last executing test programs: 5.013162563s ago: executing program 1 (id=13): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x24044010) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x40800}, 0x24048051) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x8, 0x80000000000830d}, 0x101210, 0x2, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_CREATE(0x0, 0x0, 0x50) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e999000000000000000000000000000000000000ffff00000000ac0714bb000000000000000000000000fffe04001000000002000020"], 0xb8}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6501000014"], 0x188}}, 0x0) 4.908306474s ago: executing program 1 (id=16): socket$kcm(0x2d, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1a, 0xc, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000180)=r0, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40002000) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x1ff, 0x4, 0x0, 0x4, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000000c40)={0x14, 0x24, 0x1, 0x70bd26, 0x25dfdbfc, {0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x4000d}, 0x20000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) socket$kcm(0x2, 0x200000000000001, 0x106) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, 0x0, 0x80000) 4.850459555s ago: executing program 1 (id=18): socket$nl_rdma(0x10, 0x3, 0x14) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x1000000000000, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x5, 0x84) socket$kcm(0x21, 0x2, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) socket$nl_route(0x10, 0x3, 0x0) socket$kcm(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x810000a6, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888100", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.677292367s ago: executing program 1 (id=22): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x4612, 0xffffffffffffdfff}, 0x114105, 0x6, 0x9, 0x1, 0x0, 0x40000, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x8fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f0000000040)='syz1\x00', 0x1ff) 4.508117749s ago: executing program 1 (id=25): sendmsg$inet(0xffffffffffffffff, &(0x7f0000002480)={0x0, 0x0, 0x0}, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x1}, 0x80d1) socket$kcm(0x2, 0x1, 0x84) socket$kcm(0x2, 0x5, 0x84) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='.\x00', 0x0, 0x8b7848, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) r4 = socket$kcm(0x1e, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r5 = socket$kcm(0x1e, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f00000008c0), 0x43) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfc00) recvmsg(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000040)=""/59, 0x3b}], 0x1}, 0x40000180) close(r5) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000008c0), 0x43) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10, 0x0}, 0x40040d4) 3.620739399s ago: executing program 1 (id=39): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x24044010) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$NFT_MSG_GETRULE(r0, 0x0, 0x24048051) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x8, 0x80000000000830d}, 0x101210, 0x2, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_CREATE(0x0, 0x0, 0x50) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e999000000000000000000000000000000000000ffff00000000ac0714bb000000000000000000000000fffe04001000000002000020"], 0xb8}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6501000014"], 0x188}}, 0x0) 1.85815457s ago: executing program 2 (id=75): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 1.77658354s ago: executing program 2 (id=79): socket$kcm(0x29, 0x7, 0x0) socket$kcm(0xa, 0x1, 0x106) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0}, 0x50) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x2a, 0x2, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x800) socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x6, 0x0, 0x0, 0x0, 0x80003, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x2000000000007}, 0x0, 0x94a8, 0xfffffffe, 0x4, 0x3fe, 0x7ffffffc, 0x410, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x4}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)="2703025701f328000600002fb96dbcf706e10500000086ddffff1144ee1632d4b8bf4a31accbe1ba0777cfbf6ae77256da82f6184b8a34f9015cc99e570000003c21880b", 0xfdef}], 0x1}, 0x0) 1.77607576s ago: executing program 3 (id=80): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="12000000040000000400000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000000500000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4002000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.368514475s ago: executing program 0 (id=83): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 1.275761776s ago: executing program 0 (id=84): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[], 0x90}, 0x1, 0x0, 0x0, 0x24000144}, 0x2000) close(r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x0, 0xe, 0x0, &(0x7f0000000240)="6ebca58ce6ffffffffc9252388f7", 0x0, 0x40002, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6004a, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x2, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d33, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x2, 0xfffffffe, 0xf, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x8010) r3 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x15, &(0x7f00000000c0), 0xb9) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r4, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x106) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x110002, 0x200, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r5 = socket$kcm(0x15, 0x5, 0x0) setsockopt$sock_attach_bpf(r5, 0x114, 0x1d, 0x0, 0xfea5) 1.148785397s ago: executing program 2 (id=87): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x94, 0x2, 0x0, 0x0, 0x0, 0x0, 0x181, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x4, @perf_config_ext={0x0, 0x772}, 0x108500, 0xe9a, 0x7baf376b, 0x3, 0x5, 