab}) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r7) r8 = socket(0x28, 0x5, 0x0) r9 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r9, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r9, 0x4) connect$vsock_stream(r8, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r10}, &(0x7f0000000000), &(0x7f0000000080)=r7}, 0x20) recvfrom$inet_nvme(r8, 0x0, 0x0, 0x40000002, 0x0, 0x0) setsockopt$sock_attach_bpf(r8, 0x28, 0x32, 0x0, 0x0) close_range(r6, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0xc6d, 0x0, &(0x7f0000000340), 0x0) open(&(0x7f0000000080)='./bus\x00', 0x143862, 0x0) 4.279329248s ago: executing program 1 (id=77): syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, 0x0, 0x10) perf_event_open(0x0, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0xb, 0x7}, 0x4398, 0xa88, 0x8406, 0x5, 0x1, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0xedf2}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x8) gettid() gettid() setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000001200)="006a30989a60e93be81c7f77d1bcbaeea94ce83af7e521019e99aa27cb74bada2a4ed4f5b5ac5061c941523b51a9f9e23f602147950a1d7fb98e611a8c94079a784d4faf6adfe49fd6839511062b1348ce62173f99558239ab4e6f43b2318be94668447b078b54d236972098e295583b2ee153621ea695faa64ec25cd4d0804126ce69307ae227f721247d61c553d2c8ecf8099fe57aff7b3db1866203e6c96f521bc61f4d0700000021064aff1662395ad6e2a229a64c00"/198, 0xc6, 0x4004, &(0x7f0000000140)={0xa, 0x4e23, 0x2027ff, @mcast2, 0x80d2}, 0x1c) getcwd(&(0x7f00000003c0)=""/257, 0x101) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f0000000540)='ext4\x00', &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f00000005c0), 0x1, 0x508, &(0x7f0000000600)="$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") sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000000306010200000000000000000700000a0500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40814) 3.544662004s ago: executing program 3 (id=79): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x10040) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x72}, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x67, 0x0, 0x2, 0x6, 0x0, @rand_addr=0x64010001, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) close(0x3) syz_emit_ethernet(0x6f, &(0x7f0000000240)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x61, 0x67, 0x0, 0x2, 0x6, 0x0, @rand_addr=0x64010001, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2, 0x0, 0x0, 0x5}, {"22999b3e00af1417e4ef0618e57ddf33514b0951b9e880fed728333add4facd8731d7bd8e559ea1fd6f5f849ee5c0f70dbe8d8f4402bdc5c29"}}}}}}, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, 0x0) accept4(r1, 0x0, &(0x7f0000000000), 0x0) 3.150167624s ago: executing program 2 (id=80): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f848140000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, {0xa, 0xfffe, 0x0, @local}}}, 0x32) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) r4 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r4, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x92}}, 0x10004, 0x0, 0x4}}, 0x2e) sendmsg$inet(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000340)="5c00000013006bcd9e3fe3dc4e48aa31086b8703140000001f03000000330000040014000d000a000d0000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x4040844) syz_usb_connect$uac1(0x7, 0xe8, 0x0, &(0x7f0000000640)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x200, 0x9, 0xd, 0x9, 0x20, 0xc}, 0x57, &(0x7f0000000200)={0x5, 0xf, 0x57, 0x5, [@generic={0x10, 0x10, 0x2, "bdc5903c05fb29111e4e30e44d"}, @ssp_cap={0x1c, 0x10, 0xa, 0x9, 0x4, 0x40, 0xff00, 0x8, [0x3f00, 0x0, 0xf0, 0x60]}, @wireless={0xb, 0x10, 0x1, 0x8, 0xd1, 0xbf, 0x2, 0x8001, 0x8}, @ss_container_id={0x14, 0x10, 0x4, 0xa6, "680f988a3bd7b0bf4d738671b87fe329"}, @ext_cap={0x7, 0x10, 0x2, 0xe, 0x2, 0x7, 0xffff}]}, 0x8, [{0x4, &(0x7f0000000080)=@lang_id={0x4, 0x3, 0x3801}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x421}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4}}, {0xdd, &(0x7f00000003c0)=@string={0xdd, 0x3, "acbaf40cfb035fd5d2316d7ac02c32c09d6d826f0716b144d6c106d1f7ed2d26260bb06c2254b6e6586644a773cfd0a0b01a84e8e24e706dc7b8d31bec1420fd36756d5fdf0952a1e078e5d4e87708a7527d897d7f3c075245441c76b9e18b0b25087954f37431d5427f581058475bb3033a3b343dedd45fe31fcb633a9512f0880ad025c029a0a9a490be8dcb1ce461b980c423d7da876ec95bda0dd06ea4eb6f2ab3ab18840ee5ae4d1cafba608a7ef8a9b5fd96859614c3c7322361247b3db1aaf2b97e30c31fe5ac63de2abcb8935465e2d8d324be0671d4a6"}}, {0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x44d}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x43f}}, {0x9, &(0x7f0000000500)=@string={0x9, 0x3, "232ecca18fc183"}}, {0x45, &(0x7f0000000540)=@string={0x45, 0x3, "8679df7dab9c352ec482c6790e1c961105e5156cb4bce048d14ae22d339692951a373b81a8c7b96aa1d83ca55bad6f85fac995d568fab6d0c84a472a8e71c4318064f4"}}]}) 3.007075751s ago: executing program 1 (id=82): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001d80)={'bond_slave_1\x00', &(0x7f0000001d40)=@ethtool_cmd={0x15, 0x9, 0x3, 0x0, 0x9, 0x0, 0x0, 0xb, 0x80, 0x0, 0x4b59, 0xa, 0x0, 0x0, 0x1}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000000c0)=@bpf_lsm={0x3, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41100, 0x27, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_tables_targets\x00') preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000000)=""/6, 0x6}], 0x1, 0x410, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000180)=0x80, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000040000000181100", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x19000, 0x1000000300) perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xa) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x31, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001300050022bd7000ffdbdf2507000000", @ANYRES32=r6, @ANYBLOB="800800000311000014001a80100004800c000880"], 0x34}, 0x1, 0x0, 0x0, 0x24040010}, 0x20000040) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x2, 0x3, 0x3, 0x1, 0x4, 0x6, 0xffffffffffffffff}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x10}]}, &(0x7f0000000200)='syzkaller\x00', 0x3ff, 0x74, &(0x7f0000000500)=""/116, 0x40f00, 0x10, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000580)=[{0x1, 0x4, 0x6, 0x3}, {0x1, 0x5, 0x6, 0x5}, {0x5, 0x3, 0x9, 0x5}, {0x1, 0x5, 0x7, 0x7}, {0x2, 0x4, 0xb, 0x2}], 0x10, 0xe4d2}, 0x94) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00304, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={&(0x7f0000000000), 0x0, 0x0, 0x0, 0x101, r4}, 0x38) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x8) pselect6(0xa0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x80000000000300, 0x0, 0x0, 0x4, 0x80000000000}, 0x0, &(0x7f0000000100)={0x8, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0) 2.476385127s ago: executing program 0 (id=83): socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0xffbe3523, 0x100006, 0xed34, 0x400ff7, 0xb4, "20cde7b23a5cf0b4a5a300000400", 0x1e, 0xdb25}) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="1400000022000b0fd25a806c8c6f94f90124fc60", 0x14}], 0x1}, 0x4000010) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)={{0x14}, [], {0x14}}, 0x28}}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000200000004f1000000000000063000000000000009500059e00020000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xba, &(0x7f000000cf3d)=""/186, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0500000016000000b40000007f00000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000718f1ef38f34db0e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r6}, @generic={0x61, 0x0, 0x0, 0x64}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x5}, 0x94) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r9, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f064eb", @ANYBLOB="0000000000000000280012000c0001007665"], 0x48}, 0x1, 0x0, 0x0, 0x4008001}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_ingress={0xc}]}, 0x30}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@delchain={0x24, 0x66, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {0x9, 0xffe0}, {0xc, 0xffff}, {0xffe0}}}, 0x24}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x18, 0x12, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x400}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@map_val={0x18, 0x0, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3ce6ed39}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000300)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x48, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0xc, 0x0, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r6, r6, r6, r6], 0x0, 0x10, 0x200}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40ccc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1b0c, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r5, 0x300, 0x56, 0x0, &(0x7f0000000140)="cb74445b7d4c0b24676c6c71ae37efcedaf40242309766deb4e793f90040000000000000dbc856cbc664650634231454ca2d8034c4ca29e0d99c3b6615e91835a600c08f989af45438a54981be310aad92ae545b1c96", 0x0, 0x2f00, 0x0, 0xe3, 0x0, &(0x7f0000000980)="ffc4438e5c3081d0e133e812196ec0ed923733aa8b5aba32c8650e7a66d6136853773dfbc6226be13039e230d511f1ac50cc7811aac0400e4c833fedf842ae2918e6fddb550729246fcf4c0a01bc64989ea3985fb362751a83991bd56e761379caa64f6148893ff25f38d5cd6dd695bbf9ca709a9960e0e6b054d5e2239bcb7c0fb2ac66dc4c8f534e439ff20ccaf0d48a98c19c92a3b437a699350f49606d21a403f8c112c46fea5486bf367a854b0f6c1e563b656e4794f6793a08bb3656c391643f6df71d0255054368a938d38503d064da82d5dbf395ad47ed3932669168d324ed", &(0x7f00000007c0), 0x2, 0x0, 0x10000}, 0x50) 2.449377958s ago: executing program 4 (id=84): socket$kcm(0x10, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffd, 0x8, 0x4, 0x80000011, 0x6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}, 0x1, 0x0, 0x0, 0xc000}, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x80000007, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={0x0, 0x2}, 0x10026, 0x10003, 0x1, 0x3, 0x100008, 0x20005, 0x9, 0x0, 0xfffffffc, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x2, 0x7fff7ffc}]}) getsockopt$IP_SET_OP_GET_FNAME(r2, 0x1, 0x53, &(0x7f0000000200)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000300)=0x2c) 2.426840899s ago: executing program 3 (id=85): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000004480)=ANY=[@ANYBLOB="b8aacb8c4fa1febd7695c5551f4b9a79d2d853018f59766bc25bdc6203442d262cf86b5db115237671463f3373d992eeed2cf1dfde4a0466620fd837d3ba767b9c22abd1eb76a949be597edb772379f738312d7e17f2ee517bcdff4c9cb33c1516f9ab9e1031a3f6481547199daf5dde88d46daaa3612efb83a315abbfd300f88b83030ec10380ddf972e8336a591b61f4eef3147599b8ec65d2cea841b48efb7f2660d95289f61cb7892f2b45fb80b0525cce67b83b87793ca605369e2a1eeab3", @ANYRES32=r0, @ANYBLOB="bcb426d0c3b3d794135f039b158bdb41a72a72f2c4", @ANYBLOB, @ANYRESDEC=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = io_uring_setup(0x684d, 