last executing test programs: 41m25.274709546s ago: executing program 32 (id=8): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000008c0)='./file1\x00', 0x1008490, &(0x7f0000000a40)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000001500)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) file_getattr(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300), 0xb7, 0x1000) openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000880}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setresuid(0xee01, 0xee00, 0x0) bind$bt_hci(r3, &(0x7f00000002c0)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r3, &(0x7f0000000040)=ANY=[], 0x6) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000002c0)={'tunl0\x00', {0x2, 0x4e23, @broadcast}}) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x12, 0x4, 0x4, 0xe}, 0x50) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r4 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r4, &(0x7f0000000000)={0x18, 0x2, {0x3, @local}}, 0x1e) r5 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r5, &(0x7f0000000200)={0x18, 0x2, {0xfeff, @local}}, 0x1e) connect$pptp(r5, &(0x7f0000000240)={0x18, 0x2, {0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1e) 39m46.09588915s ago: executing program 33 (id=139): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x2d, &(0x7f0000000040), 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x17440000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4000, 0x0, 0xfffffffffffffffe, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x2642, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3003, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) syz_clone(0x20020000, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20, 0x3, @remote, 0x80000001}, 0x1c) r6 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r6, &(0x7f0000000180)=[{&(0x7f00000001c0)="580000001500add427323b472545b45602117fffffff81000e22d991000000000000a80013007b00090080007f000001e809000000ff0000f03ac7100003ffffffff", 0x42}], 0x1) r7 = openat(0xffffffffffffff9c, 0x0, 0x48042, 0x8c) fallocate(r7, 0x10, 0x6, 0x10001) socket$packet(0x11, 0x2, 0x300) sync() 38m55.0976981s ago: executing program 34 (id=193): syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x10042, &(0x7f00000000c0)={[{@nouid32}, {@delalloc}]}, 0xfe, 0x26f, &(0x7f0000001c80)="$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") creat(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x17440000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10004893}, 0x80) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc00000019000100000000000000000020010000000000000000000000000000ac1414aa00000040000000000000000000000005000000000a0000002c00001a", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000a900000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffff7f0000000000000000000000000000000000000000000a00000000000000000000008040000300000000000000000000000000000000000000000000004400050000000000000000000000000000000000000000003c"], 0xfc}}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc000000190001002dbd70000000000064010100000000000000000000000000fc01000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000800000000000003000000000000000000000000000000fdfffffffbffffff0000000000000000ffffffffffffffff053b000000000000000000000000000002000000000000005600000000000000feffffffff7f40000200000000000008000000000000000001"], 0xfc}}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x4e24, 0x0, @rand_addr, 0x1}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x97ff) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 38m3.318570435s ago: executing program 35 (id=459): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x64}, 0x1, 0x0, 0x0, 0x2000c855}, 0x8000002) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000000), 0x651, 0x6400) 36m14.795989557s ago: executing program 36 (id=1407): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x652c0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x800000, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[], &(0x7f0000000440)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r2, 0x6b, 0x1, &(0x7f0000000300)=[{0x3, 0x3, {0x2, 0x0, 0x1}, {0x1, 0x1}, 0xff, 0xff}], 0x20) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) ioctl$TIOCSPTLCK(r4, 0x40045431, &(0x7f0000000000)) ioctl$TIOCGPTPEER(r4, 0x5441, 0xb3d) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="700000001000ffff27bd7000fedbdf2500000000", @ANYRES32=0x0, @ANYBLOB="1501000000000000340012800b0001006970766c616e000024000280060001000100000006000100010000000600020003000000060002000200000008000500", @ANYRES32=r3], 0x70}, 0x1, 0x0, 0x0, 0x28001}, 0x8000002) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0xffffffffffffffff, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x1414, 0x1b061}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TOS={0x5}, @IFLA_GENEVE_TTL_INHERIT={0x5, 0xc, 0x1}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x8000002) r7 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000200)={@initdev={0xfe, 0x88, '\x00', 0xfc, 0x0}, 0x800, 0x0, 0x3, 0x1, 0x0, 0x4}, 0x20) setsockopt$inet6_int(r7, 0x29, 0x1000000000021, &(0x7f0000000180)=0x9, 0x4) connect$inet6(r7, &(0x7f0000000000)={0xa, 0x4e22, 0x380000, @empty}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x800, 0x1, 0x103, 0x9}, 0x20) r8 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x800000, 0x3fff8001}, 0x0, 0x32, 0x43a1bd74, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x5, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) r10 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r11 = syz_create_resource$binfmt(&(0x7f0000000140)='./file0\x00') openat$binfmt(0xffffffffffffff9c, r11, 0x41, 0x1ff) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x4070bd2c, 0x25dfdbfc, [@sadb_key={0x2, 0x9, 0x8, 0x0, "1c"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @remote}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0xc, 0x80000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xa}}}, @sadb_x_sa2={0x2, 0x13, 0x1, 0x0, 0x0, 0x70bd29, 0x3506}]}, 0x70}, 0x1, 0x7}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[], 0x70}}, 0x0) sendmmsg(r10, &(0x7f0000000180), 0x3ef, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={r5, 0x0, 0x8, 0x0, &(0x7f00000002c0)="f3fffeffffffa000", &(0x7f0000000140), 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x50) 35m55.657613535s ago: executing program 37 (id=1603): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="28000000190001000000000000000000021800000000ff000000000008000100ac141400040008"], 0x28}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0xef, &(0x7f00000000c0)={0x0}, 0x9, 0xfc, 0x0, 0x4000001}, 0x40000) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x1000000, 0x0) 35m53.767861713s ago: executing program 38 (id=1617): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000480), 0xc0d00) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000180)={0x80, 0x3, 0x5, 0x0, 0xff, 0x105}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000040)={0x80, 0x2b, 0x5, 0x0, 0x9, 0x8}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000611240faffffffff9400000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet_buf(r1, 0x0, 0x2b, &(0x7f0000000000)="ea0d38ead3fd1267177083fd1ef6e72d720acfa94cf86000d2f60d6190dbb45ecd74552b91d3f190ef72cbc55d30372c0aa163202586256eebe2d73ad97c7de25560bcab5d247534c72536e040524bec7c12ca", 0x53) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x40, 0x7fff0000}]}) close_range(r2, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x3, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0xfffffffffffffffe, 0x0) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) fchdir(r3) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000228bd7000fddbdf7b48a1a88c4e974f00050000000c00040003000000fcffffff"], 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x24004094) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000380), 0x4) r5 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x104046, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x1, 0x0, 0x0, 0x0, 0x5, 0xa19}, 0x0, 0xffffffffffffffff, r5, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d2d, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, r5, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r6 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/devices.allow\x00', 0x2, 0x48) setreuid(0x0, 0xee00) write$cgroup_devices(r6, &(0x7f0000000000)=ANY=[], 0xe) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000100)=0xfefffff9, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000002c0)=[@timestamp, @sack_perm, @window={0x3, 0x9, 0x2}, @mss={0x2, 0x400}, @mss={0x2, 0xcb2}, @mss={0x2, 0x3}, @timestamp, @sack_perm], 0x8) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000001c0), 0x4) 35m46.544728209s ago: executing program 39 (id=1663): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_emit_ethernet(0x5e, &(0x7f0000000000)={@broadcast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "122d92", 0x28, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @mcast2, @private1={0xfc, 0x1, '\x00', 0x4}}}}}}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x7}}, [], {0x14, 0x11, 0x20, 0x0, 0x0, {0x7}}}, 0x28}, 0x1, 0x0, 0x0, 0x8010}, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockopt(r1, 0x200000000114, 0x2715, &(0x7f0000000580)=""/102393, &(0x7f0000000400)=0x18ff9) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) futex(&(0x7f0000000240)=0x2, 0x1, 0x2, &(0x7f0000000280)={0x0, 0x989680}, &(0x7f00000002c0)=0x7d00, 0x2) socket$can_j1939(0x1d, 0x2, 0x7) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0x4, 0x3e8, 0x0, 0x0, 0x130, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pimreg\x00', 'veth0_to_bridge\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f67b23ffdfa27f907a03732da3acbc6518e62a77ca06f258762e88c0d9f9d2f413b94a105f4bdf01425ce81c5d000000000000000500ffffffff00"}}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_team\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 35m46.217223205s ago: executing program 40 (id=1666): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000040)='./bus\x00', 0x143142, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000e80)='./bus\x00', 0x1c1002, 0x0) write(r4, &(0x7f0000004200)='t', 0x1) sendfile(r4, r3, 0x0, 0x7fffffff) ftruncate(r2, 0x2007ffb) sendfile(r2, r2, 0x0, 0x1000000201005) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0x4, 0x0, &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$HIDIOCGUSAGES(0xffffffffffffffff, 0xd01c4813, &(0x7f0000000240)={{0x3, 0xe8b5c71a5eb6f040, 0x5, 0xb7a6, 0x1, 0xffff}, 0x341, [0xc, 0x40, 0xcd7, 0x4, 0x6, 0x0, 0x80000002, 0x4, 0x9, 0x7a18fde9, 0x9, 0xf12, 0x4, 0x3, 0x378, 0x9, 0x4, 0x0, 0x6f, 0xffff06bd, 0x0, 0xf, 0x1a, 0xf2, 0x10, 0x9, 0x8, 0x10001, 0x401, 0x80000000, 0x401, 0x3ca5, 0x1, 0x0, 0xff, 0x40000004, 0x4, 0x3, 0x0, 0xaa80, 0x40000000, 0x80000000, 0x7fff, 0x7, 0x5, 0xa, 0x0, 0x10000, 0x405, 0x8, 0x10001, 0x91ba, 0x7, 0x9, 0x9, 0xb6, 0x4, 0xcb, 0x5, 0x7f, 0x5, 0x311, 0x66d1, 0xfffffffc, 0x9, 0xb6eb, 0xc74, 0x77, 0x2, 0xc0000000, 0x5cb5, 0xfffffffd, 0x401, 0xedf4, 0x4, 0x1000, 0x6, 0xfffffffe, 0x8001, 0xc1, 0x1, 0x8, 0x1, 0x32, 0x9, 0x7f, 0xffff, 0x401, 0x2, 0x3, 0x4680, 0x9a7f, 0xe665, 0x3c6e, 0x3, 0x7, 0x80, 0x4b, 0x9, 0x2, 0xb, 0x6, 0x4fa4, 0x80000000, 0x1, 0xb, 0x0, 0xfffffffa, 0x3, 0x8001, 0xfd, 0x101, 0x4, 0x0, 0xa, 0x1b, 0x202, 0x7ff, 0x9, 0x80000000, 0xffff, 0x8, 0x2003, 0x6, 0x2, 0xffffff87, 0xe, 0xd, 0xf, 0x8, 0x9, 0x7, 0x6, 0x400, 0x8, 0xff2, 0x6, 0x0, 0x6, 0x0, 0x8, 0x1, 0x3, 0x664, 0x4, 0x9, 0x9, 0x2, 0x8, 0xfffffffd, 0xeb6, 0x0, 0x9, 0x10000, 0x1, 0x9, 0x9, 0xc6, 0x1, 0x4, 0x7ff, 0xe6, 0x6, 0x10001, 0x40000009, 0x68, 0x7, 0x1ff, 0x5, 0x3, 0x9a3f, 0x400000, 0x0, 0x80000067, 0xffffff7e, 0x7, 0x10000000, 0x10001, 0x7, 0x3, 0x10, 0x10a, 0xa, 0x40, 0x18, 0x80, 0xb5f8, 0x9, 0x3, 0x8000103, 0x5, 0xfffffffc, 0x4, 0x18000, 0x10, 0x1000, 0x288c, 0x1ffe, 0x73ee, 0x1, 0x5, 0x9, 0x7fffffff, 0x73, 0x6, 0x8, 0x6, 0x400, 0x40, 0x0, 0x0, 0x0, 0xe, 0x981, 0x80000000, 0x7fff, 0x7, 0x4, 0x7, 0xc4c, 0x45e3, 0x5, 0x7, 0x0, 0x5, 0x40, 0x0, 0x1, 0x8002, 0xffffffff, 0x4, 0x200000ce, 0xf, 0x390, 0x1, 0xa, 0x3, 0x4, 0x9, 0x9, 0x37c, 0xd, 0x8, 0x1, 0x5, 0xfffffffe, 0x6, 0x4, 0x6, 0x1, 0x8, 0x6, 0xfffffffa, 0x5, 0x0, 0x9, 0x4, 0x2, 0x7, 0x3, 0xffffff1b, 0x9, 0x6, 0xd, 0x34ea, 0x10000, 0x0, 0x80002001, 0x8, 0x8000, 0x10004, 0x10, 0x8, 0x9, 0x5, 0x1, 0x6, 0x10001, 0x0, 0x5, 0x10000, 0x4, 0xffff, 0x2, 0x4, 0x2, 0x3, 0x1, 0x73, 0x3, 0x9, 0x4, 0x1, 0x9, 0x1, 0x8, 0x0, 0x81, 0x80000004, 0x7c, 0x9, 0x0, 0x4, 0x10000004, 0x0, 0x1, 0xce5fb90f, 0x5, 0x4, 0x10001, 0xf, 0x9, 0x100, 0x44, 0x59b, 0x7, 0x8, 0x9, 0x3, 0x2, 0x4, 0x6, 0x0, 0x8, 0x40, 0xd3, 0x7, 0xffffffff, 0x89aa, 0x8, 0x0, 0xf0ce, 0x2, 0x1, 0x0, 0x2, 0xc6, 0x1000, 0x800001, 0x937, 0xa, 0x400006, 0x3, 0xffffffff, 0x5, 0x9, 0x5, 0xffffffff, 0xbe, 0x1, 0x7, 0x0, 0xffffffff, 0x0, 0x81, 0x0, 0xae, 0x8, 0x1, 0xfffffeff, 0x6, 0x5, 0x7fff, 0x103, 0x7, 0x8000006, 0x709, 0x2, 0x49, 0x6, 0x7, 0xfffff772, 0x8, 0x80000000, 0x3, 0x7, 0xa9c, 0x9, 0x8, 0x1, 0x2, 0x5, 0x1000, 0x69f, 0x1ff, 0x9, 0x10, 0x3, 0x10000, 0xffff0000, 0xf, 0x1, 0x3, 0xffffa9b4, 0x1, 0x4, 0x5, 0x9, 0x4b5f, 0x6, 0x7fffffff, 0xffffffff, 0x1, 0x80000000, 0xb, 0x0, 0x88d, 0x1, 0x7, 0x8, 0x1, 0x89, 0x6, 0x818c, 0x10, 0x8, 0x10, 0xfffffffc, 0xfffff001, 0xa, 0xfffffff7, 0x8000005, 0x4, 0xffd, 0x9, 0x10, 0xfffffffd, 0x4, 0xc2, 0x400, 0x4, 0x0, 0x80000000, 0xd, 0x2, 0x1, 0x0, 0x20000003, 0xb6, 0x101, 0x401, 0x2, 0x7, 0xc, 0x6623258, 0xf2, 0x740, 0xfffffffc, 0x9, 0xffffa0a6, 0xc, 0x11, 0x2, 0x8, 0x9, 0x1, 0x7f, 0x98, 0x9, 0xb, 0x800, 0x4, 0x9, 0x5, 0x7, 0x7, 0x8, 0xfe, 0x7f, 0x9, 0x4, 0x6, 0x20080000, 0x9, 0x8000, 0x0, 0x0, 0x1000, 0xb, 0x0, 0x7, 0x8000000, 0x0, 0xfff, 0x8101, 0x4, 0x0, 0x9, 0xc, 0x5, 0xffe, 0x101, 0xffef, 0x1, 0x401, 0xf0, 0x0, 0xfffff53d, 0x9, 0x2, 0x6, 0x0, 0x4, 0x4b15, 0x10000, 0x1, 0x6, 0x1, 0x4000d, 0x8, 0x4, 0xfffffe01, 0x1, 0x6, 0x3, 0x2, 0x10001, 0x1, 0x7, 0xe4ce, 0x5, 0x9, 0xffffc487, 0x204, 0x10002, 0x1000, 0x7, 0x6, 0x6, 0x8, 0xfffffe00, 0x1, 0x1, 0x0, 0xe, 0x2, 0x2, 0x4, 0x0, 0xb66d, 0x3, 0x1000, 0x1eb4bce6, 0x10, 0x8, 0x1, 0x5, 0x1, 0x5, 0x9, 0x1000, 0x7, 0x62f2f805, 0x8, 0x3, 0xffffffff, 0x2, 0x7f, 0x6, 0xd, 0x40, 0x5, 0x2, 0xa, 0x5, 0x6, 0x80000000, 0x25, 0x8, 0x7, 0x7, 0x1, 0x5, 0x9, 0x6709, 0x10001, 0x0, 0x7f, 0x8, 0x6, 0x0, 0xc226, 0x0, 0x5, 0x2, 0x2, 0x4, 0xfff9, 0x80000001, 0x5, 0x1, 0x9, 0x0, 0xb7, 0x3, 0xff, 0x9, 0x0, 0x80, 0xfea5, 0x7fff, 0x7, 0x5, 0x7, 0x7485, 0x197, 0x8, 0x0, 0x5, 0xf, 0x3, 0xe, 0x8, 0x7, 0x3, 0x7, 0x382d, 0x459, 0xcad, 0x9, 0x0, 0x2, 0x119, 0x6, 0x20000a4, 0xe0, 0xfffffffb, 0x5, 0xffffffff, 0x2, 0x4007, 0xa05a, 0x7, 0x0, 0x0, 0x35, 0x8, 0x5, 0x2, 0x30, 0xb, 0x101, 0x2, 0x9, 0x3, 0x7, 0x8, 0x8, 0x1, 0x2, 0x4, 0x15294b70, 0x3, 0x3, 0x2, 0x1, 0xf, 0x9, 0x1, 0x80000000, 0x9, 0x8001, 0x5, 0x800081, 0x1, 0x2, 0x83fd, 0x1df, 0x6, 0x6, 0xfffffffa, 0x81, 0x9, 0x2, 0x9, 0x1, 0x9, 0x7, 0x2c1, 0x9e95, 0x0, 0xfffffedd, 0x30c8, 0x2, 0x38a0, 0x7b, 0x0, 0x8, 0x1, 0x6, 0x9, 0x0, 0x8, 0x5, 0x8, 0x1ff, 0x7fff, 0x3, 0x9, 0x8, 0x2b, 0x200006, 0x4, 0x7, 0x2, 0x4, 0xbfb, 0x7, 0x405, 0x6, 0x4, 0x91, 0x9, 0x8, 0x3, 0x28f, 0x6, 0xfffffe00, 0x1000, 0x5, 0x92, 0xffffffff, 0x7fffffff, 0xd7, 0x8001, 0x905, 0x3, 0x6, 0xfffffb31, 0xb, 0x1, 0x7, 0x8, 0x1, 0x6, 0x1, 0xff, 0x103, 0x10000004, 0x3, 0x6, 0x80000001, 0x0, 0x100a, 0x7fffffff, 0x7fff, 0x2, 0xfffffff8, 0x2, 0x9af, 0x10001, 0x8, 0x4, 0x8, 0x6, 0x7742348d, 0x5, 0x5, 0x1f, 0x40, 0x0, 0x6, 0xffffffff, 0x7, 0x7, 0x8, 0x17f, 0x6, 0x2, 0x1, 0x6, 0x14827783, 0xb, 0xe, 0x5, 0x1, 0xfe7, 0xfffffffc, 0x8, 0x7ff, 0x3e9, 0x0, 0x3, 0x2000, 0xa, 0x3, 0x9, 0x80000001, 0x81, 0x8, 0x14, 0x8, 0x9, 0x80, 0xd, 0xf28c, 0x7, 0x6, 0x4, 0x7fffffff, 0xffff, 0x7fffffff, 0xc9, 0x2, 0xfffffffe, 0x924, 0x499, 0x100, 0x1, 0x5, 0xffff351b, 0x7, 0xfffffffb, 0x3, 0x9, 0x2, 0x7, 0x4, 0x4, 0x4, 0xff, 0xee, 0x2, 0x4, 0x8, 0x9f, 0x7, 0xffffffff, 0x9, 0xc9, 0x1, 0x1, 0x1, 0xfffffff7, 0x0, 0x6, 0x5, 0x6, 0x400, 0x51, 0x7, 0xefb, 0x200000b8, 0xfffffff7, 0x5, 0xfffffff7, 0x7, 0x7, 0x7, 0x6330, 0xff, 0x6, 0xea, 0xbb2d, 0xfff, 0x7, 0x1, 0x0, 0x6, 0x7, 0xfffffffa, 0x3, 0x0, 0x1, 0x6, 0xfffffc00, 0x5, 0x7, 0x64c822e3, 0x9, 0x6, 0x6, 0x6, 0xfff, 0x0, 0xa7b, 0x62cc, 0xfffffff7, 0x7, 0x40, 0xa, 0x9b, 0x3, 0xe, 0xf01, 0x1, 0x3, 0x42, 0x3, 0x4, 0x5, 0x5, 0x7ff, 0x5, 0x8, 0x5, 0x3, 0x8, 0x0, 0x80000001, 0x54, 0x400, 0x1, 0x8, 0x7, 0x9, 0x10000c0, 0x5, 0x72, 0x80, 0x1000, 0x7, 0x800, 0x6, 0x7, 0x3, 0x93c, 0x6, 0x20000000, 0x0, 0xe, 0x5, 0x3, 0xfffffffa, 0xa01, 0xf3, 0xffffff00, 0x8, 0xe, 0x3, 0x3ff, 0x4, 0x2, 0x6, 0xa3, 0xffff, 0xfffffff9, 0x9, 0x5, 0x62, 0x2, 0x5, 0xfffffffa, 0x2, 0x2, 0x9, 0x7, 0xf, 0x7, 0x8, 0x10000, 0x42, 0xaa1, 0x7, 0x2b, 0x6, 0x10, 0x5, 0x200, 0x9, 0x6, 0x3, 0x8, 0x10, 0x4, 0x6, 0x633, 0xf05, 0x0, 0x101, 0x200, 0xc, 0x7ff, 0x0, 0x40, 0x1, 0x10000, 0x9, 0x40, 0x9, 0x0, 0x7f, 0x8, 0x6, 0xe, 0x3, 0x80000005, 0x0, 0x8, 0x8, 0x7, 0xde, 0x6, 0x89, 0xfffffffd, 0x100, 0x1, 0x9, 0x6, 0x3fe, 0x1, 0x0, 0x200, 0xe9ab, 0x3, 0x8000, 0x1, 0x2, 0x2, 0x43, 0x3ff, 0x0, 0x7, 0xc, 0x401, 0x6, 0x7, 0xa, 0xf, 0xf39d, 0x71, 0xfff, 0x7, 0x8]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000d40)=ANY=[@ANYBLOB="6000000010000104a0518fd50000000000000000", @ANYRES32=0x0, @ANYBLOB="096b0200000000002c00128009000100626f6e64000000001c00028006001900ff0300000800090001000000080007000000000014003500626f6e6430"], 0x60}, 0x1, 0x0, 0x0, 0x20044054}, 0x4000054) r7 = socket$netlink(0x10, 0x3, 0xe) sendmsg$nl_route(r7, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000240)={'bridge0\x00', &(0x7f0000002500)=@ethtool_dump={0x19, 0x7, 0x9}}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0xfd, 0x0, 0x4, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd7}, 0x19350, 0x3, 0xfffc, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) r8 = openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r8) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f0000000040)={0x3ffffffffffffe96, &(0x7f0000000000)=[{0x2000, 0x5}]}) 35m25.412770225s ago: executing program 41 (id=1787): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) close(r2) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x5}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00'}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r3, 0x4, 0x6c00) r4 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r3, &(0x7f0000000000), 0xfffffecc) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x711, @remote, 0xbf}, {0xa, 0x4e20, 0xfffffffe, @mcast2, 0x10001}, r6, 0x403}}, 0x48) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040), 0x8200, 0x0) fcntl$lock(r4, 0x6, &(0x7f0000000380)={0x1, 0x3, 0x1, 0x7fffffff}) 35m22.870584003s ago: executing program 42 (id=1718): r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') io_setup(0x3, &(0x7f0000000040)=0x0) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYRES8=r2], &(0x7f0000000280)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) move_pages(r4, 0x6, &(0x7f0000000040)=[&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f00008c2000/0x3000)=nil, &(0x7f00009c7000/0x4000)=nil, &(0x7f0000b30000/0x2000)=nil], &(0x7f0000000140)=[0x20, 0x7, 0x7, 0x1, 0x4], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x9}, 0x100100, 0x1, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) io_setup(0x2007, &(0x7f0000000980)=0x0) io_pgetevents(r8, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r9 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$int_in(r10, 0x5452, &(0x7f0000000180)=0xffffffffffffffff) fcntl$setsig(r10, 0xa, 0x12) ppoll(&(0x7f0000000100)=[{r11}], 0x1, 0x0, 0x0, 0x0) dup2(r10, r11) fcntl$setown(r11, 0x8, r9) tkill(r9, 0x13) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000009b40)={0x0, 0xffffffffffffff16, &(0x7f0000009b00)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000006000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc4c0000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000020000380100000800c00018006000100d10300000c000080080003400000000214000000110001"], 0xb0}, 0x1, 0x0, 0x0, 0x14}, 0x40) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000200)=[{0xff, 0x1, 0x5, 0x800}, {0x7, 0x5, 0x7, 0x7}]}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x4) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000006c0), 0x48200, 0x0) io_submit(r1, 0x1, &(0x7f0000000340)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x6, r0, 0x0, 0x0, 0x4, 0x0, 0x1}]) 35m22.725686285s ago: executing program 43 (id=1798): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r1, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbeeb, 0x8031, 0xffffffffffffffff, 0xa9525000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_read_part_table(0x604, &(0x7f0000000640)="$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") ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x42718, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x6, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$NFT_BATCH(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000060a09040000000000000000020000200900010073797a30000000000900020073797a320000000034000000080a010200000000000000000200000608000940000000000900020073797a32000000000900010073797a300000000014000000110001"], 0x88}, 0x1, 0x0, 0x0, 0x4040}, 0x0) pwrite64(r3, &(0x7f0000002d40)="61dc", 0x80002, 0x1ffffffff000) ioctl$USBDEVFS_DISCSIGNAL(r0, 0x8010550e, &(0x7f0000000100)={0x8b3, &(0x7f00000001c0)="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"}) bind$bt_sco(r2, &(0x7f0000000000)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x8) sendto$inet6(r1, 0x0, 0x0, 0x4c881, &(0x7f0000000540)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000001140)=[{{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000e00)="32aa9df8e47b9a930d35", 0xa}, {&(0x7f0000000e40)="bbfc84fcbf8bfb4d31d5c00786211fceeb495b9362096e75a1545bd85e0bccb7bb7951d5648501427dd10a114a89e07bc1733f", 0x33}, {&(0x7f0000000580)="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", 0x1ee}, {&(0x7f0000002040)="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", 0x354}], 0x4}}], 0x1, 0x4040005) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r5, 0x0, 0x2, &(0x7f0000000080)={0xc, [0x0, 0x3], 0x1f04}, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c56e902c36a8187f35da2c000000", @ANYRES16=r6, @ANYBLOB="010028bd7000010000000f000000080034000400000008000300", @ANYRES32=r7, @ANYBLOB="0500330001000000"], 0x2c}}, 0x80) 35m18.578466947s ago: executing program 44 (id=1812): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x4, &(0x7f00000005c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41000, 0x28, '\x00', 0x0, @sk_msg=0x7, 0xffffffffffffffff, 0x0, 0x0, 0xfdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffdd9) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) r2 = socket$inet_sctp(0x2, 0x5, 0x84) (async) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) (async) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = syz_io_uring_setup(0x49a, &(0x7f00000000c0)={0x0, 0x79af, 0x3180, 0x8000, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x4007, @fd_index=0x3, 0xffffffffffffffff, &(0x7f0000000580)=""/207, 0xcf, 0x2, 0x1}) (async) io_uring_enter(r5, 0x627, 0x4c1, 0x43, 0x0, 0x30) (async) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x4e21, @private=0xa010102}], 0x10) setsockopt(r4, 0x84, 0x7f, &(0x7f0000000040)="020000000980ffff", 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000003140)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x820, 0xc, @private1, 0x9}]}, 0x0) (async) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000000)={r8, 0x6, 0x30}, &(0x7f00000000c0)=0xc) (async) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r8, 0xc}, &(0x7f0000000180)=0x8) 34m30.13526783s ago: executing program 45 (id=2422): ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x2}, 0x204, 0x1, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) ioctl$FS_IOC_GETFSSYSFSPATH(r0, 0x80811501, &(0x7f00000001c0)={0x80}) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_raw(r1, &(0x7f0000000040)={0x1d, r2}, 0x10) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0xfc, 0x7fff0026}]}) close_range(r3, 0xffffffffffffffff, 0x0) 34m14.995611067s ago: executing program 46 (id=2619): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=@ipv6_delroute={0x24, 0x12, 0xc604d14dce89b4d3, 0x70bd2b, 0x25dfdbff, {0xa, 0x14, 0x0, 0x0, 0x15a597d3fd86676a, 0x1, 0xfe, 0x4, 0x2e00}, [@RTA_EXPIRES={0x8, 0x17, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x820}, 0x0) 31m22.24316468s ago: executing program 47 (id=3934): set_mempolicy(0x3, 0x0, 0x3) r0 