last executing test programs: 17.07248912s ago: executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000000c0)='./bus\x00', 0xa08886, &(0x7f0000000040)=ANY=[], 0x3, 0x2b9, &(0x7f0000000ac0)="$eJzs3U1oE2kYwPGnH9t2u7QJy7KwC7v77PayigxNzkIbpBUxUNFGqgVhaicaMiYhE6Ip0kQQevHgxa+zCiKFgngQhFIPnqRFevPgrbcerCeLiCPp9COp6Qc1bQr9/w7tQ573mTx538mQvIFk/ujtK/GoY0TNjNS31El9txRksU78Ui8rCnLo6sTbv86cO38yFA73nFbtDfUHgqra/s/k4PXx/6Yyv5x93v6yWab9F+YXgnPTv0//Mf+1/3LM0ZijiWRGTR1KJjPmkG3p8F0nbqiesi3TsTSWcKx0WT5qJ1OpnJqJ4bbWVNpyHDUTOY1bOc0kNZPOqXnJjCXUMAxtaxVsbjz7ILRxNvJ00XVlIfPGdZsL4rpu8caWPWwPNba0/q5bsv63at0S9lDJRb1FxB7LRrIR77+XD0UlJrZY0ik++SLFc8R9OOEunSrFv9eCE+HZw69fqapfRu38cn0+G2korw+IT/xejceLe0+EewLqKa//SVpL64Pik98q1wcr1jfJ/x0l9Yb4ZPaiJMWWmcl/P831jd1bqR8NqB7rC6+r/1mG16bpyccarQ8AAAAAAAAAADth6KqK+/dGccDNEVVtW5f36it9PrB+f76z4v58o/zZWNvHDgAAAADAQeHkRuKmbVvpHwyKb+WrcZzqB81S2zYe3dj+4L97Nx/T0dUw0/2ukLKtdF72x/RuJ/g8sC/aKA9kefdpq8ENVX6mrAUfqnKcuuX+Nh5zfPD9sy2P0/Td/GxkavevSgAAAAB2w9qL/i7JR19k8wNH7tS6JwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADpodfOXYzP1KKS0Gvz6ulFq9M+/3xQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPaVbwEAAP//u5TQrw==") ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x60c2, 0x0) r2 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000300), 0x16) r4 = dup3(r3, r1, 0x0) sendfile(r3, r2, 0x0, 0x8038) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x23, &(0x7f0000000680)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, &(0x7f0000000080), 0x41000, 0x46, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[r3, r1, r4, r3, r4], 0x0, 0x10, 0xfff}, 0x90) r5 = socket$inet6(0xa, 0x1, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x3}]}}}]}, 0x44}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000000c0)={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1, 0x2, 0x1ff, 0x0, 0x100, 0x5, 0x440000, r8}) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000080)={@loopback={0xfec0ffff00000000, 0xff02}, 0x0, r8}) r9 = socket(0x840000000002, 0x3, 0xfa) connect$inet(r9, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) connect$unix(r9, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) syz_genetlink_get_family_id$team(&(0x7f0000000180), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES64=r2, @ANYBLOB="000428bd5700fbdbdf259a00000008000100", @ANYBLOB="975e7eb36ef0838c1a3bb67a1c1406a21730e279a21fb9a7295b1817b7c28e9474005cc4f3462ae782dd73c4f239cc1d6c7e8fc08da88cb2fe2b243d29bfbe87741d10f4616520bb7457db976c1f5bdbae9897d51bd8a43ccb3fd2e670591a2f9e5100966e883596df2e6db6a31668d8b21b007e7d5890a6b7a625b57958586ebd23bb0ce5078adbd49f05c2e61e3548cacc3e5a501cd3c9f4", @ANYBLOB="8400029c33e350a99b812ee0c22167804000010024e900006c625f74785f6d617070696e67000000000000050051818d698103000300000008f504000000000000000000", @ANYRES32=r4, @ANYRESHEX, @ANYRES32, @ANYRESHEX=r2], 0xa0}, 0x1, 0x0, 0x0, 0x80}, 0x80) sendfile(r1, r2, 0x0, 0xef84) 16.387157127s ago: executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000), 0x8) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_PEERS={0x4}]}, 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001c00110c0000001400000f0007000000", @ANYRES32, @ANYBLOB="800202000a000200577f0000aabb000020000e80050001008f000000050001000100000004000200050001"], 0x48}}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240), &(0x7f00000002c0)=ANY=[], 0x4, 0x2) 16.133611437s ago: executing program 1: futimesat(0xffffffffffffffff, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x44d5140dfa68ad21) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x49920d862a92153b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_HASH_MAX={0x8}, @IFLA_BR_MCAST_HASH_ELASTICITY={0x8}]}}}]}, 0x44}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000003200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, 0x0, r5, 0x0, 0xf3a, 0x0) write$binfmt_misc(r5, &(0x7f00000000c0)=ANY=[], 0xfffff000) write(r2, &(0x7f00000006c0)='^', 0x1) tee(r1, r5, 0x81, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000f000000850000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x80) socket(0x40000000015, 0x5, 0x0) 15.21967139s ago: executing program 1: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x10, &(0x7f0000000400)={[{@noload}, {@journal_dev={'journal_dev', 0x3d, 0x6}}]}, 0xfe, 0x499, &(0x7f0000001780)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8d}, 0x0) r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x6, 0x8, 0x40, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000001600)={r1, &(0x7f0000000580), 0x0}, 0x20) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) ptrace(0x10, 0x1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000380)={0x0, 0x0}) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x24, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) ptrace$getenv(0x4204, r3, 0x2, &(0x7f0000000000)) futex(&(0x7f000000cffc)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f0000000e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) creat(&(0x7f0000000240)='./file0\x00', 0x0) link(&(0x7f0000001240)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000f40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') socket$kcm(0xa, 0x922000000003, 0x11) syz_open_dev$usbfs(&(0x7f0000000340), 0x74, 0x101341) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events.local\x00', 0x275a, 0x0) 3.296292905s ago: executing program 4: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) quotactl$Q_SETINFO(0x0, &(0x7f00000000c0)=@sg0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x24, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYBLOB], 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r1, &(0x7f0000000440)=""/247, 0x26) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x8, 0x840000088}, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time={0x0, 0x1}}) r3 = syz_io_uring_setup(0x3801, &(0x7f00000003c0)={0x0, 0x70a7, 0x3e00}, &(0x7f00000002c0), &(0x7f0000001000)) r4 = epoll_create1(0x0) epoll_pwait(r4, &(0x7f0000000100)=[{}], 0x1, 0xffff, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r3}], 0x1, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) 2.43299972s ago: executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0xf3a, 0x0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0xfffff000) write(r1, &(0x7f00000006c0)='^', 0x1) tee(r0, r2, 0x81, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000f000000850000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x80) socket(0x40000000015, 0x5, 0x0) 2.10901012s ago: executing program 0: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000000c0)='./bus\x00', 0xa08886, &(0x7f0000000040)=ANY=[], 0x3, 0x2b9, &(0x7f0000000ac0)="$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") r0 = open(0x0, 0x60c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000300), 0x16) r3 = dup3(r2, r0, 0x0) sendfile(r2, r1, 0x0, 0x8038) r4 = socket$inet6(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0xfec0ffff00000000, 0xff02}}) socket(0x840000000002, 0x3, 0xfa) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000000)={@local, 0x1f}) syz_genetlink_get_family_id$team(&(0x7f0000000180), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES64=r1, @ANYBLOB="000428bd5700fbdbdf259a00000008000100", @ANYBLOB="975e7eb36ef0838c1a3bb67a1c1406a21730e279a21fb9a7295b1817b7c28e9474005cc4f3462ae782dd73c4f239cc1d6c7e8fc08da88cb2fe2b243d29bfbe87741d10f4616520bb7457db976c1f5bdbae9897d51bd8a43ccb3fd2e670591a2f9e5100966e883596df2e6db6a31668d8b21b007e7d5890a6b7a625b57958586ebd23bb0ce5078adbd49f05c2e61e3548cacc3e5a501cd3c9f4", @ANYBLOB="8400029c33e350a99b812ee0c22167804000010024e900006c625f74785f6d617070696e67000000000000050051818d698103000300000008f504000000000000000000", @ANYRES32=r3, @ANYRESHEX, @ANYRES32, @ANYRESHEX=r1], 