0x0) r3 = fsopen(&(0x7f00000001c0)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=ANY=[@ANYBLOB="09000000040000000400000007"], 0x48) fchdir(0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000000)='./file0\x00', r4}, 0x18) close_range(r2, 0xffffffffffffffff, 0x0) r5 = getpid() r6 = inotify_init1(0x0) r7 = inotify_add_watch(r6, &(0x7f00000002c0)='./file0\x00', 0x5c) r8 = syz_pidfd_open(r5, 0x0) setns(r8, 0x24020000) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x80) syz_emit_ethernet(0x4e, &(0x7f0000000480)=ANY=[@ANYBLOB="bbbbbbbbbbaa86dd60000001001800ffff010000000000000000000000000001fe800000000000000000000000000000000200000000000004010000010007080000000100860a00000000000000"], 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="b40500000040000000000000008200000000004d00", @ANYRES8=r8, @ANYRESHEX=r2, @ANYRESDEC=r7, @ANYRESHEX=r0], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xba, &(0x7f000000cf3d)=""/186, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x9}, 0x10}, 0x94) timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000040)={0x0, 0x0, 0xfd8b, 0x4, r5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) mmap$perf(&(0x7f000040a000/0x1000)=nil, 0x1000, 0x9, 0x50, 0xffffffffffffffff, 0x8000000000000001) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @private1, @dev={0xfe, 0x80, '\x00', 0x32}, 0x8, 0x2, 0x9, 0x400, 0x5, 0x810c0080}) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYRES16=0x0], 0xfd, 0x2c7, &(0x7f0000000b80)="$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") 2.328241514s ago: executing program 2 (id=86): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x100}, 0x204, 0x37, 0x43a1bd78, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r2 = openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount_setattr(r2, 0x0, 0x1100, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_read_part_table(0x5c2, &(0x7f0000000000)="$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") r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8264, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10320, 0x0, 0x8, 0x0, 0x75eef597, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f00000003c0)=ANY=[]) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x9a, &(0x7f0000000080)={@link_local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010700", 0x64, 0x11, 0x0, @private1, @mcast2, {[], {0xfffc, 0xe22, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "676e19d8ff667305eb6922a1cc7960acf1e7de0bc37bc4a0c887b6128c7a238b", "f376fc15f6d380fdbdae8ffc726884b1", {"2a6d860361d3cc0637b357b741c208a1", "736edde399d3d615879145e25db4c3b1"}}}}}}}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$inet(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0x1}], 0x1, 0x0, 0x0, 0x241}, 0x4000855) 1.891951806s ago: executing program 1 (id=87): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000bdfb0c10f00", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000400)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x140401, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x7, 0x5}, 0x4, 0x6, 0x10000, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f0000000100)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e20, 0x4, @mcast2, 0x7da3}}, 0x24) r3 = syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x717f, 0x100, 0x14, 0x7f}, &(0x7f0000000140)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) unshare(0x20000) syz_io_uring_submit(r4, r5, &(0x7f00000003c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x4004, @fd=r2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}) io_uring_enter(r3, 0x3516, 0x0, 0x0, 0x0, 0x0) r6 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r6, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[], 0x10b8}, 0x20008004) syz_io_uring_setup(0x5c4, &(0x7f0000001d40)={0x0, 0x1001, 0x800}, &(0x7f00000001c0)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r5, &(0x7f00000001c0)=@IORING_OP_FADVISE={0x18, 0xc, 0x0, @fd_index=0x3, 0x3ff, 0x0, 0x9, 0x3, 0x1, {0x0, r8}}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r9, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r10, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r9, &(0x7f00000000c0), 0x10106, 0x2, 0x0) quotactl_fd$Q_SETQUOTA(r0, 0xffffffff80000802, 0xffffffffffffffff, &(0x7f00000002c0)={0x537, 0x4, 0x677, 0x3, 0x9, 0x1ffe0, 0x0, 0x1, 0x9}) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r11 = syz_open_pts(0xffffffffffffffff, 0x200000) ioctl$TIOCGSOFTCAR(r11, 0x5419, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xe0}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x2, 0x3}, {0x3, 0x3, 0x6, 0xa, 0xa, 0xfff8, 0x50}, {0x7, 0x1, 0xb, 0x2, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {0x7, 0x0, 0x0, 0x9}, {0x7, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff1, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.891427676s ago: executing program 3 (id=88): r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xa, 0x8}, 0x6025, 0x4005, 0xb, 0x3, 0x4000000000000002, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)}, 0x20) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r1}, &(0x7f0000000200), &(0x7f0000000600)=r2}, 0x20) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./bus\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x376, &(0x7f0000000280)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105142, 0x2c) r4 = gettid() timer_create(0x0, &(0x7f00000001c0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r6, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000900)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRESOCT=r0, @ANYBLOB="010062620006000000800400008004000080d72768740f2853dd6b839e92f38ca58a005966b7674d41fe3799a61d8d83df064bd67acbabc560c7a9d90bdaa4ed8add185c1c95170d9aa521af160e2aca42925792f3a503c36c17e766d41d721badb81816f611f8506e6243e6d9a4"], 0x28}, 0x1, 0x0, 0x0, 0x4040001}, 0x2400c000) sendmsg$NL80211_CMD_SET_REG(r6, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20002}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r7, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xb}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xe}]}, 0x24}, 0x1, 0x0, 0x0, 0x60}, 0x4008880) timer_settime(r5, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x86, 0x2, 0x0, 0x0, 0xfffffffc) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r8, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r8, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) madvise(&(0x7f0000524000/0x2000)=nil, 0x2000, 0x9) sendfile(r3, r3, 0x0, 0x252c000000000000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x8) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x80082, 0x0) write$vga_arbiter(r9, &(0x7f0000000840)=ANY=[@ANYBLOB="6c6f636b20696f2b6d656d005df10a7c8246cd546b5cdd55e8477016069238974eef81bea4974788b2d7a4ab64358b90bd18e17153d2760800000000000000c24c0308b3b5b51ffa035795a1b12d3823b870a81e5fffc5e860a5378056ccd7bf1f6cda8c065c06a49c35f4b177fe10c2fb890b3b51d3a6c5d9ad6acf3f3ba2da21f8df542561023bd9e92aa69a2c741a35930e9c057a06d1b135412c089ba48116b7e52e3b64960a02d52e"], 0xc) write$vga_arbiter(r9, &(0x7f00000006c0)=ANY=[@ANYBLOB="64654a30fe132e3e1e3c43c997"], 0x3c) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r0, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = shmget(0x1, 0x400000, 0xe01, &(0x7f000013e000/0x400000)=nil) shmctl$IPC_RMID(r11, 0x0) sendmsg$nl_route(r10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x407f8, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x5, 0x4}, 0x120, 0x10000, 0x33f8, 0x1, 0xb, 0x20007, 0x8, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, r0, 0x0) 1.743886633s ago: executing program 0 (id=89): setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x1, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000bd500020050000009500000000000000fd46b8bf205bdf98befdb91c2d4c692a71d2986fab4a5c7a86797603a63345279b399d0a05854dd249fb29c5733a5da15635eb4a4bc54f0ec8416a312410958d29835ce6ee71a46d38e7ea78133aa5cac3047b50f028ded627a14b36b4a5f185ca15076bad27577cda8bcf7d5e068648c82c9bd6ec5f92c2b54c09718a12b3749b1ada6f05a20427070b6a34416197391b1c63ecfc50266aaaa5559a1cd81c5a756e163e583636246381c41110b9b298f0306ed2de54e1a89a79a8ae068f4eb6e55dd6a71ea7b468f6a62c25a02d7952b930f65b93"], &(0x7f0000000040)='GPL\x00'}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000500)) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x8024) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x4e20, 0xfffffffe, @empty, 0x8}}}, 0x108) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000280)=0xc9, 0x4) readv(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0x80}}, 0x0) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000740)={0x40, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty=0xfffffffe}}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x8}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x10000047}, 0x4000084) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1c}, 0x1, 0x0, 0x0, 0x20000005}, 0x80) socket$inet6_tcp(0xa, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4d2f02, 0x0) 1.708750115s ago: executing program 0 (id=90): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x100}, 0x204, 0x37, 0x43a1bd78, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r3 = openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount_setattr(r3, 0x0, 0x1100, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_read_part_table(0x5c2, &(0x7f0000000000)="$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") r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8264, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10320, 0x0, 0x8, 0x0, 0x75eef597, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r8, 0xc008240a, &(0x7f00000003c0)=ANY=[]) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r9 = socket(0x10, 0x3, 0x0) r10 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r10, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) bind$inet6(r10, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x9a, &(0x7f0000000080)={@link_local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010700", 0x64, 0x11, 0x0, @private1, @mcast2, {[], {0xfffc, 0xe22, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "676e19d8ff667305eb6922a1cc7960acf1e7de0bc37bc4a0c887b6128c7a238b", "f376fc15f6d380fdbdae8ffc726884b1", {"2a6d860361d3cc0637b357b741c208a1", "736edde399d3d615879145e25db4c3b1"}}}}}}}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r12, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0xea, 0x0, 0xfffd, 0x0, 0x9, 0x5}, {0x12, 0x2, 0x0, 0x401, 0x8001, 0x1400}, 0xa5, 0x5, 0x10000000}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}}, 0x44080) sendmsg$nl_route_sched(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000ac0)=@newqdisc={0x30, 0x24, 0xd0f, 0x70bd2c, 0x25dfdbfb, {0x60, 