last executing test programs: 1.412409727s ago: executing program 1 (id=2): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000800200000000000000"], 0x50) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$selinux_access(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="73797374656d5f683a6f626a6563745f723a7570647077645f657865635f742073797374656d5f753a73797374656d5f723afaffffffffffffff3a73302030"], 0x56) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r0, @ANYRES16=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$inet_dccp(0x2, 0x6, 0x0) r3 = perf_event_open(&(0x7f0000000380)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000006, 0x11, r3, 0x0) r4 = syz_io_uring_setup(0xd2, &(0x7f0000000480)={0x0, 0xd814, 0x8, 0x80000000, 0xfffffffc}, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0xfffffffffffffffd, 0x0}) io_uring_enter(r4, 0x47ba, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) r8 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x141341) ioctl$USBDEVFS_IOCTL(r8, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r8, 0xc0105512, &(0x7f0000000240)=@usbdevfs_disconnect={0x2}) 1.219889711s ago: executing program 1 (id=6): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0xe, 0xf, &(0x7f0000006680)) rt_sigprocmask(0x2, &(0x7f0000000080)={[0xffffffff80000001]}, 0x0, 0x8) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="70000000100003042abd70009da1d2b900000004", @ANYRES32=0x0, @ANYBLOB="0000000000000000500012800b0001006272696467650000400002800800050000000000050029000100000006002700040000000c00220006000000000000000c0021"], 0x70}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000c800000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000011c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3f0, 0x210, 0x940c, 0x3002, 0x210, 0x2c0, 0x320, 0x3d8, 0x3d8, 0x320, 0x3d8, 0x3, 0x0, {[{{@ipv6={@empty, @mcast1, [0xffffff00, 0xffffffff, 0xfffffefe, 0xffffff00], [0xffffff00, 0x0, 0xff000000], 'lo\x00', 'caif0\x00', {0xff}, {0xff}, 0x12, 0x8f, 0x0, 0x6a}, 0x0, 0x1c8, 0x210, 0x4001, {}, [@inet=@rpfilter={{0x28}, {0xa}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x1, 'syz0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x1, 0xbe, {0x565159d7}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x450) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="8b33000000000000000005000000080003"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) r10 = socket(0x840000000002, 0x3, 0xff) connect$inet(r10, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="fafd966edb8f7e9200996b869f3f3800000056000700e22100"/34, @ANYRES8=r9, @ANYBLOB="200001"], 0x38}}, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=@deltaction={0x14, 0x18, 0x1, 0x0, 0x25dfcbfe, {0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmmsg$inet(r10, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x40000, 0x0) 624.79991ms ago: executing program 4 (id=5): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$inet6(0xa, 0x806, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000040), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r3) syz_usb_connect(0x4, 0x24, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$EVIOCRMFF(r3, 0x40095505, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) accept4(r0, 0x0, 0x0, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r5, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0xffff, 0xffff}, {0x1}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x14, 0x2, [@TCA_FQ_PLIMIT={0x8, 0x1, 0x5}, @TCA_FQ_BUCKETS_LOG={0x8, 0x8, 0x4}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x24040004) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x5a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r10}, 0x10) r11 = syz_open_procfs(0x0, &(0x7f00000008c0)='wchan\x00') pread64(r11, &(0x7f0000000280)=""/252, 0xfc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file1\x00', 0x881008, &(0x7f0000000cc0)={[{@nobh}, {@journal_path={'journal_path', 0x3d, './file1'}}, {@sb={'sb', 0x3d, 0xfff}}, {@discard}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@bh}, {@nomblk_io_submit}, {@sb={'sb', 0x3d, 0xfb84}}, {@norecovery}, {@commit={'commit', 0x3d, 0x5}}, {@orlov}], [{@fsname={'fsname', 0x3d, ':/-\xdf\']&'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'kfree\x00'}}, {@subj_type={'subj_type', 0x3d, '!-+:.'