0x0, 0x5}, 0x0, 0xfffffffc00000000, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x50) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 1.020710359s ago: executing program 0 (id=90): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 911.91081ms ago: executing program 0 (id=91): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000017c0)={&(0x7f0000000040)=@l2tp6={0xa, 0x80fe, 0x7, @dev={0xfe, 0x80, '\x00', 0x3e}, 0x12, 0x2}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000540)="7598c0a5", 0x4}], 0x1, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000084000000070000007f00000000000000b8"], 0xd0}, 0x480c4) setsockopt$sock_attach_bpf(r0, 0x1, 0xd, &(0x7f00000001c0), 0x45) close(r0) 873.65974ms ago: executing program 3 (id=92): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWRULE={0x48, 0x6, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_RULE_EXPRESSIONS={0x34, 0x4, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, @synproxy={{0xd}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x5}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x6}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x7}]}}}]}]}], {0x14, 0x10}}, 0x70}, 0x1, 0x0, 0x0, 0x20040051}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x40080) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f00000002c0)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd"], 0xffbf) 862.669561ms ago: executing program 0 (id=93): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@gettfilter={0x3c, 0x2e, 0x400, 0x70bd25, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x0, 0x4}, {0xe, 0xf}, {0x8, 0xf}}, [{0x8, 0xb, 0x3}, {0x8, 0xb, 0x9}, {0x8, 0xb, 0xc0e}]}, 0x3c}, 0x1, 0x0, 0x0, 0xb2699fab83326a53}, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000008082295"], &(0x7f00000002c0)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014fa0000b7030000000000008500000083000000bf09"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x739, &(0x7f0000000000)="ff", 0x0, 0x149c, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe, 0x2000000}, 0x48) 520.700505ms ago: executing program 4 (id=94): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x17, 0x0, 0x0, 0x0, 0x4}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0), 0x22) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000000000000000000400000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x60, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2, 0x0, 0x3}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_EXPRESSIONS={0x34, 0x4, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, @target={{0xb}, @val={0x20, 0x2, 0x0, 0x1, [@NFTA_TARGET_NAME={0x8, 0x1, 'SET\x00'}, @NFTA_TARGET_INFO={0xc, 0x3, "02b51112d439c592"}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x1}]}}}]}]}], {0x14}}, 0x88}}, 0x800) 463.266105ms ago: executing program 2 (id=95): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) close(0x3) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0700000004000000000900000100000028"], 0x50) socket$kcm(0xf, 0x3, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000003000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x29, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1}, 0x1000, 0x2, 0xffffff7e, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1000000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r2}, 0xc) socketpair(0x8, 0x4, 0x7, &(0x7f0000000180)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[{0xffffffff, 0x0, 0xb}], 0x10, 0xd5}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x8, 0x1, 0xc}]}, &(0x7f0000000100)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000), 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000140)=[{&(0x7f00000005c0)="df", 0x1}], 0x1}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x4805}, 0x20000050) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000cc0)={0x438, 0x3f4, 0x1, 0x70bd25, 0x25dfdbfb, {0x3, 0x2, 0x1c, [0x6, 0x0, 0x5, 0x6, 0x80000001, 0x2, 0x7, 0x6, 0x200, 0x5, 0xf5, 0x800, 0x480000, 0x9, 0xe7e, 0x10, 0x7fff, 0x8, 0x2, 0x8, 0xf, 0x19, 0x4, 0x880, 0x8, 0xaef, 0x0, 0x9, 0x1ff, 0x101, 0xb, 0x6, 0x6, 0xfffffff9, 0x5, 0x8, 0x5, 0x6, 0xffff, 0x7, 0x1, 0x7, 0x4, 0xfff, 0x3, 0x0, 0x46, 0x1, 0x8f9c, 0x49f, 0xf000, 0x2, 0xc281, 0x98cb, 0x3, 0x9, 0x8, 0x2, 0x2, 0x4, 0x8, 0x9, 0x7, 0x3], [0xc310, 0x9, 0x0, 0x10000, 0x8, 0x1, 0x1, 0xf, 0x7, 0xff, 0x6, 0x7ff, 0x1, 0x7, 0x3, 0xfff, 0x4, 0x3, 0xa5, 0xc, 0xe6, 0x1, 0x14, 0xfb9, 0x80000000, 0x1, 0xd78f, 0x2, 0xfffffff9, 0xdcc, 0x4, 0xfffffffa, 0x3, 0x10, 0x6, 0x71, 0x9, 0x758e2115, 0x8, 0xfc41, 0xd, 0x9, 0x0, 0x9, 0x100, 0x9fe2, 0x1, 0x9, 0x200, 0x28, 0xf7c, 0x8b3, 0x6, 0x8001, 0x8, 0x42, 0x6, 0x4, 0xe, 0xc, 0x67, 0x10000, 0x480000, 0x7fff], [0x4e0, 0x48, 0x4, 0xd7a2, 0x0, 0x0, 0x6, 0xad, 0x8000, 0x1c, 0x1ff, 0xd, 0x5, 0x0, 0x1, 0x0, 0x8, 0x7fffffff, 0x0, 0x8, 0x4, 0x8001, 0xfffffff7, 0xe2, 0x4cf1, 0x6a9b, 0x2, 0x6, 0x8, 0x1, 0x5, 0x7, 0x240, 0x287, 0x1, 0x2, 0x800, 0x6, 0x526, 0xe630, 0x2, 0x0, 0x7fffffff, 0x4, 0x6, 0x3, 0x6, 0x20000000, 0x0, 0x0, 0xfffffff8, 0x10000, 0xfffffffb, 0xff, 0xff, 0xff, 0x6, 0x3, 0x4, 0x6, 0x1, 0xffffffff, 0x1, 0x100], [0x0, 0x8, 0x1, 0x0, 0x80000001, 0x8, 0x1, 0x9, 0x7f, 0x3, 0xa, 0x4, 0x9, 0x2, 0x6, 0x0, 0x464b, 0xbdea, 0x1, 0xf2a, 0x7, 0x4, 0x2, 0xecae, 0xff, 0x8, 0x3, 0x485d, 0x2, 0x0, 0x0, 0x10001, 0x1, 0x800, 0x3, 0x3, 0x9, 0xffff, 0x1, 0x2, 0x1ff, 0x1, 0x40, 0x499, 0x8, 0x2, 0x6, 0x80, 0x5, 0xfffffffe, 0xd1, 0x1, 0x40, 0x1, 0x5, 0x8626, 0x5, 0x6, 0x1, 0x8, 0x8, 0xd, 0x9, 0x6], 0x18, ['GPL\x00', '\x00', '\x00', '*', 'GPL\x00', '\x00', ']}).