0x0, 0x0, r12, {0x0, 0xc}, {0xffe0, 0xa}, {0x1, 0x10}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4010}, 0xc010) sendmsg$inet(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0x1}], 0x1, 0x0, 0x0, 0x241}, 0x4000855) 1.534077344s ago: executing program 4 (id=91): setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x1, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000bd500020050000009500000000000000fd46b8bf205bdf98befdb91c2d4c692a71d2986fab4a5c7a86797603a63345279b399d0a05854dd249fb29c5733a5da15635eb4a4bc54f0ec8416a312410958d29835ce6ee71a46d38e7ea78133aa5cac3047b50f028ded627a14b36b4a5f185ca15076bad27577cda8bcf7d5e068648c82c9bd6ec5f92c2b54c09718a12b3749b1ada6f05a20427070b6a34416197391b1c63ecfc50266aaaa5559a1cd81c5a756e163e583636246381c41110b9b298f0306ed2de54e1a89a79a8ae068f4eb6e55dd6a71ea7b468f6a62c25a02d7952b930f65b93"], &(0x7f0000000040)='GPL\x00'}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000500)) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x8024) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x4e20, 0xfffffffe, @empty, 0x8}}}, 0x108) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000280)=0xc9, 0x4) readv(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0x80}}, 0x0) r3 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000740)={0x40, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty=0xfffffffe}}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x8}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x10000047}, 0x4000084) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1c}, 0x1, 0x0, 0x0, 0x20000005}, 0x80) socket$inet6_tcp(0xa, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4d2f02, 0x0) 1.489638416s ago: executing program 2 (id=92): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000180)=ANY=[], 0x8) connect$inet6(r0, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc/1/\x00\x82q\xee\xe5\xa0\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto, @typedef={0x0, 0x0, 0x0, 0x10, 0x4}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2a, '\x00', 0x0, r1, 0x4, 0x2}, 0x50) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000000000000000000000000000007fffffff0001000000000071273fa79d93014b8e3381b6"], 0xfdef) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000d00)='./file1\x00', 0x10010c6, &(0x7f0000000200)={[{@orlov}, {@quota}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@nombcache}, {@init_itable}, {@errors_remount}]}, 0x1, 0x569, &(0x7f00000002c0)="$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") perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x1000, 0x20da, 0x0, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$IOC_WATCH_QUEUE_SET_SIZE(0xffffffffffffffff, 0x5760, 0x15) timer_create(0x0, 0x0, &(0x7f0000bbdffc)) socket$inet6(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb9200a4831371400000069bd6efb2502eaf60d000300020400bf050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x6}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendto$inet6(r0, &(0x7f0000000300), 0x16, 0x3b00, 0x0, 0xfffffffffffffdfd) 1.343736673s ago: executing program 4 (id=93): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001d80)={'bond_slave_1\x00', &(0x7f0000001d40)=@ethtool_cmd={0x15, 0x9, 0x3, 0x0, 0x9, 0x0, 0x0, 0xb, 0x80, 0x0, 0x4b59, 0xa, 0x0, 0x0, 0x1}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000000c0)=@bpf_lsm={0x3, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41100, 0x27, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_tables_targets\x00') preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000000)=""/6, 0x6}], 0x1, 0x410, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000180)=0x80, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000040000000181100", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x19000, 0x1000000300) perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001300050022bd7000ffdbdf2507000000", @ANYRES32, @ANYBLOB="800800000311000014001a80100004800c000880"], 0x34}, 0x1, 0x0, 0x0, 0x24040010}, 0x20000040) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x2, 0x3, 0x3, 0x1, 0x4, 0x6, 0xffffffffffffffff}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x10}]}, &(0x7f0000000200)='syzkaller\x00', 0x3ff, 0x74, &(0x7f0000000500)=""/116, 0x40f00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000580)=[{0x1, 0x4, 0x6, 0x3}, {0x1, 0x5, 0x6, 0x5}, {0x5, 0x3, 0x9, 0x5}, {0x1, 0x5, 0x7, 0x7}, {0x2, 0x4, 0xb, 0x2}], 0x10, 0xe4d2}, 0x94) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00304, 0x17) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={&(0x7f0000000000), 0x0, 0x0, 0x0, 0x101, r4}, 0x38) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x8) pselect6(0xa0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x80000000000300, 0x0, 0x0, 0x4, 0x80000000000}, 0x0, &(0x7f0000000100)={0x8, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0) 1.279797196s ago: executing program 0 (id=94): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2012, 0x32, 0x7, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/32], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newsa={0x194, 0x10, 0x1, 0x70bd2d, 0x0, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0xecdf, 0x0, 0x2200, 0xa, 0x0, 0x0, 0x73}, {@in=@broadcast, 0x0, 0x32}, @in=@multicast1, {0x7fffffff, 0x2}, {0x8, 0x400800, 0x0, 0x400}, {0x0, 0x0, 0x2000}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x1c}, [@algo_crypt={0x58, 0x2, {{'cbc(aes)\x00'}, 0x80, "e0fad30397b1b667853b88000000074f"}}, @algo_auth_trunc={0x4c, 0x14, {{'hmac(sha256)\x00'}, 0x0, 0xc0}}]}, 0x194}}, 0x4050) 917.502175ms ago: executing program 3 (id=95): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x100}, 0x204, 0x37, 0x43a1bd78, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r3 = openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount_setattr(r3, 0x0, 0x1100, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_read_part_table(0x5c2, &(0x7f0000000000)="$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") r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8264, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10320, 0x0, 0x8, 0x0, 0x75eef597, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r8, 0xc008240a, &(0x7f00000003c0)=ANY=[]) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r9 = socket(0x10, 0x3, 0x0) r10 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r10, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) bind$inet6(r10, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x9a, &(0x7f0000000080)={@link_local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010700", 0x64, 0x11, 0x0, @private1, @mcast2, {[], {0xfffc, 0xe22, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "676e19d8ff667305eb6922a1cc7960acf1e7de0bc37bc4a0c887b6128c7a238b", "f376fc15f6d380fdbdae8ffc726884b1", {"2a6d860361d3cc0637b357b741c208a1", "736edde399d3d615879145e25db4c3b1"}}}}}}}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r12, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0xea, 0x0, 0xfffd, 0x0, 0x9, 0x5}, {0x12, 0x2, 0x0, 0x401, 0x8001, 0x1400}, 0xa5, 0x5, 0x10000000}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}}, 0x44080) sendmsg$nl_route_sched(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000ac0)=@newqdisc={0x30, 0x24, 0xd0f, 0x70bd2c, 0x25dfdbfb, {0x60, 0x0, 0x0, r12, {0x0, 0xc}, {0xffe0, 0xa}, {0x1, 0x10}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4010}, 0xc010) sendmsg$inet(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0x1}], 0x1, 0x0, 0x0, 0x241}, 0x4000855) 670.124747ms ago: executing program 0 (id=96): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) r4 = syz_open_procfs(0x0, &(0x7f0000000480)='task\x00') fchdir(r4) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x141a82, 0x0) write$cgroup_int(r5, &(0x7f0000000040)=0x4000900, 0x12) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) syz_usb_connect(0x0, 0x1cb, &(0x7f0000000000)=ANY=[@ANYBLOB="1201"], 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_UNBLANKSCREEN(r6, 0x541c, &(0x7f0000000000)) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) lseek(r7, 0x2000, 0x0) 495.704095ms ago: executing program 2 (id=97): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x8) 467.383087ms ago: executing program 2 (id=98): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001d80)={'bond_slave_1\x00', &(0x7f0000001d40)=@ethtool_cmd={0x15, 0x9, 0x3, 0x0, 0x9, 0x0, 0x0, 0xb, 0x80, 0x0, 0x4b59, 0xa, 0x0, 0x0, 0x1}}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000000c0)=@bpf_lsm={0x3, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41100, 0x27, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_tables_targets\x00') preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000000)=""/6, 0x6}], 0x1, 0x410, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000180)=0x80, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000040000000181100", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x19000, 0x1000000300) perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xa) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x31, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001300050022bd7000ffdbdf2507000000", @ANYRES32=r6, @ANYBLOB="800800000311000014001a80100004800c000880"], 0x34}, 0x1, 0x0, 0x0, 0x24040010}, 0x20000040) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x2, 0x3, 0x3, 0x1, 0x4, 0x6, 0xffffffffffffffff}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x10}]}, &(0x7f0000000200)='syzkaller\x00', 0x3ff, 0x74, &(0x7f0000000500)=""/116, 0x40f00, 0x10, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000580)=[{0x1, 0x4, 0x6, 0x3}, {0x1, 0x5, 0x6, 0x5}, {0x5, 0x3, 0x9, 0x5}, {0x1, 0x5, 0x7, 0x7}, {0x2, 0x4, 0xb, 0x2}], 0x10, 0xe4d2}, 0x94) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00304, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x8) pselect6(0xa0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x80000000000300, 0x0, 0x0, 0x4, 0x80000000000}, 0x0, &(0x7f0000000100)={0x8, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0) 451.363398ms ago: executing program 4 (id=99): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x8080}, 0x20004450) r1 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000000c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x80, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x54, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0xc, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "fd"}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x14}]}}}, {0x24, 0x1, 0x0, 0x1, @redir={{0xa}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_REDIR_REG_PROTO_MAX={0x8, 0x2, 0x1, 0x0, 0xf}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0xa8}, 0x1, 0x0, 0x0, 0x40}, 0x24000840) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x520, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0xa98, 