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, 0x0, 0x20000884) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x50, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x62, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa3f, 0x2, @perf_bp={0x0}, 0x0, 0x6, 0x800000, 0x6, 0x2, 0xcb, 0x2, 0x0, 0x76, 0x0, 0xc0}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x8) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x880) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x531, &(0x7f0000000640)="$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") ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000026c0)={'gre0\x00', &(0x7f0000002640)={'erspan0\x00', 0x0, 0x7800, 0x10, 0x7, 0x4, {{0x5, 0x4, 0x1, 0x0, 0x14, 0x66, 0x0, 0x9, 0x4, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f0000000100)={[{@nouid32}, {}, {@nodelalloc}, {@nouid32}, {@journal_dev={'journal_dev', 0x3d, 0x9}}, {@commit}]}, 0x1, 0x5af, &(0x7f0000000980)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, r3, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x8, &(0x7f0000000000), 0x4) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000940)=ANY=[]) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r4 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x42202) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, 0x0) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, 0x0, 0x4000000) getsockname$packet(r0, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x804) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x3, 0x101, 0x4000003, 0x9, 0xc84}, 0x23) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x20, &(0x7f0000000180)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e22, @loopback}]}, &(0x7f0000000080)=0x10) 31m6.91420831s ago: executing program 48 (id=4069): perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x10003, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x4, @perf_config_ext={0x7, 0x100}, 0x204, 0x0, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x142) 29m13.369759162s ago: executing program 49 (id=5099): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) 20m36.859382043s ago: executing program 50 (id=8299): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000003c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000000)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)={0x28, r1, 0x1, 0xfffffffd, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040040}, 0x4000000) 15m57.980049913s ago: executing program 51 (id=14461): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001c00010028bd7000fcdbdf2507000000", @ANYRES32=r1, @ANYBLOB="8f70120b0a000200"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x4040000) r2 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 15m56.910132514s ago: executing program 52 (id=14481): socket$inet_sctp(0x2, 0x5, 0x84) fsopen(&(0x7f0000000240)='ramfs\x00', 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f000008d000/0x1000)=nil, &(0x7f00005e1000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f000068c000/0xc000)=nil, &(0x7f0000817000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x40) r0 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xcefb, 0xc000, 0x4000002, 0x1000c1}) prlimit64(0x0, 0x6, &(0x7f0000000140)={0x0, 0x4}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02080000"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="16"], 0x50) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 15m53.283188735s ago: executing program 53 (id=14528): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000840)={'dummy0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000004380)=@newqdisc={0xf4, 0x24, 0x4ee4e6a52ff56541, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0x0, 0x3}}, [@qdisc_kind_options=@q_netem={{0xa}, {0xc4, 0x2, {{0x0, 0x0, 0xe, 0x0, 0x0, 0xfffffffe}, [@TCA_NETEM_LOSS={0x88, 0x5, 0x0, 0x1, [@NETEM_LOSS_GI={0x18, 0x1, {0x1000, 0x3ff, 0x1, 0xb, 0x5ea8}}, @NETEM_LOSS_GE={0x14, 0x2, {0x8020, 0xfe, 0x9, 0xffffffff}}, @NETEM_LOSS_GE={0x14, 0x2, {0xf6af, 0x1ff, 0x2, 0x10}}, @NETEM_LOSS_GI={0x18, 0x1, {0x3, 0xc2, 0xed8, 0x7d1, 0xffffffff}}, @NETEM_LOSS_GI={0x18, 0x1, {0x7, 0x0, 0x6, 0x88, 0x9}}, @NETEM_LOSS_GE={0x14, 0x2, {0x586, 0xfffff74f, 0x8001, 0x102b5e26}}]}, @TCA_NETEM_RATE={0x14, 0xd, {0x2000000}}, @TCA_NETEM_JITTER64={0xc, 0xb, 0x10}]}}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 15m52.428593948s ago: executing program 54 (id=14537): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x5, 0x7, 0x6, 0x3, 0x0, 0xffffffffffffffff, 0x20000000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r2}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000640)={r3, r1, 0x25, 0x0, @val=@uprobe_multi={0x0, 0x0, 0x0, 0x6fc}}, 0x40) syz_emit_ethernet(0xfc0, &(0x7f0000000300)=ANY=[], 0x0) syz_emit_ethernet(0x102, &(0x7f0000000100)=ANY=[@ANYRESDEC], 0x0) 15m51.431801203s ago: executing program 55 (id=14545): r0 = syz_open_dev$usbmon(&(0x7f0000000200), 0x6, 0x200) pread64(r0, 0x0, 0x0, 0x10000) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000040)) syz_open_dev$usbfs(&(0x7f0000000240), 0x10, 0x80100) 15m50.791581479s ago: executing program 56 (id=14553): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xea, 0x440, 0x0, 0x32}, 0x9c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)=0xe, 0x4) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0x0, 0x0, @empty, 0x6}}, 0x0, 0x0, 0x0, 0x0, 0x8a}, 0x9c) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 15m49.527566002s ago: executing program 57 (id=14561): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0xfffffff9, 0x7fff, 0x16, "0062ba7d82000000000000000000f7ffffff00"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000280)={0x9bc, 0x3741, 0x775e, 0x5, 0x8, "7eaa1ea790235ca7696c911fdf80d147507b21"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000d88000/0x1000)=nil, &(0x7f00007f2000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000ca9000/0x2000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x24058041) r2 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="16"], 0x50) io_uring_enter(r2, 0x2219, 0x7721, 0x16, 0x0, 0x0) 15m44.534509626s ago: executing program 58 (id=14611): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="e00000000a0601010000005a000000000300000908000940800000010900020073797a310000000005000100070000000800094000000005880008800c000780080009"], 0x13a}, 0x1, 0x0, 0x0, 0x2000c880}, 0x48084) 15m14.001757652s ago: executing program 59 (id=15388): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400090000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000010000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e1a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080e71113610e10d858e8327edb1fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18c65ae1bd4f4390af9a9ceafd07ed00b0000002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a891588d818a0afc0b3116a130974cac0615232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72c7ead0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9624d37c10223fdae7ed04935c3c9068000000bc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b40000000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f3ca1664fe2f3ced8416dc180604b60c2499d16d7d9158ffffffff00000000ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d7676074a0bde4471414c99d4894ee7f8139dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8070000001fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b2042b8ff8c21ad702cca54728acad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd20785f653b621491d04aaee0d409731091f4fb94c06006e3c1be2f633c1d987591ec3db58a7bb3042ec3f84e4272d2cc72d4e771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e1590bab105b0cb578af7dc7d5e87d48d376444e2de02f47c61e8e84ff828de457f34c2b08660b080efc707e676e1fb4d5865c0ca177a4c7fbb4e829ab0894a1062b445c00f576b2b5cc7f819abd0f885cc4806f47ffb966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d3676329bb8cda690d192a070886df42b2708398773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169cdfaa4252d4ea6b8f6216ff202b5bfc182cb5e8380100632d03a7ca6f6d0339f9953c30930804fdc3690d10ecb65dc5b47481edbf1eee2e8893e903054d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026def743f1213bf817becd9e5a225d67521d1128eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979030000007081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f324661351df747aa6a65872dfdcfa68f65bd06b4082d43e121861b5cc09b986bf56c747d9a1cc5b506892c3a16ff10feea20bdac89bfb758cf3500000000000000000000000000000098e6db5a96055e764a3bfd4ccb20d2e800994f4b602d25b2c076f21c7102687e054bb93b2d013be6227fd99902b074c0de00733128c81c48c5e140b17d71ac48f137d10798c4272826d2ba55bbda0059636528c132ed06759d880d1bc291a76456cd7ee8bcb392fdf886dbc74879ec4b831904d7c101ebbaef3c0ae6d0cf0000000000000000000000000000000011cb735f66a559ef0cdb5163a15c0bb986474bf5d9542e3e48805ce53127e4c076d69d868df543717aaaa07d7aca056f7f036c2bcba0795d1a64868a29ac5321b3cd6ef5b1a741afc7124ee3df3a35e8014d6cb5fd6c054a10bb2146174c1d68b45fcfd7e531090ceae2f05536a4d5d6a4081e743827fb9c031d1fc9f195c2da189c49eaed6c30c71da0452e502ef393efeb02ebe82b1851cae5fa7c958ba23110b5e0e5b890803f28a356b2920e74564e0f8377b0ba5187fed2882b4780a1bcb583f1cb1470003ef9b592b9461328cfc01ebfce0ecdcea714a517dc40000000000000000000000000006bd0561e1cc72880cc3ec1bdf35eb670a9040e3b53cd826b94ad8aeb014e74787fe89fb3247a87d8bfb6d400142369f88964708d1d4db5a5df9d62ea6d805dfce568b885a50ed8e2eaf8a932287a1d3bfac17774e58875a63b77e07298e4b4f515189c6fcac3cd35dac9240e633219bb6a5a25865e6ed8e16caa5406b56702afe0befcabbc9a2a772a1a087f0d633d457bceb695b2cba3a1a2daa2dda796373cc0fe0a53236d028fc1076bb746b2717c8b6052f58c91bb8cc19474ab9d4d2160773829f078727f6c684ca749136a7f46ca28b00bb4237695b4"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2e0, 0x5ee, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f91731dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) 15m13.17593328s ago: executing program 60 (id=15405): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000002d40)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000000203010200000000000000000000000009000200000000470200000008000340000000000800010001"], 0x30}}, 0x0) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40049d1}, 0x0) 15m12.947860856s ago: executing program 61 (id=15412): r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24000088, &(0x7f00000001c0)={0xa, 0x4e20, 0x8, @loopback, 0xfffffffe}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000200)=0x3fd0, 0x4) sendmmsg$inet6(r0, &(0x7f0000004280)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)="147112e2f56040885efa42d123cac58eb92908d472d15cf2b94cd4431951ea5fc11fb9c1f054714308ec70c187d2cab403262cbce0a52e006a1df7e1b7b828694822bd06ae639948674559bf72ebc7ffa571c161a7a74a35a3113c7a04ad3ee791e92bb80068ec5c023f5bf422d4d61e5363407a8777df12a3e1ef90b3b23bbac96887fee9c951edf7fcd86695caa648e0945abbb89df866a01248e14e11494cac643aa57e29ac1b52508f2f216c1a4fc7e20e5e348e659b661e5764da0c046b89bacff6b85b47012aeb8d9473ec4ca842ca4e80fd5c5b65bbef911596e62d6076251766ab340acc877626e76fa7895931f9ee3ac21229e3cf3b8d01d0227ff128e8b5d7cfe94cb974d356afc8e9802e1463f609", 0x114}], 0x1}}, {{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000003580)='j', 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003740)='Z', 0x1}], 0x1}}], 0x4, 0x84) 14m44.692312017s ago: executing program 62 (id=16046): r0 = socket$kcm(0x11, 0x200000000000003, 0x300) sendmsg$sock(r0, &(0x7f0000000600)={&(0x7f0000000280)=@ieee802154={0x24, @long={0x3, 0xffff, {0xaaaaaaaaaaaa0302}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)}], 0x1, &(0x7f0000000500)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x8010) 14m9.07482482s ago: executing program 63 (id=16544): socket$kcm(0x11, 0xa, 0x300) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000500)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWRULE={0x48, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_EXPRESSIONS={0x1c, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @synproxy={{0xd}, @val={0x4}}}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x24044010) r1 = socket$kcm(0xa, 0x3, 0x3a) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) sendmsg$kcm(r1, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xffffffffffff0000, 0xac14140c}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)="8bcd", 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) 14m5.312853045s ago: executing program 64 (id=16630): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="5c000000020601080000000000000000000000000900020073797a310000000005000400000000001400078008001240000100000800114000000000050001000600000005000500000000000d000300686173683a6d6163"], 0x5c}}, 0x4004804) 14m3.768084763s ago: executing program 65 (id=16645): bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x8, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000400050000", @ANYBLOB="000000002f47c439a7000000003436b702000014000000b70300", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$kcm(0x11, 0x200000000000003, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000040), 0x4) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x1}, 0x2) 13m56.17979843s ago: executing program 0 (id=16815): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0a000000120300000200000009"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), 0x0, 0x2}, 0x20) 13m56.077128011s ago: executing program 0 (id=16817): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x5}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="27031c12d8f714000000002f1eafbcf706e105000000894f000f1102ee1680ca8286cee844000000000019b0fb0bba00"/65, 0x41}, {&(0x7f0000000440)="63f805d7649496db72959832930469edc7b7d050139bf7ada32bc9e37eed1153ecb716cdb8981cd819af0b33254465cc904b7b31789d65c0e0d3333ce2ef36205dd154e363bcadf8f2ea93f45503c6d9fd8dfe5a638cfeb9f79c930a4d18260e5a08ffd35ed8371cff78119319b2b62c7cd9378c73ae90c801681f55ef26cb0000000000000000", 0x87}, {&(0x7f0000000280)="fe112162c63e6da8bc8432294ef18af53cc330a62a2c7035246635093ba4d30fcf19a90804f04a10939db8f4e13069cda6d167bf1b68c94d8d694d6ad1a4d51a715975560ad48770706eb1b88d021e1119f2eb75275cfe77f862368649be0f7aff5e7826729816e3d3e7986d9434f891c71ca6e4210c6757083cfd8e732048c504f28b6d309fc129ed8eb5a82e224eb648f90134d1d315977c6ea360a7fece4baa3dd7dcc970759f29df0e86469e954e2b050e87b203ca27a2a519b7555c3b73f2681d49442d9647ff5ea64110cc5020fd", 0xd1}, {&(0x7f0000000180)="6fe4dd9eeba3271dc700b581440284", 0xf}], 0x4}, 0x0) 13m55.976268221s ago: executing program 0 (id=16819): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x670, 0x0, 0x0, 0x0, 0x9}, [@generic={0x73, 0x1, 0x1, 0x6}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 13m55.941240694s ago: executing program 0 (id=16820): r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x4}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000600)}, {&(0x7f0000001a40)="e969b9ca2a9a2732559840ec1ed4bfe607b21531c4e677ffe27da0a9157d62acd6f8707097e994ef79268390a8b1c8bec6d2edd3a30819156fd7b6cf8d02b3c128b0e38807c6c0dbeece245c58a6ece453ceeda1ed3d7e225991e9ce06cae9d4fc7ea2e87adc53e8c9e0d64ff86f856586470783cf57a008a283be0ca07aec9f7bd8063dd7b8121d0c00824cba8bc03683a6392ce744fe7ac78840631e5fd77a717af96e35076ee0987bfb82b62907185d36f8bb0d6e226fb0f927f5f6f59fb26c714b75e2bf7575e7a62e71a5b4292cee2f156834b50d9b6bb4c272fc03a904a13177541045210604c2a0177c84ebcfe6cd9f34936aa1c98bdbc9ebc5c08ce2b04051f73e71b7205895e2042f8f1aa7486393595db0d13e599d1dccce6fec21c3e03543a4a62d57d9a0312d9637370f1efe6d711d09eb11d8fd7e234110cb876dda29d57b80a2c6b185fee558bb46dac5a9d59ff2ac8b07346a280a05f150f1084566ae2b8057b433ceaa7ae566bf6627e9a82fc18bf82d45702353211325cd505185a5c19d9b9249a67e2d8ba34c9e05040bbdacf74a45b4d7fc0897893476b5e4fe88d652287b9c462d26c9553cda36fe1e2bc48c5833ba044423b40b451cbf7d2b0ff9772e1949887bfa0f4b016d13b2336e74d914efab02c98eb19f6d4d1a7bf03be4a02925e6b888109cb60645af050bf53a3425370d77420caa3581dd2a8f7e270c68d95a359e6eb97594ea1b6b24884ce0336630e3638ceaa272badff0fe4b7ca515725161f031d95e0460074d63b8708ff6dea2a1a31bd541468bbb8d770f131f9afbf73af9e0bb2326a52beab528e239762e8fd3626de064ed3b30447e73003a19dee1a0745746dfc5d757a41e762b94a27f3a32d377bff74812955e97593f19567b7153c900cc04e9d2ec9f3e2529aedab30a6900760b2f3f65744fe88d12836dd23813d83455af836d8845a286ebc55475820d861433f1b22a3958d9e799081874211390543c933a71cc64c700fb66997fd19d08941c74fbea7c4519f00a2787f621ef2e4f841971d5f1f453a7d87fe31af0ad271ba66f743077bfa97341fda914bdb208faf836b24ddf13234b8b952ed88a535d9465af1446578db7996b0c56a84ed712d5329fcc9ea80e05667f32b3b0dd0524632edc07090139c4b8c9b6b0fde26442ba97592d1572882caca27dc16387d203e5a57caf08556b3cac6654f1978624b5669d6f7e958394d7d8d0b00b57377ebd4025b6cbe69b38d9621ad1c1fa59da63010ef72e573194cc0977490467536fd1ed41dcd0713fc6c813a1a951a1648f68e5cec776192b1e24887fbe0f7506a33ce33a46007576cdab50b16c1d09a850b700fa9ab01951230108a8250045ba9237e47550b807c21eea6cc198022bc9781b3520c0c19af08150d79c0271cdabf9ec36e60d4ee88ad5f2dc7e2ba85eb637db4ee4fcac4e6776ded538cd55dccfc2f62cae047ccf0d5c3f324403c4482112cf57a3b0b0815a09c0250e4420455350a0a086d10c1ab823ff414b1f5cd997968e35ffe5e34db90645baf2fddbe70a5aa64e65ccdb0a40020754b90b571c982641bd5a3a66cb747af4888d9aba217be9b0a0080f295e8582e0547ee5235cb927af979e2a16d334fef04af110af639bfcf538435483e9e4a9a3df281245fca24d4f8d106881fb5cf4eeaa4c17d7e074c6fd484abc02a65daa9125c2999cf0157afb83c3ff1e57199543d6e454eb583c7cc877f742ad4678e97d4022ffa07299839203e85f23a4a70044131a9b4b0d95caee2665602536e9d80f635b09d4aae1842d41e66a7bd62d2d5bdea2d2a02b6b3c4c0f3f9726e5a7405d77dd504277f05f1733bfe8764833d45d3a99de8396e529a7eccb9f9b2dc674f9cb4d963b423581a024b9f8a7fe0e0ccbd8c12f3a4c87beb135a573155b0c627986b79c12999a13559f85181aba1e634d92eae7e3e170f6bba66c6e81be582c135f94e34208f98dbee33fd5aed16d8be95f8732960062dd8ade74a633170df8b7b900a10e92c8deb78d92716af5721056465cea75cccea533f509c071d76798a155ff3dae5d04292c9ab7c951863a358262d6cef0d46ed3bb20398fe6b990f3f75da8a64e45329f7dd66e2699dfdb44f2f4892667f4e16b70d4dfb9d0636b7013e5bc6b3cb09cfdafbdeddb7a51540e618e226a7edb4d1d676888e7dff2a3d87d0d4bc0dc497b233d46a9f0b07808a849069dde96fc0928448d8478f038671d411ed39b094c0e015fc8ac8d398bae174c96cdbe63e63b21b8873207e031d301e849036a8df084620c963151c27dd1ea37b2540d78e15c913f03a301e727175d959295af3005f43f4d5e571cefdbc7185122a3b52996599a2e45b44cef66f56dcc347fe30b2e97f0138ac358f3ec1d52b3aab7dc8918ed6f2d1d5a6e7caaf779650f51b4060ef310638d2f6f8be6515b202fefb95f2947b5ca35aae027d7081a8a0148f92baafc1e6a5a4b50621ab8803ee86e580aea4128d8c12af1107e897f231b06ce22094131f8813d61b42c575a1b60fc944cb1769a45fa79f082d8fbe5342327bf5b945648a02a67a63ef987e6af6261361818c5439a34895737286285e96b053e512f809c2b2ceca71d9838ab305bba1fa89e17fd27c528d2c32364bd7ba7a0a269446a69639ff1aedd0d5f2fe08a1ca495f92dd0714c2e583669bd2f6215029684694174c5ffec194a1afc74972e701945162f9b2b19fef249b650c1e49fb8dff75f17fabfe73d5b4afd72c0458e63b93093ed4925b8fed9b3004f97d86a46ca76232c420eb23575289a0d450c4ff735967604aeb7cffcb12de41265bab51332c259b70598090a58b29562f17a1133defa8d8886fcdf007f6870126f3a3f8a7cead2c8f9b56b3294e6828fdfc580067c9bf1af74270142ae381bc5f9b01a9eabf150dba335fdc4cb76bc0d7d470af11893c9671169dab94d60ceec7e435808b07c4ab7431a095b2236136c557a73926c32339af1710be6bc0a89094b90edc7f7cf459cc7ba15a1a2231732c54c9d121f7eb661d2d1ec86d1a081e6dc3d2b4af9ed101d6b161b3dded03f11063500f399928e9185014978dd51b1373d926ac97a6554178f63d8a6377ef8ce9c58b15d1bc53380d081f1ef1e8d1eff5b0a48f8f1aab4f5fadf5709c05684eb864a2c78bfacd3b56c46b2b31c9c3ff7a2d7a2fe283b8ab6510c0eecec8cf5fc64875e6a3cc81cf3e54b4d56fabfa7022f25faf53f0d917e9b11c037f46c86c2c619f21b1395d841f51610d9ae3fdefcf4ef17350c8a8e0112025771cd958a77e528a0d4fdd53805a5d9dfdeeca27ed7987f8f031cc38fe8d16bb42a1c67184f2a67b1b0139bbe73900545fa6ba1c09290708142b47574649372ae6d9be962e424ab8d8113a846dfe1c13306237a1efc66e9745c6db3d4ff02fd3892c5ca2767963f9f626211b254b79f9f72740633c5fb713b3e44c8122bbdb2edf095758a5c68994d8971187d513f548caa695ae3b54944f854c760309de46f739fcd2cec4ddfe527ed8debd88466460daf402913b44e9b4cc3fc28ee477a6b33cbfd3699b48fd048bb443f6a25e26b0b0135a3ddb6e003403d619ce016b2cd88a9a0f8316847bd89b325d3fadaa3530f99eaf4bb1d9a305fbc9237c11a50a84b8502494c230943e74dcb838f3cb8e1ff089eb2a7ef319b3bd296568c3e9dafe4389081046f52aab36efdaa4b16e4b06c34928c7a878a69f12d9be564b728fb37d9e1ee30a0571176fddda624e98c94b45da6b6ae5b943f4a39736384ea15df85ff7ce0889c4470da8def371ae669dcb786f293b7a6aaee474fdeadc9f66ec0fbc2a98773883f6e03a7717863049cc998aafa1f7ed6ed56614459b7b4440b55f52fce808ca802e65617d27dc2036ed0f645404e12c98a0b3020da9e08439b8283ec80803b1ae94e8fe6558bba7349c3e4101daf6ed747fa9ac2219857fa89bb11427f2e71790f92615c03951db097a4bda737bff78d7290b57b5edac8f4bafb5dcfef6fdf4167c7a81f6966ec2d61025b67224141eefbac420f88553ae149c7cdeb9594ae0c769005789bb34a7189ea06dff7388334954c9ff27b8f28e727a5e760a0184f40a17c8504c374275ace39d4e618c0ea248f6f4683886ca737ece30582f2302e94843513470eac6929c3f5bd71a1fbb7211bd474f7507f20ec521e07d4ed0be3e20e5c9f5aeb9c205afbb3bb6663691a04f8c0b0b81de5dcf6764b3633935d03a3827bd774ed9f9796063f5b19aaec7df3927643c4cba77dc401a763bb0f68b6a908296d93328df3c0e33bf4f8f3b345368c248cd4ae68b6782636b47986a80cd77094830cdb9eea964f16657b9d63e4bbbd07e728bc343201200b448ad3240cd7729a7d4366365f2f3bc7ab9ef903232dddb48aa54757ae669994ce599ebbf6d0bf4367864ef37b1c4c54c8038e724b8f0fb7cd67147bc9fc3e1293a7d729a0cbf11f00c5c67669cc3a373ed2555c36ea710139183b848e780219bed62f65e3f46876bc110617a86018ebeca434991f5f2fc008aa9e9aea07d9a82d4ef2a66a09cbce4372a19b95059cbe52996167936e4cff8a3b404f544955338d9d54930972156fbe8e5e42cf698b2ba8dcea42b998e3ccb44bd87189ac768b3ed8f93288c2646d0333fce58ee6a1b82d564fc70f619850794c40fc836281defe9d80663b85a490ccfd4c126c5341bfe1ae99057ef92dd1d9ddc390e3f6ec454533fc2a0be6a2141fb9a67e38a0d2165084d9e6ed97e2a2ba58e26f79fbb1bfb42c1e341e0d7c6c9ae03102caf72a7da5ec080d923dca5a06891fa5ed05d75e974831ffec5a217113d0fc312c61a0fbb9cb66ceb6135ba79b5ea08e6b23c798072e41349e9eb11a20a27e28b1f07a5e81e0187154dea0aa86446741f8f228e6d68138e3a596ef3539a35ee80c74f1df87258676da00566ac1bf01c983bdaa841ff3b2b0a734ead1044daf68a922822a19a65d3fb899e15bf346fa0679bb4c91ae9a0c18d73dcdf713c2f7419b4da134fde0d3b154a496d86453b21cd1e004a88d1b6132a91dbd38ab64e961567f163d4461079a6b34465549e9e32909e39e77f3740c9ca900740546c77c5b27e935485eef207a1d9e5ce5d9ea612443394835d160ec8f90f6c15035ede5d52f5c36a6b7a7e0646baa3109404949e87af12edef72c9414e403d24e66e128093c3c1b3dd934ab16bba9610999d0052e334d6de4868def73a629add9eb0194ffbea6eb7336003264627b533cbf68f92c8e4b8549b8209c0f4114220831d438e35d4447f1ea65f48373b54dbd9c4e1f28e54a8685865e4e2741cc20562f87356b96bdf4e856744fe99a193624ea40d13ee0ac3c4101490c413420109e6dfa5da36791a63935e3342b7806fed6a1b25de14874f5cf82f0863ebb1f72da4b06ef47226e9f5742ee82f4a1f51d4873ecb43daaacb2a4da99f5100c", 0xf2f}], 0x2}, 0x0) 13m55.855434297s ago: executing program 0 (id=16821): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x24000, 0x0) 13m55.775638991s ago: executing program 0 (id=16823): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="61126d000000000061134c0000000000bf2000000000000015000500511b48013d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586162c17600674"], 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, &(0x7f0000000100), 0x4) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x7, &(0x7f0000000200)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000001780)=""/4096, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x4, 0x6, 0x7, 0xb}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0xffffffffffffffff], &(0x7f0000000340)=[{0x1, 0x1, 0x3, 0x8}, {0x4, 0x2, 0x0, 0x2}], 0x10, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a2, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140), 0x4) gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a3, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xc, 0x7fff}, 0x8601, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6, 0x10, 0x0, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x244041, 0x0) 13m50.858300561s ago: executing program 66 (id=16727): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="1802000003000000000000000000000085000000a0000000850000005000000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 13m40.280982575s ago: executing program 67 (id=16811): socket$key(0xf, 0x3, 0x2) socket$kcm(0x10, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$kcm(0x2, 0x5, 0x84) r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc0042, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefffffc, 0x2, @perf_bp={0x0, 0x8}, 0x100000, 0x0, 0x0, 0x0, 0x3fe, 0x3, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x30000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff7, 0x11}, 0xa02, 0x0, 0x0, 0x8, 0x0, 0x1, 0xffff}, 0x0, 0xffffffffffffffff, r0, 0x0) socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x2, 0x2, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000007140100000000000000", @ANYRES32=r2], 