$][-\\-\'\x00']}, ["", "", "", "", "", "", "", ""]}, 0x438}, 0x1, 0x0, 0x0, 0x20040045}, 0x4000) sendmsg$NFT_BATCH(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[], 0xfff4}}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d34, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2800000000000000, 0x800}, 0x405, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 462.863605ms ago: executing program 3 (id=96): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x7c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0xd}, @NFTA_SET_EXPRESSIONS={0x38, 0x12, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x8}]}}}, {0x14, 0x1, 0x0, 0x1, @last={{0x9}, @val={0x4}}}]}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x120}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0xc4}}, 0x20050800) 453.667475ms ago: executing program 0 (id=97): perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0xd000, 0x0, 0xfffffffa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1000e, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa0c0, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc12082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b"], 0xfdef) write$cgroup_subtree(r2, &(0x7f00000004c0)=ANY=[], 0xfdef) 449.057655ms ago: executing program 4 (id=98): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="1b00000000000000001b00000080", @ANYRES32, @ANYBLOB], 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xa, 0x1, 0x56d, 0x4, 0x42, 0xffffffffffffffff, 0x1000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600), &(0x7f0000001f80), 0xfffffffb, r0}, 0x38) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200), &(0x7f00000004c0), 0x1000, r0}, 0x38) 356.548736ms ago: executing program 3 (id=99): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000017c0)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext={0x400, 0x8}, 0x4040, 0x0, 0xffffffff, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a44000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40000000010800034000000014480000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a31000000001c0003801800008008000340000000020c0004400000000000000c7f14000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={0x2c, 0xd, 0xa, 0x655c3878357aea39, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004001}, 0x4000004) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)={{0x14}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x28}, 0x1, 0x0, 0x0, 0x4008091}, 0x24000000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, 0x0, 0x0) 355.846596ms ago: executing program 2 (id=100): perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/1423], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002200)=@base={0x9, 0x2, 0x5, 0x9, 0x402a, 0x1, 0x52, '\x00', 0x0, r0, 0x5, 0x2, 0x2}, 0x50) 284.821847ms ago: executing program 2 (id=101): sendmsg$inet(0xffffffffffffffff, &(0x7f0000002480)={0x0, 0x0, 0x0}, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x1}, 0x80d1) socket$kcm(0x2, 0x1, 0x84) socket$kcm(0x2, 0x5, 0x84) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='.\x00', 0x0, 0x8b7848, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) r4 = socket$kcm(0x1e, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r5 = socket$kcm(0x1e, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f00000008c0), 0x43) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfc00) recvmsg(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000040)=""/59, 0x3b}], 0x1}, 0x40000180) close(r5) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000008c0), 0x43) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) 284.290937ms ago: executing program 3 (id=102): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x20040d4) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', r0}, 0x18) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1}, 0x1000, 0x2, 0xffffff7e, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1000000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=@newsa={0x174, 0x1a, 0x713, 0x0, 0x0, {{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x2}, {@in=@local, 0x0, 0x33}, @in=@dev, {0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x20000000}, {0x0, 0x0, 0xffffffffffffffff}, {}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x60}, [@algo_auth={0x84, 0x1, {{'sha1\x00'}, 0x1e0, "c1fc1176d858b905a1db4ff6cb8fc1f08589966e6ef789ed99a74a5f55ad735a1fe0dac791824a72fb9792a0f47d88e0dea44b765bb9c761ab943014"}}]}, 0x174}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b34, &(0x7f0000000000)={'erspan0\x00', @random="004023ea1c00"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="25390000290003"], 0x33fe0) 252.829077ms ago: executing program 4 (id=103): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x300f000, 0xe, 0x0, &(0x7f0000000080)="0069c2704ade28eddb0000200000", 0x0, 0x48b8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 206.415688ms ago: executing program 3 (id=104): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0xf, 0xc, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x40, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, 0x0, 0x10) fstat(r2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000100000006a0a00ff00000000850000000a000000b70000000000000095000000000000009cc6b3fcd62c7d376238975d43a4505f80fc88943c4f0cf08e467b592f868ee30a0e8c1bf176db2a6b2f0180"], &(0x7f0000000340)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r4, 0xffff0000, 0xc, 0x0, &(0x7f0000001a40)="2b206d074843b397737ea49d", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x2a, 0x107, 0xfffffffc, 0x0, {0x3, 0x7c}}, 0x14}, 0x1, 0x0, 0x0, 0x488c4}, 0xc000) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xfc, 0x19, 0x1, 0x70bd2d, 0x0, {{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xc, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa00, 0x407ffffffffffe, 0x800000000000002}, 0x0, 0x0, 0x1, 0x0, 0x6}, [@tmpl={0x44, 0x5, [{{@in6=@ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0x0, 0x3c}, 0x2, @in=@local, 0x6, 0x4, 0x3}]}]}, 0xfc}}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x100}, 0x50) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@union={0x4, 0x0, 0x0, 0x5, 0x1, 0xffff6ebe}]}, {0x0, [0x30, 0x30, 0x30, 0x2e]}}, 0x0, 0x2a, 0x0, 0x1, 0x3}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r6, 0x2c}, 0x10) r7 = socket(0xa, 0x5, 0x0) sendmsg$inet_sctp(r7, &(0x7f00000000c0)={&(0x7f0000000000)=@in6={0xa, 0x4e24, 0xff, @loopback, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000080)="1b", 0x1}], 0x1, &(0x7f00000001c0)=[@dstaddrv4={0x18, 0x84, 