0x3}, 0x0, 0x10000, 0x4202, 0x5, 0x1, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a30"], 0x84}, 0x1, 0x0, 0x0, 0x24040089}, 0x20008000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeea, 0x2010, r0, 0x28f43000) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IMADDTIMER(r3, 0x80044940, &(0x7f0000000080)=0x14) ioctl$IMDELTIMER(r3, 0x80044941, &(0x7f0000000280)=0x2252648c528f075a) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000000000085000000a800000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r5}, 0xc) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) getgroups(0x27, &(0x7f0000002540)) 395.922291ms ago: executing program 3 (id=100): syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, 0x0, 0x10) perf_event_open(0x0, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x8) gettid() gettid() setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000900)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x0, 0x0, @loopback, 0x7ff}], 0x2c) sendto$inet6(0xffffffffffffffff, &(0x7f0000001200)="006a30989a60e93be81c7f77d1bcbaeea94ce83af7e521019e99aa27cb74bada2a4ed4f5b5ac5061c941523b51a9f9e23f602147950a1d7fb98e611a8c94079a784d4faf6adfe49fd6839511062b1348ce62173f99558239ab4e6f43b2318be94668447b078b54d236972098e295583b2ee153621ea695faa64ec25cd4d0804126ce69307ae227f721247d61c553d2c8ecf8099fe57aff7b3db1866203e6c96f521bc61f4d0700000021064aff1662395ad6e2a229a64c00"/198, 0xc6, 0x4004, &(0x7f0000000140)={0xa, 0x4e23, 0x2027ff, @mcast2, 0x80d2}, 0x1c) getcwd(&(0x7f00000003c0)=""/257, 0x101) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f0000000540)='ext4\x00', &(0x7f0000000580)='./file0\x00', 0x0, &(0x7f00000005c0), 0x1, 0x508, &(0x7f0000000600)="$eJzs3e9rVWUcAPDvufvlz6ZkVBa4qNAMN3UrNBLSehNEUGoihTnc/JHzR26BCpZSlvgiXwlBBJYRoRAjoRdS4X/Qi14ZEkLRC20I/aCwYHHu7p1Xd7epmzvk+Xzg6HOes/F87/lyznOf57lnN4DcaoqI/RFRHxHrI6KxVJ+UtnhqYEt/rre1d3O6JdHfv/JSUjx+vLV3c1T8Tmpq+k8hYlJErPg5ifkHh7bbvWfv1vaurs5dpf2Wnm07W7r37F2wZVv7ps5Nndtbl7a1ti1ZuLR1ybi91nOPXG5Y/dKKDQfbLr6VvPzw52m800rHKl/HeGmKpsFzcpUk4pnxbiwjNRFRW3EeU0nt8D9/V+eRbyYiLka37Os3vyhU5HB9NEZNDCTv38ZXfmuMo+1ZxwgAjL/+/v7+a/cBgNtdos8HgJwpj/uPt/ZuLm8TNfew9tREtcRw+pZHcaH2eGltt3cw/7WllaBJURcRU35PonJZL7lmze9mrDkf0RSXN/164rF30i1u0Tosw9t/ICLuqXb9J8X8ziiu4g/Nf01EzBpj2z/9neZ/w/zKOvmfWGPJ/91jbPuzfWn+1/1VWSf/+TH7hawjIEvfHco6ArL0fV/WEZClF1dmHQFZev7xrCMgSx9eyjoCziyPiCXVxn+FuL/4f/XxX0NETB9j2+9fTMd/na9X1g0d/xUujLEZRtC3POLJimc7eivyXzKjprQ3vTgfUJds3NLVuTAi7oiIeVHXkO4vGqGNI8lXz1arP702zf8/a8rzf+mWtl+eCyzFcaG24erf62jv8bn0cdJ3IGJ2bbX8J4Pzv8kw87+zr7ONX75ddbha/dSzaf7bPhg5/9xK/R9HzK16/V95cikZ+fmsluL9oKV8Vxjqy8uHV1erX/Z2mv/TC+Q/O+n1P2Xk/Bfv/4PP63XfeBtzVl6o+lZh8Xtp/tecuJn7f32yqhhgfalud3tPz65FEfXJc0PrF994zLer8vkon680//MerN7/D6zvVL//10XEfdfZ5sl17+6sVn/qk+L8/3nXf3bS/HeMcv0nV13/N15o+/PYQ9Xa3tee5v+1k6Nf/23FYOaVarz/G931JijrOAEAAAAAAAAYH4Xic9xJoXmwXCg0Nw/8De9ZMaXQtaO759GNO97Y3hGl50HrCuVPejVWfB50UbF8ZX/xNfutETEzIg41TC7uN2/Y0dWR9YsHgJyZFvHjDwufPjZ1mP4/da4h6ygBgPGU9v/nH7jz07T8h34eAHIh7f9f3f3R0dD/A0Bu6P8BIH/0/wCQP/p/AMgf/T8A5E+5/58558zZJCL2PzG5uEXFd2fUZRohcKsVsg4AyExN1gEAmanNOgAgM8b4QDLK8UnDHaj6za7A/8Hce83/Q16Z/4f8Mv8P+WX+H/LLGB8w/w/5071n79b2rq7OXQoKCgqDhazvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIzkvwAAAP//h7ctEg==") sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000000306010200000000000000000700000a0500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40814) 260.497847ms ago: executing program 3 (id=101): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x100}, 0x204, 0x37, 0x43a1bd78, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r2 = openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount_setattr(r2, 0x0, 0x1100, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_read_part_table(0x5c2, &(0x7f0000000000)="$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") r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8264, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10320, 0x0, 0x8, 0x0, 0x75eef597, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f00000003c0)=ANY=[]) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x9a, &(0x7f0000000080)={@link_local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010700", 0x64, 0x11, 0x0, @private1, @mcast2, {[], {0xfffc, 0xe22, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "676e19d8ff667305eb6922a1cc7960acf1e7de0bc37bc4a0c887b6128c7a238b", "f376fc15f6d380fdbdae8ffc726884b1", {"2a6d860361d3cc0637b357b741c208a1", "736edde399d3d615879145e25db4c3b1"}}}}}}}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$inet(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0x1}], 0x1, 0x0, 0x0, 0x241}, 0x4000855) 151.209433ms ago: executing program 4 (id=102): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x14806, &(0x7f0000000140)=ANY=[@ANYBLOB="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", @ANYRES64=0x0], 0x1, 0x6fd, &(0x7f0000000c40)="$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") r0 = socket$inet(0x2, 0x1, 0x100) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000040)=0x7f, 0x4) bind$inet(r0, &(0x7f0000e15000)={0x2, 0x4e20, @multicast2}, 0x10) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000040)=0x7f, 0x4) bind$inet(r1, &(0x7f0000e15000)={0x2, 0x4e20, @multicast2}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000140)=[{&(0x7f00000001c0)="580000001400192340834b80040d8c560a067f024e22000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100050c10000000010000000000", 0x58}], 0x1) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x2, 0x96) 113.151744ms ago: executing program 1 (id=103): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x2, @loopback}, 0x1c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000009000000440003800800010002000000140002007663616e3000000000000000000000000800030000000000140006"], 0x58}}, 0x20008000) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xe, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xf, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x30e, &(0x7f0000000f00)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x32) write(r4, &(0x7f0000000240)="53d38327618ea9", 0x7) sendfile(r4, r3, 0x0, 0x3ffff) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "87ee8ac6c46dad33", "2607080d7f4fcf00fd4ef2dece6c7c58", '\x00', '#\x00'}, 0x28) 0s ago: executing program 4 (id=104): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x100}, 0x204, 0x37, 0x43a1bd78, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r3 = openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount_setattr(r3, 0x0, 0x1100, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_read_part_table(0x5c2, &(0x7f0000000000)="$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") r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8264, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10320, 0x0, 0x8, 0x0, 0x75eef597, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r8, 0xc008240a, &(0x7f00000003c0)=ANY=[]) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r9 = socket(0x10, 0x3, 0x0) r10 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r10, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) bind$inet6(r10, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x9a, &(0x7f0000000080)={@link_local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010700", 0x64, 0x11, 0x0, @private1, @mcast2, {[], {0xfffc, 0xe22, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "676e19d8ff667305eb6922a1cc7960acf1e7de0bc37bc4a0c887b6128c7a238b", "f376fc15f6d380fdbdae8ffc726884b1", {"2a6d860361d3cc0637b357b741c208a1", "736edde399d3d615879145e25db4c3b1"}}}}}}}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r12, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0xea, 0x0, 0xfffd, 0x0, 0x9, 0x5}, {0x12, 0x2, 0x0, 0x401, 0x8001, 0x1400}, 0xa5, 0x5, 0x10000000}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}}, 0x44080) sendmsg$nl_route_sched(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000ac0)=@newqdisc={0x30, 0x24, 0xd0f, 0x70bd2c, 0x25dfdbfb, {0x60, 0x0, 0x0, r12, {0x0, 0xc}, {0xffe0, 0xa}, {0x1, 0x10}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4010}, 0xc010) sendmsg$inet(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0x1}], 0x1, 0x0, 0x0, 0x241}, 0x4000855) kernel console output (not intermixed with test programs): [ 18.869177][ T28] audit: type=1400 audit(1774325711.405:62): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 18.891439][ T28] audit: type=1400 audit(1774325711.405:63): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 18.914807][ T28] audit: type=1400 audit(1774325711.405:64): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 18.938781][ T28] audit: type=1400 audit(1774325711.405:65): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 18.962207][ T28] audit: type=1400 audit(1774325711.405:66): avc: denied { read open } for pid=3193 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.1.54' (ED25519) to the list of known hosts. [ 24.757615][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 24.757631][ T28] audit: type=1400 audit(1774325717.295:70): avc: denied { mounton } for pid=3298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.787650][ T28] audit: type=1400 audit(1774325717.325:71): avc: denied { mount } for pid=3298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.788414][ T3298] cgroup: Unknown subsys name 'net' [ 24.816258][ T28] audit: type=1400 audit(1774325717.355:72): avc: denied { unmount } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.934962][ T3298] cgroup: Unknown subsys name 'cpuset' [ 24.941537][ T3298] cgroup: Unknown subsys name 'rlimit' [ 25.051674][ T28] audit: type=1400 audit(1774325717.585:73): avc: denied { setattr } for pid=3298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.080762][ T28] audit: type=1400 audit(1774325717.585:74): avc: denied { create } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.102113][ T28] audit: type=1400 audit(1774325717.585:75): avc: denied { write } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.121337][ T3301] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.123679][ T28] audit: type=1400 audit(1774325717.585:76): avc: denied { read } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.123701][ T28] audit: type=1400 audit(1774325717.595:77): avc: denied { mounton } for pid=3298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.151745][ T3298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k Setting up swapspace version 1, size = 127995904 bytes [ 25.153093][ T28] audit: type=1400 audit(1774325717.595:78): avc: denied { mount } for pid=3298 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.211349][ T28] audit: type=1400 audit(1774325717.615:79): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 26.339865][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 26.377344][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 