0xa0}, 0x1, 0x0, 0x0, 0x80}, 0x80) sendfile(r0, r1, 0x0, 0xef84) 2.083062114s ago: executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) setsockopt$MRT6_DONE(0xffffffffffffffff, 0x29, 0xc9, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r4, 0x1, 0x53, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4c0000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800c0001006d6163766c616e00140002800800010010000000080003000300000008000500", @ANYRES32=r6, @ANYBLOB="6b1147cc725c88f9a043d1d4711ca76c4212b38e348186ea546d3d3d18eb040730517361b386609a7bd4dfab9dffa7853cdb06c9637373ffcf86f94c1cf1aa899e7b6f73ecc9faffdb79dee31a40db717cf63e9f9cf89b03d0bd66a2d3755259c6086b44a324af3771c7"], 0x4c}}, 0x0) utimes(0x0, &(0x7f0000000280)={{r2, r3/1000+60000}, {0x77359400}}) sendmsg$NL802154_CMD_GET_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x34, r1, 0x301, 0x70bd26, 0x0, {0x2b}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}}, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@multicast2, @local, @local}, 0xc) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r8 = socket$kcm(0x2, 0xa, 0x2) r9 = socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r9, 0x8983, &(0x7f0000000300)={0x0, 'syzkaller1\x00'}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r7, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaabaabb88a800008100000008004500005800000000002f90"], 0x6e) 1.979190601s ago: executing program 2: futimesat(0xffffffffffffffff, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x44d5140dfa68ad21) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r4, 0x0, 0xf3a, 0x0) write$binfmt_misc(r4, &(0x7f00000000c0)=ANY=[], 0xfffff000) write(r1, &(0x7f00000006c0)='^', 0x1) tee(r0, r4, 0x81, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000f000000850000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x80) socket(0x40000000015, 0x5, 0x0) 1.964559593s ago: executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x4, 0x1000004, 0x0, 0xffffffffffffffff, 0x8000, '\x00', r3, 0xffffffffffffffff, 0x0, 0xfffffffc}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0xa, 0x8, &(0x7f0000000180)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x21}}]}, &(0x7f0000000200)='syzkaller\x00'}, 0x90) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 1.937367617s ago: executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/205, 0xcd}], 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) 1.72737355s ago: executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000000c0)='./bus\x00', 0xa08886, &(0x7f0000000040)=ANY=[], 0x3, 0x2b9, &(0x7f0000000ac0)="$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") ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x60c2, 0x0) r2 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000300), 0x16) r4 = dup3(r3, r1, 0x0) sendfile(r3, r2, 0x0, 0x8038) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x23, &(0x7f0000000680)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, &(0x7f0000000080), 0x41000, 0x46, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[r3, r1, r4, r3, r4], 0x0, 0x10, 0xfff}, 0x90) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@loopback={0xfec0ffff00000000, 0xff02}}) socket(0x840000000002, 0x3, 0xfa) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@local, 0x1f}) syz_genetlink_get_family_id$team(&(0x7f0000000180), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES64=r2, @ANYBLOB="000428bd5700fbdbdf259a00000008000100", @ANYBLOB="975e7eb36ef0838c1a3bb67a1c1406a21730e279a21fb9a7295b1817b7c28e9474005cc4f3462ae782dd73c4f239cc1d6c7e8fc08da88cb2fe2b243d29bfbe87741d10f4616520bb7457db976c1f5bdbae9897d51bd8a43ccb3fd2e670591a2f9e5100966e883596df2e6db6a31668d8b21b007e7d5890a6b7a625b57958586ebd23bb0ce5078adbd49f05c2e61e3548cacc3e5a501cd3c9f4", @ANYBLOB="8400029c33e350a99b812ee0c22167804000010024e900006c625f74785f6d617070696e67000000000000050051818d698103000300000008f504000000000000000000", @ANYRES32=r4, @ANYRESHEX, @ANYRES32, @ANYRESHEX=r2], 0xa0}, 0x1, 0x0, 0x0, 0x80}, 0x80) sendfile(r1, r2, 0x0, 0xef84) 1.585781882s ago: executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000000c0)='./bus\x00', 0xa08886, &(0x7f0000000040)=ANY=[], 0x3, 0x2b9, &(0x7f0000000ac0)="$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") ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x60c2, 0x0) r2 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000300), 0x16) r4 = dup3(r3, r1, 0x0) sendfile(r3, r2, 0x0, 0x8038) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x23, &(0x7f0000000680)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, &(0x7f0000000080), 0x41000, 0x46, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[r3, r1, r4, r3, r4], 0x0, 0x10, 0xfff}, 0x90) socket$inet6(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendfile(r1, r2, 0x0, 0xef84) 1.349344539s ago: executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000000c0)='./bus\x00', 0xa08886, &(0x7f0000000040)=ANY=[], 0x3, 0x2b9, &(0x7f0000000ac0)="$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") ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x60c2, 0x0) r2 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000300), 0x16) r4 = dup3(r3, r1, 0x0) sendfile(r3, r2, 0x0, 0x8038) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x23, &(0x7f0000000680)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, &(0x7f0000000080), 0x41000, 0x46, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[r3, r1, r4, r3, r4], 0x0, 0x10, 0xfff}, 0x90) r5 = socket$inet6(0xa, 0x1, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x3}]}}}]}, 0x44}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000000c0)={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1, 0x2, 0x1ff, 0x0, 0x100, 0x5, 0x440000, r8}) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) sendfile(r1, r2, 0x0, 0xef84) 1.232806157s ago: executing program 4: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) quotactl$Q_SETINFO(0x0, &(0x7f00000000c0)=@sg0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x24, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYBLOB], 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000440)=""/247, 0x26) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x8, 0x840000088}, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time={0x0, 0x1}}) r3 = syz_io_uring_setup(0x3801, &(0x7f00000003c0)={0x0, 0x70a7, 0x3e00}, &(0x7f00000002c0), &(0x7f0000001000)) r4 = epoll_create1(0x0) epoll_pwait(r4, &(0x7f0000000100)=[{}], 0x1, 0xffff, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r3}], 0x1, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) 1.092278409s ago: executing program 0: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) quotactl$Q_SETINFO(0x0, &(0x7f00000000c0)=@sg0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x24, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYBLOB], 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r1, &(0x7f0000000440)=""/247, 0x26) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x8, 0x840000088}, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time={0x0, 0x1}}) r3 = syz_io_uring_setup(0x3801, &(0x7f00000003c0)={0x0, 0x70a7, 0x3e00}, &(0x7f00000002c0), &(0x7f0000001000)) r4 = epoll_create1(0x0) epoll_pwait(r4, &(0x7f0000000100)=[{}], 0x1, 0xffff, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r3}], 0x1, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) 