0x7, @loopback}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x30, 0x4855}, 0x24000052) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r8 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)={0x38, 0x1403, 0x1, 0x70bd29, 0x25dfdbfd, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x801}, 0x4000) 206.190958ms ago: executing program 4 (id=105): r0 = socket$kcm(0x2, 0x2, 0x73) setsockopt$sock_attach_bpf(r0, 0x0, 0x17, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x108b84, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r1, 0x84, 0x3, &(0x7f0000000000), 0x4) 87.459239ms ago: executing program 4 (id=106): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114815, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x0, 0x4, 0x0, 0x28) 0s ago: executing program 4 (id=107): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWRULE={0x48, 0x6, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_RULE_EXPRESSIONS={0x34, 0x4, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, @synproxy={{0xd}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x5}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x6}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x7}]}}}]}]}], {0x14, 0x10}}, 0x70}, 0x1, 0x0, 0x0, 0x20040051}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x40080) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1100, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f00000002c0)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd"], 0xffbf) kernel console output (not intermixed with test programs): [ 23.566717][ T28] audit: type=1400 audit(1778221607.941:103): avc: denied { search } for pid=3181 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 23.588822][ T28] audit: type=1400 audit(1778221607.941:104): avc: denied { search } for pid=3181 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.162094][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 25.162113][ T28] audit: type=1400 audit(1778221609.531:116): avc: denied { write } for pid=3209 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.197294][ T28] audit: type=1400 audit(1778221609.571:117): avc: denied { write } for pid=3220 comm="rm" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.271398][ T28] audit: type=1400 audit(1778221609.641:118): avc: denied { write } for pid=3223 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.304222][ T28] audit: type=1400 audit(1778221609.671:119): avc: denied { write } for pid=3235 comm="rm" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.377555][ T28] audit: type=1400 audit(1778221609.751:120): avc: denied { write } for pid=3238 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.408280][ T28] audit: type=1400 audit(1778221609.781:121): avc: denied { write } for pid=3249 comm="rm" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.555780][ T28] audit: type=1400 audit(1778221609.931:122): avc: denied { write } for pid=3252 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.586380][ T28] audit: type=1400 audit(1778221609.961:123): avc: denied { write } for pid=3263 comm="rm" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.703609][ T28] audit: type=1400 audit(1778221610.071:124): avc: denied { write } for pid=3266 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 25.734106][ T28] audit: type=1400 audit(1778221610.101:125): avc: denied { write } for pid=3277 comm="rm" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.1.170' (ED25519) to the list of known hosts. [ 31.106813][ T28] audit: type=1400 audit(1778221615.481:126): avc: denied { mounton } for pid=3287 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 31.129936][ T28] audit: type=1400 audit(1778221615.501:127): avc: denied { mount } for pid=3287 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 31.132476][ T3287] cgroup: Unknown subsys name 'net' [ 31.157879][ T28] audit: type=1400 audit(1778221615.531:128): avc: denied { unmount } for pid=3287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 31.275049][ T3287] cgroup: Unknown subsys name 'cpuset' [ 31.281474][ T3287] cgroup: Unknown subsys name 'rlimit' [ 31.393203][ T28] audit: type=1400 audit(1778221615.761:129): avc: denied { setattr } for pid=3287 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.429368][ T28] audit: type=1400 audit(1778221615.761:130): avc: denied { create } for pid=3287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.450080][ T28] audit: type=1400 audit(1778221615.761:131): avc: denied { write } for pid=3287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.470928][ T28] audit: type=1400 audit(1778221615.761:132): avc: denied { read } for pid=3287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.491420][ T28] audit: type=1400 audit(1778221615.761:133): avc: denied { mounton } for pid=3287 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 31.512628][ T3290] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 31.516481][ T28] audit: type=1400 audit(1778221615.761:134): avc: denied { mount } for pid=3287 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 31.548607][ T28] audit: type=1400 audit(1778221615.791:135): avc: denied { read } for pid=3024 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 31.585415][ T3287] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 33.730319][ T3299] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.737546][ T3299] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.744719][ T3299] bridge_slave_0: entered allmulticast mode [ 33.751158][ T3299] bridge_slave_0: entered promiscuous mode [ 33.775728][ T3299] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.782875][ T3299] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.790092][ T3299] bridge_slave_1: entered allmulticast mode [ 33.796532][ T3299] bridge_slave_1: entered promiscuous mode [ 33.807480][ T3307] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.814633][ T3307] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.821900][ T3307] bridge_slave_0: entered allmulticast mode [ 33.828557][ T3307] bridge_slave_0: entered promiscuous mode [ 33.850329][ T3307] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.857462][ T3307] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.864722][ T3307] bridge_slave_1: entered allmulticast mode [ 33.871253][ T3307] bridge_slave_1: entered promiscuous mode [ 33.890675][ T3300] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.897789][ T3300] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.904948][ T3300] bridge_slave_0: entered allmulticast mode [ 33.911369][ T3300] bridge_slave_0: entered promiscuous mode [ 33.932649][ T3299] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.941980][ T3300] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.949180][ T3300] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.956439][ T3300] bridge_slave_1: entered allmulticast mode [ 33.963013][ T3300] bridge_slave_1: entered promiscuous mode [ 33.976781][ T3303] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.983910][ T3303] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.991216][ T3303] bridge_slave_0: entered allmulticast mode [ 33.997733][ T3303] bridge_slave_0: entered promiscuous mode [ 34.005244][ T3299] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.020214][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.032452][ T3303] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.039619][ T3303] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.046807][ T3303] bridge_slave_1: entered allmulticast mode [ 34.053341][ T3303] bridge_slave_1: entered promiscuous mode [ 34.069913][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.097099][ T3300] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.107489][ T3300] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.131661][ T3299] team0: Port device team_slave_0 added [ 34.142806][ T3307] team0: Port device team_slave_0 added [ 34.154827][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.164776][ T3299] team0: Port device team_slave_1 added [ 34.175859][ T3307] team0: Port device team_slave_1 added [ 34.181543][ T3305] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.188682][ T3305] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.195858][ T3305] bridge_slave_0: entered allmulticast mode [ 34.202346][ T3305] bridge_slave_0: entered promiscuous mode [ 34.209863][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.224213][ T3300] team0: Port device team_slave_0 added [ 34.234736][ T3305] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.241949][ T3305] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.249263][ T3305] bridge_slave_1: entered allmulticast mode [ 34.255813][ T3305] bridge_slave_1: entered promiscuous mode [ 34.271585][ T3300] team0: Port device team_slave_1 added [ 34.291225][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.298250][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.324289][ T3299] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.340463][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.347654][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.373997][ T3307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.390514][ T3303] team0: Port device team_slave_0 added [ 34.396506][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.403616][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.429842][ T3299] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.445461][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.452465][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.478532][ T3307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.490484][ T3305] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.500484][ T3303] team0: Port device team_slave_1 added [ 34.509143][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.516159][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.542201][ T3300] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.557262][ T3305] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.577529][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.584602][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.610769][ T3303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.621807][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.628827][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.654898][ T3300] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.680540][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.687649][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.713765][ T3303] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.753318][ T3305] team0: Port device team_slave_0 added [ 34.761345][ T3299] hsr_slave_0: entered promiscuous mode [ 34.767436][ T3299] hsr_slave_1: entered promiscuous mode [ 34.786579][ T3307] hsr_slave_0: entered promiscuous mode [ 34.792691][ T3307] hsr_slave_1: entered promiscuous mode [ 34.798735][ T3307] debugfs: 'hsr0' already exists in 'hsr' [ 34.804508][ T3307] Cannot create hsr debugfs directory [ 34.810656][ T3305] team0: Port device team_slave_1 added [ 34.829051][ T3300] hsr_slave_0: entered promiscuous mode [ 34.835135][ T3300] hsr_slave_1: entered promiscuous mode [ 34.841152][ T3300] debugfs: 'hsr0' already exists in 'hsr' [ 34.847046][ T3300] Cannot create hsr debugfs directory [ 34.874966][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.881988][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.908164][ T3305] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.919443][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.926468][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 34.952750][ T3305] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.974399][ T3303] hsr_slave_0: entered promiscuous mode [ 34.981280][ T3303] hsr_slave_1: entered promiscuous mode [ 34.987582][ T3303] debugfs: 'hsr0' already exists in 'hsr' [ 34.993385][ T3303] Cannot create hsr debugfs directory [ 35.070254][ T3305] hsr_slave_0: entered promiscuous mode [ 35.076390][ T3305] hsr_slave_1: entered promiscuous mode [ 35.082324][ T3305] debugfs: 'hsr0' already exists in 'hsr' [ 35.088248][ T3305] Cannot create hsr debugfs directory [ 35.234605][ T3299] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 35.243595][ T3299] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 35.251533][ T3299] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 35.260130][ T3299] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 35.270702][ T3299] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 35.279843][ T3299] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 35.289861][ T3299] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 35.298831][ T3299] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 35.326306][ T3307] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 35.335142][ T3307] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 35.343699][ T3307] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 35.352699][ T3307] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 35.362905][ T3307] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 35.371671][ T3307] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 35.384154][ T3307] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 35.393188][ T3307] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 35.417532][ T3300] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 35.426560][ T3300] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 35.435239][ T3300] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 35.444342][ T3300] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 35.452034][ T3300] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 35.461137][ T3300] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 35.469387][ T3300] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 35.478094][ T3300] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 35.526316][ T3303] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 35.535005][ T3303] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 35.542721][ T3303] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 35.551641][ T3303] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 35.564201][ T3303] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 35.572997][ T3303] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 35.580835][ T3303] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 35.589787][ T3303] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 35.609919][ T3299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.637094][ T3299] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.657977][ T3305] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 35.666901][ T3305] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 35.675029][ T3305] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 35.683898][ T3305] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 35.691838][ T3305] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 35.700850][ T3305] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 35.708954][ T3305] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 35.718119][ T3305] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 35.727837][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.734949][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.746893][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.768088][ T3300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.777532][ T62] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.784666][ T62] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.797037][ T3307] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.814684][ T3300] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.831700][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.838794][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.857231][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.864368][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.875727][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.882815][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.892736][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.899860][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.926861][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.975774][ T3303] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.999851][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.006994][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.017571][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.024915][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.088181][ T3305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.106669][ T3305] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.123273][ T1814] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.130404][ T1814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.144929][ T1814] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.152082][ T1814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.250662][ T3299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.331293][ T3300] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.353429][ T3307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.367595][ T3303] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.495892][ T3305] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.543025][ T3307] veth0_vlan: entered promiscuous mode [ 36.562139][ T3307] veth1_vlan: entered promiscuous mode [ 36.599197][ T3303] veth0_vlan: entered promiscuous mode [ 36.606477][ T3300] veth0_vlan: entered promiscuous mode [ 36.622223][ T3299] veth0_vlan: entered promiscuous mode [ 36.629211][ T3300] veth1_vlan: entered promiscuous mode [ 36.636781][ T3303] veth1_vlan: entered promiscuous mode [ 36.649824][ T3299] veth1_vlan: entered promiscuous mode [ 36.657174][ T3307] veth0_macvtap: entered promiscuous mode [ 36.672121][ T3307] veth1_macvtap: entered promiscuous mode [ 36.695568][ T3303] veth0_macvtap: entered promiscuous mode [ 36.702864][ T3305] veth0_vlan: entered promiscuous mode [ 36.712603][ T3303] veth1_macvtap: entered promiscuous mode [ 36.723933][ T3300] veth0_macvtap: entered promiscuous mode [ 36.731807][ T3300] veth1_macvtap: entered promiscuous mode [ 