26.395734][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 26.448599][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.456268][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.463616][ T3311] bridge_slave_0: entered allmulticast mode [ 26.470210][ T3311] bridge_slave_0: entered promiscuous mode [ 26.493026][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.500455][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.507752][ T3311] bridge_slave_1: entered allmulticast mode [ 26.514316][ T3311] bridge_slave_1: entered promiscuous mode [ 26.525833][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.533104][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.540433][ T3310] bridge_slave_0: entered allmulticast mode [ 26.547278][ T3310] bridge_slave_0: entered promiscuous mode [ 26.560091][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 26.573905][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.581325][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.589531][ T3310] bridge_slave_1: entered allmulticast mode [ 26.597117][ T3310] bridge_slave_1: entered promiscuous mode [ 26.628062][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.643064][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.663834][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.671630][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.679274][ T3319] bridge_slave_0: entered allmulticast mode [ 26.686238][ T3319] bridge_slave_0: entered promiscuous mode [ 26.707265][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.716814][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.724356][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.732084][ T3319] bridge_slave_1: entered allmulticast mode [ 26.739199][ T3319] bridge_slave_1: entered promiscuous mode [ 26.757572][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.767471][ T3311] team0: Port device team_slave_0 added [ 26.796109][ T3311] team0: Port device team_slave_1 added [ 26.803099][ T3310] team0: Port device team_slave_0 added [ 26.809948][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.819470][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 26.837192][ T3310] team0: Port device team_slave_1 added [ 26.847959][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.860482][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.868158][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.875772][ T3318] bridge_slave_0: entered allmulticast mode [ 26.882332][ T3318] bridge_slave_0: entered promiscuous mode [ 26.893493][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 26.900996][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 26.927199][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 26.942857][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 26.949972][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 26.980168][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 26.999873][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.007158][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.014550][ T3318] bridge_slave_1: entered allmulticast mode [ 27.021223][ T3318] bridge_slave_1: entered promiscuous mode [ 27.043455][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.050456][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.076777][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.088553][ T3319] team0: Port device team_slave_0 added [ 27.095293][ T3319] team0: Port device team_slave_1 added [ 27.107977][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.114981][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.141769][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.170155][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.182255][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.189346][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.215952][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.236361][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.256064][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.263211][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.289527][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.305663][ T3311] hsr_slave_0: entered promiscuous mode [ 27.311646][ T3311] hsr_slave_1: entered promiscuous mode [ 27.323758][ T3318] team0: Port device team_slave_0 added [ 27.340804][ T3310] hsr_slave_0: entered promiscuous mode [ 27.347013][ T3310] hsr_slave_1: entered promiscuous mode [ 27.353062][ T3310] debugfs: 'hsr0' already exists in 'hsr' [ 27.359143][ T3310] Cannot create hsr debugfs directory [ 27.369439][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.376922][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.384082][ T3317] bridge_slave_0: entered allmulticast mode [ 27.390789][ T3317] bridge_slave_0: entered promiscuous mode [ 27.397980][ T3318] team0: Port device team_slave_1 added [ 27.403697][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.411329][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.418741][ T3317] bridge_slave_1: entered allmulticast mode [ 27.425416][ T3317] bridge_slave_1: entered promiscuous mode [ 27.485950][ T3319] hsr_slave_0: entered promiscuous mode [ 27.492459][ T3319] hsr_slave_1: entered promiscuous mode [ 27.498291][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 27.504348][ T3319] Cannot create hsr debugfs directory [ 27.515722][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.525735][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.533142][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.559605][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.581102][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.590842][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.598790][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.625227][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.706325][ T3317] team0: Port device team_slave_0 added [ 27.717353][ T3318] hsr_slave_0: entered promiscuous mode [ 27.723570][ T3318] hsr_slave_1: entered promiscuous mode [ 27.729816][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 27.735703][ T3318] Cannot create hsr debugfs directory [ 27.757871][ T3317] team0: Port device team_slave_1 added [ 27.809281][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.816665][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.843785][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.860701][ T3311] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 27.875442][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.882670][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.908873][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.927219][ T3311] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 27.943415][ T3311] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 27.966353][ T3311] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 27.976837][ T3317] hsr_slave_0: entered promiscuous mode [ 27.983272][ T3317] hsr_slave_1: entered promiscuous mode [ 27.989913][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 27.996136][ T3317] Cannot create hsr debugfs directory [ 28.027360][ T3310] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 28.038519][ T3310] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 28.051788][ T3310] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 28.066896][ T3310] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 28.096691][ T3318] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 28.116563][ T3318] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 28.135887][ T3318] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 28.145468][ T3318] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 28.173674][ T3319] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 28.182878][ T3319] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 28.193099][ T3319] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 28.202038][ T3319] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 28.254654][ T3317] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 28.268812][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.276380][ T3317] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 28.291509][ T3317] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 28.300600][ T3317] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 28.310951][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.340021][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.353031][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.361812][ T318] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.368968][ T318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.377993][ T318] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.385258][ T318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.400683][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.419876][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.433240][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.440430][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.455573][ T318] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.462640][ T318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.477942][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.487093][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.497267][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.505322][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.529921][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.537748][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.548475][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.556068][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.576107][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.583944][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.626561][ T3311] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 28.656031][ T3318] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 28.682994][ T3319] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 28.746557][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.756518][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.776500][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.792821][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.800360][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.826629][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.834097][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.851059][ T3317] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 28.874524][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.888445][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.908189][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.971087][ T3310] veth0_vlan: entered promiscuous mode [ 29.015149][ T3310] veth1_vlan: entered promiscuous mode [ 