0x30}}, 0x94) 13m39.613553904s ago: executing program 68 (id=16823): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="61126d000000000061134c0000000000bf2000000000000015000500511b48013d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586162c17600674"], 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, &(0x7f0000000100), 0x4) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x7, &(0x7f0000000200)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000001780)=""/4096, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x4, 0x6, 0x7, 0xb}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0xffffffffffffffff], &(0x7f0000000340)=[{0x1, 0x1, 0x3, 0x8}, {0x4, 0x2, 0x0, 0x2}], 0x10, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a2, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140), 0x4) gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a3, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xc, 0x7fff}, 0x8601, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20, 0x0, 0x0, 0x6, 0x10, 0x0, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x244041, 0x0) 13m29.343876128s ago: executing program 6 (id=17025): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$NFT_BATCH(r0, 0x0, 0x400c0c0) 13m29.225813045s ago: executing program 6 (id=17029): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x5}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="27031c12d8f714000000002f1eafbcf706e105000000894f000f1102ee1680ca8286cee844000000000019b0fb0bba00"/65, 0x41}, {&(0x7f0000000440)="63f805d7649496db72959832930469edc7b7d050139bf7ada32bc9e37eed1153ecb716cdb8981cd819af0b33254465cc904b7b31789d65c0e0d3333ce2ef36205dd154e363bcadf8f2ea93f45503c6d9fd8dfe5a638cfeb9f79c930a4d18260e5a08ffd35ed8371cff78119319b2b62c7cd9378c73ae90c801681f55ef26cb0000000000000000", 0x87}, {&(0x7f0000000280)="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", 0x19b}, {&(0x7f0000000180)="6fe4dd9eeba3271dc700b581440284", 0xf}], 0x4}, 0x0) 13m29.137635208s ago: executing program 6 (id=17031): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0xffffffffffffff7c, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee7, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r2, 0xfffffffffffffeef, &(0x7f0000000240)=0x2) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) listen(r1, 0x4) r6 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000000c0)={0x3, [0x400, 0x0, 0x5]}, 0xa) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000004c0)={0x30, r8, 0x1, 0x70bd2c, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x1c}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}]}]}, 0x30}}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x20, r10, 0x7, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x48050}, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0x0) 13m29.091215889s ago: executing program 8 (id=17032): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, 0x0, 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x24000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x8b7848, 0x0) 13m28.925844227s ago: executing program 8 (id=17034): r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = fcntl$dupfd(r0, 0x0, r0) write$sndseq(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, 0x0}}], 0x38) write$sndseq(r1, &(0x7f0000000740)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @queue}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {0x2}, @raw32}, {0x0, 0x0, 0x8, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0xfffffffe}}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @result}], 0x8c) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000040)) 13m28.799935762s ago: executing program 8 (id=17037): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x19, &(0x7f0000000400)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0xa, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 13m28.611253305s ago: executing program 8 (id=17038): openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20008008b}, 0x0) openat$sndseq(0xffffffffffffff9c, 0x0, 0x28002) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) r1 = syz_io_uring_setup(0x110, &(0x7f00000003c0)={0x0, 0xfad6, 0x800, 0x1, 0x3}, &(0x7f00000000c0)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x133d, 0x0, 0x8, 0x0, 0x0) 13m28.112046138s ago: executing program 6 (id=17043): r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x2000) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4", 0x46}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000a00)=""/221, 0xdd}, {&(0x7f0000000780)=""/253, 0xfd}, {&(0x7f0000003140)=""/4050, 0xfd2}, {&(0x7f0000000880)=""/267, 0x10b}, {&(0x7f0000000240)=""/175, 0xaf}, {&(0x7f0000000340)=""/176, 0xb0}, {&(0x7f00000010c0)=""/260, 0x104}, {&(0x7f0000000bc0)=""/26, 0x1a}, {&(0x7f00000006c0)=""/172, 0xac}, {&(0x7f00000005c0)=""/158, 0x9e}, {&(0x7f0000000140)=""/81, 0x51}, {&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000e80)=""/232, 0xe8}, {&(0x7f0000000b00)=""/168, 0xa8}], 0xf}, 0x0) 13m28.055944097s ago: executing program 8 (id=17044): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x24000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x8b7848, 0x0) 13m27.997403646s ago: executing program 8 (id=17047): r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = fcntl$dupfd(r0, 0x0, r0) write$sndseq(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, 0x0}}], 0x38) write$sndseq(r1, &(0x7f0000000740)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @queue}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {0x2}, @raw32}, {0x0, 0x0, 0x8, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0xfffffffe}}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @result}], 0x8c) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000040)) 13m27.793859396s ago: executing program 2 (id=17053): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0xffffffffffffff7c, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee7, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r2, 0xfffffffffffffeef, &(0x7f0000000240)=0x2) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) listen(r1, 0x4) r6 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000000c0)={0x3, [0x400, 0x0, 0x5]}, 0xa) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000004c0)={0x30, r8, 0x1, 0x70bd2c, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x1c}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}]}]}, 0x30}}, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x20, r10, 0x7, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x48050}, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0x0) 13m27.062455733s ago: executing program 6 (id=17057): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x24000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x8b7848, 0x0) 13m26.956897252s ago: executing program 6 (id=17059): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000340)}], 0x1}, 0x4004) sendmmsg$inet6(r0, &(0x7f0000000480)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x80020}, 0x1c, &(0x7f0000000300)=[{&(0x7f00000034c0)='\x00', 0x1}], 0x1}}], 0x1, 0x34000811) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="12e01b398adda1"], 0x1000f) 13m26.813043874s ago: executing program 2 (id=17063): r0 = socket$kcm(0xa, 0x3, 0x73) sendmsg$inet(r0, &(0x7f0000001180)={&(0x7f0000000000)={0xa, 0x0, @multicast2}, 0x10, &(0x7f0000001080)=[{&(0x7f0000000040)="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", 0xf00}, {&(0x7f0000001040)="9d7fcf3efc63f4a6a555ba8b4726d7ccaf8a207100e69cfac4377876021d7131b838059f96bd206d4776368ed2a92432e5af71", 0x33}], 0x2, &(0x7f00000010c0)=[@ip_tos_int={{0x14, 0x29, 0x43, 0xf00}}, @ip_tos_u8={{0x11, 0x29, 0x36}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @remote}}}], 0x50}, 0x0) 13m26.754259903s ago: executing program 2 (id=17064): recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000120) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x70400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0xb) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) getpid() sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x8040) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe33) close(0xffffffffffffffff) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x28, 0x3, 0x6, 0x3, 0x0, 0x0, {0xd, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4041}, 0x4000980) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@local, 0x0, 0x5, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa9, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7fffffff}, {0x0, 0xa00, 0x40800000000000, 0x800000000000000}}, [@tmpl={0x44, 0x5, [{{@in=@empty, 0x0, 0x3c}, 0x0, @in=@broadcast, 0x0, 0x0, 0x3, 0x4, 0x49}]}]}, 0xfc}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0xafe6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3d}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffeffff, 0x0, @perf_bp={&(0x7f0000000080), 0xc}, 0x4000, 0x0, 0x1, 0x1, 0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 13m25.686045924s ago: executing program 2 (id=17068): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x5}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="27031c12d8f714000000002f1eafbcf706e105000000894f000f1102ee1680ca8286cee844000000000019b0fb0bba00"/65, 0x41}, {&(0x7f0000000440)="63f805d7649496db72959832930469edc7b7d050139bf7ada32bc9e37eed1153ecb716cdb8981cd819af0b33254465cc904b7b31789d65c0e0d3333ce2ef36205dd154e363bcadf8f2ea93f45503c6d9fd8dfe5a638cfeb9f79c930a4d18260e5a08ffd35ed8371cff78119319b2b62c7cd9378c73ae90c801681f55ef26cb0000000000000000", 0x87}, {&(0x7f0000000280)="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", 0x19e}, {&(0x7f0000000180)="6fe4dd9eeba3271dc700b581440284", 0xf}], 0x4}, 0x0) 13m25.240948127s ago: executing program 2 (id=17069): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x24000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x8b7848, 0x0) 13m25.174480054s ago: executing program 2 (id=17070): r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x4b301, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000240)=0xd) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000000)={0x30000011}) 13m11.685649159s ago: executing program 69 (id=17047): r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = fcntl$dupfd(r0, 0x0, r0) write$sndseq(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, 0x0}}], 0x38) write$sndseq(r1, &(0x7f0000000740)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time=@time}, {0x0, 0x0, 0x0, 0x0, @time, {}, {}, @queue}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {0x2}, @raw32}, {0x0, 0x0, 0x8, 0x0, @tick, {}, {}, @note={0x0, 0x0, 0x0, 0x0, 0xfffffffe}}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @result}], 0x8c) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000040)) 13m10.675647852s ago: executing program 70 (id=17059): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000340)}], 0x1}, 0x4004) sendmmsg$inet6(r0, &(0x7f0000000480)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x80020}, 0x1c, &(0x7f0000000300)=[{&(0x7f00000034c0)='\x00', 0x1}], 0x1}}], 0x1, 0x34000811) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="12e01b398adda1"], 0x1000f) 13m8.662042379s ago: executing program 71 (id=17070): r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x4b301, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000240)=0xd) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000000)={0x30000011}) 5m11.379633168s ago: executing program 7 (id=23567): socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000086dd03000a000000140000006c07010033d43afffec00000000000000000000000000010ff020000000000000000"], 0x340a) 5m11.045151243s ago: executing program 7 (id=23571): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000026c0)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2, 0x2}}, [@qdisc_kind_options=@q_cbs={{0x8}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18, 0x1, {0x0, '\x00', 0x1, 0x7, 0x100, 0x8}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x208802, 0x0) close(r3) socket(0x400000000010, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newqdisc={0x78, 0x24, 0x4ee4e6a52ff56541, 0x70b922, 0x80000, {0x0, 0x0, 0x0, r7, {0x0, 0xfff2}, {0x9, 0xb}, {0xfff7, 0x4}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x83, 0x0, 0x5, 0x1, 0xc}, 0xb, 0x0, 0x5, 0x5, 0x9, 0x2, 0x9, 0x12, 0x8, 0x1, {0xffff1c72, 0x3, 0x1000, 0x101, 0xfffffffe, 0x5}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x8840}, 0x4008000) sendmmsg$inet(r4, &(0x7f0000001700)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10, 0x0, 0x0, &(0x7f0000001900)=ANY=[@ANYBLOB="140000000000000000000000010000000e000000000000001400000000000000000000000100000007000000000000002400000000000000000000000700000094040000820d212aab96bad6cdf92da325000000000000001c000000000000000000000008000000", @ANYRES32, @ANYBLOB="ac1414366401010100000000600000000000000010000000070000000144207d40000000090000069f000000060001000000000a76000000090000000701862a00000002070e301517f337fc5724b0f4b19f0210c22ab262618268e7b39eceaeaa720106fe8b1561940400001c000000000000000000000008000000", @ANYRES32, @ANYBLOB="ffffffff00000000000000001100000000000000290000000100000000000000000000001c000000000000000000000008000000", @ANYRES32, @ANYBLOB="0a010102ac1414aa000000001400000000000000010000000100000001000000000000001c000000000000000000000008000000", @ANYRES32=r7], 0x168}}], 0x1, 0x8000004) 5m10.661744718s ago: executing program 7 (id=23577): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() getpid() ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$UHID_INPUT(r3, &(0x7f0000002080)={0xfc, {"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", 0x1000}}, 0x1006) 5m9.523829565s ago: executing program 7 (id=23581): socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000086dd03000a000000140000006c07010033d43afffec00000000000000000000000000010ff020000000000000000"], 0x340a) 5m9.183870988s ago: executing program 7 (id=23584): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6c69f68dc1cf3e78, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000300)=r5) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 5m8.831775129s ago: executing program 7 (id=23588): r0 = socket$isdn(0x22, 0x2, 0x3) r1 = socket$isdn(0x22, 0x2, 0x2) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000100)={0x8, 0x80000100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f0000000100), 0x0, 0x0) read$msr(r2, &(0x7f0000001a40)=""/102392, 0x18ff8) io_uring_register$IORING_UNREGISTER_RING_FDS(0xffffffffffffffff, 0x15, &(0x7f0000001140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}, {0x0, 0x0, 0x0, &(0x7f0000000cc0), &(0x7f0000000d40)=[0x6cac]}, {0x0, 0x0, 0x0, &(0x7f0000001080), 0x0}], 0x3) openat$ptmx(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ptrace(0x10, 0x1) timer_create(0x0, 0x0, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000080), 0x10) r3 = dup3(r1, r0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r3) 4m52.591904894s ago: executing program 72 (id=23588): r0 = socket$isdn(0x22, 0x2, 0x3) r1 = socket$isdn(0x22, 0x2, 0x2) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000100)={0x8, 0x80000100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f0000000100), 0x0, 0x0) read$msr(r2, &(0x7f0000001a40)=""/102392, 0x18ff8) io_uring_register$IORING_UNREGISTER_RING_FDS(0xffffffffffffffff, 0x15, &(0x7f0000001140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}, {0x0, 0x0, 0x0, &(0x7f0000000cc0), &(0x7f0000000d40)=[0x6cac]}, {0x0, 0x0, 0x0, &(0x7f0000001080), 0x0}], 0x3) openat$ptmx(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ptrace(0x10, 0x1) timer_create(0x0, 0x0, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000080), 0x10) r3 = dup3(r1, r0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r3) 1m5.908698956s ago: executing program 1 (id=26371): socket$nl_xfrm(0x10, 0x3, 0x6) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x80a, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002240)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4060000000000007111310000000000851000000200000085000000070000009500000000000000950000000000000059a30f4936e44feb8adb9474dd7d10406d8bb1f72366e95281c2c0be09e6af23f926d804488628cda2ad6fe64f"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe}, 0x70) socket$inet_tcp(0x2, 0x1, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) close(0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000080)=0xfff, 0x4) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg(r0, &(0x7f0000000440), 0x0, 0x0) 1m5.225393042s ago: executing program 1 (id=26377): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x1, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x7ff, 0x3, 0x6361, 0x7, 0xffffffff, 0x3}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40088c1}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000600)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x70b926, 0x25dfdc01, {0x0, 0x0, 0x0, r3, {0x0, 0xffff}, {0xffff, 0xb}, {0xffff, 0x1e}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0xf, 0xdb, 0x7, 0x5, 0x2067f108, 0x5, 0x4, 0x3, 0x4}}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x200080e0}, 0x4890) sendto$packet(0xffffffffffffffff, &(0x7f00000005c0)="bad330fbc9b55400040000ea0756", 0xe, 0x40, &(0x7f00000001c0)={0x11, 0x8100, r3, 0x1, 0xd8, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x31}}, 0x14) 1m3.846992602s ago: executing program 1 (id=26387): syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) shutdown(r0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000000)=@ccm_128={{0x303}, "00008000e89700", "950000cffd914d4f51b57b3f80df847f", '\x00', "00000200"}, 0x28) syz_genetlink_get_family_id$batadv(&(0x7f00000003c0), r0) poll(&(0x7f00000001c0)=[{r0, 0x20}], 0x1, 0x4) 1m3.709039055s ago: executing program 1 (id=26391): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000540)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) sendmmsg$inet(r0, &(0x7f00000060c0)=[{{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000140)='@', 0x1}, {&(0x7f00000007c0)='y', 0x1}, {&(0x7f0000000340)="b9", 0x1}, {&(0x7f0000000940)="99", 0x1}, {&(0x7f00000008c0)='z', 0x1}, {&(0x7f00000009c0)='~', 0x1}, {&(0x7f0000000a00)='x', 0x1}, {&(0x7f0000000440)="06", 0x1}, {&(0x7f0000000580)='k', 0x1}, {&(0x7f00000006c0)="1d", 0x1}, {0x0}, {&(0x7f0000000280)='$', 0x1}], 0xc}}, {{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000001040)="fc", 0x1}, {&(0x7f0000001080)="c9", 0x1}, {&(0x7f0000002180)='-', 0x1}, {&(0x7f0000002240)='R', 0x1}, {&(0x7f00000033c0)="c4", 0x1}], 0x5}}], 0x2, 0x4000000) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000)=0x7fffffff, 0x4) 1m3.647143003s ago: executing program 1 (id=26394): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4800000010001fff000000000100000000000000", @ANYRES32=0x0, @ANYBLOB="0000000008440000200012800b00010067656e65766500001000028004000600060005004e2400", @ANYRES32=r2], 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 1m3.047535275s ago: executing program 1 (id=26400): socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) socket$packet(0x11, 0x3, 0x300) socket$inet_mptcp(0x2, 0x1, 0x106) socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$key(0xf, 0x3, 0x2) socket$packet(0x11, 0x3, 0x300) close(0x3) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$key(0xf, 0x3, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000013c0)=ANY=[@ANYBLOB="640000001000030400000000000000", @ANYRES32=0x0, @ANYBLOB="e5fda988000000002800128009000100766c616e00000000180002800c0002001c0000001f000000060001000000000008000500", @ANYRES32=r0, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="0a000100000070"], 0x64}, 0x1, 0x0, 0x0, 0x8811}, 0x0) 1m0.350903946s ago: executing program 5 (id=26426): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x100, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socket(0x400000000010, 0x3, 0x0) socket$unix(0x1, 0x2, 0x0) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x24040084) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r5, {0xffff}, {0xffff, 0xffff}, {0x2, 0xa}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff2}, {0xffff, 0x6}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) 59.813138601s ago: executing program 5 (id=26429): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2, 0x2}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0x2a, 0x8001, 0x2, 0x6, 0x6, 0x5, 0x3, 0x200, 0xfffffffb}}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70b923, 0x80000, {0x0, 0x0, 0x0, r4, {0x0, 0x9}, {0x10, 0xb}, {0xfff1, 0xb}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x2000c061}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r5) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00', @ANYRES16=r6, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) 59.755600849s ago: executing program 9 (id=26430): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000003080)=@newtfilter={0x58, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r6, {0xffff, 0x5}, {}, {0x7, 0x3}}, [@filter_kind_options=@f_basic={{0xa}, {0x28, 0x2, [@TCA_BASIC_EMATCHES={0x24, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x18, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x4, 0x7, 0x6}, {{0x2, 0x1, 0x1, 0x1}, {0x3}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1}}]}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x404c000}, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r7) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r8 = socket$kcm(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r8, &(0x7f00000000c0)={&(0x7f0000000380)=@xdp={0x2c, 0x7, r9, 0x3e}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)='\r', 0x1}], 0x1}, 0x0) 58.805134993s ago: executing program 4 (id=26435): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xa8442, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r2 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000380)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) close(r1) socket$unix(0x1, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r4 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r4, 0x107, 0xf, &(0x7f0000000600), 0x56) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r4, &(0x7f0000000280)={&(0x7f0000000740)=@xdp={0x2c, 0x0, r6, 0x42}, 0x80, &(0x7f0000000cc0)=[{&(0x7f00000002c0)="27030200dc0f14000e00003c0ff000000000ff840000000200000003125ce882cbf490d908f1523f000000002d9c2740e260a09c6911cda856d5141bffc6e29a5789796eec81944d7dff184d3319ce9dfb5c1fcd66e67b91a917a67ece64299573503cbc7e27133c4e5ed68c7a9b407a275bcff3432a487ebef21275b91d386164b443c1dfdf63831812", 0x8a}], 0x1}, 0x8bb3a321efc09a) 58.803111363s ago: executing program 5 (id=26436): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) getsockname$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c0000001000850600000000ff6122314a000800", @ANYRES32=r2, @ANYBLOB="f5ff0f00252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x40000) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x10, 0x803, 0x2) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r4) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') ioctl$BTRFS_IOC_GET_FEATURES(r6, 0x80189439, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r7, @ANYRES16=r5], 0x3c}, 0x1, 0x0, 0x0, 0x40020c1}, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f0000000100)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x56, r2}) socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c00000010000305000000000007000000000000", @ANYRES32=0x0, @ANYBLOB="0000000006100000140012800b00010062726964676500000400028008000a00", @ANYRES32=r2], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x440b0) 58.709089355s ago: executing program 9 (id=26437): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x3, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}}, 0x24}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x1, 0x3}, {}, {0x8, 0xfff1}}}, 0x24}}, 0x40004) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0xffffffff, {0x0, 0x0, 0x0, r7, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x24040084) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@newqdisc={0x30, 0x28, 0x4ee4e6a52ff56541, 0x3fff, 0x25dfdbfb, {0x0, 0x0, 0x0, r7, {0x1}, {0xffff, 0xffff}, {0xfff2, 0x1}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0xdc}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r4) 58.222989979s ago: executing program 4 (id=26439): r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x23, 0x0, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000002740)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=""/23, 0x17}, 0x8}], 0x1, 0x20, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) 