}}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x31, 0x38, 0x63, 0x37, 0x38, 0x34, 0x39], 0x2d, [0x37, 0x33, 0x63, 0x64], 0x2d, [0x62, 0x1, 0x30, 0x66], 0x2d, [0x33, 0x62, 0x61, 0x63], 0x2d, [0x31, 0x32, 0x31, 0x61, 0x34, 0x34, 0x32, 0x38]}}}, {@subj_user={'subj_user', 0x3d, 'fo}s\xf9p<\xa7\xf6\xf0\xe3\"\xe5\xd5ky\x81\xef\x87\xc8\xf9:\x15Cw\xe8\x15\x9e\x8c\x05\xb0R'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@measure}]}, 0x1, 0x553, &(0x7f0000001080)="$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") 411.855174ms ago: executing program 0 (id=1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000ce", 0x30, 0x6, 0x0, @remote, @local, {[], {{0x1, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x2, 0xc, 0xc2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x2, 0xdd1}, @generic={0x2, 0x12, "b9f28733063686e31bd7d9b8ddcd1262"}]}}}}}}}}, 0x0) 331.861205ms ago: executing program 0 (id=7): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="01"], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000340)={0x0, 0x1}, 0x8) 300.626215ms ago: executing program 0 (id=8): bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x10, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x46, 0x0, "2431d0edd9b36cb74d7df7671eacf04be3b08353efa3641776f56c7556fd3713097bd0072577bc6fefb4cdc9e94e420b0ea4fbc5b07a32056eff5e6c42784b46ddab72b1b8fc87f208ad6db80d8dfe25"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x4e23, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x2, 0x5, 0x2}}}}}}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x86, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r2}, 0x18) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x0) r4 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x80000000) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) r5 = syz_open_dev$tty1(0xc, 0x4, 0x2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r6}, &(0x7f0000000000), &(0x7f00000005c0)=r7}, 0x20) ioctl$KDSKBENT(r5, 0x4b47, &(0x7f0000000400)={0x0, 0x7f, 0x700}) 241.698777ms ago: executing program 1 (id=9): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x22048854, &(0x7f0000000200)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000040)=0x999, 0x4) sendto$inet(r0, 0x0, 0x0, 0x11, 0x0, 0x0) recvmmsg(r0, &(0x7f0000021080)=[{{0x0, 0x0, &(0x7f000001fa00)=[{&(0x7f000001f9c0)=""/16, 0x10}, {0x0}, {0x0}], 0x3}, 0x3}, {{&(0x7f000001fdc0)=@l2tp6={0xa, 0x0, 0x0, @private0}, 0x80, &(0x7f000001fa40)=[{&(0x7f000001fe40)=""/4071, 0xfe7}, {0x0}], 0x2}, 0x92d}], 0x2, 0x20, 0x0) 185.320927ms ago: executing program 0 (id=10): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000040), 0x5, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r4 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r4) syz_usb_connect(0x4, 0x24, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$EVIOCRMFF(r4, 0x40095505, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r1, 0x3) r5 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r5, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) accept4(r1, 0x0, 0x0, 0x0) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r6, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {0xffff, 0xffff}, {0x1}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_BUCKETS_LOG={0x8, 0x8, 0x4}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x24040004) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r12 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x1b, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x374, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @btf_id={0x18, 0x123744ec6e7e53d, 0x3, 0x0, 0x4}, @jmp={0x5, 0x1, 0x9, 0x3, 0x3, 0xffffffffffffffc0, 0x8}, @ldst={0x0, 0x3, 0x1, 0x3, 0x5}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffffffff}, @generic={0x80, 0x2, 0x8, 0x6, 0x95d5}, @alu={0x7, 0x0, 0xa, 0x7, 0x5, 0x4}]}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x2f, &(0x7f0000000640)=""/47, 0x41100, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0x5, 0x8, 0x8}, 0x10, 0x9bd3, r11, 0x1, &(0x7f0000000700)=[r7, r7, 0x1, r7, r0], &(0x7f0000000740)=[{0x4, 0x1, 0xd, 0x1}], 0x10, 0x3, @void, @value}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r12, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x5a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r13}, 0x10) r14 = syz_open_procfs(0x0, &(0x7f00000008c0)='wchan\x00') pread64(r14, &(0x7f0000000280)=""/252, 0xfc, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file1\x00', 0x881008, &(0x7f0000000cc0)={[{@nobh}, {@journal_path={'journal_path', 0x3d, './file1'}}, {@sb={'sb', 0x3d, 0xfff}}, {@discard}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@bh}, {@nomblk_io_submit}, {@sb={'sb', 0x3d, 0xfb84}}, {@norecovery}, {@commit={'commit', 0x3d, 0x5}}, {@orlov}], [{@fsname={'fsname', 0x3d, ':/-\xdf\']&'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'kfree\x00'}}, {@subj_type={'subj_type', 0x3d, '!-+:.'