1.075874912s ago: executing program 2: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000000c0)='./bus\x00', 0xa08886, &(0x7f0000000040)=ANY=[], 0x3, 0x2b9, &(0x7f0000000ac0)="$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") r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000300), 0x16) r3 = dup3(r2, r0, 0x0) sendfile(r2, r1, 0x0, 0x8038) r4 = socket$inet6(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000080)={@loopback={0xfec0ffff00000000, 0xff02}}) socket(0x840000000002, 0x3, 0xfa) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000000)={@local, 0x1f}) syz_genetlink_get_family_id$team(&(0x7f0000000180), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES64=r1, @ANYBLOB="000428bd5700fbdbdf259a00000008000100", @ANYBLOB="975e7eb36ef0838c1a3bb67a1c1406a21730e279a21fb9a7295b1817b7c28e9474005cc4f3462ae782dd73c4f239cc1d6c7e8fc08da88cb2fe2b243d29bfbe87741d10f4616520bb7457db976c1f5bdbae9897d51bd8a43ccb3fd2e670591a2f9e5100966e883596df2e6db6a31668d8b21b007e7d5890a6b7a625b57958586ebd23bb0ce5078adbd49f05c2e61e3548cacc3e5a501cd3c9f4", @ANYBLOB="8400029c33e350a99b812ee0c22167804000010024e900006c625f74785f6d617070696e67000000000000050051818d698103000300000008f504000000000000000000", @ANYRES32=r3, @ANYRESHEX, @ANYRES32, @ANYRESHEX=r1], 0xa0}, 0x1, 0x0, 0x0, 0x80}, 0x80) sendfile(r0, r1, 0x0, 0xef84) 1.037205408s ago: executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000000c0)='./bus\x00', 0xa08886, &(0x7f0000000040)=ANY=[], 0x3, 0x2b9, &(0x7f0000000ac0)="$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") ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x60c2, 0x0) r2 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000300), 0x16) r4 = dup3(r3, r1, 0x0) sendfile(r3, r2, 0x0, 0x8038) r5 = socket$inet6(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000080)={@loopback={0xfec0ffff00000000, 0xff02}}) socket(0x840000000002, 0x3, 0xfa) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000000)={@local, 0x1f}) syz_genetlink_get_family_id$team(&(0x7f0000000180), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES64=r2, @ANYBLOB="000428bd5700fbdbdf259a00000008000100", @ANYBLOB="975e7eb36ef0838c1a3bb67a1c1406a21730e279a21fb9a7295b1817b7c28e9474005cc4f3462ae782dd73c4f239cc1d6c7e8fc08da88cb2fe2b243d29bfbe87741d10f4616520bb7457db976c1f5bdbae9897d51bd8a43ccb3fd2e670591a2f9e5100966e883596df2e6db6a31668d8b21b007e7d5890a6b7a625b57958586ebd23bb0ce5078adbd49f05c2e61e3548cacc3e5a501cd3c9f4", @ANYBLOB="8400029c33e350a99b812ee0c22167804000010024e900006c625f74785f6d617070696e67000000000000050051818d698103000300000008f504000000000000000000", @ANYRES32=r4, @ANYRESHEX, @ANYRES32, @ANYRESHEX=r2], 0xa0}, 0x1, 0x0, 0x0, 0x80}, 0x80) sendfile(r1, r2, 0x0, 0xef84) 998.839224ms ago: executing program 3: socket$inet(0x2, 0x3, 0x2) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) setsockopt$MRT6_DONE(0xffffffffffffffff, 0x29, 0xc9, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r3, 0x1, 0x53, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4c0000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800c0001006d6163766c616e00140002800800010010000000080003000300000008000500", @ANYRES32=r5, @ANYBLOB="6b1147cc725c88f9a043d1d4711ca76c4212b38e348186ea546d3d3d18eb040730517361b386609a7bd4dfab9dffa7853cdb06c9637373ffcf86f94c1cf1aa899e7b6f73ecc9faffdb79dee31a40db717cf63e9f9cf89b03d0bd66a2d3755259c6086b44a324af3771c7"], 0x4c}}, 0x0) utimes(0x0, &(0x7f0000000280)={{r1, r2/1000+60000}, {0x77359400}}) sendmsg$NL802154_CMD_GET_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x40, r0, 0x301, 0x70bd26, 0x0, {0x2b}, [@NL802154_ATTR_WPAN_DEV={0xfffffffffffffccc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x40}}, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@multicast2, @local, @local}, 0xc) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r7 = socket$kcm(0x2, 0xa, 0x2) r8 = socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r8, 0x8983, &(0x7f0000000300)={0x0, 'syzkaller1\x00'}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r6, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaabaabb88a800008100000008004500005800000000002f90"], 0x6e) 882.119572ms ago: executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x4, 0x1000004, 0x0, 0xffffffffffffffff, 0x8000, '\x00', r3, 0xffffffffffffffff, 0x0, 0xfffffffc}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0xa, 0x8, &(0x7f0000000180)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x21}}]}, &(0x7f0000000200)='syzkaller\x00'}, 0x90) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 851.932277ms ago: executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r4, 0x0, 0xf3a, 0x0) write$binfmt_misc(r4, &(0x7f00000000c0)=ANY=[], 0xfffff000) write(r1, &(0x7f00000006c0), 0x0) tee(r0, r4, 0x81, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4) 684.132693ms ago: executing program 2: socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240), &(0x7f00000002c0)=ANY=[], 0x4, 0x0) 605.379895ms ago: executing program 2: r0 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000000000), &(0x7f00000001c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f00000005c0)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) ioctl$PAGEMAP_SCAN(0xffffffffffffffff, 0xc0606610, &(0x7f0000000280)={0x60, 0x3, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0xa4, &(0x7f0000000080)=[{0x401, 0xcc, 0x8a4e}, {0xffffffff, 0x1, 0x2}], 0x2, 0xff, 0x20, 0xd, 0x4, 0x8}) io_uring_enter(r0, 0x2def, 0x0, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r6 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) faccessat2(r6, &(0x7f0000001400)='\x00', 0x0, 0x200) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140), r4) sendmsg$NLBL_MGMT_C_ADD(r5, 0x0, 0x0) 587.117509ms ago: executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0xf3a, 0x0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0xfffff000) write(r1, &(0x7f00000006c0)='^', 0x1) tee(r0, r2, 0x81, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000f000000850000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x80) socket(0x40000000015, 0x5, 0x0) 323.99537ms ago: executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000000c0)='./bus\x00', 0xa08886, &(0x7f0000000040)=ANY=[], 0x3, 0x2b9, &(0x7f0000000ac0)="$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") ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x60c2, 0x0) r2 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000300), 0x16) r4 = dup3(r3, r1, 0x0) sendfile(r3, r2, 0x0, 0x8038) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x23, &(0x7f0000000680)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, &(0x7f0000000080), 0x41000, 0x46, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[r3, r1, r4, r3, r4], 0x0, 0x10, 0xfff}, 0x90) socket$inet6(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendfile(r1, r2, 0x0, 0xef84) 212.228587ms ago: executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/205, 0xcd}], 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b81000085"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) 52.081772ms ago: executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000000c0)='./bus\x00', 0xa08886, &(0x7f0000000040)=ANY=[], 0x3, 0x2b9, &(0x7f0000000ac0)="$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") ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x60c2, 0x0) r2 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000300), 0x16) r4 = dup3(r3, r1, 0x0) sendfile(r3, r2, 0x0, 0x8038) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x23, &(0x7f0000000680)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, &(0x7f0000000080), 