29.024742][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.040291][ T3310] veth0_macvtap: entered promiscuous mode [ 29.074976][ T3310] veth1_macvtap: entered promiscuous mode [ 29.088453][ T3311] veth0_vlan: entered promiscuous mode [ 29.119567][ T3318] veth0_vlan: entered promiscuous mode [ 29.126967][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.152113][ T3319] veth0_vlan: entered promiscuous mode [ 29.159606][ T3311] veth1_vlan: entered promiscuous mode [ 29.168288][ T3318] veth1_vlan: entered promiscuous mode [ 29.176060][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.190252][ T58] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.199977][ T58] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.217871][ T58] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.226672][ T58] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.238316][ T3319] veth1_vlan: entered promiscuous mode [ 29.248077][ T3311] veth0_macvtap: entered promiscuous mode [ 29.275953][ T3311] veth1_macvtap: entered promiscuous mode [ 29.287953][ T3319] veth0_macvtap: entered promiscuous mode [ 29.298592][ T3319] veth1_macvtap: entered promiscuous mode [ 29.310402][ T3310] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 29.329788][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.345024][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.360748][ T3318] veth0_macvtap: entered promiscuous mode [ 29.375439][ T116] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.393274][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.404010][ T116] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.413406][ T116] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.424089][ T116] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.435164][ T3318] veth1_macvtap: entered promiscuous mode [ 29.459468][ C1] hrtimer: interrupt took 28314 ns [ 29.491069][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.505709][ T3317] veth0_vlan: entered promiscuous mode [ 29.521296][ T318] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.530864][ T318] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.545644][ T3479] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4'. [ 29.565223][ T3317] veth1_vlan: entered promiscuous mode [ 29.571213][ T3484] loop1: detected capacity change from 0 to 764 [ 29.578344][ T318] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.587981][ T12] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.600575][ T3484] rock: directory entry would overflow storage [ 29.613795][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.621263][ T3484] rock: sig=0x5245, size=8, remaining=5 [ 29.629417][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.664403][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.684040][ T3317] veth0_macvtap: entered promiscuous mode [ 29.694348][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.703752][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.713921][ T3317] veth1_macvtap: entered promiscuous mode [ 29.824445][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 29.824475][ T28] audit: type=1400 audit(1774325722.315:113): avc: denied { create } for pid=3485 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 29.888203][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.943909][ T28] audit: type=1400 audit(1774325722.395:114): avc: denied { write } for pid=3485 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 30.037190][ T28] audit: type=1400 audit(1774325722.395:115): avc: denied { nlmsg_write } for pid=3485 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 30.135911][ T28] audit: type=1400 audit(1774325722.395:116): avc: denied { write } for pid=3485 comm="syz.1.6" name="001" dev="devtmpfs" ino=168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 30.222182][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.270657][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.291288][ T3479] syz.3.4 (3479) used greatest stack depth: 10440 bytes left [ 30.299567][ T58] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.302837][ T28] audit: type=1400 audit(1774325722.845:117): avc: denied { create } for pid=3493 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 30.320133][ T58] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.378907][ T58] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.418302][ T28] audit: type=1400 audit(1774325722.955:118): avc: denied { write } for pid=3493 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 30.439666][ T58] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.463627][ T3498] netlink: 4 bytes leftover after parsing attributes in process `syz.3.7'. [ 30.472762][ T28] audit: type=1400 audit(1774325722.995:119): avc: denied { map_read map_write } for pid=3493 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 30.531057][ T3498] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 30.549671][ T3498] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 30.576724][ T3499] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1'. [ 30.656067][ T28] audit: type=1400 audit(1774325723.195:120): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 30.718253][ T3502] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 30.741095][ T28] audit: type=1400 audit(1774325723.255:121): avc: denied { create } for pid=3501 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 30.771200][ T3508] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10'. [ 30.794071][ T3502] loop1: detected capacity change from 0 to 512 [ 30.824500][ T28] audit: type=1326 audit(1774325723.355:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3510 comm="syz.4.5" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f79af8bc799 code=0x7ffc0000 [ 30.831131][ T3508] loop2: detected capacity change from 0 to 128 [ 30.878133][ T3508] ======================================================= [ 30.878133][ T3508] WARNING: The mand mount option has been deprecated and [ 30.878133][ T3508] and is ignored by this kernel. Remove the mand [ 30.878133][ T3508] option from the mount to silence this warning. [ 30.878133][ T3508] ======================================================= [ 30.916909][ T3502] EXT4-fs error (device loop1): ext4_free_branches:1023: inode #11: comm syz.1.8: invalid indirect mapped block 256 (level 2) [ 30.930714][ T3511] loop4: detected capacity change from 0 to 2048 [ 30.938888][ T3502] loop1: lost file I/O error report for ino 11 type 5 pos 0x0 len 0x0 error -117 [ 30.939209][ T3502] EXT4-fs (loop1): 2 truncates cleaned up [ 30.949087][ C1] EXT4-fs (loop1): error count since last fsck: 1 [ 30.949110][ C1] EXT4-fs (loop1): initial error at time 1774325723: ext4_free_branches:1023: inode 11 [ 30.949166][ C1] EXT4-fs (loop1): last error at time 1774325723: ext4_free_branches:1023: inode 11 [ 30.992072][ T3502] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 31.006895][ T3304] Alternate GPT is invalid, using primary GPT. [ 31.014169][ T3304] loop4: p1 p2 p3 [ 31.034709][ T3304] loop4: partition table partially beyond EOD, truncated [ 31.063559][ T3511] Alternate GPT is invalid, using primary GPT. [ 31.070897][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 31.091476][ T3511] loop4: p1 p2 p3 [ 31.095873][ T3511] loop4: partition table partially beyond EOD, truncated [ 31.175250][ T3516] loop1: detected capacity change from 0 to 2048 [ 31.236084][ T3304] Alternate GPT is invalid, using primary GPT. [ 31.242392][ T3304] loop1: p1 p2 p3 [ 31.256236][ T3304] loop1: partition table partially beyond EOD, truncated [ 31.270566][ T3511] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 31.301967][ T3516] Alternate GPT is invalid, using primary GPT. [ 31.303316][ T3519] netlink: 'syz.0.12': attribute type 16 has an invalid length. [ 31.308781][ T3516] loop1: p1 p2 p3 [ 31.317198][ T3519] netlink: 'syz.0.12': attribute type 3 has an invalid length. [ 31.320909][ T3516] loop1: partition table partially beyond EOD, truncated [ 31.336223][ T3519] netlink: 64066 bytes leftover after parsing attributes in process `syz.0.12'. [ 31.541930][ T3526] netlink: 8 bytes leftover after parsing attributes in process `syz.0.14'. [ 31.626151][ T3508] syz.2.10 (3508) used greatest stack depth: 10056 bytes left [ 31.697698][ T3526] loop0: detected capacity change from 0 to 128 [ 32.132577][ T3537] loop3: detected capacity change from 0 to 128 [ 32.146710][ T3539] netlink: 8 bytes leftover after parsing attributes in process `syz.2.17'. [ 32.209559][ T3522] Set syz1 is full, maxelem 65536 reached [ 32.228652][ T3539] loop2: detected capacity change from 0 to 128 [ 32.630098][ T3559] netlink: 8 bytes leftover after parsing attributes in process `syz.4.20'. [ 32.735640][ T3560] netlink: 8 bytes leftover after parsing attributes in process `syz.0.21'. [ 32.992916][ T3539] syz.2.17 (3539) used greatest stack depth: 9928 bytes left [ 33.120537][ T3564] bridge0: entered promiscuous mode [ 33.131265][ T3564] macsec1: entered promiscuous mode [ 33.137207][ T3564] macsec1: entered allmulticast mode [ 33.142659][ T3564] bridge0: entered allmulticast mode [ 33.149912][ T3564] bridge0: port 3(macsec1) entered blocking state [ 33.154347][ T3566] loop3: detected capacity change from 0 to 128 [ 33.156961][ T3564] bridge0: port 3(macsec1) entered disabled state [ 33.172224][ T3564] bridge0: left allmulticast mode [ 33.178078][ T3564] bridge0: left promiscuous mode [ 33.349929][ T3570] loop2: detected capacity change from 0 to 128 [ 33.966817][ T3588] netlink: 8 bytes leftover after parsing attributes in process `syz.0.28'. [ 34.035603][ T3593] hub 8-0:1.0: USB hub found [ 34.040317][ T3593] hub 8-0:1.0: 8 ports detected [ 34.279043][ T3566] syz.3.23 (3566) used greatest stack depth: 9608 bytes left [ 34.503536][ T3594] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 34.514723][ T3592] Alternate GPT is invalid, using primary GPT. [ 34.522099][ T3592] loop1: p1 p2 p3 [ 34.526040][ T3592] loop1: partition table partially beyond EOD, truncated [ 34.650679][ T3606] netlink: 8 bytes leftover after parsing attributes in process `syz.3.34'. [ 34.758491][ T3606] set_capacity_and_notify: 1 callbacks suppressed [ 34.758605][ T3606] loop3: detected capacity change from 0 to 128 [ 34.808150][ T3610] loop4: detected capacity change from 0 to 2048 [ 34.815698][ T3608] netlink: 24 bytes leftover after parsing attributes in process `syz.2.32'. [ 34.845202][ T3608] loop2: detected capacity change from 0 to 2048 [ 34.856260][ T3523] Alternate GPT is invalid, using primary GPT. [ 34.862930][ T3523] loop4: p1 p2 p3 [ 34.866875][ T3523] loop4: partition table partially beyond EOD, truncated [ 34.899705][ T3610] Alternate GPT is invalid, using primary GPT. [ 34.919139][ T3610] loop4: p1 p2 p3 [ 34.923209][ T3610] loop4: partition table partially beyond EOD, truncated [ 34.924310][ T3303] Alternate GPT is invalid, using primary GPT. [ 34.939655][ T3303] loop2: p2 p3 p7 [ 34.992497][ T28] kauditd_printk_skb: 237 callbacks suppressed [ 34.992512][ T28] audit: type=1326 audit(1774325727.525:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3609 comm="syz.4.