36.739380][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.747978][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.763756][ T3305] veth1_vlan: entered promiscuous mode [ 36.776012][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.785855][ T36] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.794651][ T36] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.803418][ T36] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.818439][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.827647][ T3299] veth0_macvtap: entered promiscuous mode [ 36.835121][ T36] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.849234][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.859721][ T1814] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.868702][ T1814] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.881331][ T3299] veth1_macvtap: entered promiscuous mode [ 36.889278][ T1814] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.899014][ T1814] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.910077][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.931724][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 36.931739][ T28] audit: type=1400 audit(1778221621.301:146): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/root/syzkaller.3JuiEv/syz-tmp" dev="sda1" ino=2042 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 36.940701][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.972914][ T28] audit: type=1400 audit(1778221621.331:147): avc: denied { mount } for pid=3307 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 36.995289][ T28] audit: type=1400 audit(1778221621.341:148): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/root/syzkaller.3JuiEv/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 37.024096][ T28] audit: type=1400 audit(1778221621.341:149): avc: denied { mount } for pid=3307 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 37.047257][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.056389][ T28] audit: type=1400 audit(1778221621.341:150): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/root/syzkaller.3JuiEv/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 37.056909][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.100106][ T28] audit: type=1400 audit(1778221621.341:151): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/root/syzkaller.3JuiEv/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4898 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 37.128660][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.137653][ T28] audit: type=1400 audit(1778221621.341:152): avc: denied { unmount } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 37.157411][ T28] audit: type=1400 audit(1778221621.401:153): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 37.160433][ T3305] veth0_macvtap: entered promiscuous mode [ 37.181023][ T28] audit: type=1400 audit(1778221621.401:154): avc: denied { mount } for pid=3307 comm="syz-executor" name="/" dev="gadgetfs" ino=4904 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 37.194660][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.216911][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.221079][ T3303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 37.247054][ T3305] veth1_macvtap: entered promiscuous mode [ 37.258531][ T28] audit: type=1400 audit(1778221621.621:155): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 37.301226][ T3506] netlink: 56 bytes leftover after parsing attributes in process `syz.3.4'. [ 37.331093][ T49] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.350314][ T49] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.359450][ T49] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.373630][ T49] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.391898][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.409997][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.459693][ T62] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.471006][ T62] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.491353][ T62] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.511247][ T3520] ======================================================= [ 37.511247][ T3520] WARNING: The mand mount option has been deprecated and [ 37.511247][ T3520] and is ignored by this kernel. Remove the mand [ 37.511247][ T3520] option from the mount to silence this warning. [ 37.511247][ T3520] ======================================================= [ 37.556273][ T3519] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.5'. [ 37.574253][ T3519] veth0_to_bond: default FDB implementation only supports local addresses [ 37.583100][ T62] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.708924][ T3525] syz.2.9 uses obsolete (PF_INET,SOCK_PACKET) [ 37.822570][ T3539] netlink: 277 bytes leftover after parsing attributes in process `syz.1.13'. [ 37.896988][ T3543] netlink: 8 bytes leftover after parsing attributes in process `syz.2.15'. [ 37.971399][ T3543] netlink: 'syz.2.15': attribute type 1 has an invalid length. [ 38.245215][ T3561] netlink: 72 bytes leftover after parsing attributes in process `syz.2.23'. [ 38.270222][ T3561] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=3561 comm=syz.2.23 [ 38.299797][ T3561] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=3561 comm=syz.2.23 [ 38.344416][ T3563] Zero length message leads to an empty skb [ 38.372346][ T3571] netlink: 277 bytes leftover after parsing attributes in process `syz.0.27'. [ 39.659153][ T3606] netlink: 'syz.2.44': attribute type 10 has an invalid length. [ 39.678851][ T3606] netlink: 40 bytes leftover after parsing attributes in process `syz.2.44'. [ 39.692693][ T3606] A link change request failed with some changes committed already. Interface vlan1 may have been left with an inconsistent configuration, please check. [ 40.443854][ T3647] netlink: 'syz.3.62': attribute type 1 has an invalid length. [ 40.473762][ T3647] netlink: 'syz.3.62': attribute type 2 has an invalid length. [ 40.495089][ T3651] netlink: 'syz.0.63': attribute type 37 has an invalid length. [ 40.517988][ T3651] netlink: 20 bytes leftover after parsing attributes in process `syz.0.63'. [ 40.840153][ T3662] Cannot find add_set index 46338 as target [ 42.291611][ T3719] Cannot find add_set index 46338 as target [ 42.365612][ T28] kauditd_printk_skb: 63 callbacks suppressed [ 42.365631][ T28] audit: type=1400 audit(1778221626.741:219): avc: denied { create } for pid=3720 comm="syz.2.