58.195000984s ago: executing program 9 (id=26440): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) close(r4) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0xb}, {0xffff, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x4, 0x7, 0x48c1, 0x5, 0xffffffed, 0x6}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newqdisc={0x78, 0x24, 0x4ee4e6a52ff56541, 0x70bd25, 0x7fffe, {0x0, 0x0, 0x0, r7, {}, {0xb, 0xb}, {0xe, 0x4}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x3, 0x808, 0x205, 0x1, 0xc}, 0x8, 0xffffffff, 0x5, 0x0, 0x9, 0x8, 0x49, 0xd, 0x1, 0x1, {0x7, 0x3, 0x1000, 0x101, 0xfffffffe, 0x401}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x20004080}, 0x4000000) ioctl$SIOCSIFHWADDR(r4, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 58.087330043s ago: executing program 5 (id=26441): socket$nl_xfrm(0x10, 0x3, 0x6) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x80a, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002240)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="b4060000000000007111310000000000851000000200000085000000070000009500000000000000950000000000000059a30f4936e44feb8adb9474dd7d10406d8bb1f72366e95281c2c0be09e6af23f926d804488628cda2ad6fe64f"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe}, 0x70) socket$inet_tcp(0x2, 0x1, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) close(0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000080)=0xfff, 0x4) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg(r0, &(0x7f0000000440)=[{{&(0x7f0000000700)=@xdp={0x2c, 0x0, r2}, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}}], 0x1, 0x0) 57.933581373s ago: executing program 4 (id=26442): bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) r0 = socket$kcm(0x10, 0x2, 0x0) socket$igmp(0x2, 0x3, 0x2) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) socket$inet6_udp(0xa, 0x2, 0x0) socket(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$pppl2tp(0x18, 0x1, 0x1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r1}, &(0x7f00000001c0), &(0x7f0000000300)=r2}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x5, 0xe, 0x0, &(0x7f0000000040)="000000000000000000000001e370", 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x50) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 57.76887114s ago: executing program 4 (id=26445): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x40040, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$kcm(0x11, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r5 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0x1}, {0xffff, 0xffff}, {0x5, 0x9}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=@newtfilter={0x8c, 0x2c, 0xd27, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, {0xb, 0xfff3}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x58, 0x2, [@TCA_MATCHALL_ACT={0x54, 0x2, [@m_skbedit={0x50, 0x1, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8, 0x5, 0x4c1}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x3, 0xd73, 0xffffffffffffffff, 0x80, 0x401}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x810}, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r7) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r2, &(0x7f00000000c0)={&(0x7f0000000380)=@xdp={0x2c, 0x7, r8, 0x3e}, 0x80, &(0x7f0000000080)=[{&(0x7f0000002300)="81", 0x1}], 0x1}, 0x4) 57.76743336s ago: executing program 9 (id=26446): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000003080)=@newtfilter={0x58, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r6, {0xffff, 0x5}, {}, {0x7, 0x3}}, [@filter_kind_options=@f_basic={{0xa}, {0x28, 0x2, [@TCA_BASIC_EMATCHES={0x24, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x18, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x4, 0x7, 0x6}, {{0x2, 0x1, 0x1, 0x1}, {0x3}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1}}]}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x404c000}, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r7) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r8 = socket$kcm(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r8, &(0x7f00000000c0)={&(0x7f0000000380)=@xdp={0x2c, 0x7, r9, 0x3e}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)='\r', 0x1}], 0x1}, 0x0) 57.628166192s ago: executing program 5 (id=26447): socket(0x22, 0x2, 0x2) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r1) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010026bd7000fcdbdf250200000008000100", @ANYRES32=r3], 0x1c}}, 0x840) write$nci(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="6105070103"], 0x12) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x800) 57.441300806s ago: executing program 4 (id=26449): r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) connect$llc(r0, &(0x7f0000000080)={0x1a, 0x322, 0x4c, 0x9, 0x5, 0xfb, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmmsg$inet(r2, &(0x7f0000000c40)=[{{&(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x23, 0x0}}], 0x1e1730a30afb6559, 0x8014) bind$llc(r2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x90, 0x3f, 0x10, 0x70bd2c, 0x25dfdbfc, {0x16}, [@nested={0x76, 0x17, 0x0, 0x1, [@typed={0x8, 0x113, 0x0, 0x0, @u32=0x1}, @nested={0x4, 0xc0}, @typed={0xc, 0x75, 0x0, 0x0, @u64=0x10001}, @nested={0x4, 0x11b}, @typed={0x5, 0x75, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x121, 0x0, 0x0, @ipv6=@remote}, @generic, @generic="49dbd1d2a7a2e0e8c7f1da314ae0f14be162bfe2f4539844cbd98f97b4ced1e2d596d1956b0b43f7ec29629aa76b02ea51547076818233878119"]}, @typed={0x4, 0x39}]}, 0x90}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000ac0)=@newsa={0x144, 0x10, 0x1, 0x8000000, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, {@in=@broadcast, 0x0, 0x33}, @in=@local, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x5680000000}, {0x10, 0x9, 0x2}, 0x0, 0x0, 0x2, 0x1}, [@algo_auth={0x48, 0x1, {{'sha256\x00'}}}, @offload={0xc, 0x1c, {0x0, 0x1}}]}, 0x144}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x25dfdbfc, 0x2ffffffff}, 0xc) bind$netlink(r4, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfc, 0x200000}, 0xc) sendmsg$TIPC_NL_KEY_SET(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)={0x1b0, r3, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x4c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "9ea239186acb25a222a6ad614b612aa3a6eb4577471bc3a135"}}]}, @TIPC_NLA_MEDIA={0x100, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}]}, @TIPC_NLA_MEDIA={0x50, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2307b57}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x88}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x4000001}, 0x20004800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000081000010402730000fedbdf250000ffff", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c0012800e00010069703665727370616e0000001800028005000800800000000400120005000b0049000000"], 0x4c}}, 0x0) 57.385267824s ago: executing program 9 (id=26450): syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x7, @ipv4={'\x00', '\xff\xff', @local}, 0x1}, 0x1c) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000000)=@ccm_128={{0x303}, "00008000e89700", "950000cffd914d4f51b57b3f80df847f", '\x00', "00000200"}, 0x28) syz_genetlink_get_family_id$batadv(&(0x7f00000003c0), 0xffffffffffffffff) poll(&(0x7f00000001c0)=[{0xffffffffffffffff, 0x20}], 0x1, 0x4) 56.707804062s ago: executing program 3 (id=26457): socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0e000000040000000400000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)) socket$key(0xf, 0x3, 0x2) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$key(0xf, 0x3, 0x2) socket(0x400000000010, 0x3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) socket(0x400000000010, 0x3, 0x0) socket$unix(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xffe, &(0x7f0000000940)={&(0x7f00000013c0)=ANY=[@ANYBLOB="640000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="e5fda988000000002800128009000100766c616e00000000180002800c0002001c0000001f000000060001000000000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="0a000100000070"], 0x64}, 0x1, 0x0, 0x0, 0x8811}, 0x0) 56.660460833s ago: executing program 3 (id=26458): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x40040, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$kcm(0x11, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r5 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0x1}, {0xffff, 0xffff}, {0x5, 0x9}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=@newtfilter={0x8c, 0x2c, 0xd27, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, {0xb, 0xfff3}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x58, 0x2, [@TCA_MATCHALL_ACT={0x54, 0x2, [@m_skbedit={0x50, 0x1, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8, 0x5, 0x4c1}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x3, 0xd73, 0xffffffffffffffff, 0x80, 0x401}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x810}, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r7) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r2, &(0x7f00000000c0)={&(0x7f0000000380)=@xdp={0x2c, 0x7, r8, 0x3e}, 0x80, &(0x7f0000000080)=[{&(0x7f0000002300)="81", 0x1}], 0x1}, 0x4) 56.532147257s ago: executing program 3 (id=26459): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000003080)=@newtfilter={0x58, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r6, {0xffff, 0x5}, {}, {0x7, 0x3}}, [@filter_kind_options=@f_basic={{0xa}, {0x28, 0x2, [@TCA_BASIC_EMATCHES={0x24, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x18, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x4, 0x7, 0x6}, {{0x2, 0x1, 0x1, 0x1}, {0x3}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1}}]}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x404c000}, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r7) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r8 = socket$kcm(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r8, &(0x7f00000000c0)={&(0x7f0000000380)=@xdp={0x2c, 0x7, r9, 0x3e}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)='\r', 0x1}], 0x1}, 0x0) 56.424936277s ago: executing program 3 (id=26460): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40840) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)="89e7ee2c7cdad9b4b47380c988ca", 0xffbf}], 0x1) 49.220534553s ago: executing program 9 (id=26461): r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="500000001000370400000000ffdbdf2500000000", @ANYRES32=r3, @ANYBLOB="01f5050000000000300012800b00010067656e6576650000200002800500040001000000140007"], 0x50}, 0x1, 0x0, 0x0, 0x11}, 0x40004) sendto$packet(r0, 0x0, 0x0, 0x40800, &(0x7f0000000080)={0x11, 0x8100, r3, 0x1, 0x5, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2c}}, 0x14) 46.064926025s ago: executing program 5 (id=26462): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x4, @loopback, 0x8}, 0x1c) sendmmsg$sock(r0, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000640)="89", 0x1}], 0x1}}], 0x1, 0x0) 43.086774421s ago: executing program 3 (id=26463): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x50, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x14}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x81}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x78}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x3c, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, '\x00\x00'}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x64}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[], 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 38.791641948s ago: executing program 4 (id=26464): r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) rt_sigprocmask(0x2, &(0x7f00000003c0)={[0xa]}, 0x0, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x80) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) unshare(0x2a020400) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x58}}, 0x0) msgsnd(0x0, &(0x7f0000000480)=ANY=[@ANYRESDEC], 0x2000, 0x0) msgrcv(0x0, 0x0, 0x0, 0x2, 0x3000) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000040000100fcff0700040000000100000004004880180001801400108010000880a831985351cb3d4a577293610c0002000000000000000000697fff6d86830da42fffad7505a5d56dfe18cef14261a147f4ee8c5941a6a10c983b8df251d528e8"], 0x3c}, 0x1, 0x0, 0x0, 0x400c801}, 0x4008094) write$UHID_INPUT2(r0, &(0x7f00000001c0)=ANY=[], 0x6) 28.470965444s ago: executing program 73 (id=26461): r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="500000001000370400000000ffdbdf2500000000", @ANYRES32=r3, @ANYBLOB="01f5050000000000300012800b00010067656e6576650000200002800500040001000000140007"], 0x50}, 0x1, 0x0, 0x0, 0x11}, 0x40004) sendto$packet(r0, 0x0, 0x0, 0x40800, &(0x7f0000000080)={0x11, 0x8100, r3, 0x1, 0x5, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2c}}, 0x14) 24.783993661s ago: executing program 74 (id=26462): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x4, @loopback, 0x8}, 0x1c) sendmmsg$sock(r0, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000640)="89", 0x1}], 0x1}}], 0x1, 0x0) 19.994748282s ago: executing program 3 (id=26467): socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0e000000040000000400000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)) socket$key(0xf, 0x3, 0x2) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$key(0xf, 0x3, 0x2) socket(0x400000000010, 0x3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) socket(0x400000000010, 0x3, 0x0) socket$unix(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xffe, &(0x7f0000000940)={&(0x7f00000013c0)=ANY=[@ANYBLOB="640000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="e5fda988000000002800128009000100766c616e00000000180002800c0002001c0000001f000000060001000000000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="0a000100000070"], 0x64}, 0x1, 0x0, 0x0, 0x8811}, 0x0) 17.527032068s ago: executing program 75 (id=26464): r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) rt_sigprocmask(0x2, &(0x7f00000003c0)={[0xa]}, 0x0, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x80) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) unshare(0x2a020400) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x58}}, 0x0) msgsnd(0x0, &(0x7f0000000480)=ANY=[@ANYRESDEC], 0x2000, 0x0) msgrcv(0x0, 0x0, 0x0, 0x2, 0x3000) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000040000100fcff0700040000000100000004004880180001801400108010000880a831985351cb3d4a577293610c0002000000000000000000697fff6d86830da42fffad7505a5d56dfe18cef14261a147f4ee8c5941a6a10c983b8df251d528e8"], 0x3c}, 0x1, 0x0, 0x0, 0x400c801}, 0x4008094) write$UHID_INPUT2(r0, &(0x7f00000001c0)=ANY=[], 0x6) 0s ago: executing program 76 (id=26467): socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0e000000040000000400000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000080)) socket$key(0xf, 0x3, 0x2) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$key(0xf, 0x3, 0x2) socket(0x400000000010, 0x3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) socket(0x400000000010, 0x3, 0x0) socket$unix(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xffe, &(0x7f0000000940)={&(0x7f00000013c0)=ANY=[@ANYBLOB="640000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="e5fda988000000002800128009000100766c616e00000000180002800c0002001c0000001f000000060001000000000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="0a000100000070"], 0x64}, 0x1, 0x0, 0x0, 0x8811}, 0x0) kernel console output (not intermixed with test programs): 485][T22087] syzkaller0: entered promiscuous mode [ 2396.362146][T22087] syzkaller0: entered allmulticast mode [ 2396.460597][T22098] netlink: 'syz.9.25663': attribute type 39 has an invalid length. [ 2396.563640][T22110] netlink: 4 bytes leftover after parsing attributes in process `syz.9.25666'. [ 2396.574293][T22101] syzkaller0: entered promiscuous mode [ 2396.598389][T22101] syzkaller0: entered allmulticast mode [ 2396.721718][T22120] syzkaller0: entered promiscuous mode [ 2396.727407][T22120] syzkaller0: entered allmulticast mode [ 2396.825718][T22110] netlink: 52 bytes leftover after parsing attributes in process `syz.9.25666'. [ 2397.018961][T22134] syzkaller0: entered promiscuous mode [ 2397.024501][T22134] syzkaller0: entered allmulticast mode [ 2397.098853][T22150] syzkaller0: entered promiscuous mode [ 2397.104800][T22150] syzkaller0: entered allmulticast mode [ 2397.121539][T22151] netlink: 'syz.9.25676': attribute type 39 has an invalid length. [ 2397.136310][T22139] syzkaller0: entered promiscuous mode [ 2397.141784][T22139] syzkaller0: entered allmulticast mode [ 2397.207103][T22156] syzkaller0: entered promiscuous mode [ 2397.212922][T22156] syzkaller0: entered allmulticast mode [ 2397.289616][T22161] netlink: 4 bytes leftover after parsing attributes in process `syz.4.25686'. [ 2397.340114][T22165] syzkaller0: entered promiscuous mode [ 2397.353268][T22165] syzkaller0: entered allmulticast mode [ 2397.619060][T22161] netlink: 52 bytes leftover after parsing attributes in process `syz.4.25686'. [ 2397.827727][T22189] syzkaller0: entered promiscuous mode [ 2397.833628][T22189] syzkaller0: entered allmulticast mode [ 2397.841980][T22193] lo: left promiscuous mode [ 2397.846610][T22193] lo: entered allmulticast mode [ 2397.858840][T22199] lo: entered promiscuous mode [ 2397.865163][T22199] lo: left allmulticast mode [ 2397.936515][ T28] kauditd_printk_skb: 1194 callbacks suppressed [ 2397.936528][ T28] audit: type=1400 audit(2000000289.520:364922): avc: denied { read write } for pid=18518 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2398.018561][T22204] netlink: 12 bytes leftover after parsing attributes in process `syz.9.25696'. [ 2398.031068][ T28] audit: type=1400 audit(2000000289.520:364923): avc: denied { open } for pid=18518 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2398.032184][T22204] vlan2: entered promiscuous mode [ 2398.061216][T22204] bridge0: entered promiscuous mode [ 2398.083219][ T28] audit: type=1400 audit(2000000289.520:364924): avc: denied { ioctl } for pid=18518 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=105 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2398.121658][T22208] syzkaller0: entered promiscuous mode [ 2398.137737][T22208] syzkaller0: entered allmulticast mode [ 2398.151229][ T28] audit: type=1400 audit(2000000289.520:364925): avc: denied { read write } for pid=16748 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2398.230173][ T28] audit: type=1400 audit(2000000289.520:364926): avc: denied { open } for pid=16748 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2398.230891][T22210] syzkaller0: entered promiscuous mode [ 2398.260755][ T28] audit: type=1400 audit(2000000289.520:364927): avc: denied { ioctl } for pid=16748 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2398.277590][T22210] syzkaller0: entered allmulticast mode [ 2398.293830][ T28] audit: type=1400 audit(2000000289.520:364928): avc: denied { recv } for pid=3299 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2398.321354][ T28] audit: type=1400 audit(2000000289.530:364929): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2398.356658][T22213] team_slave_0: entered promiscuous mode [ 2398.362342][T22213] team_slave_1: entered promiscuous mode [ 2398.370178][T22213] vlan2: entered promiscuous mode [ 2398.384651][T22213] team0: entered promiscuous mode [ 2398.396421][T22222] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2398.405712][T22222] audit: audit_lost=2990 audit_rate_limit=0 audit_backlog_limit=64 [ 2398.529897][T22227] lo: left promiscuous mode [ 2398.538681][T22227] lo: entered allmulticast mode [ 2398.552952][T22228] 8021q: VLANs not supported on vxcan1 [ 2398.593507][T22227] lo: entered promiscuous mode [ 2398.607276][T22227] lo: left allmulticast mode [ 2398.690726][T22237] netlink: 12 bytes leftover after parsing attributes in process `syz.1.25710'. [ 2398.717658][T22232] syzkaller0: entered promiscuous mode [ 2398.724094][T22232] syzkaller0: entered allmulticast mode [ 2398.744382][T22239] syzkaller0: entered promiscuous mode [ 2398.761425][T22239] syzkaller0: entered allmulticast mode [ 2399.116293][T22262] syzkaller0: entered promiscuous mode [ 2399.122305][T22262] syzkaller0: entered allmulticast mode [ 2399.195086][T22262] 0: reclassify loop, rule prio 0, protocol 700 [ 2399.233273][T22265] netlink: 8 bytes leftover after parsing attributes in process `syz.5.25717'. [ 2399.289328][T22265] netlink: 8 bytes leftover after parsing attributes in process `syz.5.25717'. [ 2399.509290][T22270] lo: entered allmulticast mode [ 2399.527336][T22270] lo: entered promiscuous mode [ 2399.533963][T22270] lo: left allmulticast mode [ 2399.589246][T22272] IPv6: Can't replace route, no match found [ 2399.719144][T22278] syzkaller0: entered promiscuous mode [ 2399.731134][T22278] syzkaller0: entered allmulticast mode [ 2400.005088][T22284] syzkaller0: entered promiscuous mode [ 2400.037478][T22284] syzkaller0: entered allmulticast mode [ 2400.186579][T22292] syzkaller0: entered promiscuous mode [ 2400.205225][T22292] syzkaller0: entered allmulticast mode [ 2400.231631][T22294] lo: left promiscuous mode [ 2400.236265][T22294] lo: entered allmulticast mode [ 2400.277925][T22294] lo: entered promiscuous mode [ 2400.282706][T22294] lo: left allmulticast mode [ 2400.409436][T22298] team_slave_0: entered promiscuous mode [ 2400.415210][T22298] team_slave_1: entered promiscuous mode [ 2400.444951][T22298] vlan2: entered promiscuous mode [ 2400.458567][T22298] team0: entered promiscuous mode [ 2400.595411][T22311] netlink: 'syz.3.25738': attribute type 19 has an invalid length. [ 2400.610306][T22311] netlink: 4 bytes leftover after parsing attributes in process `syz.3.25738'. [ 2400.644110][T22311] netlink: 'syz.3.25738': attribute type 19 has an invalid length. [ 2400.740794][T22316] syzkaller0: entered promiscuous mode [ 2400.750067][T22316] syzkaller0: entered allmulticast mode [ 2400.802866][T22317] syzkaller0: entered promiscuous mode [ 2400.810035][T22317] syzkaller0: entered allmulticast mode [ 2400.954545][T22325] syzkaller0: entered promiscuous mode [ 2400.960153][T22325] syzkaller0: entered allmulticast mode [ 2400.970236][T22326] syzkaller0: entered promiscuous mode [ 2400.975802][T22326] syzkaller0: entered allmulticast mode [ 2401.068216][T22330] lo: left promiscuous mode [ 2401.072899][T22330] lo: entered allmulticast mode [ 2401.087079][T22330] lo: entered promiscuous mode [ 2401.091890][T22330] lo: left allmulticast mode [ 2401.456270][T22344] syzkaller0: entered promiscuous mode [ 2401.462255][T22344] syzkaller0: entered allmulticast mode [ 2401.627628][T22350] syzkaller0: entered promiscuous mode [ 2401.633172][T22350] syzkaller0: entered allmulticast mode [ 2401.739138][T22352] syzkaller0: entered promiscuous mode [ 2401.744666][T22352] syzkaller0: entered allmulticast mode [ 2401.821017][T22354] lo: left promiscuous mode [ 2401.825669][T22354] lo: entered allmulticast mode [ 2401.832410][T22354] lo: entered promiscuous mode [ 2401.837270][T22354] lo: left allmulticast mode [ 2403.193303][T22377] syzkaller0: entered promiscuous mode [ 2403.198877][T22377] syzkaller0: entered allmulticast mode [ 2403.466688][ T28] kauditd_printk_skb: 665 callbacks suppressed [ 2403.466704][ T28] audit: type=1400 audit(2000000294.686:365543): avc: denied { recv } for pid=22375 comm="syz.5.25762" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2403.734529][T22305] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 2403.758570][ T28] audit: type=1400 audit(2000000294.958:365544): avc: denied { read } for pid=22375 comm="syz.5.25762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2403.833567][ T28] audit: type=1400 audit(2000000294.976:365545): avc: denied { read write } for pid=16748 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2403.861985][ T28] audit: type=1400 audit(2000000294.976:365546): avc: denied { open } for pid=16748 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2403.912724][ T28] audit: type=1400 audit(2000000294.976:365547): avc: denied { ioctl } for pid=16748 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2403.929922][T22379] syzkaller0: entered promiscuous mode [ 2403.941236][T22383] netlink: 'syz.1.25765': attribute type 39 has an invalid length. [ 2403.946332][T22379] syzkaller0: entered allmulticast mode [ 2403.958343][ T28] audit: type=1400 audit(2000000294.976:365548): avc: denied { recv } for pid=3299 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2403.984209][T22386] syzkaller0: entered promiscuous mode [ 2403.989670][T22386] syzkaller0: entered allmulticast mode [ 2404.004682][ T28] audit: type=1400 audit(2000000294.976:365549): avc: denied { recv } for pid=3299 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2404.044826][ T28] audit: type=1400 audit(2000000294.995:365550): avc: denied { recv } for pid=3299 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2404.076680][ T28] audit: type=1400 audit(2000000294.995:365551): avc: denied { recv } for pid=3299 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2404.088095][T22394] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2404.134084][T22387] syzkaller0: entered promiscuous mode [ 2404.140189][T22387] syzkaller0: entered allmulticast mode [ 2404.148068][T22392] lo: left promiscuous mode [ 2404.152584][T22392] lo: entered allmulticast mode [ 2404.222324][T22392] lo: entered promiscuous mode [ 2404.227170][T22392] lo: left allmulticast mode [ 2404.340419][T22409] syzkaller0: entered promiscuous mode [ 2404.369220][T22409] syzkaller0: entered allmulticast mode [ 2404.419003][T22421] __nla_validate_parse: 1 callbacks suppressed [ 2404.419021][T22421] netlink: 44 bytes leftover after parsing attributes in process `syz.3.25776'. [ 2404.863644][T22446] netlink: 52 bytes leftover after parsing attributes in process `syz.3.25777'. [ 2404.936773][T22434] netlink: 64 bytes leftover after parsing attributes in process `syz.5.25779'. [ 2404.961019][T22452] syzkaller0: entered promiscuous mode [ 2404.966589][T22452] syzkaller0: entered allmulticast mode [ 2405.016177][T22454] syzkaller0: entered promiscuous mode [ 2405.023567][T22454] syzkaller0: entered allmulticast mode [ 2405.065035][T22456] lo: left promiscuous mode [ 2405.069660][T22456] lo: entered allmulticast mode [ 2405.079416][T22456] lo: entered promiscuous mode [ 2405.084353][T22456] lo: left allmulticast mode [ 2405.154102][T22458] syzkaller0: entered promiscuous mode [ 2405.166619][T22458] syzkaller0: entered allmulticast mode [ 2405.181381][T22460] 8021q: VLANs not supported on vxcan1 [ 2405.254835][T22466] netlink: 'syz.1.25789': attribute type 39 has an invalid length. [ 2405.466741][T22486] syzkaller0: entered promiscuous mode [ 2405.472880][T22486] syzkaller0: entered allmulticast mode [ 2405.572921][T22489] syzkaller0: entered promiscuous mode [ 2405.578407][T22489] syzkaller0: entered allmulticast mode [ 2406.717773][T22501] 8021q: VLANs not supported on vxcan1 [ 2407.532045][T22411] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 2407.712761][T22512] netlink: 'syz.5.25801': attribute type 39 has an invalid length. [ 2407.834347][T22521] syzkaller0: entered promiscuous mode [ 2407.839964][T22521] syzkaller0: entered allmulticast mode [ 2407.892377][T22529] syzkaller0: entered promiscuous mode [ 2407.899041][T22529] syzkaller0: entered allmulticast mode [ 2407.906372][T22528] syzkaller0: entered promiscuous mode [ 2407.911832][T22528] syzkaller0: entered allmulticast mode [ 2407.928491][T22529] tipc: Enabled bearer , priority 0 [ 2407.941756][T22526] tipc: Resetting bearer [ 2407.979103][T22526] tipc: Disabling bearer [ 2408.006258][T22539] 8021q: VLANs not supported on vxcan1 [ 2408.517401][T22558] netlink: 52 bytes leftover after parsing attributes in process `syz.3.25813'. [ 2408.970800][ T28] kauditd_printk_skb: 635 callbacks suppressed [ 2408.970821][ T28] audit: type=1400 audit(2000000299.843:366170): avc: denied { recv } for pid=3299 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2409.003604][ T28] audit: type=1400 audit(2000000299.852:366171): avc: denied { read write } for pid=16748 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2409.044698][ T28] audit: type=1400 audit(2000000299.852:366172): avc: denied { open } for pid=16748 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2409.070727][ T28] audit: type=1400 audit(2000000299.852:366173): avc: denied { ioctl } for pid=16748 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2409.109049][ T28] audit: type=1400 audit(2000000299.871:366174): avc: denied { recv } for pid=28 comm="kauditd" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2409.159897][ T28] audit: type=1400 audit(2000000299.871:366175): avc: denied { recv } for pid=28 comm="kauditd" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2409.188296][ T28] audit: type=1400 audit(2000000299.890:366176): avc: denied { create } for pid=22568 comm="syz.9.25815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2409.217470][ T28] audit: type=1400 audit(2000000299.890:366177): avc: denied { write } for pid=22568 comm="syz.9.25815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2409.224247][T22577] syzkaller0: entered promiscuous mode [ 2409.243973][T22577] syzkaller0: entered allmulticast mode [ 2409.249163][ T28] audit: type=1400 audit(2000000299.890:366178): avc: denied { create } for pid=22568 comm="syz.9.25815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2409.271099][ T28] audit: type=1400 audit(2000000299.890:366179): avc: denied { write } for pid=22568 comm="syz.9.25815" lport=17 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2409.411421][T22592] syzkaller0: entered promiscuous mode [ 2409.416974][T22592] syzkaller0: entered allmulticast mode [ 2409.499450][T22598] 8021q: VLANs not supported on vxcan1 [ 2409.537382][T22600] syzkaller0: entered promiscuous mode [ 2409.542995][T22600] syzkaller0: entered allmulticast mode [ 2409.796377][T22609] syzkaller0: entered promiscuous mode [ 2409.801908][T22609] syzkaller0: entered allmulticast mode [ 2409.934292][T22613] netlink: 'syz.5.25829': attribute type 1 has an invalid length. [ 2409.948093][T22613] 8021q: adding VLAN 0 to HW filter on device bond1 [ 2409.967937][T22613] bond1: (slave geneve2): making interface the new active one [ 2409.977301][T22613] bond1: (slave geneve2): Enslaving as an active interface with an up link [ 2410.076338][T22618] syzkaller0: entered promiscuous mode [ 2410.081878][T22618] syzkaller0: entered allmulticast mode [ 2410.302109][T22629] 8021q: VLANs not supported on vxcan1 [ 2410.344333][T22631] syzkaller0: entered promiscuous mode [ 2410.349803][T22631] syzkaller0: entered allmulticast mode [ 2410.613155][T22640] syzkaller0: entered promiscuous mode [ 2410.618744][T22640] syzkaller0: entered allmulticast mode [ 2410.839065][T22648] syzkaller0: entered promiscuous mode [ 2410.844564][T22648] syzkaller0: entered allmulticast mode [ 2411.248575][T22543] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 2411.251348][T22671] syzkaller0: entered promiscuous mode [ 2411.279685][T22671] syzkaller0: entered allmulticast mode [ 2411.404345][T22675] syzkaller0: entered promiscuous mode [ 2411.413585][T22675] syzkaller0: entered allmulticast mode [ 2411.763764][T22710] syzkaller0: entered promiscuous mode [ 2411.769852][T22710] syzkaller0: entered allmulticast mode [ 2411.923260][T22722] netlink: 'syz.3.25864': attribute type 39 has an invalid length. [ 2411.963007][T22702] netlink: 52 bytes leftover after parsing attributes in process `syz.4.25860'. [ 2412.016277][T22727] syzkaller0: entered promiscuous mode [ 2412.022527][T22727] syzkaller0: entered allmulticast mode [ 2412.108150][T22729] syzkaller0: entered promiscuous mode [ 2412.113737][T22729] syzkaller0: entered allmulticast mode [ 2412.237756][T22735] syzkaller0: entered promiscuous mode [ 2412.243680][T22735] syzkaller0: entered allmulticast mode [ 2412.571036][ T2601] bond0 (unregistering): Released all slaves [ 2412.580036][T22752] netlink: 'syz.3.25875': attribute type 39 has an invalid length. [ 2412.608495][ T2601] hsr_slave_0: left promiscuous mode [ 2412.614138][ T2601] hsr_slave_1: left promiscuous mode [ 2412.676507][T22756] syzkaller0: entered promiscuous mode [ 2412.682131][T22756] syzkaller0: entered allmulticast mode [ 2412.812611][T22758] syzkaller0: entered promiscuous mode [ 2412.818166][T22758] syzkaller0: entered allmulticast mode [ 2412.960182][ T2601] IPVS: stop unused estimator thread 0... [ 2412.994430][T22764] syzkaller0: entered promiscuous mode [ 2413.000114][T22764] syzkaller0: entered allmulticast mode [ 2413.182139][T22774] syzkaller0: entered promiscuous mode [ 2413.187716][T22774] syzkaller0: entered allmulticast mode [ 2413.376198][T22781] netlink: 'syz.3.25886': attribute type 39 has an invalid length. [ 2413.434018][T22785] syzkaller0: entered promiscuous mode [ 2413.439565][T22785] syzkaller0: entered allmulticast mode [ 2413.517255][T22787] syzkaller0: entered promiscuous mode [ 2413.522766][T22787] syzkaller0: entered allmulticast mode [ 2413.654269][T22793] syzkaller0: entered promiscuous mode [ 2413.659771][T22793] syzkaller0: entered allmulticast mode [ 2413.823068][T22803] syzkaller0: entered promiscuous mode [ 2413.828631][T22803] syzkaller0: entered allmulticast mode [ 2414.817188][ T28] kauditd_printk_skb: 655 callbacks suppressed [ 2414.817202][ T28] audit: type=1400 audit(2000000305.318:366835): avc: denied { recv } for pid=21022 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2414.850786][ T28] audit: type=1400 audit(2000000305.318:366836): avc: denied { recv } for pid=28 comm="kauditd" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2414.854829][T22703] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 2414.878050][ T28] audit: type=1400 audit(2000000305.374:366837): avc: denied { create } for pid=22810 comm="syz.3.25897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2414.912576][ T28] audit: type=1400 audit(2000000305.384:366838): avc: denied { write } for pid=22810 comm="syz.3.25897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2414.933321][ T28] audit: type=1400 audit(2000000305.384:366839): avc: denied { read } for pid=22810 comm="syz.3.25897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2414.998855][ T28] audit: type=1400 audit(2000000305.449:366840): avc: denied { write } for pid=22810 comm="syz.3.25897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2415.058348][T22816] syzkaller0: entered promiscuous mode [ 2415.068421][T22816] syzkaller0: entered allmulticast mode [ 2415.074736][ T28] audit: type=1400 audit(2000000305.459:366841): avc: denied { read write } for pid=16748 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2415.109985][ T28] audit: type=1400 audit(2000000305.459:366842): avc: denied { open } for pid=16748 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2415.149219][ T28] audit: type=1400 audit(2000000305.459:366843): avc: denied { ioctl } for pid=16748 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2415.177039][ T28] audit: type=1400 audit(2000000305.459:366844): avc: denied { read write } for pid=16223 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2415.219122][T22818] syzkaller0: entered promiscuous mode [ 2415.226230][T22818] syzkaller0: entered allmulticast mode [ 2415.495637][T22845] netlink: 20 bytes leftover after parsing attributes in process `syz.5.25909'. [ 2415.532174][T22847] netlink: 8 bytes leftover after parsing attributes in process `syz.5.25910'. [ 2415.581122][T22849] syzkaller0: entered promiscuous mode [ 2415.586824][T22849] syzkaller0: entered allmulticast mode [ 2415.732324][T22855] syzkaller0: entered promiscuous mode [ 2415.738198][T22855] syzkaller0: entered allmulticast mode [ 2415.964469][T22873] netlink: 20 bytes leftover after parsing attributes in process `syz.5.25920'. [ 2416.030704][T22878] syzkaller0: entered promiscuous mode [ 2416.036279][T22878] syzkaller0: entered allmulticast mode [ 2416.050641][T22878] tipc: Enabled bearer , priority 0 [ 2416.058097][T22877] tipc: Resetting bearer [ 2416.069162][T22877] tipc: Disabling bearer [ 2416.519146][T22898] netlink: 16 bytes leftover after parsing attributes in process `syz.5.25931'. [ 2416.534601][T22895] syzkaller0: entered promiscuous mode [ 2416.547137][T22895] syzkaller0: entered allmulticast mode [ 2416.555768][T22887] netlink: 52 bytes leftover after parsing attributes in process `syz.4.25923'. [ 2416.742757][T22911] syzkaller0: entered promiscuous mode [ 2416.749962][T22911] syzkaller0: entered allmulticast mode [ 2416.913197][T22926] tipc: Enabled bearer , priority 0 [ 2416.928552][T22926] tipc: Resetting bearer [ 2416.938263][T22921] tipc: Disabling bearer [ 2416.947197][T22929] bridge0: port 3(veth0_to_bridge) entered blocking state [ 2416.955121][T22929] bridge0: port 3(veth0_to_bridge) entered disabled state [ 2416.962727][T22929] veth0_to_bridge: entered allmulticast mode [ 2416.969597][T22929] veth0_to_bridge: entered promiscuous mode [ 2416.975651][T22929] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2416.987984][T22929] bridge0: port 3(veth0_to_bridge) entered blocking state [ 2416.995179][T22929] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 2417.070043][T22938] netlink: 144 bytes leftover after parsing attributes in process `syz.9.25943'. [ 2417.075874][T22937] syzkaller0: entered promiscuous mode [ 2417.086633][T22937] syzkaller0: entered allmulticast mode [ 2417.436805][T22940] netlink: 52 bytes leftover after parsing attributes in process `syz.4.25945'. [ 2417.467954][T22957] syzkaller0: entered promiscuous mode [ 2417.473506][T22957] syzkaller0: entered allmulticast mode [ 2417.504316][T22959] netlink: 20 bytes leftover after parsing attributes in process `syz.1.25950'. [ 2417.573888][T22963] batadv_slave_0: entered promiscuous mode [ 2417.581929][T22962] batadv_slave_0: left promiscuous mode [ 2417.677518][T22967] 8021q: VLANs not supported on vxcan0 [ 2417.827095][T22972] netlink: 16 bytes leftover after parsing attributes in process `syz.5.25957'. [ 2417.854654][T22973] netlink: 'syz.1.25953': attribute type 1 has an invalid length. [ 2417.862557][T22973] netlink: 'syz.1.25953': attribute type 2 has an invalid length. [ 2417.890399][T22970] syzkaller0: entered promiscuous mode [ 2417.912010][T22970] syzkaller0: entered allmulticast mode [ 2418.150071][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2418.162084][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2418.174239][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2418.186198][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2418.198284][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2418.210282][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2418.222359][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2418.226142][T22980] syzkaller0: entered promiscuous mode [ 2418.234348][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2418.243834][T22980] syzkaller0: entered allmulticast mode [ 2418.251827][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2418.269284][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2418.435995][T22982] tipc: Enabled bearer , priority 0 [ 2418.566113][T22982] syzkaller0: entered promiscuous mode [ 2418.579227][T22982] syzkaller0: entered allmulticast mode [ 2418.586916][T22982] tipc: Resetting bearer [ 2418.615273][T22986] syzkaller0: entered promiscuous mode [ 2418.622552][T22986] syzkaller0: entered allmulticast mode [ 2418.652097][T22981] tipc: Resetting bearer [ 2418.691817][T22981] tipc: Disabling bearer [ 2418.787862][T22994] 8021q: VLANs not supported on vxcan1 [ 2418.863548][T23003] syzkaller0: entered promiscuous mode [ 2418.907432][T23003] syzkaller0: entered allmulticast mode [ 2419.094918][T23014] netlink: 'syz.1.25969': attribute type 1 has an invalid length. [ 2419.198394][T23014] 8021q: adding VLAN 0 to HW filter on device bond1 [ 2419.267299][T23025] netlink: 'syz.4.25971': attribute type 39 has an invalid length. [ 2419.303059][T23022] syzkaller0: entered promiscuous mode [ 2419.323335][T23022] syzkaller0: entered allmulticast mode [ 2419.628670][T23042] syzkaller0: entered promiscuous mode [ 2419.634224][T23042] syzkaller0: entered allmulticast mode [ 2419.643601][T23036] netlink: 8 bytes leftover after parsing attributes in process `syz.9.25975'. [ 2420.260440][ T28] kauditd_printk_skb: 837 callbacks suppressed [ 2420.260454][ T28] audit: type=1400 audit(2000000310.325:367682): avc: denied { create } for pid=23056 comm="syz.5.25980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2420.466666][T23054] 8021q: VLANs not supported on vxcan1 [ 2420.544979][ T28] audit: type=1400 audit(2000000310.335:367683): avc: denied { read } for pid=23056 comm="syz.5.25980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2420.629585][ T28] audit: type=1400 audit(2000000310.400:367684): avc: denied { create } for pid=23056 comm="syz.5.25980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2420.645638][T23075] netlink: 'syz.4.25984': attribute type 39 has an invalid length. [ 2420.679746][ T28] audit: type=1400 audit(2000000310.409:367685): avc: denied { module_request } for pid=23056 comm="syz.5.25980" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2420.800415][ T28] audit: type=1400 audit(2000000310.475:367686): avc: denied { write } for pid=23056 comm="syz.5.25980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2420.836609][T23067] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2420.844361][T23086] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2420.854266][T23087] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2420.860949][T23067] audit: audit_lost=3014 audit_rate_limit=0 audit_backlog_limit=64 [ 2420.872733][T23086] audit: audit_lost=3015 audit_rate_limit=0 audit_backlog_limit=64 [ 2421.119624][T23095] syzkaller0: entered promiscuous mode [ 2421.135970][T23095] syzkaller0: entered allmulticast mode [ 2421.411230][T23102] syzkaller0: entered promiscuous mode [ 2421.416849][T23102] syzkaller0: entered allmulticast mode [ 2421.885508][T23134] netlink: 'syz.1.25997': attribute type 39 has an invalid length. [ 2422.030355][T23142] netlink: 4 bytes leftover after parsing attributes in process `syz.5.26000'. [ 2422.398344][T23142] netlink: 52 bytes leftover after parsing attributes in process `syz.5.26000'. [ 2422.537302][T23151] syzkaller0: entered promiscuous mode [ 2422.590342][T23151] syzkaller0: entered allmulticast mode [ 2422.655377][T23158] syzkaller0: entered promiscuous mode [ 2422.668358][T23158] syzkaller0: entered allmulticast mode [ 2422.840463][T23164] syzkaller0: entered promiscuous mode [ 2422.851824][T23164] syzkaller0: entered allmulticast mode [ 2423.124477][T23183] netlink: 32 bytes leftover after parsing attributes in process `syz.1.26012'. [ 2423.146301][T23174] netlink: 'syz.9.26011': attribute type 39 has an invalid length. [ 2423.315260][T23193] netlink: 'syz.4.26014': attribute type 1 has an invalid length. [ 2423.348119][T23194] netlink: 68 bytes leftover after parsing attributes in process `syz.9.26017'. [ 2423.375885][T23195] netlink: 4 bytes leftover after parsing attributes in process `syz.5.26018'. [ 2423.404869][T23195] netlink: 4 bytes leftover after parsing attributes in process `syz.5.26018'. [ 2423.427563][T23195] netlink: 4 bytes leftover after parsing attributes in process `syz.5.26018'. [ 2423.455853][T23195] netlink: 4 bytes leftover after parsing attributes in process `syz.5.26018'. [ 2423.479989][T23195] netlink: 4 bytes leftover after parsing attributes in process `syz.5.26018'. [ 2423.494889][T23195] netlink: 4 bytes leftover after parsing attributes in process `syz.5.26018'. [ 2423.503166][ C0] net_ratelimit: 131480 callbacks suppressed [ 2423.503180][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2423.505535][T23195] netlink: 4 bytes leftover after parsing attributes in process `syz.5.26018'. [ 2423.509874][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2423.522656][T23195] netlink: 4 bytes leftover after parsing attributes in process `syz.5.26018'. [ 2423.530843][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2423.563639][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2423.575620][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2423.587731][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2423.599815][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2423.611920][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2423.624104][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2423.636433][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2423.650493][T23207] syzkaller0: entered promiscuous mode [ 2423.686704][T23207] syzkaller0: entered allmulticast mode [ 2423.737245][T23200] syzkaller0: entered promiscuous mode [ 2423.757928][T23200] syzkaller0: entered allmulticast mode [ 2424.053560][T23222] 8021q: VLANs not supported on vxcan1 [ 2424.154763][T23213] syzkaller0: entered promiscuous mode [ 2424.173004][T23213] syzkaller0: entered allmulticast mode [ 2424.204855][T23229] netlink: 'syz.5.26028': attribute type 39 has an invalid length. [ 2424.899922][T23257] 8021q: VLANs not supported on vxcan1 [ 2424.987536][T23262] netlink: 'syz.5.26040': attribute type 39 has an invalid length. [ 2425.049061][T23263] syzkaller0: entered promiscuous mode [ 2425.056253][T23263] syzkaller0: entered allmulticast mode [ 2425.210851][T23269] syzkaller0: entered promiscuous mode [ 2425.220991][T23269] syzkaller0: entered allmulticast mode [ 2425.609149][ T28] kauditd_printk_skb: 774 callbacks suppressed [ 2425.609224][ T28] audit: type=1400 audit(2000000315.417:368403): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2425.649336][ T28] audit: type=1400 audit(2000000315.417:368404): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2425.686889][ T28] audit: type=1400 audit(2000000315.491:368405): avc: denied { create } for pid=23283 comm="syz.3.26050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2425.724714][ T28] audit: type=1400 audit(2000000315.519:368406): avc: denied { write } for pid=23283 comm="syz.3.26050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2425.793919][ T28] audit: type=1400 audit(2000000315.585:368407): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2425.829562][ T28] audit: type=1400 audit(2000000315.585:368408): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2425.859426][ T28] audit: type=1400 audit(2000000315.650:368409): avc: denied { prog_load } for pid=23285 comm="syz.3.26051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2425.895690][ T28] audit: type=1400 audit(2000000315.650:368410): avc: denied { bpf } for pid=23285 comm="syz.3.26051" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2425.919516][ T28] audit: type=1400 audit(2000000315.669:368411): avc: denied { prog_load } for pid=23285 comm="syz.3.26051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2425.942528][ T28] audit: type=1400 audit(2000000315.669:368412): avc: denied { perfmon } for pid=23285 comm="syz.3.26051" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2426.012177][T23288] netlink: 'syz.3.26052': attribute type 39 has an invalid length. [ 2426.077505][T23290] syzkaller0: entered promiscuous mode [ 2426.083278][T23290] syzkaller0: entered allmulticast mode [ 2426.348700][T23297] syzkaller0: entered promiscuous mode [ 2426.354304][T23297] syzkaller0: entered allmulticast mode [ 2427.103740][T23216] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 2427.311165][T23304] syzkaller0: entered promiscuous mode [ 2427.327702][T23304] syzkaller0: entered allmulticast mode [ 2427.585970][T23315] syzkaller0: entered promiscuous mode [ 2427.591581][T23315] syzkaller0: entered allmulticast mode [ 2427.654417][T23312] netlink: 'syz.1.26063': attribute type 39 has an invalid length. [ 2428.129392][T23336] syzkaller0: entered promiscuous mode [ 2428.136926][T23336] syzkaller0: entered allmulticast mode [ 2428.163588][T23342] tipc: Enabled bearer , priority 0 [ 2428.213672][T23329] syzkaller0: entered promiscuous mode [ 2428.219279][T23329] syzkaller0: entered allmulticast mode [ 2428.288804][T23326] tipc: Resetting bearer [ 2428.312358][T23326] tipc: Disabling bearer [ 2428.349365][T23348] 8021q: VLANs not supported on vxcan0 [ 2428.385086][T23346] syzkaller0: entered promiscuous mode [ 2428.391644][T23346] syzkaller0: entered allmulticast mode [ 2428.483276][T23355] __nla_validate_parse: 132 callbacks suppressed [ 2428.483295][T23355] netlink: 68 bytes leftover after parsing attributes in process `syz.1.26076'. [ 2428.506449][T23352] syzkaller0: entered promiscuous mode [ 2428.525576][T23352] syzkaller0: entered allmulticast mode [ 2428.754794][T23363] netlink: 'syz.1.26080': attribute type 39 has an invalid length. [ 2428.856285][ C0] net_ratelimit: 158457 callbacks suppressed [ 2428.856300][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2428.874317][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2428.886346][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2428.898379][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2428.910434][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2428.922494][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2428.934493][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2428.946560][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2428.958535][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2428.970507][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2428.978758][T23368] syzkaller1: entered promiscuous mode [ 2428.988017][T23368] syzkaller1: entered allmulticast mode [ 2429.093033][T23381] syzkaller0: entered promiscuous mode [ 2429.098627][T23381] syzkaller0: entered allmulticast mode [ 2429.184199][T23381] tipc: Enabled bearer , priority 0 [ 2429.195872][T23379] tipc: Resetting bearer [ 2429.215857][T23379] tipc: Disabling bearer [ 2429.255938][T23383] syzkaller0: entered promiscuous mode [ 2429.272658][T23383] syzkaller0: entered allmulticast mode [ 2429.423721][T23389] 8021q: VLANs not supported on vxcan0 [ 2429.568110][T23395] syzkaller0: entered promiscuous mode [ 2429.592846][T23395] syzkaller0: entered allmulticast mode [ 2429.687013][T23398] netlink: 'syz.5.26094': attribute type 39 has an invalid length. [ 2429.899271][T23408] syzkaller1: entered promiscuous mode [ 2429.904919][T23408] syzkaller1: entered allmulticast mode [ 2430.008678][T23407] syzkaller0: entered promiscuous mode [ 2430.014570][T23407] syzkaller0: entered allmulticast mode [ 2430.093575][T23416] netlink: 4 bytes leftover after parsing attributes in process `syz.5.26102'. [ 2430.253694][T23413] syzkaller0: entered promiscuous mode [ 2430.311577][T23413] syzkaller0: entered allmulticast mode [ 2430.328845][T23412] tipc: Enabled bearer , priority 0 [ 2430.367407][T23421] syzkaller0: entered promiscuous mode [ 2430.373040][T23421] syzkaller0: entered allmulticast mode [ 2430.417824][T23405] tipc: Resetting bearer [ 2430.598985][T23405] tipc: Disabling bearer [ 2430.708486][T23425] syzkaller0: entered promiscuous mode [ 2430.717958][T23425] syzkaller0: entered allmulticast mode [ 2430.725179][T23416] netlink: 52 bytes leftover after parsing attributes in process `syz.5.26102'. [ 2430.855268][T23431] netlink: 12 bytes leftover after parsing attributes in process `syz.9.26105'. [ 2430.907160][T23431] vlan3: entered promiscuous mode [ 2431.004205][ T28] kauditd_printk_skb: 548 callbacks suppressed [ 2431.004219][ T28] audit: type=1400 audit(2000000320.461:368961): avc: denied { recv } for pid=2579 comm="kworker/u8:2" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2431.025310][T23431] dummy0: entered promiscuous mode [ 2431.132920][T23438] netlink: 28 bytes leftover after parsing attributes in process `syz.5.26106'. [ 2431.152989][ T28] audit: type=1400 audit(2000000320.527:368962): avc: denied { recv } for pid=16223 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2431.262909][ T28] audit: type=1400 audit(2000000320.527:368963): avc: denied { recv } for pid=23430 comm="syz.9.26105" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2431.381530][T23444] netlink: 'syz.5.26111': attribute type 39 has an invalid length. [ 2431.400879][ T28] audit: type=1400 audit(2000000320.527:368964): avc: denied { recv } for pid=23430 comm="syz.9.26105" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2431.464806][T23448] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2431.474766][T23449] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2431.484793][T23449] audit: audit_lost=3035 audit_rate_limit=0 audit_backlog_limit=64 [ 2431.497752][ T28] audit: type=1400 audit(2000000320.555:368965): avc: denied { read write } for pid=18518 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2431.502360][T23448] audit: audit_lost=3036 audit_rate_limit=0 audit_backlog_limit=64 [ 2431.527390][T23449] audit: backlog limit exceeded [ 2431.542008][T23451] syzkaller0: entered promiscuous mode [ 2431.557060][T23451] syzkaller0: entered allmulticast mode [ 2431.573720][T23452] 8021q: VLANs not supported on vxcan0 [ 2431.589655][T23451] tipc: Enabled bearer , priority 0 [ 2431.605414][T23450] tipc: Resetting bearer [ 2431.626377][T23450] tipc: Disabling bearer [ 2431.735137][T23459] netlink: 4 bytes leftover after parsing attributes in process `syz.5.26117'. [ 2432.011262][T23465] syzkaller0: entered promiscuous mode [ 2432.028935][T23465] syzkaller0: entered allmulticast mode [ 2432.049916][T23467] netlink: 52 bytes leftover after parsing attributes in process `syz.5.26117'. [ 2432.211996][T23468] syzkaller0: entered promiscuous mode [ 2432.228288][T23468] syzkaller0: entered allmulticast mode [ 2432.631551][T23479] netlink: 'syz.1.26125': attribute type 39 has an invalid length. [ 2432.856718][T23486] netlink: 28 bytes leftover after parsing attributes in process `syz.5.26121'. [ 2432.885816][T23488] syzkaller0: entered promiscuous mode [ 2432.891471][T23488] syzkaller0: entered allmulticast mode [ 2433.264191][T23490] netlink: 'syz.4.26124': attribute type 1 has an invalid length. [ 2433.272117][T23490] netlink: 'syz.4.26124': attribute type 2 has an invalid length. [ 2433.356313][T23497] syzkaller0: entered promiscuous mode [ 2433.370821][T23497] syzkaller0: entered allmulticast mode [ 2433.425083][T23499] netlink: 4 bytes leftover after parsing attributes in process `syz.3.26131'. [ 2433.441694][T23495] 8021q: VLANs not supported on vxcan0 [ 2433.703111][T23503] syzkaller0: entered promiscuous mode [ 2433.732272][T23503] syzkaller0: entered allmulticast mode [ 2434.048121][T23509] netlink: 52 bytes leftover after parsing attributes in process `syz.3.26131'. [ 2434.209406][ C0] net_ratelimit: 126804 callbacks suppressed [ 2434.209433][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.227453][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.239507][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.251520][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.263636][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.275712][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.287823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.299889][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.311889][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.323915][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2434.686410][T23530] netlink: 28 bytes leftover after parsing attributes in process `syz.1.26140'. [ 2435.019913][T23542] syzkaller0: entered promiscuous mode [ 2435.045405][T23548] netlink: 'syz.1.26143': attribute type 1 has an invalid length. [ 2435.053461][T23548] netlink: 'syz.1.26143': attribute type 2 has an invalid length. [ 2435.087421][T23542] syzkaller0: entered allmulticast mode [ 2436.442851][ T28] kauditd_printk_skb: 448 callbacks suppressed [ 2436.442865][ T28] audit: type=1400 audit(2000000325.487:369395): avc: denied { create } for pid=23549 comm="syz.9.26145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2436.864139][T23518] chnl_net:caif_netlink_parms(): no params data found [ 2436.902571][ T28] audit: type=1400 audit(2000000325.496:369396): avc: denied { write } for pid=23549 comm="syz.9.26145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2436.955501][ T28] audit: type=1400 audit(2000000325.506:369397): avc: denied { recv } for pid=23549 comm="syz.9.26145" saddr=127.0.0.1 daddr=127.0.0.1 dest=52294 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2437.047187][ T28] audit: type=1400 audit(2000000325.608:369398): avc: denied { recv } for pid=23549 comm="syz.9.26145" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2437.137922][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2437.144463][ C1] audit: audit_lost=3043 audit_rate_limit=0 audit_backlog_limit=64 [ 2437.152437][ C1] audit: backlog limit exceeded [ 2437.157663][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2437.164186][ C1] audit: audit_lost=3044 audit_rate_limit=0 audit_backlog_limit=64 [ 2437.172170][ C1] audit: backlog limit exceeded [ 2437.301680][T23518] bridge0: port 1(bridge_slave_0) entered blocking state [ 2437.333103][T23518] bridge0: port 1(bridge_slave_0) entered disabled state [ 2437.361820][T23518] bridge_slave_0: entered allmulticast mode [ 2437.379147][T23518] bridge_slave_0: entered promiscuous mode [ 2437.451696][T23590] syzkaller0: entered promiscuous mode [ 2437.476246][T23590] syzkaller0: entered allmulticast mode [ 2437.494159][T23518] bridge0: port 2(bridge_slave_1) entered blocking state [ 2437.521784][T23518] bridge0: port 2(bridge_slave_1) entered disabled state [ 2437.546705][T23518] bridge_slave_1: entered allmulticast mode [ 2437.562070][T23518] bridge_slave_1: entered promiscuous mode [ 2437.693788][T23594] netlink: 4 bytes leftover after parsing attributes in process `syz.3.26153'. [ 2437.737730][T23518] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2437.766222][T23518] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2437.965227][T23518] team0: Port device team_slave_0 added [ 2438.002867][T23518] team0: Port device team_slave_1 added [ 2438.092201][T23518] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2438.129596][T23518] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2438.311985][T23518] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2438.373177][T23600] netlink: 52 bytes leftover after parsing attributes in process `syz.3.26153'. [ 2438.407027][T23518] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2438.429317][T23518] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2438.504781][T23518] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2438.543133][T23603] 8021q: VLANs not supported on vxcan0 [ 2438.669766][T23518] hsr_slave_0: entered promiscuous mode [ 2438.691489][T23518] hsr_slave_1: entered promiscuous mode [ 2438.717247][T23518] debugfs: 'hsr0' already exists in 'hsr' [ 2438.734514][T23518] Cannot create hsr debugfs directory [ 2439.037433][T23610] netlink: 32 bytes leftover after parsing attributes in process `syz.1.26158'. [ 2439.180500][T23618] syzkaller0: entered promiscuous mode [ 2439.186363][T23618] syzkaller0: entered allmulticast mode [ 2439.213687][T23518] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2439.292530][T23518] 8021q: adding VLAN 0 to HW filter on device team0 [ 2439.562568][ C0] net_ratelimit: 96471 callbacks suppressed [ 2439.562588][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.580518][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.592492][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.604646][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.616683][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.628852][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.640922][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.652881][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.664868][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.667838][ T2581] bridge0: port 1(bridge_slave_0) entered blocking state [ 2439.676838][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2439.683903][ T2581] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2439.883612][T23619] netlink: 'syz.3.26157': attribute type 1 has an invalid length. [ 2439.887014][ T2581] bridge0: port 2(bridge_slave_1) entered blocking state [ 2439.891435][T23619] netlink: 'syz.3.26157': attribute type 2 has an invalid length. [ 2439.906310][ T2581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2439.946144][T23518] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2439.966169][T23518] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2440.842816][T23518] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2441.978792][ T28] kauditd_printk_skb: 666 callbacks suppressed [ 2441.978807][ T28] audit: type=1400 audit(2000000330.288:369939): avc: denied { recv } for pid=23656 comm="syz.3.26167" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2442.289439][ T28] audit: type=1400 audit(2000000330.344:369940): avc: denied { create } for pid=23656 comm="syz.3.26167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2442.332141][ T28] audit: type=1400 audit(2000000330.428:369941): avc: denied { write } for pid=23656 comm="syz.3.26167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2442.373647][ T28] audit: type=1400 audit(2000000330.756:369942): avc: denied { recv } for pid=32685 comm="ipvs-m:295:0" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2442.403951][ T28] audit: type=1400 audit(2000000330.765:369943): avc: denied { read write } for pid=16748 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2442.503204][ T28] audit: type=1400 audit(2000000330.765:369944): avc: denied { open } for pid=16748 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2442.650988][ T28] audit: type=1400 audit(2000000330.765:369945): avc: denied { ioctl } for pid=16748 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2442.740775][ T28] audit: type=1400 audit(2000000330.775:369946): avc: denied { recv } for pid=23660 comm="modprobe" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2442.775236][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2442.779617][T23677] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2442.934049][T23686] syzkaller0: entered promiscuous mode [ 2442.940018][T23686] syzkaller0: entered allmulticast mode [ 2443.180036][T23691] syzkaller1: entered promiscuous mode [ 2443.187205][T23691] syzkaller1: entered allmulticast mode [ 2443.464120][T23699] netlink: 'syz.9.26172': attribute type 1 has an invalid length. [ 2443.471951][T23699] netlink: 'syz.9.26172': attribute type 2 has an invalid length. [ 2443.835221][T23702] 8021q: adding VLAN 0 to HW filter on device bond2 [ 2443.855858][T23702] bond0: (slave bond2): Enslaving as an active interface with an up link [ 2443.895164][T23518] veth0_vlan: entered promiscuous mode [ 2443.909548][T23518] veth1_vlan: entered promiscuous mode [ 2443.953409][T23518] veth0_macvtap: entered promiscuous mode [ 2444.915670][ C0] net_ratelimit: 90035 callbacks suppressed [ 2444.915690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2444.933643][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2444.945623][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2444.957595][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2444.969559][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2444.981539][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2444.993604][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2445.005670][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2445.007236][T23518] veth1_macvtap: entered promiscuous mode [ 2445.017866][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2445.036511][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2445.179068][T23518] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2445.189697][T23518] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2445.364838][ C0] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 2445.389889][T23720] syzkaller0: entered promiscuous mode [ 2445.452730][T23720] syzkaller0: entered allmulticast mode [ 2445.761652][T23739] syzkaller1: entered promiscuous mode [ 2445.788489][T23739] syzkaller1: entered allmulticast mode [ 2445.964761][T23749] netlink: 28 bytes leftover after parsing attributes in process `syz.1.26189'. [ 2446.410936][T23746] bridge0: port 2(bridge_slave_1) entered disabled state [ 2446.418091][T23746] bridge0: port 1(bridge_slave_0) entered disabled state [ 2446.579556][T23746] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2446.646912][T23746] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2447.341984][ T28] kauditd_printk_skb: 502 callbacks suppressed [ 2447.342000][ T28] audit: type=1400 audit(2000000335.707:370430): avc: denied { recv } for pid=23782 comm="syz.3.26204" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2447.413107][ T28] audit: type=1400 audit(2000000335.726:370431): avc: denied { read write } for pid=23788 comm="syz.1.26206" name="uhid" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2447.445904][ T28] audit: type=1400 audit(2000000335.726:370432): avc: denied { open } for pid=23788 comm="syz.1.26206" path="/dev/uhid" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2447.473251][ T28] audit: type=1400 audit(2000000335.726:370433): avc: denied { prog_load } for pid=23788 comm="syz.1.26206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2447.493627][ T28] audit: type=1400 audit(2000000335.726:370434): avc: denied { bpf } for pid=23788 comm="syz.1.26206" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2447.515157][ T28] audit: type=1400 audit(2000000335.726:370435): avc: denied { prog_load } for pid=23788 comm="syz.1.26206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2447.552019][ T28] audit: type=1400 audit(2000000335.726:370436): avc: denied { bpf } for pid=23788 comm="syz.1.26206" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2447.575755][ T28] audit: type=1400 audit(2000000335.726:370437): avc: denied { mount } for pid=23788 comm="syz.1.26206" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2447.606154][T23793] netlink: 'syz.1.26206': attribute type 1 has an invalid length. [ 2447.614561][T23793] netlink: 'syz.1.26206': attribute type 2 has an invalid length. [ 2447.643742][ T28] audit: type=1400 audit(2000000335.726:370438): avc: denied { execmem } for pid=23788 comm="syz.1.26206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2447.669506][ T28] audit: type=1400 audit(2000000335.819:370439): avc: denied { read } for pid=23773 comm="syz.5.26201" dev="nsfs" ino=4026532788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2450.268839][ C0] net_ratelimit: 106320 callbacks suppressed [ 2450.268874][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2450.286858][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2450.298837][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2450.310900][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2450.322886][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2450.334889][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2450.346937][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2450.359092][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2450.371321][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2450.383394][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2451.758263][T23846] netlink: 28 bytes leftover after parsing attributes in process `syz.9.26225'. [ 2452.137480][T23854] netlink: 28 bytes leftover after parsing attributes in process `syz.5.26228'. [ 2452.183946][T23854] netlink: 8 bytes leftover after parsing attributes in process `syz.5.26228'. [ 2452.541670][T23868] syzkaller0: entered promiscuous mode [ 2452.559800][T23868] syzkaller0: entered allmulticast mode [ 2452.704370][ T28] kauditd_printk_skb: 368 callbacks suppressed [ 2452.704402][ T28] audit: type=1400 audit(2000000340.770:370808): avc: denied { read } for pid=23867 comm="syz.1.26234" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2452.859184][ T28] audit: type=1400 audit(2000000340.798:370809): avc: denied { read open } for pid=23867 comm="syz.1.26234" path="net:[4026532631]" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2452.954620][ T28] audit: type=1400 audit(2000000340.817:370810): avc: denied { create } for pid=23867 comm="syz.1.26234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2452.978656][ T28] audit: type=1400 audit(2000000340.836:370812): avc: denied { create } for pid=23867 comm="syz.1.26234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2453.024627][ T28] audit: type=1400 audit(2000000340.836:370811): avc: denied { module_request } for pid=23876 comm="syz.4.26236" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2453.112694][ T28] audit: type=1400 audit(2000000340.845:370813): avc: denied { map_create } for pid=23867 comm="syz.1.26234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2453.160388][ T28] audit: type=1400 audit(2000000340.845:370814): avc: denied { map_read map_write } for pid=23867 comm="syz.1.26234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2453.274454][ T28] audit: type=1400 audit(2000000340.854:370815): avc: denied { prog_load } for pid=23867 comm="syz.1.26234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2453.378991][ T28] audit: type=1400 audit(2000000340.854:370816): avc: denied { bpf } for pid=23867 comm="syz.1.26234" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2453.404957][T23883] syzkaller0: entered promiscuous mode [ 2453.411883][T23883] syzkaller0: entered allmulticast mode [ 2453.418150][ T28] audit: type=1400 audit(2000000340.882:370817): avc: denied { read } for pid=23867 comm="syz.1.26234" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2453.486644][T23897] syzkaller1: entered promiscuous mode [ 2453.492126][T23897] syzkaller1: entered allmulticast mode [ 2453.723130][T23904] netlink: 'syz.1.26240': attribute type 39 has an invalid length. [ 2453.870550][T23918] tipc: Enabled bearer , priority 0 [ 2453.887589][T23918] tipc: Resetting bearer [ 2453.895316][T23910] netlink: 28 bytes leftover after parsing attributes in process `syz.4.26242'. [ 2453.905076][T23910] netlink: 8 bytes leftover after parsing attributes in process `syz.4.26242'. [ 2454.091155][T23916] tipc: Disabling bearer [ 2455.621939][ C0] net_ratelimit: 98494 callbacks suppressed [ 2455.621958][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2455.639887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2455.651957][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2455.664102][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2455.676328][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2455.688407][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2455.700399][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2455.712349][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2455.724343][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2455.736405][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2456.115327][T23937] syzkaller0: entered promiscuous mode [ 2456.120867][T23937] syzkaller0: entered allmulticast mode [ 2456.352858][T23940] syzkaller1: entered promiscuous mode [ 2456.379828][T23940] syzkaller1: entered allmulticast mode [ 2456.403650][T23944] syzkaller0: entered promiscuous mode [ 2456.434058][T23944] syzkaller0: entered allmulticast mode [ 2456.447174][ T53] bridge_slave_1: left allmulticast mode [ 2456.466109][ T53] bridge_slave_1: left promiscuous mode [ 2456.486289][ T53] bridge0: port 2(bridge_slave_1) entered disabled state [ 2456.513499][ T53] bridge_slave_0: left allmulticast mode [ 2456.522556][ T53] bridge_slave_0: left promiscuous mode [ 2456.630023][ T53] bridge0: port 1(bridge_slave_0) entered disabled state [ 2457.196246][ T53] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2457.206441][ T53] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2457.222355][ T53] bond0 (unregistering): Released all slaves [ 2457.232558][T23958] netlink: 'syz.5.26258': attribute type 1 has an invalid length. [ 2457.240420][T23958] netlink: 'syz.5.26258': attribute type 2 has an invalid length. [ 2457.291755][ T53] tipc: Left network mode [ 2457.330337][ T53] hsr_slave_0: left promiscuous mode [ 2457.352070][ T53] hsr_slave_1: left promiscuous mode [ 2457.374826][ T53] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2457.382257][ T53] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2457.497311][ T53] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2457.525672][ T53] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2457.586599][ T53] batman_adv: batadv0: Interface deactivated: ªªªªªª [ 2457.600584][ T53] batman_adv: batadv0: Removing interface: ªªªªªª [ 2457.654979][T23973] netlink: 20 bytes leftover after parsing attributes in process `syz.3.26263'. [ 2457.685162][ T53] veth1_vlan: left promiscuous mode [ 2457.699330][ T53] veth0_vlan: left promiscuous mode [ 2457.806256][T23979] netlink: 'syz.1.26265': attribute type 1 has an invalid length. [ 2458.042381][ T53] team0 (unregistering): Port device team_slave_1 removed [ 2458.061525][ T28] kauditd_printk_skb: 345 callbacks suppressed [ 2458.061546][ T28] audit: type=1400 audit(2000000345.786:371163): avc: denied { bind } for pid=23966 comm="syz.5.26262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2458.101232][ T53] team0 (unregistering): Port device team_slave_0 removed [ 2458.150959][T23987] netlink: 4 bytes leftover after parsing attributes in process `syz.5.26262'. [ 2458.343045][T23973] geneve2: entered promiscuous mode [ 2458.448656][T23979] 8021q: adding VLAN 0 to HW filter on device bond2 [ 2458.458087][ T28] audit: type=1400 audit(2000000346.161:371164): avc: denied { recv } for pid=16748 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2458.505960][T23987] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2458.527129][ T28] audit: type=1400 audit(2000000346.161:371165): avc: denied { recv } for pid=16748 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2458.604022][ T28] audit: type=1400 audit(2000000346.161:371166): avc: denied { recv } for pid=2604 