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7f79af8badda code=0x7ffc0000 [ 35.062328][ T28] audit: type=1326 audit(1774325727.565:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3609 comm="syz.4.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=266 compat=0 ip=0x7f79af8bb857 code=0x7ffc0000 [ 35.097885][ T3618] syz.0.36 uses obsolete (PF_INET,SOCK_PACKET) [ 35.160842][ T3615] Zero length message leads to an empty skb [ 35.171200][ T28] audit: type=1326 audit(1774325727.565:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3609 comm="syz.4.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7f79af8badda code=0x7ffc0000 [ 35.210630][ T3608] Alternate GPT is invalid, using primary GPT. [ 35.218532][ T3608] loop2: p2 p3 p7 [ 35.251187][ T28] audit: type=1326 audit(1774325727.565:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3609 comm="syz.4.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=266 compat=0 ip=0x7f79af8bb857 code=0x7ffc0000 [ 35.300755][ T28] audit: type=1326 audit(1774325727.565:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3609 comm="syz.4.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7f79af8badda code=0x7ffc0000 [ 35.360199][ T28] audit: type=1326 audit(1774325727.565:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3609 comm="syz.4.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=266 compat=0 ip=0x7f79af8bb857 code=0x7ffc0000 [ 35.407399][ T28] audit: type=1326 audit(1774325727.565:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3609 comm="syz.4.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7f79af8badda code=0x7ffc0000 [ 35.477756][ T28] audit: type=1326 audit(1774325727.565:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3609 comm="syz.4.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7f79af8badda code=0x7ffc0000 [ 35.509051][ T28] audit: type=1326 audit(1774325727.565:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3609 comm="syz.4.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7f79af8badda code=0x7ffc0000 [ 35.542317][ T28] audit: type=1326 audit(1774325727.565:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3609 comm="syz.4.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7f79af8badda code=0x7ffc0000 [ 35.586963][ T3624] bridge1: entered promiscuous mode [ 35.592297][ T3624] bridge1: entered allmulticast mode [ 35.600566][ T3624] team0: Port device bridge1 added [ 35.626558][ T3624] bridge0: port 3(team0) entered blocking state [ 35.633146][ T3624] bridge0: port 3(team0) entered disabled state [ 35.646774][ T3624] team0: entered allmulticast mode [ 35.652289][ T3624] team_slave_0: entered allmulticast mode [ 35.675343][ T3624] team_slave_1: entered allmulticast mode [ 35.683940][ T3624] team0: entered promiscuous mode [ 35.690023][ T3624] team_slave_0: entered promiscuous mode [ 35.702094][ T3629] netlink: 8 bytes leftover after parsing attributes in process `syz.0.40'. [ 35.709064][ T3624] team_slave_1: entered promiscuous mode [ 35.721499][ T3624] bridge0: port 3(team0) entered blocking state [ 35.728197][ T3624] bridge0: port 3(team0) entered forwarding state [ 35.744669][ T3632] netlink: 8 bytes leftover after parsing attributes in process `syz.4.42'. [ 35.751575][ T3628] netlink: 8 bytes leftover after parsing attributes in process `syz.1.41'. [ 35.831382][ T3634] loop4: detected capacity change from 0 to 128 [ 35.846753][ T3629] loop0: detected capacity change from 0 to 128 [ 36.110945][ T3636] netlink: 24 bytes leftover after parsing attributes in process `syz.3.43'. [ 36.585455][ T3645] netlink: 8 bytes leftover after parsing attributes in process `syz.0.44'. [ 36.615908][ T3644] netlink: 8 bytes leftover after parsing attributes in process `syz.3.45'. [ 36.922406][ T3644] loop3: detected capacity change from 0 to 128 [ 38.159698][ T3670] netlink: 8 bytes leftover after parsing attributes in process `syz.2.51'. [ 38.172380][ T3671] netlink: 8 bytes leftover after parsing attributes in process `syz.4.50'. [ 38.261102][ T3675] loop2: detected capacity change from 0 to 128 [ 38.465508][ T3680] hub 8-0:1.0: USB hub found [ 38.470542][ T3680] hub 8-0:1.0: 8 ports detected [ 38.899000][ T3685] loop1: detected capacity change from 0 to 2048 [ 38.997511][ T3685] loop1: unable to read partition table [ 39.003637][ T3685] loop1: partition table beyond EOD, truncated [ 39.013148][ T3685] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 39.059503][ T2999] loop1: unable to read partition table [ 39.065526][ T2999] loop1: partition table beyond EOD, truncated [ 39.121975][ T3689] loop3: detected capacity change from 0 to 128 [ 39.167137][ T3691] loop2: detected capacity change from 0 to 2048 [ 39.318689][ T3523] Alternate GPT is invalid, using primary GPT. [ 39.327292][ T3699] EXT4-fs warning (device loop0): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 39.339269][ T3523] loop2: p1 p2 p3 [ 39.343014][ T3523] loop2: partition table partially beyond EOD, truncated [ 39.353309][ T3699] EXT4-fs warning (device loop0): dx_probe:849: Enable large directory feature to access it [ 39.433010][ T3699] EXT4-fs warning (device loop0): dx_probe:934: inode #2: comm syz.0.57: Corrupt directory, running e2fsck is recommended [ 39.476269][ T3702] FAT-fs (loop1): Directory bread(block 64) failed [ 39.483481][ T3702] FAT-fs (loop1): Directory bread(block 65) failed [ 39.490350][ T3702] FAT-fs (loop1): Directory bread(block 66) failed [ 39.497040][ T3702] FAT-fs (loop1): Directory bread(block 67) failed [ 39.503967][ T3702] FAT-fs (loop1): Directory bread(block 68) failed [ 39.510782][ T3702] FAT-fs (loop1): Directory bread(block 69) failed [ 39.518492][ T3702] FAT-fs (loop1): Directory bread(block 70) failed [ 39.525697][ T3702] FAT-fs (loop1): Directory bread(block 71) failed [ 39.532290][ T3702] FAT-fs (loop1): Directory bread(block 72) failed [ 39.539080][ T3702] FAT-fs (loop1): Directory bread(block 73) failed [ 39.784683][ T3691] Alternate GPT is invalid, using primary GPT. [ 39.868097][ T3691] loop2: p1 p2 p3 [ 39.891930][ T3699] EXT4-fs (loop0): Cannot turn on journaled quota: type 1: error -117 [ 39.907191][ T3696] set_capacity_and_notify: 2 callbacks suppressed [ 39.907219][ T3696] loop4: detected capacity change from 0 to 8192 [ 39.927791][ T3691] loop2: partition table partially beyond EOD, truncated [ 39.960266][ T3699] EXT4-fs error (device loop0): ext4_iget_extra_inode:5025: inode #15: comm syz.0.57: corrupted in-inode xattr: e_name out of bounds [ 40.209261][ T28] kauditd_printk_skb: 60 callbacks suppressed [ 40.209295][ T28] audit: type=1326 audit(1774325732.745:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3690 comm="syz.2.56" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7f751a71adda code=0x7ffc0000 [ 40.273782][ T2999] Alternate GPT is invalid, using primary GPT. [ 40.321024][ T2999] loop2: p1 p2 p3 [ 40.325149][ T2999] loop2: partition table partially beyond EOD, truncated [ 40.332754][ T3699] loop0: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 40.334225][ C0] EXT4-fs (loop0): error count since last fsck: 1 [ 40.350026][ C0] EXT4-fs (loop0): initial error at time 1774325732: ext4_iget_extra_inode:5025: inode 15 [ 40.360725][ C0] EXT4-fs (loop0): last error at time 1774325732: ext4_iget_extra_inode:5025: inode 15 [ 40.571972][ T3708] loop3: detected capacity change from 0 to 1024 [ 40.670002][ T3708] EXT4-fs: Ignoring removed orlov option [ 40.781626][ T3708] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.242676][ T3699] EXT4-fs error (device loop0): ext4_orphan_get:1396: comm syz.0.57: couldn't read orphan inode 15 (err -117) [ 41.254561][ T28] audit: type=1326 audit(1774325732.775:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3690 comm="syz.2.56" exe="/root/syz-executor" sig=0 arch=c000003e syscall=266 compat=0 ip=0x7f751a71b857 code=0x7ffc0000 [ 41.277933][ T3699] loop0: lost filesystem error report for type 5 error -117 [ 41.278652][ T3699] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.298993][ T28] audit: type=1326 audit(1774325732.775:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3690 comm="syz.2.56" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7f751a71adda code=0x7ffc0000 [ 41.322702][ T28] audit: type=1326 audit(1774325732.775:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3690 comm="syz.2.56" exe="/root/syz-executor" sig=0 arch=c000003e syscall=266 compat=0 ip=0x7f751a71b857 code=0x7ffc0000 [ 41.326826][ T3699] EXT4-fs warning (device loop0): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 41.346430][ T28] audit: type=1326 audit(1774325732.775:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3690 comm="syz.2.56" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7f751a71adda code=0x7ffc0000 [ 41.383095][ T28] audit: type=1326 audit(1774325732.775:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3690 comm="syz.2.56" exe="/root/syz-executor" sig=0 arch=c000003e syscall=266 compat=0 ip=0x7f751a71b857 code=0x7ffc0000 [ 41.406928][ T28] audit: type=1326 audit(1774325732.775:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3690 comm="syz.2.56" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7f751a71adda code=0x7ffc0000 [ 41.410447][ T3699] EXT4-fs warning (device loop0): dx_probe:849: Enable large directory feature to access it [ 41.430948][ T28] audit: type=1326 audit(1774325732.785:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3690 comm="syz.2.56" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7f751a71adda code=0x7ffc0000 [ 41.431006][ T28] audit: type=1326 audit(1774325732.795:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3690 comm="syz.2.56" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7f751a71adda code=0x7ffc0000 [ 41.474056][ T3699] EXT4-fs warning (device loop0): dx_probe:934: inode #2: comm syz.0.57: Corrupt directory, running e2fsck is recommended [ 41.490582][ T28] audit: type=1326 audit(1774325732.795:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3690 comm="syz.2.56" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7f751a71adda code=0x7ffc0000 [ 41.608206][ T3711] __nla_validate_parse: 30 callbacks suppressed [ 41.608222][ T3711] netlink: 20 bytes leftover after parsing attributes in process `syz.0.57'. [ 41.675769][ T3712] EXT4-fs warning (device loop0): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 41.687854][ T3712] EXT4-fs warning (device loop0): dx_probe:849: Enable large directory feature to access it [ 41.698520][ T3712] EXT4-fs warning (device loop0): dx_probe:934: inode #2: comm syz.0.57: Corrupt directory, running e2fsck is recommended [ 41.714075][ T3712] EXT4-fs warning (device loop0): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 