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 42.607471][ T28] audit: type=1400 audit(1778221626.981:220): avc: denied { setopt } for pid=3741 comm="syz.4.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 42.679973][ T3742] lo speed is unknown, defaulting to 1000 [ 42.680505][ T28] audit: type=1400 audit(1778221627.051:221): avc: denied { write } for pid=3740 comm="syz.3.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 42.690967][ T3742] lo speed is unknown, defaulting to 1000 [ 42.714734][ T3742] lo speed is unknown, defaulting to 1000 [ 42.722143][ T3742] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 42.732545][ T3742] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 42.751387][ T3742] lo speed is unknown, defaulting to 1000 [ 42.758549][ T3742] lo speed is unknown, defaulting to 1000 [ 42.765981][ T3742] lo speed is unknown, defaulting to 1000 [ 42.773091][ T3742] lo speed is unknown, defaulting to 1000 [ 42.781611][ T3742] lo speed is unknown, defaulting to 1000 [ 42.824424][ T35] ================================================================== [ 42.832567][ T35] BUG: KCSAN: data-race in kick_pool / wq_worker_running [ 42.839621][ T35] [ 42.841941][ T35] read-write to 0xffff888237c2a8e4 of 4 bytes by task 3344 on cpu 0: [ 42.849998][ T35] wq_worker_running+0x9b/0x120 [ 42.854903][ T35] synchronize_rcu_expedited+0x5f8/0x770 [ 42.860559][ T35] try_check_zero+0x191/0x260 [ 42.865245][ T35] process_srcu+0xd5/0xda0 [ 42.869669][ T35] process_scheduled_works+0x4f0/0x9c0 [ 42.875156][ T35] worker_thread+0x58a/0x780 [ 42.879760][ T35] kthread+0x22a/0x280 [ 42.883850][ T35] ret_from_fork+0x146/0x330 [ 42.888455][ T35] ret_from_fork_asm+0x1a/0x30 [ 42.893227][ T35] [ 42.895549][ T35] read to 0xffff888237c2a8e4 of 4 bytes by task 35 on cpu 1: [ 42.902915][ T35] kick_pool+0x49/0x2d0 [ 42.907082][ T35] __queue_work+0x899/0xaa0 [ 42.911594][ T35] queue_work_on+0xa9/0x140 [ 42.916109][ T35] process_srcu+0xa44/0xda0 [ 42.920616][ T35] process_scheduled_works+0x4f0/0x9c0 [ 42.926082][ T35] worker_thread+0x58a/0x780 [ 42.930683][ T35] kthread+0x22a/0x280 [ 42.934748][ T35] ret_from_fork+0x146/0x330 [ 42.939343][ T35] ret_from_fork_asm+0x1a/0x30 [ 42.944130][ T35] [ 42.946461][ T35] value changed: 0x00000000 -> 0x00000001 [ 42.952180][ T35] [ 42.954502][ T35] Reported by Kernel Concurrency Sanitizer on: [ 42.960662][ T35] CPU: 1 UID: 0 PID: 35 Comm: kworker/1:1 Not tainted syzkaller #0 PREEMPT(full) [ 42.969880][ T35] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 42.979950][ T35] Workqueue: rcu_gp process_srcu [ 42.984903][ T35] ================================================================== [ 43.055093][ T3742] syz.3.104 (3742) used greatest stack depth: 9536 bytes left [ 43.572110][ T62] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 43.631648][ T62] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 43.708761][ T62] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 43.747547][ T62] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 43.846032][ T62] bridge_slave_1: left allmulticast mode [ 43.864325][ T62] bridge_slave_1: left promiscuous mode [ 43.870092][ T62] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.886299][ T62] bridge_slave_0: left allmulticast mode [ 43.905783][ T62] bridge_slave_0: left promiscuous mode [ 43.913459][ T62] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.023563][ T28] audit: type=1400 audit(1778221628.391:222): avc: denied { write } for pid=3757 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 44.096365][ T28] audit: type=1400 audit(1778221628.471:223): avc: denied { write } for pid=3768 comm="rm" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 44.145173][ T62] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 44.156582][ T62] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 44.177560][ T62] bond0 (unregistering): Released all slaves [ 44.195971][ T3024] 8021q: adding VLAN 0 to HW filter on device eth1 [ 44.249041][ T62] hsr_slave_0: left promiscuous mode [ 44.266842][ T62] hsr_slave_1: left promiscuous mode [ 44.281136][ T62] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 44.304332][ T62] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 44.313452][ T62] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 44.335027][ T62] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 44.353847][ T62] veth1_macvtap: left promiscuous mode [ 44.369395][ T62] veth0_macvtap: left promiscuous mode [ 44.384426][ T62] veth1_vlan: left promiscuous mode [ 44.395145][ T62] veth0_vlan: left promiscuous mode [ 44.433330][ T28] audit: type=1400 audit(1778221628.801:224): avc: denied { write } for pid=3771 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 44.508732][ T28] audit: type=1400 audit(1778221628.861:225): avc: denied { write } for pid=3782 comm="rm" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 44.611173][ T62] team0 (unregistering): Port device team_slave_1 removed [ 44.632870][ T62] team0 (unregistering): Port device team_slave_0 removed [ 44.712962][ T3024] 8021q: adding VLAN 0 to HW filter on device eth2 [ 44.888735][ T28] audit: type=1400 audit(1778221629.261:226): avc: denied { write } for pid=3785 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 44.948373][ T28] audit: type=1400 audit(1778221629.321:227): avc: denied { write } for pid=3796 comm="rm" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 45.001903][ T3024] 8021q: adding VLAN 0 to HW filter on device eth3 [ 45.205981][ T28] audit: type=1400 audit(1778221629.581:228): avc: denied { write } for pid=3799 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 45.300431][ T3024] 8021q: adding VLAN 0 to HW filter on device eth4