0x41000, 0x46, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[r3, r1, r4, r3, r4], 0x0, 0x10, 0xfff}, 0x90) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@loopback={0xfec0ffff00000000, 0xff02}}) socket(0x840000000002, 0x3, 0xfa) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@local, 0x1f}) syz_genetlink_get_family_id$team(&(0x7f0000000180), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES64=r2, @ANYBLOB="000428bd5700fbdbdf259a00000008000100", @ANYBLOB="975e7eb36ef0838c1a3bb67a1c1406a21730e279a21fb9a7295b1817b7c28e9474005cc4f3462ae782dd73c4f239cc1d6c7e8fc08da88cb2fe2b243d29bfbe87741d10f4616520bb7457db976c1f5bdbae9897d51bd8a43ccb3fd2e670591a2f9e5100966e883596df2e6db6a31668d8b21b007e7d5890a6b7a625b57958586ebd23bb0ce5078adbd49f05c2e61e3548cacc3e5a501cd3c9f4", @ANYBLOB="8400029c33e350a99b812ee0c22167804000010024e900006c625f74785f6d617070696e67000000000000050051818d698103000300000008f504000000000000000000", @ANYRES32=r4, @ANYRESHEX, @ANYRES32, @ANYRESHEX=r2], 0xa0}, 0x1, 0x0, 0x0, 0x80}, 0x80) sendfile(r1, r2, 0x0, 0xef84) 0s ago: executing program 3: futimesat(0xffffffffffffffff, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x44d5140dfa68ad21) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r4, 0x0, 0xf3a, 0x0) write$binfmt_misc(r4, &(0x7f00000000c0)=ANY=[], 0xfffff000) write(r1, &(0x7f00000006c0)='^', 0x1) tee(r0, r4, 0x81, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000f000000850000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x80) socket(0x40000000015, 0x5, 0x0) kernel console output (not intermixed with test programs): [ 18.631185][ T29] audit: type=1400 audit(1718720931.395:81): avc: denied { read } for pid=2765 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.1.81' (ED25519) to the list of known hosts. 2024/06/18 14:28:54 fuzzer started 2024/06/18 14:28:54 dialing manager at 10.128.0.163:30030 [ 21.625196][ T29] audit: type=1400 audit(1718720934.385:82): avc: denied { node_bind } for pid=3073 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 21.645743][ T29] audit: type=1400 audit(1718720934.385:83): avc: denied { name_bind } for pid=3073 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 21.698198][ T3084] cgroup: Unknown subsys name 'net' [ 21.703433][ T29] audit: type=1400 audit(1718720934.455:84): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.726187][ T29] audit: type=1400 audit(1718720934.455:85): avc: denied { mount } for pid=3084 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.748364][ T29] audit: type=1400 audit(1718720934.455:86): avc: denied { create } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.768959][ T29] audit: type=1400 audit(1718720934.455:87): avc: denied { write } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.776178][ T3092] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.789390][ T29] audit: type=1400 audit(1718720934.455:88): avc: denied { read } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.789430][ T29] audit: type=1400 audit(1718720934.465:89): avc: denied { unmount } for pid=3084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.838184][ T29] audit: type=1400 audit(1718720934.465:90): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.862967][ T29] audit: type=1400 audit(1718720934.465:91): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.889775][ T3087] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.977469][ T3084] cgroup: Unknown subsys name 'rlimit' 2024/06/18 14:28:54 suppressing KCSAN reports in functions: 'folios_put_refs' 'filemap_fdatawrite_wbc' 'pcpu_alloc_noprof' 'exit_mm' 'ext4_fill_raw_inode' 'ondemand_readahead' '__lru_add_drain_all' 'do_sys_poll' 'data_alloc' '__xa_set_mark' '_prb_read_valid' 'd_instantiate_new' 'n_tty_receive_char_flow_ctrl' 'jbd2_journal_dirty_metadata' 'do_select' 'jbd2_journal_stop' 'ext4_free_inodes_count' 'wg_packet_send_staged_packets' 'process_scheduled_works' 'mem_cgroup_flush_stats_ratelimited' 'call_rcu' '__mark_inode_dirty' '__xa_clear_mark' 'xas_clear_mark' 'filemap_splice_read' 2024/06/18 14:28:54 starting 5 executor processes [ 22.826318][ T3101] chnl_net:caif_netlink_parms(): no params data found [ 22.917622][ T3101] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.924851][ T3101] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.931991][ T3101] bridge_slave_0: entered allmulticast mode [ 22.938320][ T3101] bridge_slave_0: entered promiscuous mode [ 22.946539][ T3106] chnl_net:caif_netlink_parms(): no params data found [ 22.963528][ T3101] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.970650][ T3101] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.977977][ T3101] bridge_slave_1: entered allmulticast mode [ 22.984439][ T3101] bridge_slave_1: entered promiscuous mode [ 23.006366][ T3101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 23.020606][ T3101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 23.051719][ T3101] team0: Port device team_slave_0 added [ 23.058118][ T3101] team0: Port device team_slave_1 added [ 23.104497][ T3101] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 23.111449][ T3101] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 23.137417][ T3101] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 23.155702][ T3106] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.162802][ T3106] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.169983][ T3106] bridge_slave_0: entered allmulticast mode [ 23.176365][ T3106] bridge_slave_0: entered promiscuous mode [ 23.187120][ T3101] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 23.194086][ T3101] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 23.220126][ T3101] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 23.238002][ T3106] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.245112][ T3106] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.252284][ T3106] bridge_slave_1: entered allmulticast mode [ 23.258622][ T3106] bridge_slave_1: entered promiscuous mode [ 23.282703][ T3114] chnl_net:caif_netlink_parms(): no params data found [ 23.310883][ T3106] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 23.328515][ T3101] hsr_slave_0: entered promiscuous mode [ 23.334490][ T3101] hsr_slave_1: entered promiscuous mode [ 23.343087][ T3106] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 23.352494][ T3112] chnl_net:caif_netlink_parms(): no params data found [ 23.373293][ T3116] chnl_net:caif_netlink_parms(): no params data found [ 23.398156][ T3106] team0: Port device team_slave_0 added [ 23.419078][ T3106] team0: Port device team_slave_1 added [ 23.436361][ T3114] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.443454][ T3114] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.450830][ T3114] bridge_slave_0: entered allmulticast mode [ 23.457256][ T3114] bridge_slave_0: entered promiscuous mode [ 23.463652][ T3114] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.470777][ T3114] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.477984][ T3114] bridge_slave_1: entered allmulticast mode [ 23.484360][ T3114] bridge_slave_1: entered promiscuous mode [ 23.496737][ T3106] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 23.503753][ T3106] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 23.529692][ T3106] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 23.543675][ T3106] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 23.550644][ T3106] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 23.576603][ T3106] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 