comm="kworker/u8:18" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2458.631452][ T28] audit: type=1400 audit(2000000346.161:371167): avc: denied { recv } for pid=2604 comm="kworker/u8:18" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2458.658314][ T28] audit: type=1400 audit(2000000346.226:371168): avc: denied { recv } for pid=2601 comm="kworker/u8:16" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2458.703476][ T28] audit: type=1400 audit(2000000346.385:371169): avc: denied { read write } for pid=16748 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2458.736378][ T28] audit: type=1400 audit(2000000346.385:371170): avc: denied { open } for pid=16748 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2458.777157][T23987] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2458.905317][ T28] audit: type=1400 audit(2000000346.385:371171): avc: denied { ioctl } for pid=16748 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2458.962209][T23999] netlink: 8 bytes leftover after parsing attributes in process `syz.3.26270'. [ 2458.999396][ T28] audit: type=1400 audit(2000000346.451:371172): avc: denied { recv } for pid=2601 comm="kworker/u8:16" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2459.557643][T24021] syzkaller0: entered promiscuous mode [ 2459.563280][T24021] syzkaller0: entered allmulticast mode [ 2459.625041][T24023] syzkaller0: entered promiscuous mode [ 2459.640504][T24023] syzkaller0: entered allmulticast mode [ 2459.909994][T24045] netlink: 4 bytes leftover after parsing attributes in process `syz.1.26282'. [ 2459.971010][T24032] netlink: 'syz.9.26278': attribute type 1 has an invalid length. [ 2460.328490][T24032] 8021q: adding VLAN 0 to HW filter on device bond1 [ 2460.434762][T24049] netlink: 'syz.3.26283': attribute type 39 has an invalid length. [ 2460.975077][ C0] net_ratelimit: 88543 callbacks suppressed [ 2460.975092][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2460.993078][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2461.005105][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2461.008492][T24089] tipc: Enabling of bearer rejected, failed to enable media [ 2461.017124][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2461.037883][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2461.049885][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2461.061961][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2461.074076][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2461.086069][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2461.098133][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2461.260508][T24081] syzkaller0: entered promiscuous mode [ 2461.283342][T24081] syzkaller0: entered allmulticast mode [ 2461.439808][T24098] syzkaller0: entered promiscuous mode [ 2461.471322][T24098] syzkaller0: entered allmulticast mode [ 2461.515049][T24103] syzkaller0: entered promiscuous mode [ 2461.523776][T24103] syzkaller0: entered allmulticast mode [ 2461.753281][T24120] syzkaller0: entered promiscuous mode [ 2461.775502][T24120] syzkaller0: entered allmulticast mode [ 2462.096324][T24119] syzkaller0: entered promiscuous mode [ 2462.122644][T24119] syzkaller0: entered allmulticast mode [ 2462.174921][T24141] syzkaller0: entered promiscuous mode [ 2462.180450][T24141] syzkaller0: entered allmulticast mode [ 2462.609475][T24162] syzkaller0: entered promiscuous mode [ 2462.615054][T24162] syzkaller0: entered allmulticast mode [ 2462.834126][T24179] syzkaller0: entered promiscuous mode [ 2462.863431][T24179] syzkaller0: entered allmulticast mode [ 2462.998875][T24184] tipc: Enabled bearer , priority 0 [ 2463.062762][T24187] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24187 comm=syz.4.26317 [ 2463.100332][T24184] syzkaller0: entered promiscuous mode [ 2463.107761][T24187] xt_SECMARK: invalid security context 'unconfined' [ 2463.115402][T24184] syzkaller0: entered allmulticast mode [ 2463.124379][T24184] tipc: Resetting bearer [ 2463.140614][T24183] tipc: Resetting bearer [ 2463.168429][T24187] IPVS: Scheduler module ip_vs_sip not found [ 2463.200816][T24183] tipc: Disabling bearer [ 2463.288275][T24193] tipc: Enabling of bearer rejected, failed to enable media [ 2463.317699][T24193] syzkaller0: entered promiscuous mode [ 2463.348849][T24193] syzkaller0: entered allmulticast mode [ 2463.412557][ T28] kauditd_printk_skb: 590 callbacks suppressed [ 2463.412572][ T28] audit: type=1400 audit(2000000350.803:371763): avc: denied { module_request } for pid=24196 comm="syz.4.26321" kmod="ip6t_" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2463.454400][T24205] netlink: 8 bytes leftover after parsing attributes in process `syz.5.26322'. [ 2463.469628][ T28] audit: type=1400 audit(2000000350.822:371764): avc: denied { read write } for pid=24198 comm="syz.5.26322" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2463.496159][ T28] audit: type=1400 audit(2000000350.822:371765): avc: denied { read write open } for pid=24198 comm="syz.5.26322" path="/dev/virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2463.638067][ T28] audit: type=1400 audit(2000000350.831:371766): avc: denied { read } for pid=24198 comm="syz.5.26322" dev="nsfs" ino=4026532788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2463.663443][ T28] audit: type=1400 audit(2000000350.831:371767): avc: denied { read open } for pid=24198 comm="syz.5.26322" path="net:[4026532788]" dev="nsfs" ino=4026532788 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2463.718712][ T28] audit: type=1400 audit(2000000350.831:371768): avc: denied { create } for pid=24198 comm="syz.5.26322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2463.740733][ T28] audit: type=1400 audit(2000000350.831:371769): avc: denied { create } for pid=24201 comm="syz.1.26323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2463.763433][ T28] audit: type=1400 audit(2000000350.831:371770): avc: denied { write } for pid=24198 comm="syz.5.26322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2463.825187][ T28] audit: type=1400 audit(2000000350.831:371771): avc: denied { read } for pid=24198 comm="syz.5.26322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2463.854644][ T28] audit: type=1400 audit(2000000350.831:371772): avc: denied { create } for pid=24201 comm="syz.1.26323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2464.023038][T24228] syzkaller0: entered promiscuous mode [ 2464.028648][T24228] syzkaller0: entered allmulticast mode [ 2464.097096][T24223] syzkaller0: entered promiscuous mode [ 2464.102583][T24223] syzkaller0: entered allmulticast mode [ 2464.685717][T24253] tipc: Enabling of bearer rejected, failed to enable media [ 2464.763124][T24262] syzkaller0: entered promiscuous mode [ 2464.783147][T24258] netlink: 8 bytes leftover after parsing attributes in process `syz.4.26337'. [ 2464.797459][T24262] syzkaller0: entered allmulticast mode [ 2464.944215][T24273] tipc: Enabling of bearer rejected, failed to enable media [ 2465.032119][T24275] syzkaller0: entered promiscuous mode [ 2465.057552][T24275] syzkaller0: entered allmulticast mode [ 2465.328311][T24287] netlink: 'syz.5.26343': attribute type 39 has an invalid length. [ 2465.339479][T24289] syzkaller0: entered promiscuous mode [ 2465.344977][T24289] syzkaller0: entered allmulticast mode [ 2465.444646][T24293] syzkaller0: entered promiscuous mode [ 2465.468500][T24293] syzkaller0: entered allmulticast mode [ 2466.105371][T24316] tipc: Enabling of bearer rejected, failed to enable media [ 2466.129636][T24316] syzkaller0: entered promiscuous mode [ 2466.146119][T24316] syzkaller0: entered allmulticast mode [ 2466.190426][T24323] netlink: 'syz.3.26357': attribute type 39 has an invalid length. [ 2466.328227][ C0] net_ratelimit: 116459 callbacks suppressed [ 2466.328243][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2466.346303][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2466.358296][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2466.370394][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2466.382465][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2466.394448][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2466.406524][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2466.418589][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2466.430553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2466.442593][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2466.907444][T24336] syzkaller0: entered promiscuous mode [ 2466.918371][T24336] syzkaller0: entered allmulticast mode [ 2467.063811][T24343] syzkaller0: entered promiscuous mode [ 2467.091625][T24343] syzkaller0: entered allmulticast mode [ 2467.557425][T24372] 8021q: VLANs not supported on vxcan1 [ 2467.601072][T24369] netlink: 'syz.9.26369': attribute type 39 has an invalid length. [ 2467.759474][T24379] syzkaller0: entered promiscuous mode [ 2467.765823][T24379] syzkaller0: entered allmulticast mode [ 2468.766864][ T28] kauditd_printk_skb: 767 callbacks suppressed [ 2468.766877][ T28] audit: type=1400 audit(2000000355.810:372540): avc: denied { sys_module } for pid=24411 comm="syz.3.26379" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2468.788785][T24405] syzkaller0: entered promiscuous mode [ 2468.808144][T24405] syzkaller0: entered allmulticast mode [ 2468.823138][T24414] syzkaller0: entered promiscuous mode [ 2468.829266][T24414] syzkaller0: entered allmulticast mode [ 2468.840543][T24421] tipc: Enabled bearer , priority 10 [ 2468.847746][ T28] audit: type=1400 audit(2000000355.810:372541): avc: denied { module_request } for pid=24411 comm="syz.3.26379" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2468.870891][ T28] audit: type=1400 audit(2000000355.810:372542): avc: denied { setopt } for pid=24411 comm="syz.3.26379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2468.900242][ T28] audit: type=1400 audit(2000000355.810:372543): avc: denied { write } for pid=24411 comm="syz.3.26379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2468.921664][ T28] audit: type=1400 audit(2000000355.875:372544): avc: denied { read } for pid=24397 comm="syz.9.26378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2468.947062][T24432] 8021q: VLANs not supported on vxcan1 [ 2468.968591][T24433] syzkaller0: entered promiscuous mode [ 2468.974218][T24433] syzkaller0: entered allmulticast mode [ 2469.012426][ T28] audit: type=1400 audit(2000000356.025:372545): avc: denied { read write } for pid=16748 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2469.066203][ T28] audit: type=1400 audit(2000000356.063:372546): avc: denied { open } for pid=16748 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2469.202786][T24443] syzkaller0: entered promiscuous mode [ 2469.223900][T24443] syzkaller0: entered allmulticast mode [ 2469.229536][ T28] audit: type=1400 audit(2000000356.063:372547): avc: denied { ioctl } for pid=16748 comm="syz-executor" path="/dev/loop9" dev="devtmpfs" ino=109 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2469.290220][ T28] audit: type=1400 audit(2000000356.063:372548): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2469.352162][ T28] audit: type=1400 audit(2000000356.072:372549): avc: denied { recv } for pid=23729 comm="kworker/0:7" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2469.404180][T24447] netlink: 'syz.5.26384': attribute type 39 has an invalid length. [ 2469.495776][T24453] syzkaller0: entered promiscuous mode [ 2469.501421][T24453] syzkaller0: entered allmulticast mode [ 2469.834887][T24473] netlink: 'syz.1.26394': attribute type 1 has an invalid length. [ 2469.890616][T24473] 8021q: adding VLAN 0 to HW filter on device bond3 [ 2469.904987][T24474] 8021q: VLANs not supported on vxcan1 [ 2470.161673][T24491] netlink: 'syz.9.26398': attribute type 39 has an invalid length. [ 2470.193571][ T8190] tipc: Node number set to 119121672 [ 2470.244469][T24476] syzkaller0: entered promiscuous mode [ 2470.255239][T24476] syzkaller0: entered allmulticast mode [ 2470.276104][T24489] syzkaller0: entered promiscuous mode [ 2470.291207][T24489] syzkaller0: entered allmulticast mode [ 2470.584013][T24498] netlink: 68 bytes leftover after parsing attributes in process `syz.1.26400'. [ 2470.775838][T24514] syzkaller0: entered promiscuous mode [ 2470.788603][T24514] syzkaller0: entered allmulticast mode [ 2471.035773][T24516] syzkaller0: entered promiscuous mode [ 2471.066949][T24516] syzkaller0: entered allmulticast mode [ 2471.653000][T24534] syzkaller0: entered promiscuous mode [ 2471.671212][T24534] syzkaller0: entered allmulticast mode [ 2471.681395][ C0] net_ratelimit: 117981 callbacks suppressed [ 2471.681412][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2471.699472][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2471.711537][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2471.723544][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2471.735502][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2471.747592][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2471.759667][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2471.773339][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2471.785438][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2471.797411][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2471.926863][T24541] syzkaller0: entered promiscuous mode [ 2471.957630][T24541] syzkaller0: entered allmulticast mode [ 2472.124004][T24547] syzkaller0: entered promiscuous mode [ 2472.129562][T24547] syzkaller0: entered allmulticast mode [ 2472.442261][T24556] syzkaller0: entered promiscuous mode [ 2472.469981][T24556] syzkaller0: entered allmulticast mode [ 2472.503721][T24554] 8021q: VLANs not supported on vxcan1 [ 2472.529345][T24528] chnl_net:caif_netlink_parms(): no params data found [ 2472.553723][T24561] netlink: 68 bytes leftover after parsing attributes in process `syz.5.26421'. [ 2472.767843][T24528] bridge0: port 1(bridge_slave_0) entered blocking state [ 2472.785901][T24528] bridge0: port 1(bridge_slave_0) entered disabled state [ 2472.807531][T24528] bridge_slave_0: entered allmulticast mode [ 2472.869548][T24528] bridge_slave_0: entered promiscuous mode [ 2472.883539][T24528] bridge0: port 2(bridge_slave_1) entered blocking state [ 2472.891921][T24528] bridge0: port 2(bridge_slave_1) entered disabled state [ 2472.899151][T24528] bridge_slave_1: entered allmulticast mode [ 2472.907945][T24528] bridge_slave_1: entered promiscuous mode [ 2472.917135][T24572] syzkaller0: entered promiscuous mode [ 2472.923405][T24572] syzkaller0: entered allmulticast mode [ 2472.987787][T24528] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2473.069289][T24528] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2473.091075][T24575] syzkaller0: entered promiscuous mode [ 2473.103212][T24575] syzkaller0: entered allmulticast mode [ 2473.111129][ T53] bridge_slave_1: left allmulticast mode [ 2473.118002][ T53] bridge_slave_1: left promiscuous mode [ 2473.124426][ T53] bridge0: port 2(bridge_slave_1) entered disabled state [ 2473.133299][ T53] bridge_slave_0: left allmulticast mode [ 2473.139502][ T53] bridge_slave_0: left promiscuous mode [ 2473.145941][ T53] bridge0: port 1(bridge_slave_0) entered disabled state [ 2473.350904][ T53] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2473.362537][ T53] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2473.374244][ T53] bond0 (unregistering): Released all slaves [ 2473.383181][ T53] bond1 (unregistering): Released all slaves [ 2473.393527][ T53] bond2 (unregistering): Released all slaves [ 2473.406488][ T53] bond3 (unregistering): Released all slaves [ 2473.451050][ T53] tipc: Left network mode [ 2473.543709][T24528] team0: Port device team_slave_0 added [ 2473.702463][ T53] hsr_slave_0: left promiscuous mode [ 2473.725621][ T53] hsr_slave_1: left promiscuous mode [ 2473.737262][ T53] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2473.745752][ T53] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2473.753411][ T53] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2473.761874][ T53] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2473.774487][ T53] veth1_macvtap: left promiscuous mode [ 2473.786190][ T53] veth0_macvtap: left promiscuous mode [ 2473.793847][ T53] veth1_vlan: left promiscuous mode [ 2473.808604][ T53] veth0_vlan: left promiscuous mode [ 2473.980142][ T53] team0 (unregistering): Port device team_slave_1 removed [ 2474.000724][ T53] team0 (unregistering): Port device team_slave_0 removed [ 2474.061547][T24528] team0: Port device team_slave_1 added [ 2474.142166][ T28] kauditd_printk_skb: 1204 callbacks suppressed [ 2474.142182][ T28] audit: type=1400 audit(2000000360.826:373754): avc: denied { read } for pid=24587 comm="syz.5.26429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2474.173432][T24597] syzkaller0: entered promiscuous mode [ 2474.179101][T24597] syzkaller0: entered allmulticast mode [ 2474.193904][ T28] audit: type=1400 audit(2000000360.883:373755): avc: denied { create } for pid=24594 comm="syz.9.26430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2474.204063][T24592] 8021q: VLANs not supported on vxcan1 [ 2474.214992][ T28] audit: type=1400 audit(2000000360.883:373756): avc: denied { write } for pid=24594 comm="syz.9.26430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2474.306049][ T28] audit: type=1400 audit(2000000360.985:373757): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2474.335742][ T28] audit: type=1400 audit(2000000360.985:373758): avc: denied { recv } for pid=31826 comm="kworker/0:3" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2474.398340][T24528] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2474.428825][T24528] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2474.465594][ T28] audit: type=1400 audit(2000000361.051:373759): avc: denied { create } for pid=24614 comm="syz.3.26433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2474.488429][T24528] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2474.500193][ T28] audit: type=1400 audit(2000000361.051:373760): avc: denied { create } for pid=24614 comm="syz.3.26433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2474.527893][ T28] audit: type=1400 audit(2000000361.051:373761): avc: denied { write } for pid=24614 comm="syz.3.26433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2474.609762][ T28] audit: type=1400 audit(2000000361.088:373762): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2474.688950][ T28] audit: type=1400 audit(2000000361.088:373763): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2474.764067][T24528] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2474.775374][T24528] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2474.829526][T24632] netlink: 28 bytes leftover after parsing attributes in process `syz.5.26436'. [ 2474.857341][T24528] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2474.867050][T24622] netlink: 'syz.5.26436': attribute type 1 has an invalid length. [ 2474.965678][T24636] syzkaller0: entered promiscuous mode [ 2474.971301][T24636] syzkaller0: entered allmulticast mode [ 2474.998746][T24622] bond3: entered promiscuous mode [ 2475.023077][T24622] 8021q: adding VLAN 0 to HW filter on device bond3 [ 2475.154854][T24622] bond3: (slave bridge0): making interface the new active one [ 2475.194995][T24622] bridge0: entered promiscuous mode [ 2475.211873][T24622] bond3: (slave bridge0): Enslaving as an active interface with an up link [ 2475.250804][T24646] syzkaller0: entered promiscuous mode [ 2475.263130][T24646] syzkaller0: entered allmulticast mode [ 2475.301477][T24528] hsr_slave_0: entered promiscuous mode [ 2475.309181][T24528] hsr_slave_1: entered promiscuous mode [ 2475.713636][T24663] syzkaller0: entered promiscuous mode [ 2475.719140][T24663] syzkaller0: entered allmulticast mode [ 2476.474485][T24696] syzkaller0: entered promiscuous mode [ 2476.480122][T24696] syzkaller0: entered allmulticast mode [ 2476.761778][T24705] syzkaller0: entered promiscuous mode [ 2476.767374][T24705] syzkaller0: entered allmulticast mode [ 2477.034500][ C0] net_ratelimit: 131001 callbacks suppressed [ 2477.034517][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2477.044026][T24710] syzkaller0: entered promiscuous mode [ 2477.052576][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2477.061700][T24710] syzkaller0: entered allmulticast mode [ 2477.069996][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2477.087589][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2477.099545][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2477.111489][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2477.123503][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2477.135525][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2477.147467][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2477.159534][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2479.140558][T24669] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 2479.545465][ T28] kauditd_printk_skb: 376 callbacks suppressed [ 2479.545481][ T28] audit: type=1400 audit(2000000365.880:374140): avc: denied { egress } for pid=2581 comm="kworker/u8:3" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2480.023871][ T28] audit: type=1400 audit(2000000365.880:374141): avc: denied { sendto } for pid=2581 comm="kworker/u8:3" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 2480.230318][ T28] audit: type=1400 audit(2000000365.880:374142): avc: denied { egress } for pid=2581 comm="kworker/u8:3" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2480.326502][ T28] audit: type=1400 audit(2000000365.880:374143): avc: denied { egress } for pid=2581 comm="kworker/u8:3" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2480.412600][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2480.419126][ C1] audit: audit_lost=3094 audit_rate_limit=0 audit_backlog_limit=64 [ 2480.427024][ C1] audit: backlog limit exceeded [ 2480.431887][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2480.438392][ C1] audit: audit_lost=3095 audit_rate_limit=0 audit_backlog_limit=64 [ 2480.446284][ C1] audit: backlog limit exceeded [ 2482.387643][ C1] net_ratelimit: 168068 callbacks suppressed [ 2482.387661][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2482.387706][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2482.393791][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2482.405578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2482.417663][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2482.429427][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2482.441524][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2482.453391][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2482.465366][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2482.477242][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2485.059257][ T28] kauditd_printk_skb: 457 callbacks suppressed [ 2485.059325][ T28] audit: type=1400 audit(2000000371.046:374538): avc: denied { recv } for pid=24528 comm="syz-executor" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2485.497757][ T28] audit: type=1400 audit(2000000371.046:374539): avc: denied { sendto } for pid=21145 comm="napi/wg1-0" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 2486.172333][ T28] audit: type=1400 audit(2000000371.046:374540): avc: denied { egress } for pid=21145 comm="napi/wg1-0" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2486.246678][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2486.253372][ C1] audit: audit_lost=3117 audit_rate_limit=0 audit_backlog_limit=64 [ 2486.261288][ C1] audit: backlog limit exceeded [ 2486.266157][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2486.272665][ C1] audit: audit_lost=3118 audit_rate_limit=0 audit_backlog_limit=64 [ 2486.280572][ C1] audit: backlog limit exceeded [ 2486.285550][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2487.740829][ C0] net_ratelimit: 167729 callbacks suppressed [ 2487.740845][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2487.740847][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2487.740899][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2487.747150][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2487.758909][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2487.771023][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2487.782853][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2487.794847][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2487.806602][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2487.818594][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2489.132438][ C1] ip6_tunnel: ip6gre2 xmit: Local address not yet configured! [ 2490.466114][ T28] kauditd_printk_skb: 348 callbacks suppressed [ 2490.466132][ T28] audit: type=1400 audit(2000000376.025:374806): avc: denied { egress } for pid=21022 comm="syz-executor" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2491.492083][ T28] audit: type=1400 audit(2000000376.025:374807): avc: denied { sendto } for pid=21022 comm="syz-executor" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 2491.973174][ C1] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2491.979862][ C1] audit: audit_lost=3147 audit_rate_limit=0 audit_backlog_limit=64 [ 2491.987770][ C1] audit: backlog limit exceeded [ 2491.992690][ C1] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2491.999288][ C1] audit: audit_lost=3148 audit_rate_limit=0 audit_backlog_limit=64 [ 2492.007195][ C1] audit: backlog limit exceeded [ 2492.064903][ C0] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2492.064936][ C1] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2493.093871][ C0] net_ratelimit: 170132 callbacks suppressed [ 2493.093889][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2493.093950][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2493.100049][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2493.112093][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2493.123865][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2493.135891][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2493.147664][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2493.159669][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2493.171382][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2493.183478][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2495.821939][ T28] kauditd_printk_skb: 338 callbacks suppressed [ 2495.821955][ T28] audit: type=1400 audit(2000000381.126:375088): avc: denied { sendto } for pid=24734 comm="kworker/u8:32" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 2496.802411][ T28] audit: type=1400 audit(2000000381.126:375089): avc: denied { egress } for pid=24734 comm="kworker/u8:32" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2497.092102][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2497.098714][ C1] audit: audit_lost=3169 audit_rate_limit=0 audit_backlog_limit=64 [ 2497.106624][ C1] audit: backlog limit exceeded [ 2497.134328][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2497.140865][ C1] audit: audit_lost=3170 audit_rate_limit=0 audit_backlog_limit=64 [ 2497.148777][ C1] audit: backlog limit exceeded [ 2497.153868][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2497.160376][ C1] audit: audit_lost=3171 audit_rate_limit=0 audit_backlog_limit=64 [ 2498.447041][ C1] net_ratelimit: 170047 callbacks suppressed [ 2498.447058][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2498.447078][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2498.453196][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2498.464984][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2498.477162][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2498.488905][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2498.500906][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2498.512739][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2498.524720][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2498.536505][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2501.203724][ T28] kauditd_printk_skb: 400 callbacks suppressed [ 2501.203738][ T28] audit: type=1400 audit(2000000386.161:375429): avc: denied { egress } for pid=22 comm="ksoftirqd/1" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2502.069947][ T28] audit: type=1400 audit(2000000386.161:375430): avc: denied { sendto } for pid=22 comm="ksoftirqd/1" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 2502.373243][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2502.379786][ C1] audit: audit_lost=3192 audit_rate_limit=0 audit_backlog_limit=64 [ 2502.387699][ C1] audit: backlog limit exceeded [ 2502.392663][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2502.399174][ C1] audit: audit_lost=3193 audit_rate_limit=0 audit_backlog_limit=64 [ 2502.407088][ C1] audit: backlog limit exceeded [ 2502.412194][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2502.418699][ C1] audit: audit_lost=3194 audit_rate_limit=0 audit_backlog_limit=64 [ 2503.800158][ C0] net_ratelimit: 162240 callbacks suppressed [ 2503.800177][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2503.800176][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2503.806493][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2503.818280][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2503.830380][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2503.842089][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2503.854231][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2503.865951][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2503.878058][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2503.889801][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2506.561986][ T28] kauditd_printk_skb: 391 callbacks suppressed [ 2506.562002][ T28] audit: type=1400 audit(2000000391.178:375743): avc: denied { egress } for pid=3420 comm="kworker/1:6" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2507.557823][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2507.564373][ C0] audit: audit_lost=3221 audit_rate_limit=0 audit_backlog_limit=64 [ 2507.572359][ C0] audit: backlog limit exceeded [ 2507.583294][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2507.583308][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2507.589799][ C1] audit: audit_lost=3222 audit_rate_limit=0 audit_backlog_limit=64 [ 2507.589812][ C1] audit: backlog limit exceeded [ 2507.589829][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2507.596313][ C0] audit: audit_lost=3223 audit_rate_limit=0 audit_backlog_limit=64 [ 2509.153277][ C0] net_ratelimit: 152226 callbacks suppressed [ 2509.153295][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2509.153343][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2509.159339][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2509.171326][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2509.183106][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2509.195166][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2509.206973][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2509.219014][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2509.231009][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2509.242947][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2512.060237][ T28] kauditd_printk_skb: 373 callbacks suppressed [ 2512.060255][ T28] audit: type=1400 audit(2000000396.194:376102): avc: denied { egress } for pid=3553 comm="kworker/u8:8" saddr=fe80::a8aa:aaff:feaa:aa1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2512.861518][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2512.868039][ C1] audit: audit_lost=3229 audit_rate_limit=0 audit_backlog_limit=64 [ 2512.875939][ C1] audit: backlog limit exceeded [ 2512.884066][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2512.890578][ C1] audit: audit_lost=3230 audit_rate_limit=0 audit_backlog_limit=64 [ 2512.893117][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2512.898477][ C1] audit: backlog limit exceeded [ 2512.898539][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2512.904991][ C0] audit: audit_lost=3231 audit_rate_limit=0 audit_backlog_limit=64 [ 2514.506430][ C0] net_ratelimit: 123731 callbacks suppressed [ 2514.506447][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2514.506578][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2514.512477][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2514.524763][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2514.536338][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2514.549563][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2514.560555][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2514.572825][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2514.584291][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2514.596589][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2517.415633][ T28] kauditd_printk_skb: 523 callbacks suppressed [ 2517.415649][ T28] audit: type=1400 audit(2000000401.332:376620): avc: denied { egress } for pid=24773 comm="kworker/1:9" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2518.262248][ T28] audit: type=1400 audit(2000000401.332:376621): avc: denied { sendto } for pid=24773 comm="kworker/1:9" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 2518.855503][ T28] audit: type=1400 audit(2000000401.379:376622): avc: denied { sendto } for pid=14883 comm="kworker/u8:13" saddr=fe80::a8aa:aaff:feaa:aa1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 2519.094951][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2519.095685][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2519.101512][ C1] audit: audit_lost=3234 audit_rate_limit=0 audit_backlog_limit=64 [ 2519.101525][ C1] audit: backlog limit exceeded [ 2519.101556][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2519.108027][ C0] audit: audit_lost=3235 audit_rate_limit=0 audit_backlog_limit=64 [ 2519.115911][ C1] audit: audit_lost=3236 audit_rate_limit=0 audit_backlog_limit=64 [ 2519.859582][ C0] net_ratelimit: 119089 callbacks suppressed [ 2519.859600][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2519.859729][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2519.865680][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2519.877915][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2519.889543][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2519.901733][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2519.913264][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2519.925488][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2519.937081][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2519.949453][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2522.767225][ T28] kauditd_printk_skb: 324 callbacks suppressed [ 2522.767264][ T28] audit: type=1400 audit(2000000406.349:376888): avc: denied { sendto } for pid=3420 comm="kworker/1:6" saddr=fe80::a8aa:aaff:feaa:aa1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 2523.173224][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2523.173359][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2523.179743][ C1] audit: audit_lost=3256 audit_rate_limit=0 audit_backlog_limit=64 [ 2523.186329][ C0] audit: audit_lost=3257 audit_rate_limit=0 audit_backlog_limit=64 [ 2523.194207][ C1] audit: backlog limit exceeded [ 2523.202067][ C0] audit: backlog limit exceeded [ 2523.238684][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2523.238987][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2523.245202][ C1] audit: audit_lost=3258 audit_rate_limit=0 audit_backlog_limit=64 [ 2525.212736][ C0] net_ratelimit: 131985 callbacks suppressed [ 2525.212754][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2525.212782][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2525.218826][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2525.231058][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2525.242722][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2525.254878][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2525.266419][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2525.278626][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2525.290197][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2525.302627][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2528.175024][ T28] kauditd_printk_skb: 520 callbacks suppressed [ 2528.175042][ T28] audit: type=1400 audit(2000000411.346:377259): avc: denied { egress } for pid=53 comm="kworker/u8:4" saddr=fe80::b88f:e2ff:fe87:81ce daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2529.149027][ T28] audit: type=1400 audit(2000000411.346:377260): avc: denied { sendto } for pid=24789 comm="syz.3.26467" saddr=fe80::a8aa:aaff:feaa:aa1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 2529.188684][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2529.188718][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2529.195194][ C1] audit: audit_lost=3309 audit_rate_limit=0 audit_backlog_limit=64 [ 2529.195207][ C1] audit: backlog limit exceeded [ 2529.195220][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2529.201711][ C0] audit: audit_lost=3310 audit_rate_limit=0 audit_backlog_limit=64 [ 2529.209578][ C1] audit: audit_lost=3311 audit_rate_limit=0 audit_backlog_limit=64 [ 2529.214397][ C0] audit: backlog limit exceeded [ 2530.565824][ C0] net_ratelimit: 131980 callbacks suppressed [ 2530.565842][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2530.566209][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2530.571883][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2530.584089][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2530.595690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2530.607856][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2530.619495][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2530.631753][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2530.643403][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2530.655719][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2533.601072][ T28] kauditd_printk_skb: 310 callbacks suppressed [ 2533.601090][ T28] audit: type=1400 audit(2000000416.391:377514): avc: denied { sendto } for pid=3299 comm="syz-executor" saddr=fe80::a8aa:aaff:feaa:aa1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 2534.328043][ T28] audit: type=1400 audit(2000000416.391:377513): avc: denied { egress } for pid=2601 comm="kworker/u8:16" saddr=fe80::b88f:e2ff:fe87:81ce daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2534.873322][ C0] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2534.873377][ C1] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2534.879841][ C0] audit: audit_lost=3331 audit_rate_limit=0 audit_backlog_limit=64 [ 2534.886341][ C1] audit: audit_lost=3332 audit_rate_limit=0 audit_backlog_limit=64 [ 2534.894265][ C0] audit: backlog limit exceeded [ 2534.902084][ C1] audit: backlog limit exceeded [ 2534.979837][ T28] audit: type=1400 audit(2000000416.484:377515): avc: denied { recv } for pid=24741 comm="kworker/u8:38" saddr=10.128.0.163 src=30036 daddr=10.128.0.55 dest=40242 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2535.068350][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2535.726689][ C1] ================================================================== [ 2535.734820][ C1] BUG: KCSAN: data-race in wq_worker_tick / wq_worker_tick [ 2535.742042][ C1] [ 2535.744356][ C1] read-write to 0xffff8881000c5ed8 of 8 bytes by interrupt on cpu 0: [ 2535.752413][ C1] wq_worker_tick+0x60/0x230 [ 2535.757011][ C1] sched_tick+0xda/0x210 [ 2535.761287][ C1] update_process_times+0x15e/0x190 [ 2535.766499][ C1] tick_nohz_handler+0x275/0x3d0 [ 2535.771441][ C1] __hrtimer_run_queues+0x218/0x4f0 [ 2535.776775][ C1] hrtimer_interrupt+0x269/0x810 [ 2535.781717][ C1] __sysvec_apic_timer_interrupt+0x5f/0x1f0 [ 2535.787625][ C1] sysvec_apic_timer_interrupt+0x32/0x80 [ 2535.793374][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 2535.799363][ C1] __tsan_read_write4+0x136/0x180 [ 2535.804396][ C1] __netif_receive_skb_core+0xd1f/0x1980 [ 2535.810154][ C1] process_backlog+0x25b/0x670 [ 2535.814940][ C1] __napi_poll+0x61/0x330 [ 2535.819278][ C1] net_rx_action+0x452/0x930 [ 2535.823878][ C1] handle_softirqs+0xb9/0x2a0 [ 2535.828553][ C1] do_softirq+0x45/0x60 [ 2535.832704][ C1] __local_bh_enable_ip+0x70/0x80 [ 2535.837773][ C1] __alloc_skb+0x658/0x690 [ 2535.842299][ C1] nsim_dev_trap_report_work+0x18a/0x630 [ 2535.848004][ C1] process_scheduled_works+0x4de/0x9e0 [ 2535.853474][ C1] worker_thread+0x581/0x770 [ 2535.858063][ C1] kthread+0x22a/0x280 [ 2535.862224][ C1] ret_from_fork+0x150/0x360 [ 2535.866829][ C1] ret_from_fork_asm+0x1a/0x30 [ 2535.871599][ C1] [ 2535.873912][ C1] read-write to 0xffff8881000c5ed8 of 8 bytes by interrupt on cpu 1: [ 2535.881967][ C1] wq_worker_tick+0x60/0x230 [ 2535.886575][ C1] sched_tick+0xda/0x210 [ 2535.890816][ C1] update_process_times+0x15e/0x190 [ 2535.896025][ C1] tick_nohz_handler+0x275/0x3d0 [ 2535.900976][ C1] __hrtimer_run_queues+0x218/0x4f0 [ 2535.906183][ C1] hrtimer_interrupt+0x269/0x810 [ 2535.911124][ C1] __sysvec_apic_timer_interrupt+0x5f/0x1f0 [ 2535.917022][ C1] sysvec_apic_timer_interrupt+0x32/0x80 [ 2535.918945][ C0] net_ratelimit: 133179 callbacks suppressed [ 2535.918983][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2535.922654][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 2535.928715][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2535.940561][ C1] __tsan_read_write8+0x2c/0x180 [ 2535.940588][ C1] skb_push+0x2c/0x90 [ 2535.946774][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2535.958584][ C1] br_nf_forward_finish+0x2a0/0x780 [ 2535.963617][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2535.967484][ C1] br_nf_forward_ip+0x5fe/0x620 [ 2535.979407][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2535.984515][ C1] br_nf_forward+0x5a2/0xec0 [ 2535.984541][ C1] nf_hook_slow+0x78/0x180 [ 2535.996459][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2536.001238][ C1] __br_forward+0x282/0x360 [ 2536.013161][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2536.017779][ C1] br_flood+0x451/0x6d0 [ 2536.022238][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2536.034124][ C1] br_handle_frame_finish+0xdb8/0xfd0 [ 2536.034153][ C1] br_nf_hook_thresh+0x233/0x270 [ 2536.038703][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2536.050579][ C1] br_nf_pre_routing_finish_ipv6+0x550/0x580 [ 2536.054772][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 2536.066934][ C1] br_nf_pre_routing_ipv6+0x1fa/0x2e0 [ 2536.066967][ C1] br_nf_pre_routing+0x52b/0xbd0 [ 2536.117347][ C1] br_handle_frame+0x85f/0xa60 [ 2536.122116][ C1] __netif_receive_skb_core+0x5b1/0x1980 [ 2536.127754][ C1] process_backlog+0x25b/0x670 [ 2536.132526][ C1] __napi_poll+0x61/0x330 [ 2536.136862][ C1] net_rx_action+0x452/0x930 [ 2536.141457][ C1] handle_softirqs+0xb9/0x2a0 [ 2536.146135][ C1] do_softirq+0x45/0x60 [ 2536.150290][ C1] __local_bh_enable_ip+0x70/0x80 [ 2536.155309][ C1] _raw_spin_unlock_bh+0x18/0x20 [ 2536.160315][ C1] nsim_dev_trap_report_work+0x52b/0x630 [ 2536.165952][ C1] process_scheduled_works+0x4de/0x9e0 [ 2536.171415][ C1] worker_thread+0x581/0x770 [ 2536.176009][ C1] kthread+0x22a/0x280 [ 2536.180070][ C1] ret_from_fork+0x150/0x360 [ 2536.184679][ C1] ret_from_fork_asm+0x1a/0x30 [ 2536.189453][ C1] [ 2536.191766][ C1] value changed: 0x000000000171df80 -> 0x0000000001720690 [ 2536.198861][ C1] [ 2536.201173][ C1] Reported by Kernel Concurrency Sanitizer on: [ 2536.207326][ C1] CPU: 1 UID: 0 PID: 24748 Comm: kworker/u8:43 Tainted: G W syzkaller #0 PREEMPT(full) [ 2536.218527][ C1] Tainted: [W]=WARN [ 2536.222316][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2536.232367][ C1] Workqueue: events_unbound nsim_dev_trap_report_work [ 2536.239144][ C1] ================================================================== [ 2539.061964][ T28] kauditd_printk_skb: 328 callbacks suppressed [ 2539.062019][ T28] audit: type=1400 audit(2000000421.407:377761): avc: denied { egress } for pid=24740 comm="kworker/u8:37" saddr=fe80::a8aa:aaff:feaa:aa1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 2539.659506][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2539.659699][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2539.666035][ C1] audit: audit_lost=3361 audit_rate_limit=0 audit_backlog_limit=64 [ 2539.672540][ C0] audit: audit_lost=3362 audit_rate_limit=0 audit_backlog_limit=64 [ 2539.680504][ C1] audit: backlog limit exceeded [ 2539.688362][ C0] audit: backlog limit exceeded [ 2539.712762][ C1] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2539.719293][ C1] audit: audit_lost=3363 audit_rate_limit=0 audit_backlog_limit=64 [ 2539.722929][ C0] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2540.634759][ T8] veth0_to_bridge: left allmulticast mode [ 2540.644398][ T8] veth0_to_bridge: left promiscuous mode [ 2540.697735][ T8] bridge0: port 3(veth0_to_bridge) entered disabled state SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2540.770119][ T8] bridge_slave_1: left allmulticast mode [ 2540.775792][ T8] bridge_slave_1: left promiscuous mode [ 2540.781537][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 2540.823608][ T8] bridge_slave_0: left allmulticast mode [ 2540.829271][ T8] bridge_slave_0: left promiscuous mode [ 2540.835850][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 2540.996469][ T8] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2541.006426][ T8] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2541.016870][ T8] bond0 (unregistering): Released all slaves [ 2541.024144][ T8] bond1 (unregistering): Released all slaves [ 2541.146916][ T8] tipc: Disabling bearer [ 2541.152236][ T8] tipc: Left network mode [ 2541.254832][ T8] hsr_slave_0: left promiscuous mode [ 2541.261401][ T8] hsr_slave_1: left promiscuous mode [ 2541.267012][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2541.274427][ T8] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2541.282116][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2541.289628][ T8] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2541.300653][ T8] veth1_macvtap: left promiscuous mode [ 2541.306157][ T8] veth0_macvtap: left promiscuous mode [ 2541.311640][ T8] veth1_vlan: left promiscuous mode [ 2541.316932][ T8] veth0_vlan: left promiscuous mode [ 2541.372568][ T8] team0 (unregistering): Port device team_slave_1 removed [ 2541.385410][ T8] team0 (unregistering): Port device team_slave_0 removed [ 2541.680529][ T8] IPVS: stop unused estimator thread 0... [ 2541.743534][T24780] bridge_slave_1: left allmulticast mode [ 2541.749214][T24780] bridge_slave_1: left promiscuous mode [ 2541.754968][T24780] bridge0: port 2(bridge_slave_1) entered disabled state [ 2541.762783][T24780] bridge_slave_0: left allmulticast mode [ 2541.768585][T24780] bridge_slave_0: left promiscuous mode [ 2541.774178][T24780] bridge0: port 1(bridge_slave_0) entered disabled state [ 2541.894927][T24780] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2541.904801][T24780] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2541.914634][T24780] bond0 (unregistering): Released all slaves [ 2541.936006][T24780] bond1 (unregistering): (slave geneve2): Releasing active interface [ 2541.950586][T24780] bond3 (unregistering): (slave bridge0): Releasing backup interface [ 2541.959918][T24780] bridge0 (unregistering): left promiscuous mode [ 2542.021822][T24780] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2542.031704][T24780] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2542.041106][T24780] bond0 (unregistering): (slave bond2): Releasing backup interface [ 2542.049721][T24780] bond0 (unregistering): Released all slaves [ 2542.057554][T24780] bond1 (unregistering): Released all slaves [ 2542.065904][T24780] bond2 (unregistering): Released all slaves [ 2542.074409][T24780] bond3 (unregistering): Released all slaves [ 2542.098392][T24780] tipc: Left network mode [ 2542.105587][T24780] hsr_slave_0: left promiscuous mode [ 2542.111282][T24780] hsr_slave_1: left promiscuous mode [ 2542.116915][T24780] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2542.124280][T24780] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2542.134134][T24780] hsr_slave_0: left promiscuous mode [ 2542.139727][T24780] hsr_slave_1: left promiscuous mode [ 2542.145484][T24780] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2542.153428][T24780] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2542.164004][T24780] veth1_macvtap: left promiscuous mode [ 2542.169640][T24780] veth0_macvtap: left promiscuous mode [ 2542.175121][T24780] veth1_vlan: left promiscuous mode [ 2542.180426][T24780] veth0_vlan: left promiscuous mode [ 2542.233285][T24780] team0 (unregistering): Port device team_slave_1 removed [ 2542.243116][T24780] team0 (unregistering): Port device team_slave_0 removed [ 2542.294108][T24780] team_slave_1 (unregistering): left promiscuous mode [ 2542.301476][T24780] team0 (unregistering): Port device team_slave_1 removed [ 2542.311054][T24780] team_slave_0 (unregistering): left promiscuous mode [ 2542.318072][T24780] team0 (unregistering): Port device team_slave_0 removed