}}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x31, 0x38, 0x63, 0x37, 0x38, 0x34, 0x39], 0x2d, [0x37, 0x33, 0x63, 0x64], 0x2d, [0x62, 0x1, 0x30, 0x66], 0x2d, [0x33, 0x62, 0x61, 0x63], 0x2d, [0x31, 0x32, 0x31, 0x61, 0x34, 0x34, 0x32, 0x38]}}}, {@subj_user={'subj_user', 0x3d, 'fo}s\xf9p<\xa7\xf6\xf0\xe3\"\xe5\xd5ky\x81\xef\x87\xc8\xf9:\x15Cw\xe8\x15\x9e\x8c\x05\xb0R'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@measure}]}, 0x1, 0x553, &(0x7f0000001080)="$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") 118.947318ms ago: executing program 3 (id=4): socket$nl_route(0x10, 0x3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x10, &(0x7f00000004c0)={[{@i_version}, {@nodiscard}, {@min_batch_time={'min_batch_time', 0x3d, 0x3ff}}]}, 0x1, 0x3f7, &(0x7f0000003080)="$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") creat(&(0x7f00000000c0)='./file1\x00', 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000400000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000003000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r0}, 0x10) r1 = gettid() capset(0x0, &(0x7f0000000140)) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000096c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@newtaction={0x48, 0x30, 0xb, 0x0, 0x0, {}, [{0x34, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x3, 0x2, 0x400}, {0x2, 0x2, 0x1000}, {0x2, 0x3, 0x1800}, {0x2, 0x5540, 0x800}, {0x0, 0xe, 0x3000}, {0x1, 0x9, 0x800}, {0x2, 0xfbbd, 0x800}], 0x7, &(0x7f00000006c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=@updpolicy={0xbc, 0x19, 0x1, 0x0, 0x0, {{@in=@private, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x4}]}, 0xbc}}, 0x40080) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) socket$nl_generic(0x10, 0x3, 0x10) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r3 = mq_open(&(0x7f0000000380)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\x01\x00\x00\x00a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|\x00\x17\xc0\xa3\xd5\xf9\xaa\x98/\xa4v\xe4)I\xf3+[e\x95\x89\x99\xca\x8e\xc5\xd3\\T\xf0\x1a|5\xfff\xff\x99\xa4\xbb\x9e#oR\xa4\xf1\xba\x04c\xb3-\xf7R\xb85\xb5\xdb\xe9?\xfa/\xdf\xb4R\xbfx=\v_j\x8e\xb0\'\xf4\xe5\xff!\xe1\xbf\x82e\xb1\x9b\x8d\xf3L\t\xd21\x9cbwV\xc8\xcc\xe4\x96M_w\xbc\xdf9\b\r\xf6\x95\xae\xb5,\x92\x8c\xc0DQm\x80\xd1w\xa2\x1a\x12Z\xe5\xf4H\xf7D\n\x96J\x93\xfb\xf0$\x9f\xf7\xa2\xae$O\xa3\xb6\xf5\x98\xd3\v\x00\x86\xa5\x8b\x81\x04\xaf\x03s\xe5\x86>\x0e\xa6\xe6\x1aV\x17\x8b\xed\xa7\'\xd0\r_\xe8,XVR\x13\xe5%\xb9\x88\xb8W@D\'\x17A\xc8\x80\x02J\xd4V\x00wH(\xc5v\f\xc9\xb6\xdf..$\xe6P(_\xf1\'\xc1:\xa3\xcb\xd9\xd1\xc7\x13\x99Md\x1dc\xf1\'j\x03!\x13\xd1\xb8\xbf\xe6\xb2M\b/\rp\xa5\x00\x00\x00\x00', 0x40, 0x9, 0x0) fcntl$setlease(r3, 0x400, 0x0) mq_open(&(0x7f0000000b40)='eth0\x00\xdd\xad4=2k\xf1\x05\x9b\x91y\xe1;F\xa2\x8df\xe9\x04\x00\x00\x00\x00\x0078z=\x8f\xd5F\xa4AR\xc7\x9f.\xdc\xdb\"A\x16\xd8\x19\xf1lZ\xc8\x93\xda\xf2\xc9\xe8h[u8\xc6\xfa\x9ep\xbe\a\xe2\xf5\xa3Y\x9f\xe1\x04gM\x99K$\r\xf1G\xee\xe1\xbd\x1e\xdf\xe1\x9c\x19\xda\xd3\x94EL\xca\x88\x85Q\x02\xd9L\x90\xeb%/\xb1\xeb\x11uP7\x1f\xd9b\xebF\xf8\x88\xf0\xac.\x94\xfc\v\xb1W\xef~+n\xb1\x9b\x02n]xr\xb3\x80\xbc>\xe8XX\xe6\x12\xf3\xc9\xd5\xf8\xd1\x8d\xcb9\xbf\xb0(<\xeb\x92\x8a\x16\xb7\x11^\xb6\xb7n\xd5\xb5\x00[\xdf\x94\x00\r\x95\x17\xa1h\xf8\x00\x00\x00\"\xa0\x05\xcc^\x90c\xc9}\xb8\ny\xf4\xe1\xb4.\xa4\a\x05\xbb}\x91\xf4C\xf5O\xf1a\x12\b\x86\xa16\xbb}C\xc9\x1d\\\xedD\x14\xb1w\x1e\xa0\xc1E\xb5\xf8\xab\xfb\xd9\x93\xb8vJ\x85p\xb5n\x1b\xe4\xd5g\xae\xe4\xeb\xca\xae\x1bs\xd4\xf0\xc0\xdag\x19R4\xd4\xd4\x04\xfc\x04Zb\xf6\xba\xf8B\xf6YU\xcd\xf2\xdb\xb5\xa2\xda\xdf\x8dD\xef`\x13\x15$\xceq\xd7j\xd7\xe3V\xf2\xa2\x95\xcf\x18T\xf1\xb0\xf3\xf8O', 0x1, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r4, &(0x7f0000000940)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x9, @remote, 0x5}, 0x1c, &(0x7f0000000080)=[{&(0x7f0000000300)="e2", 0x1}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x4e24, 0x101, @dev={0xfe, 0x80, '\x00', 0x33}, 0x1}, 0x1c, &(0x7f0000000280)}}], 0x2, 0x14) shutdown(r4, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 106.582539ms ago: executing program 2 (id=3): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000027"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f687372"], 0xfc}}, 0x0) 56.232809ms ago: executing program 2 (id=11): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/96, 0x128000, 0x800}, 0x20) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000140)=0x20, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000200)=0x8, 0x4) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000180)=0x8, 0x4) bind$xdp(r2, &(0x7f00000002c0)={0x2c, 0x0, r4}, 0x10) 0s ago: executing program 2 (id=12): pipe(&(0x7f0000005880)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @private1}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000840)=""/198, 0xc6}, 0x100) syz_emit_ethernet(0x6e, &(0x7f0000000440)={@multicast, @random="fd137b07daa7", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02adf7", 0x38, 0x3a, 0x0, @ipv4={'\x00', '\xff\xff', @private}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "fd9063", 0x0, 0x2f, 0x0, @mcast1, @loopback={0x0, 0xffffac1414aa}, [], "8d0022eb00000000"}}}}}}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3b, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xe, &(0x7f0000005640)=0x1, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xf, 0x4, &(0x7f0000001300)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x1, 0x6}, 