23.616046][ T3112] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.623166][ T3112] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.630287][ T3112] bridge_slave_0: entered allmulticast mode [ 23.636558][ T3112] bridge_slave_0: entered promiscuous mode [ 23.664084][ T3114] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 23.673268][ T3112] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.680346][ T3112] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.687519][ T3112] bridge_slave_1: entered allmulticast mode [ 23.693774][ T3112] bridge_slave_1: entered promiscuous mode [ 23.708143][ T3106] hsr_slave_0: entered promiscuous mode [ 23.714081][ T3106] hsr_slave_1: entered promiscuous mode [ 23.719996][ T3106] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 23.727564][ T3106] Cannot create hsr debugfs directory [ 23.738112][ T3114] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 23.747285][ T3116] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.754382][ T3116] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.761704][ T3116] bridge_slave_0: entered allmulticast mode [ 23.767975][ T3116] bridge_slave_0: entered promiscuous mode [ 23.781578][ T3112] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 23.795165][ T3116] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.802263][ T3116] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.809361][ T3116] bridge_slave_1: entered allmulticast mode [ 23.815865][ T3116] bridge_slave_1: entered promiscuous mode [ 23.829812][ T3112] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 23.865712][ T3114] team0: Port device team_slave_0 added [ 23.887176][ T3114] team0: Port device team_slave_1 added [ 23.895222][ T3112] team0: Port device team_slave_0 added [ 23.901879][ T3116] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 23.924599][ T3112] team0: Port device team_slave_1 added [ 23.939096][ T3116] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 23.950450][ T3114] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 23.957484][ T3114] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 23.983526][ T3114] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 23.994821][ T3114] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.001757][ T3114] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.027656][ T3114] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.045622][ T3112] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.052644][ T3112] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.078575][ T3112] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.107104][ T3112] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.114085][ T3112] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.140011][ T3112] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.174010][ T3116] team0: Port device team_slave_0 added [ 24.184141][ T3114] hsr_slave_0: entered promiscuous mode [ 24.190232][ T3114] hsr_slave_1: entered promiscuous mode [ 24.196207][ T3114] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 24.203745][ T3114] Cannot create hsr debugfs directory [ 24.209915][ T3116] team0: Port device team_slave_1 added [ 24.239743][ T3112] hsr_slave_0: entered promiscuous mode [ 24.245755][ T3112] hsr_slave_1: entered promiscuous mode [ 24.251704][ T3112] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 24.259276][ T3112] Cannot create hsr debugfs directory [ 24.272833][ T3116] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.279809][ T3116] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.305717][ T3116] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.316987][ T3116] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.323980][ T3116] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.349958][ T3116] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.362903][ T3101] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 24.389507][ T3101] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 24.400011][ T3101] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 24.408590][ T3101] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 24.437341][ T3116] hsr_slave_0: entered promiscuous mode [ 24.443166][ T3116] hsr_slave_1: entered promiscuous mode [ 24.449149][ T3116] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 24.456730][ T3116] Cannot create hsr debugfs directory [ 24.496264][ T3106] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 24.524047][ T3106] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 24.561586][ T3114] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 24.571226][ T3106] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 24.581982][ T3114] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 24.591335][ T3114] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 24.600323][ T3106] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 24.618216][ T3114] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 24.640758][ T3112] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 24.649293][ T3112] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 24.666212][ T3112] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 24.674827][ T3112] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 24.729390][ T3116] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 24.738161][ T3116] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 24.746719][ T3116] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 24.761353][ T3116] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 24.778183][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 24.809093][ T3101] 8021q: adding VLAN 0 to HW filter on device team0 [ 24.824551][ T3178] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.831611][ T3178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.842214][ T3114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 24.854491][ T3181] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.861582][ T3181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.879915][ T3114] 8021q: adding VLAN 0 to HW filter on device team0 [ 24.901845][ T3101] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 24.912240][ T3101] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 24.925755][ T3112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 24.936537][ T3179] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.943587][ T3179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.954049][ T3179] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.961125][ T3179] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.981826][ T3114] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 25.034096][ T3112] 8021q: adding VLAN 0 to HW filter on device team0 [ 25.045337][ T3116] 8021q: adding VLAN 0 to HW filter on device bond0 [ 25.055469][ T3106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 25.070427][ T3153] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.077497][ T3153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.086563][ T3153] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.093582][ T3153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.106653][ T3116] 8021q: adding VLAN 0 to HW filter on device team0 [ 25.121639][ T3101] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 25.136653][ T3153] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.143708][ T3153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.154885][ T3114] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 25.163482][ T3106] 8021q: adding VLAN 0 to HW filter on device team0 [ 25.178287][ T3180] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.185348][ T3180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.193824][ T3180] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.201030][ T3180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.210157][ T3180] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.217238][ T3180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.229395][ T3112] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 25.272809][ T3116] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 25.283369][ T3116] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 25.362357][ T3101] veth0_vlan: entered promiscuous mode [ 25.388714][ T3101] veth1_vlan: entered promiscuous mode [ 25.397232][ T3116] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 25.412249][ T3101] veth0_macvtap: entered promiscuous mode [ 25.421217][ T3101] veth1_macvtap: entered promiscuous mode [ 25.444477][ T3101] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 25.454374][ T3114] veth0_vlan: entered promiscuous mode [ 25.463045][ T3101] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 25.471733][ T3101] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.480472][ T3101] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.489325][ T3101] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.498059][ T3101] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.508898][ T3112] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 25.519948][ T3114] veth1_vlan: entered promiscuous mode [ 25.538881][ T3106] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 25.550295][ T3114] veth0_macvtap: entered promiscuous mode [ 25.561189][ T3114] veth1_macvtap: entered promiscuous mode [ 25.577938][ T3114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 25.588480][ T3114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.615489][ T3114] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 25.634729][ T3114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 25.645262][ T3114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.671405][ T3114] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 25.701307][ T3235] loop1: detected capacity change from 0 to 128 [ 25.707390][ T3116] veth0_vlan: entered promiscuous mode [ 25.728559][ T3114] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.737341][ T3114] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.746138][ T3114] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.754995][ T3114] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 25.782971][ T3116] veth1_vlan: entered promiscuous mode [ 25.800744][ T3112] veth0_vlan: entered promiscuous mode [ 25.825869][ T3116] veth0_macvtap: entered promiscuous mode [ 25.836165][ T3116] veth1_macvtap: entered promiscuous mode [ 25.854863][ T3241] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 25.868544][ T3116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 25.879041][ T3116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.889068][ T3116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 25.899538][ T3116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.911929][ T3116] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 25.920035][ T3112] veth1_vlan: entered promiscuous mode [ 25.939071][ T3116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 25.949634][ T3116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.959542][ T3116] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 25.969962][ T3116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 25.981289][ T3116] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 26.014974][ T3248] bridge1: the hash_elasticity option has been deprecated and is always 16 [ 26.028670][ T3112] veth0_macvtap: entered promiscuous mode [ 26.037139][ T3116] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.045890][ T3116] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.054650][ T3116] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.063339][ T3116] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.080794][ T3106] veth0_vlan: entered promiscuous mode [ 26.090467][ T3112] veth1_macvtap: entered promiscuous mode [ 26.107614][ T3106] veth1_vlan: entered promiscuous mode [ 26.134214][ T3112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 26.144809][ T3112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.154696][ T3112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 26.165160][ T3112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.174979][ T3112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 26.185548][ T3112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.202395][ T3112] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.212720][ T3106] veth0_macvtap: entered promiscuous mode [ 26.235479][ T3112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 26.245972][ T3112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.255892][ T3112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 26.266346][ T3112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.276199][ T3112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 26.286712][ T3112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.299227][ T3112] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 26.307649][ T3106] veth1_macvtap: entered promiscuous mode [ 26.319474][ T3112] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.328340][ T3112] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.337085][ T3112] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.345802][ T3112] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.370183][ T3106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 26.380888][ T3106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.390861][ T3106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 26.401276][ T3106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.411078][ T3106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 26.421550][ T3106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.431356][ T3106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 26.441772][ T3106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.453755][ T3106] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.463295][ T3106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 26.473812][ T3106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.483824][ T3106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 26.494454][ T3106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.504270][ T3106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 26.514753][ T3106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.524606][ T3106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 26.535028][ T3106] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 26.546040][ T3106] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 26.558754][ T3106] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.567611][ T3106] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.576478][ T3106] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.576527][ T3106] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.607654][ T3262] loop2: detected capacity change from 0 to 128 [ 26.655521][ T3265] bridge1: the hash_elasticity option has been deprecated and is always 16 [ 26.673871][ T3266] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 26.718686][ T3268] loop4: detected capacity change from 0 to 128 [ 26.796794][ T3272] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 26.810984][ T3271] loop3: detected capacity change from 0 to 128 [ 26.898400][ T3275] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 27.140082][ T3277] loop0: detected capacity change from 0 to 128 [ 27.218052][ T3278] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 27.228021][ T3266] syz-executor.2 (3266) used greatest stack depth: 11000 bytes left [ 27.292211][ T3280] loop2: detected capacity change from 0 to 128 [ 27.388349][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 27.388363][ T29] audit: type=1400 audit(1718720940.145:133): avc: denied { ioctl } for pid=3281 comm="syz-executor.4" path="socket:[3966]" dev="sockfs" ino=3966 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 27.398069][ T3282] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) [ 27.436790][ T29] audit: type=1400 audit(1718720940.155:134): avc: denied { setopt } for pid=3281 comm="syz-executor.4" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 27.457432][ T29] audit: type=1400 audit(1718720940.185:135): avc: denied { create } for pid=3281 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 27.477492][ T29] audit: type=1400 audit(1718720940.205:136): avc: denied { ioctl } for pid=3281 comm="syz-executor.4" path="socket:[3974]" dev="sockfs" ino=3974 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 27.564984][ T3285] loop1: detected capacity change from 0 to 512 [ 27.579636][ T3285] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2234: inode #15: comm syz-executor.1: corrupted in-inode xattr: invalid ea_ino [ 27.597010][ T3285] EXT4-fs error (device loop1): ext4_orphan_get:1399: comm syz-executor.1: couldn't read orphan inode 15 (err -117) [ 27.612428][ T3285] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 27.617079][ T3289] loop4: detected capacity change from 0 to 128 [ 27.638156][ T29] audit: type=1400 audit(1718720940.395:137): avc: denied { mount } for pid=3284 comm="syz-executor.1" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 27.713266][ T29] audit: type=1400 audit(1718720940.465:138): avc: denied { write } for pid=3284 comm="syz-executor.1" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 27.735329][ T29] audit: type=1400 audit(1718720940.465:139): avc: denied { add_name } for pid=3284 comm="syz-executor.1" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 27.756186][ T29] audit: type=1400 audit(1718720940.465:140): avc: denied { create } for pid=3284 comm="syz-executor.1" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 27.777424][ T3290] EXT4-fs warning (device loop1): __ext4fs_dirhash:270: inode #2: comm syz-executor.1: Siphash requires key [ 27.794930][ T29] audit: type=1400 audit(1718720940.525:141): avc: denied { create } for pid=3284 comm="syz-executor.1" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 27.836835][ T29] audit: type=1400 audit(1718720940.525:142): avc: denied { write open } for pid=3284 comm="syz-executor.1" path="/root/syzkaller-testdir101975981/syzkaller.J4mtOk/3/file1/file0" dev="loop1" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 27.864896][ T3290] EXT4-fs warning (device loop1): dx_probe:844: inode #2: comm syz-executor.1: Hash code is SIPHASH, but hash not in dirent [ 27.878330][ T3290] EXT4-fs warning (device loop1): dx_probe:965: inode #2: comm syz-executor.1: Corrupt directory, running e2fsck is recommended [ 27.891746][ T3290] EXT4-fs warning (device loop1): dx_probe:844: inode #2: comm syz-executor.1: Hash code is SIPHASH, but hash not in dirent [ 27.904654][ T3290] EXT4-fs warning (device loop1): dx_probe:965: inode #2: comm syz-executor.1: Corrupt directory, running e2fsck is recommended [ 28.134670][ T3301] loop0: detected capacity change from 0 to 128 [ 28.201101][ T3303] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 28.347832][ T3307] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 28.417506][ T3311] loop4: detected capacity change from 0 to 128 [ 28.716367][ T3321] loop3: detected capacity change from 0 to 128 [ 28.789447][ T3322] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 28.802238][ T3324] loop4: detected capacity change from 0 to 128 [ 28.868708][ T3325] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 29.275811][ T3335] loop3: detected capacity change from 0 to 128 [ 29.330631][ T3338] loop3: detected capacity change from 0 to 128 [ 29.370079][ T3340] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 29.395091][ T3342] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 29.449726][ T3345] loop0: detected capacity change from 0 to 128 [ 29.513453][ T3346] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 29.842380][ T3355] loop0: detected capacity change from 0 to 128 [ 29.905812][ T3357] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 30.055275][ T3361] bridge1: the hash_elasticity option has been deprecated and is always 16 [ 30.180741][ T3365] loop0: detected capacity change from 0 to 128 [ 30.242319][ T3367] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 30.656178][ T3374] loop3: detected capacity change from 0 to 128 [ 30.721962][ T3381] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 30.735287][ T3384] loop2: detected capacity change from 0 to 128 [ 30.748738][ T3386] loop3: detected capacity change from 0 to 128 [ 30.809353][ T3387] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 30.822917][ T3388] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 31.201370][ T3394] loop2: detected capacity change from 0 to 128 [ 31.264948][ T3396] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 31.430455][ T3400] loop0: detected capacity change from 0 to 128 [ 31.501625][ T3401] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 31.709040][ T3401] syz-executor.0 (3401) used greatest stack depth: 10800 bytes left [ 31.761136][ T3408] loop0: detected capacity change from 0 to 128 [ 31.789465][ T3410] loop4: detected capacity change from 0 to 128 [ 31.860645][ T3412] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 32.151084][ T3418] bridge2: the hash_elasticity option has been deprecated and is always 16 [ 32.169406][ T3420] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 32.195881][ T3422] loop0: detected capacity change from 0 to 128 [ 32.263727][ T3424] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 32.539026][ T3437] bridge1: the hash_elasticity option has been deprecated and is always 16 [ 32.616491][ T3440] loop2: detected capacity change from 0 to 128 [ 32.679024][ T3442] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 32.982974][ T29] kauditd_printk_skb: 119 callbacks suppressed [ 32.982988][ T29] audit: type=1326 audit(1718720945.735:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3444 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f80ed2bff29 code=0x7ffc0000 [ 33.013001][ T29] audit: type=1326 audit(1718720945.735:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3444 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f80ed2bff29 code=0x7ffc0000 [ 33.037414][ T29] audit: type=1326 audit(1718720945.735:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3444 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f80ed2bff29 code=0x7ffc0000 [ 33.061563][ T29] audit: type=1326 audit(1718720945.735:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3444 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f80ed2bff29 code=0x7ffc0000 [ 33.085479][ T29] audit: type=1326 audit(1718720945.735:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3444 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f80ed2bff29 code=0x7ffc0000 [ 33.109404][ T29] audit: type=1326 audit(1718720945.735:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3444 