41.726186][ T3712] EXT4-fs warning (device loop0): dx_probe:849: Enable large directory feature to access it [ 41.736660][ T3712] EXT4-fs warning (device loop0): dx_probe:934: inode #2: comm syz.0.57: Corrupt directory, running e2fsck is recommended [ 41.752938][ T3712] EXT4-fs warning (device loop0): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 42.095462][ T3310] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.115352][ T3714] netlink: 'syz.3.61': attribute type 16 has an invalid length. [ 42.123447][ T3714] netlink: 'syz.3.61': attribute type 3 has an invalid length. [ 42.131386][ T3714] netlink: 64066 bytes leftover after parsing attributes in process `syz.3.61'. [ 42.158040][ T3716] netlink: 8 bytes leftover after parsing attributes in process `syz.3.62'. [ 42.167461][ T3702] syz.1.58 (3702) used greatest stack depth: 9592 bytes left [ 42.186659][ T3716] loop3: detected capacity change from 0 to 128 [ 42.435032][ T3722] netlink: 8 bytes leftover after parsing attributes in process `syz.1.63'. [ 42.695765][ T3727] hub 8-0:1.0: USB hub found [ 42.700528][ T3727] hub 8-0:1.0: 8 ports detected [ 43.060993][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.146537][ T3734] netlink: 32 bytes leftover after parsing attributes in process `syz.0.66'. [ 43.185777][ T3737] loop3: detected capacity change from 0 to 128 [ 43.410250][ T3749] loop4: detected capacity change from 0 to 1024 [ 43.435229][ T3749] EXT4-fs: Ignoring removed orlov option [ 43.463178][ T3749] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 43.893526][ T3749] netlink: 8 bytes leftover after parsing attributes in process `syz.4.71'. [ 43.926168][ T3317] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.326421][ T3757] netlink: 24 bytes leftover after parsing attributes in process `syz.4.73'. [ 44.328821][ T3768] loop1: detected capacity change from 0 to 1024 [ 44.354602][ T3768] EXT4-fs: Ignoring removed orlov option [ 44.592627][ T3768] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 44.792392][ T3750] Set syz1 is full, maxelem 65536 reached [ 45.248946][ T28] kauditd_printk_skb: 21 callbacks suppressed [ 45.248962][ T28] audit: type=1400 audit(1774325737.785:461): avc: denied { read write } for pid=3780 comm="syz.3.79" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 45.311071][ T28] audit: type=1400 audit(1774325737.785:462): avc: denied { open } for pid=3780 comm="syz.3.79" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 45.404705][ T3784] netlink: 'syz.2.80': attribute type 10 has an invalid length. [ 45.428239][ T28] audit: type=1400 audit(1774325737.785:463): avc: denied { ioctl } for pid=3780 comm="syz.3.79" path="/dev/ppp" dev="devtmpfs" ino=140 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 45.451533][ T3785] netlink: 'syz.2.80': attribute type 10 has an invalid length. [ 45.461245][ T3785] netlink: 40 bytes leftover after parsing attributes in process `syz.2.80'. [ 45.472428][ T3784] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 45.501349][ T3784] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 45.528665][ T3785] batadv0: entered promiscuous mode [ 45.534806][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 45.544116][ T3785] batadv0: entered allmulticast mode [ 45.558620][ T3785] bond0: (slave batadv0): Releasing backup interface [ 45.589340][ T3785] bridge0: port 3(batadv0) entered blocking state [ 45.599795][ T3785] bridge0: port 3(batadv0) entered disabled state [ 45.698186][ T3793] netlink: 8 bytes leftover after parsing attributes in process `syz.1.82'. [ 45.734326][ T2405] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 45.743799][ T2405] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 46.153778][ T3796] netlink: 28 bytes leftover after parsing attributes in process `syz.0.83'. [ 46.285000][ T28] audit: type=1326 audit(1774325738.825:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3805 comm="syz.2.86" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f751a71c799 code=0x7ffc0000 [ 46.411541][ T28] audit: type=1326 audit(1774325738.845:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3805 comm="syz.2.86" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f751a71c799 code=0x7ffc0000 [ 46.548585][ T28] audit: type=1326 audit(1774325738.845:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3805 comm="syz.2.86" exe="/root/syz-executor" sig=0 arch=c000003e syscall=437 compat=0 ip=0x7f751a71c799 code=0x7ffc0000 [ 46.665716][ T28] audit: type=1326 audit(1774325738.845:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3805 comm="syz.2.86" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f751a71c799 code=0x7ffc0000 [ 46.684872][ T3809] loop2: detected capacity change from 0 to 2048 [ 46.707949][ T28] audit: type=1326 audit(1774325738.845:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3805 comm="syz.2.86" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f751a71c799 code=0x7ffc0000 [ 46.733504][ T28] audit: type=1326 audit(1774325738.845:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3805 comm="syz.2.86" exe="/root/syz-executor" sig=0 arch=c000003e syscall=442 compat=0 ip=0x7f751a71c799 code=0x7ffc0000 [ 46.758648][ T28] audit: type=1326 audit(1774325738.845:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3805 comm="syz.2.86" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f751a71c799 code=0x7ffc0000 [ 46.785453][ T3817] loop3: detected capacity change from 0 to 128 [ 46.793098][ T3817] FAT-fs (loop3): Invalid FSINFO signature: 0x41615252, 0x61ff7272 (sector = 1) [ 46.834608][ T3809] Alternate GPT is invalid, using primary GPT. [ 46.842786][ T3809] loop2: p1 p2 p3 [ 46.848912][ T3809] loop2: partition table partially beyond EOD, truncated [ 46.872416][ T3823] loop0: detected capacity change from 0 to 2048 [ 47.038040][ T3303] Alternate GPT is invalid, using primary GPT. [ 47.048057][ T3814] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000100) [ 47.074391][ T3303] loop0: p1 p2 p3 [ 47.080739][ T3303] loop0: partition table partially beyond EOD, truncated [ 47.102296][ T3814] FAT-fs (loop3): Filesystem has been set read-only [ 47.109331][ T3814] syz.3.88: attempt to access beyond end of device [ 47.109331][ T3814] loop3: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 47.136524][ T3831] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 47.146859][ T3823] Alternate GPT is invalid, using primary GPT. [ 47.154934][ T3823] loop0: p1 p2 p3 [ 47.164256][ T3823] loop0: partition table partially beyond EOD, truncated [ 47.477201][ T3830] loop2: detected capacity change from 0 to 1024 [ 47.618999][ T3310] FAT-fs (loop3): Invalid FSINFO signature: 0x41615252, 0x61ff7272 (sector = 1) [ 47.668400][ T3830] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 47.689701][ T3830] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 47.756834][ T3855] loop3: detected capacity change from 0 to 2048 [ 47.782105][ T3830] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 47.791807][ T3830] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 47.822675][ T3523] Alternate GPT is invalid, using primary GPT. [ 47.832969][ T3523] loop3: p1 p2 p3 [ 47.842913][ T3830] bridge0: port 3(batadv0) entered disabled state [ 47.851888][ T3523] loop3: partition table partially beyond EOD, truncated [ 47.870715][ T3835] syz.0.94 (3835) used greatest stack depth: 9448 bytes left [ 47.890249][ T3855] Alternate GPT is invalid, using primary GPT. [ 47.896867][ T3855] loop3: p1 p2 p3 [ 47.900806][ T3855] loop3: partition table partially beyond EOD, truncated [ 47.962575][ T3858] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 47.971260][ T3858] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 48.021937][ T3855] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 48.150213][ T3866] loop3: detected capacity change from 0 to 1024 [ 48.169909][ T3867] netlink: 8 bytes leftover after parsing attributes in process `syz.2.98'. [ 48.190863][ T3866] EXT4-fs: Ignoring removed orlov option [ 48.217559][ T3866] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 48.350808][ T3310] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 48.403120][ T3875] loop4: detected capacity change from 0 to 164 [ 48.414652][ T3873] loop3: detected capacity change from 0 to 2048 [ 48.432677][ T3877] netlink: 8 bytes leftover after parsing attributes in process `syz.1.103'. [ 48.463599][ T3877] loop1: detected capacity change from 0 to 128 [ 48.481388][ T3303] Alternate GPT is invalid, using primary GPT. [ 48.488329][ T3303] loop3: p1 p2 p3 [ 48.492477][ T3303] loop3: partition table partially beyond EOD, truncated [ 48.515074][ T2999] ================================================================== [ 48.523816][ T2999] BUG: KCSAN: data-race in dentry_unlink_inode / step_into_slowpath [ 48.532099][ T2999] [ 48.534612][ T2999] write to 0xffff888107fb43f0 of 8 bytes by task 3523 on cpu 1: [ 48.542687][ T2999] dentry_unlink_inode+0x65/0x260 [ 48.548014][ T2999] d_delete+0xc8/0xe0 [ 48.552119][ T2999] d_delete_notify+0x32/0x100 [ 48.557186][ T2999] vfs_unlink+0x289/0x490 [ 48.561543][ T2999] filename_unlinkat+0x1e2/0x410 [ 48.566691][ T2999] __se_sys_unlink+0x2b/0xe0 [ 48.571485][ T2999] __x64_sys_unlink+0x1f/0x30 [ 48.576177][ T2999] x64_sys_call+0x2eb6/0x3020 [ 48.581134][ T2999] do_syscall_64+0x12c/0x370 [ 48.585875][ T2999] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 48.592031][ T2999] [ 48.594417][ T2999] read to 0xffff888107fb43f0 of 8 bytes by task 2999 on cpu 0: [ 48.602652][ T2999] step_into_slowpath+0x12c/0x4c0 [ 48.607684][ T2999] path_lookupat+0x330/0x500 [ 48.612464][ T2999] filename_lookup+0x190/0x390 [ 48.617253][ T2999] do_readlinkat+0x74/0x2f0 [ 48.621940][ T2999] __x64_sys_readlink+0x47/0x60 [ 48.626803][ T2999] x64_sys_call+0x2b51/0x3020 [ 48.631837][ T2999] do_syscall_64+0x12c/0x370 [ 48.636691][ T2999] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 48.642762][ T2999] [ 48.645094][ T2999] value changed: 0xffff88811b056360 -> 0x0000000000000000 [ 48.652464][ T2999] [ 48.654969][ T2999] Reported by Kernel Concurrency Sanitizer on: [ 48.661204][ T2999] CPU: 0 UID: 0 PID: 2999 Comm: udevd Not tainted syzkaller #0 PREEMPT(full) [ 48.670309][ T2999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 48.681083][ T2999] ================================================================== [ 48.715253][ T3873] Alternate GPT is invalid, using primary GPT. [ 48.721901][ T3873] loop3: p1 p2 p3 [ 48.725931][ T3873] loop3: partition table partially beyond EOD, truncated [ 48.783220][ T3880] loop4: detected capacity change from 0 to 2048 [ 48.835790][ T3880] Alternate GPT is invalid, using primary GPT. [ 48.842296][ T3880] loop4: p1 p2 p3 [ 48.846488][ T3880] loop4: partition table partially beyond EOD, truncated [ 48.933997][ T3883] sch_tbf: burst 19872 is lower than device lo mtu (65550) !