0x1c) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) lremovexattr(0x0, &(0x7f0000000080)=@known='system.advise\x00') setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, 0x0, 0x310) setsockopt$inet6_group_source_req(r3, 0x29, 0x2c, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@link_local, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "120008", 0x34, 0x3a, 0x0, @remote, @local, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, '\x00', 0x0, 0x2c, 0x0, @ipv4={'\x00', '\xff\xff', @dev}, @empty, [], "fb36eeca"}}}}}}}, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) syz_emit_ethernet(0x0, 0x0, 0x0) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) fchdir(r4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000007940)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x33f}, 0x1, 0x0, 0x0, 0xc0d0}, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r6, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r5, {}, 0xa}}, 0x26) sendmmsg$inet(r6, &(0x7f0000005f80)=[{{0x0, 0x0, &(0x7f0000005dc0)=[{&(0x7f00000010c0)="7d5107673289eeae3f806c5c62db497a0299399ab6101c3b", 0x1}], 0x1}}], 0x4000000000001ce, 0x8040) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/profiling', 0xe41, 0x0) mount(&(0x7f0000000000), &(0x7f0000000280)='./cgroup\x00', 0x0, 0x75809, 0x0) mount(0x0, &(0x7f0000000140)='./cgroup\x00', 0x0, 0x21a8f5, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.108' (ED25519) to the list of known hosts. [ 33.787151][ T29] audit: type=1400 audit(1745380858.681:82): avc: denied { mounton } for pid=3293 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.788321][ T3293] cgroup: Unknown subsys name 'net' [ 33.813268][ T29] audit: type=1400 audit(1745380858.681:83): avc: denied { mount } for pid=3293 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.842948][ T29] audit: type=1400 audit(1745380858.721:84): avc: denied { unmount } for pid=3293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 34.079375][ T3293] cgroup: Unknown subsys name 'cpuset' [ 34.086045][ T3293] cgroup: Unknown subsys name 'rlimit' [ 34.238187][ T29] audit: type=1400 audit(1745380859.131:85): avc: denied { setattr } for pid=3293 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 34.267273][ T29] audit: type=1400 audit(1745380859.141:86): avc: denied { create } for pid=3293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.291713][ T29] audit: type=1400 audit(1745380859.141:87): avc: denied { write } for pid=3293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.315541][ T29] audit: type=1400 audit(1745380859.141:88): avc: denied { read } for pid=3293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.323409][ T3297] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 34.340611][ T29] audit: type=1400 audit(1745380859.151:89): avc: denied { mounton } for pid=3293 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 34.413413][ T29] audit: type=1400 audit(1745380859.151:90): avc: denied { mount } for pid=3293 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 34.444080][ T29] audit: type=1400 audit(1745380859.271:91): avc: denied { relabelto } for pid=3297 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 34.479902][ T3293] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 35.538172][ T3303] chnl_net:caif_netlink_parms(): no params data found [ 35.651500][ T3303] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.660732][ T3303] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.671499][ T3303] bridge_slave_0: entered allmulticast mode [ 35.678540][ T3303] bridge_slave_0: entered promiscuous mode [ 35.685740][ T3303] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.695250][ T3303] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.703446][ T3303] bridge_slave_1: entered allmulticast mode [ 35.711229][ T3303] bridge_slave_1: entered promiscuous mode [ 35.749072][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.764901][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.793961][ T3303] team0: Port device team_slave_0 added [ 35.809027][ T3303] team0: Port device team_slave_1 added [ 35.842241][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.850776][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.879746][ T3303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.892351][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.900063][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.930589][ T3303] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.966282][ T3303] hsr_slave_0: entered promiscuous mode [ 35.972546][ T3303] hsr_slave_1: entered promiscuous mode [ 36.063871][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 36.109015][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 36.183533][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 36.212862][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 36.229813][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.238196][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.246711][ T3313] bridge_slave_0: entered allmulticast mode [ 36.254733][ T3313] bridge_slave_0: entered promiscuous mode [ 36.281384][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.289739][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.297659][ T3313] bridge_slave_1: entered allmulticast mode [ 36.304972][ T3313] bridge_slave_1: entered promiscuous mode [ 36.357801][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.372039][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.380080][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.389533][ T3316] bridge_slave_0: entered allmulticast mode [ 36.396962][ T3316] bridge_slave_0: entered promiscuous mode [ 36.405192][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.413458][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.422352][ T3316] bridge_slave_1: entered allmulticast mode [ 36.429964][ T3316] bridge_slave_1: entered promiscuous mode [ 36.437761][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.447450][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.458269][ T3317] bridge_slave_0: entered allmulticast mode [ 36.465837][ T3317] bridge_slave_0: entered promiscuous mode [ 36.474354][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.481761][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.490364][ T3317] bridge_slave_1: entered allmulticast mode [ 36.497425][ T3317] bridge_slave_1: entered promiscuous mode [ 36.505506][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.546033][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.554597][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.566046][ T3312] bridge_slave_0: entered allmulticast mode [ 36.574921][ T3312] bridge_slave_0: entered promiscuous mode [ 36.584477][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.593667][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.604141][ T3312] bridge_slave_1: entered allmulticast mode [ 36.615014][ T3312] bridge_slave_1: entered promiscuous mode [ 36.622625][ T3303] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 36.659984][ T3303] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 36.671366][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.683032][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.697553][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.712650][ T3313] team0: Port device team_slave_0 added [ 36.720083][ T3313] team0: Port device team_slave_1 added [ 36.732287][ T3303] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 36.751209][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.780010][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.790309][ T3303] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 36.811509][ T3316] team0: Port device team_slave_0 added [ 36.819861][ T3317] team0: Port device team_slave_0 added [ 36.826524][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.835263][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.863742][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.876571][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.887963][ T3316] team0: Port device team_slave_1 added [ 36.901671][ T3317] team0: Port device team_slave_1 added [ 36.913874][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.921421][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.950333][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.981812][ T3312] team0: Port device team_slave_0 added [ 36.994905][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.003434][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.033050][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.051331][ T3312] team0: Port device team_slave_1 added [ 37.057568][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.064984][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.093841][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.115443][ T3313] hsr_slave_0: entered promiscuous mode [ 37.122772][ T3313] hsr_slave_1: entered promiscuous mode [ 37.129525][ T3313] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.137887][ T3313] Cannot create hsr debugfs directory [ 37.144225][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.151510][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.180616][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.199992][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.207390][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.235295][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.285848][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.293595][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.323606][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.348736][ T3316] hsr_slave_0: entered promiscuous mode [ 37.356886][ T3316] hsr_slave_1: entered promiscuous mode [ 37.363862][ T3316] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.372540][ T3316] Cannot create hsr debugfs directory [ 37.383393][ T3317] hsr_slave_0: entered promiscuous mode [ 37.392442][ T3317] hsr_slave_1: entered promiscuous mode [ 37.399377][ T3317] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.410521][ T3317] Cannot create hsr debugfs directory [ 37.419816][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.428595][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.457988][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.527851][ T3312] hsr_slave_0: entered promiscuous mode [ 37.534748][ T3312] hsr_slave_1: entered promiscuous mode [ 37.542506][ T3312] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.551649][ T3312] Cannot create hsr debugfs directory [ 37.711395][ T3313] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 37.738841][ T3313] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 37.749900][ T3313] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 37.761815][ T3313] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 37.791784][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.808936][ T3303] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.818290][ T3316] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 37.834874][ T1936] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.842731][ T1936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.852442][ T3316] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 37.870000][ T1936] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.877777][ T1936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.894800][ T3316] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 37.906607][ T3316] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 37.952178][ T3317] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 37.965860][ T3312] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.977116][ T3312] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.987142][ T3317] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 37.998571][ T3317] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 38.010897][ T3312] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 38.020246][ T3317] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 38.037714][ T3312] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 38.073804][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.117656][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.133657][ T3303] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.144475][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.151952][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.169983][ T1936] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.178322][ T1936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.206321][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.236132][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.261031][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.276705][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.284236][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.297046][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.306894][ T1936] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.315058][ T1936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.335307][ T3316] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.346568][ T3316] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.363463][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.373169][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.400470][ T1936] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.408109][ T1936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.418284][ T1936] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.425867][ T1936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.438656][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.455149][ T3303] veth0_vlan: entered promiscuous mode [ 38.472069][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.483006][ T34] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.490724][ T34] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.500459][ T34] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.508269][ T34] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.526426][ T3317] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.537863][ T3317] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.568058][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.577432][ T3303] veth1_vlan: entered promiscuous mode [ 38.597662][ T3303] veth0_macvtap: entered promiscuous mode [ 38.613832][ T3303] veth1_macvtap: entered promiscuous mode [ 38.665189][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.687845][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.702673][ T3303] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.714244][ T3303] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.726036][ T3303] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.736088][ T3303] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.753128][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.813362][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 38.813380][ T29] audit: type=1400 audit(1745380863.711:110): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/root/syzkaller.gsXWgS/syz-tmp" dev="sda1" ino=1944 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 38.836143][ T3316] veth0_vlan: entered promiscuous mode [ 38.856412][ T29] audit: type=1400 audit(1745380863.711:111): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 38.858798][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.879919][ T29] audit: type=1400 audit(1745380863.711:112): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/root/syzkaller.gsXWgS/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 38.893076][ T3316] veth1_vlan: entered promiscuous mode [ 38.914666][ T29] audit: type=1400 audit(1745380863.711:113): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 38.924794][ T3313] veth0_vlan: entered promiscuous mode [ 38.943184][ T29] audit: type=1400 audit(1745380863.711:114): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/root/syzkaller.gsXWgS/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 38.966761][ T3316] veth0_macvtap: entered promiscuous mode [ 38.977879][ T29] audit: type=1400 audit(1745380863.711:115): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/root/syzkaller.gsXWgS/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4321 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 39.008624][ T3313] veth1_vlan: entered promiscuous mode [ 39.011388][ T29] audit: type=1400 audit(1745380863.721:116): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 39.036742][ T29] audit: type=1400 audit(1745380863.751:117): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=502 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 39.053637][ T3313] veth0_macvtap: entered promiscuous mode [ 39.062906][ T29] audit: type=1400 audit(1745380863.751:118): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="gadgetfs" ino=4334 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 39.082061][ T3316] veth1_macvtap: entered promiscuous mode [ 39.100686][ T3303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 39.124478][ T3313] veth1_macvtap: entered promiscuous mode [ 39.147718][ T29] audit: type=1400 audit(1745380864.041:119): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 39.180694][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 39.192772][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.212817][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.225337][ T3313] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 39.238451][ T3313] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.249484][ T3313] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 39.260319][ T3313] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.273266][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.294195][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 39.306016][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.321850][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.337918][ T3313] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 39.349724][ T3313] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.361251][ T3313] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 39.372282][ T3313] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.384653][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.384765][ T3445] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6'. [ 39.393538][ T3316] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.414115][ T3316] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.424045][ T3316] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.433631][ T3316] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.446225][ T3312] veth0_vlan: entered promiscuous mode [ 39.462423][ T3317] veth0_vlan: entered promiscuous mode [ 39.471678][ T3313] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.481521][ T3313] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.492152][ T3313] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.502116][ T3313] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.527162][ T3445] bridge1: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 39.540278][ T3312] veth1_vlan: entered promiscuous mode [ 39.560656][ T3317] veth1_vlan: entered promiscuous mode [ 39.577150][ T3317] veth0_macvtap: entered promiscuous mode [ 39.587724][ T3317] veth1_macvtap: entered promiscuous mode [ 39.610758][ T3317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 39.622274][ T3317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.633958][ T3317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 39.645241][ T3317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.656339][ T3317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 39.667617][ T3317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.681181][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.720954][ T3447] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6'. [ 39.764137][ T3312] veth0_macvtap: entered promiscuous mode [ 39.788962][ T3317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 39.800091][ T3317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.810775][ T3317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 39.822114][ T3317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.832784][ T3317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 39.844065][ T3317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.865184][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.894749][ T3312] veth1_macvtap: entered promiscuous mode [ 39.967069][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 39.982386][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.994722][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 40.008710][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.022114][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 40.035903][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.049952][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 40.062157][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.082770][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.092097][ T3317] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.101187][ T3317] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.110598][ T3317] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.120007][ T3317] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.143240][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 40.155520][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.166372][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 40.178142][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.189179][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 40.201540][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.213197][ T3312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 40.227526][ T3312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.298928][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.311610][ T3312] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.321978][ T3312] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.334801][ T3312] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.344972][ T3312] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.400257][ T3451] loop4: detected capacity change from 0 to 1024 [ 40.483287][ T3468] loop3: detected capacity change from 0 to 512 [ 40.500970][ T3468] EXT4-fs: Ignoring removed i_version option [ 40.526363][ T3468] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.571515][ T3474] ======================================================= [ 40.571515][ T3474] WARNING: The mand mount option has been deprecated and [ 40.571515][ T3474] and is ignored by this kernel. Remove the mand [ 40.571515][ T3474] option from the mount to silence this warning. [ 40.571515][ T3474] ======================================================= [ 40.633828][ T3461] loop0: detected capacity change from 0 to 1024 [ 40.653880][ T3296] ================================================================== [ 40.662536][ T3296] BUG: KCSAN: data-race in path_openat / shrink_dentry_list [ 40.670146][ T3296] [ 40.672656][ T3296] read-write to 0xffff888106064cc0 of 4 bytes by task 3474 on cpu 1: [ 40.681663][ T3296] shrink_dentry_list+0x226/0x3e0 [ 40.687412][ T3296] shrink_dcache_sb+0x156/0x280 [ 40.692490][ T3296] reconfigure_super+0x4c1/0x5b0 [ 40.698167][ T3296] path_mount+0x96a/0xb30 [ 40.702910][ T3296] __se_sys_mount+0x28f/0x2e0 [ 40.707959][ T3296] __x64_sys_mount+0x67/0x80 [ 40.713154][ T3296] x64_sys_call+0xd11/0x2e10 [ 40.718260][ T3296] do_syscall_64+0xc9/0x1a0 [ 40.723877][ T3296] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 40.729807][ T3296] [ 40.732339][ T3296] read to 0xffff888106064cc0 of 4 bytes by task 3296 on cpu 0: [ 40.740408][ T3296] path_openat+0x194f/0x2000 [ 40.745772][ T3296] do_filp_open+0x115/0x240 [ 40.750723][ T3296] do_sys_openat2+0xaa/0x110 [ 40.755720][ T3296] __x64_sys_openat+0xf8/0x120 [ 40.761138][ T3296] x64_sys_call+0x1ac/0x2e10 [ 40.767050][ T3296] do_syscall_64+0xc9/0x1a0 [ 40.772294][ T3296] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 40.779797][ T3296] [ 40.782402][ T3296] value changed: 0x00240444 -> 0x00200044 [ 40.789253][ T3296] [ 40.792043][ T3296] Reported by Kernel Concurrency Sanitizer on: [ 40.798795][ T3296] CPU: 0 UID: 0 PID: 3296 Comm: udevd Not tainted 6.15.0-rc3-syzkaller-00019-gbc3372351d0c #0 PREEMPT(voluntary) [ 40.812188][ T3296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 40.823862][ T3296] ================================================================== [ 41.304582][ T3475] syz.3.4 (3475) used greatest stack depth: 9456 bytes left [ 41.317602][ T3317] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.