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f80ed2bff29 code=0x7ffc0000 [ 33.133234][ T29] audit: type=1326 audit(1718720945.735:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3444 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f80ed2bff29 code=0x7ffc0000 [ 33.315855][ T29] audit: type=1326 audit(1718720946.075:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3456 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4c36b6f29 code=0x7ffc0000 [ 33.339929][ T29] audit: type=1326 audit(1718720946.075:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3456 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4c36b6f29 code=0x7ffc0000 [ 33.363975][ T29] audit: type=1326 audit(1718720946.075:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3456 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=289 compat=0 ip=0x7fd4c36b6f29 code=0x7ffc0000 [ 33.400629][ T3459] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 33.434694][ T3463] loop4: detected capacity change from 0 to 128 [ 33.460827][ T3465] loop0: detected capacity change from 0 to 128 [ 33.497712][ T3466] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 33.528954][ T3467] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 33.901126][ T3474] loop4: detected capacity change from 0 to 128 [ 33.923790][ T3476] bridge2: the hash_elasticity option has been deprecated and is always 16 [ 33.969562][ T3479] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 34.687684][ T3494] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 34.715613][ T3496] bridge1: the hash_elasticity option has been deprecated and is always 16 [ 35.115947][ T3508] loop4: detected capacity change from 0 to 128 [ 35.179013][ T3509] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 35.450835][ T3511] loop4: detected capacity change from 0 to 128 [ 35.513271][ T3512] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 35.602327][ T3514] loop2: detected capacity change from 0 to 128 [ 35.657721][ T3518] loop3: detected capacity change from 0 to 128 [ 35.694240][ T3519] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 35.743207][ T3522] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 35.938221][ T3529] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 35.968873][ T3531] loop4: detected capacity change from 0 to 128 [ 36.453813][ T3542] loop4: detected capacity change from 0 to 128 [ 36.522109][ T3543] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 36.696350][ T3545] bridge3: the hash_elasticity option has been deprecated and is always 16 [ 37.255958][ T3561] loop2: detected capacity change from 0 to 128 [ 37.547785][ T3564] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 37.579713][ T3568] loop0: detected capacity change from 0 to 128 [ 37.602134][ T3570] loop2: detected capacity change from 0 to 128 [ 37.650115][ T3571] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 37.667011][ T3572] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 37.719995][ T3574] loop4: detected capacity change from 0 to 128 [ 38.104377][ T3580] loop2: detected capacity change from 0 to 128 [ 38.295652][ T3587] loop4: detected capacity change from 0 to 128 [ 38.486436][ T3594] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 38.508125][ T3596] loop2: detected capacity change from 0 to 128 [ 38.518303][ T29] kauditd_printk_skb: 122 callbacks suppressed [ 38.518373][ T29] audit: type=1326 audit(1718720951.275:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4c36b6f29 code=0x7ffc0000 [ 38.548671][ T29] audit: type=1326 audit(1718720951.275:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4c36b6f29 code=0x7ffc0000 [ 38.577634][ T29] audit: type=1326 audit(1718720951.275:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=289 compat=0 ip=0x7fd4c36b6f29 code=0x7ffc0000 [ 38.601543][ T29] audit: type=1326 audit(1718720951.275:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4c36b6f29 code=0x7ffc0000 [ 38.625739][ T29] audit: type=1326 audit(1718720951.275:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd4c36b6f29 code=0x7ffc0000 [ 38.649698][ T29] audit: type=1326 audit(1718720951.275:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4c36b6f29 code=0x7ffc0000 [ 38.673566][ T29] audit: type=1326 audit(1718720951.275:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4c36b6f29 code=0x7ffc0000 [ 38.697551][ T29] audit: type=1326 audit(1718720951.275:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd4c36b6f29 code=0x7ffc0000 [ 38.722940][ T29] audit: type=1326 audit(1718720951.275:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4c36b6f29 code=0x7ffc0000 [ 38.748003][ T29] audit: type=1326 audit(1718720951.275:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd4c36b6f29 code=0x7ffc0000 [ 38.906613][ T3607] loop3: detected capacity change from 0 to 128 [ 38.968347][ T3609] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 39.015237][ T3611] loop0: detected capacity change from 0 to 128 [ 39.287190][ T3614] loop3: detected capacity change from 0 to 128 [ 39.356442][ T3615] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 39.483203][ T3619] loop0: detected capacity change from 0 to 128 [ 39.673278][ T3626] loop3: detected capacity change from 0 to 128 [ 39.689500][ T3628] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 39.699931][ T3628] Zero length message leads to an empty skb [ 39.740734][ T3632] loop2: detected capacity change from 0 to 128 [ 40.141888][ T3640] loop2: detected capacity change from 0 to 128 [ 40.203168][ T3643] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 40.470595][ T3651] loop2: detected capacity change from 0 to 128 [ 40.660275][ T3654] loop0: detected capacity change from 0 to 128 [ 40.804804][ T3658] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 41.042043][ T3672] loop3: detected capacity change from 0 to 128 [ 41.192069][ T3675] loop4: detected capacity change from 0 to 128 [ 41.467053][ T3678] loop3: detected capacity change from 0 to 128 [ 41.535757][ T3679] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 41.702365][ T3686] loop2: detected capacity change from 0 to 128 [ 41.780896][ T3689] loop2: detected capacity change from 0 to 128 [ 41.895192][ T3694] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 42.446984][ T3709] loop4: detected capacity change from 0 to 128 [ 42.764478][ T3716] loop4: detected capacity change from 0 to 128 [ 42.877912][ T3719] ================================================================== [ 42.886021][ T3719] BUG: KCSAN: data-race in vfs_fsync_range / writeback_single_inode [ 42.894012][ T3719] [ 42.896334][ T3719] write to 0xffff8881093f0130 of 8 bytes by task 3716 on cpu 0: [ 42.903982][ T3719] writeback_single_inode+0x10e/0x4a0 [ 42.909373][ T3719] sync_inode_metadata+0x5c/0x90 [ 42.914318][ T3719] __generic_file_fsync+0xf9/0x140 [ 42.919432][ T3719] fat_file_fsync+0x4c/0x100 [ 42.924028][ T3719] vfs_fsync_range+0x122/0x140 [ 42.928795][ T3719] generic_file_write_iter+0x191/0x1d0 [ 42.934265][ T3719] iter_file_splice_write+0x5e6/0x970 [ 42.939653][ T3719] direct_splice_actor+0x16c/0x2c0 [ 42.944778][ T3719] splice_direct_to_actor+0x305/0x670 [ 42.950151][ T3719] do_splice_direct+0xd7/0x150 [ 42.954909][ T3719] do_sendfile+0x3ab/0x960 [ 42.959309][ T3719] __x64_sys_sendfile64+0x110/0x150 [ 42.964503][ T3719] x64_sys_call+0x2c9f/0x2d70 [ 42.969174][ T3719] do_syscall_64+0xc9/0x1c0 [ 42.973662][ T3719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.979550][ T3719] [ 42.981856][ T3719] read to 0xffff8881093f0130 of 8 bytes by task 3719 on cpu 1: [ 42.989390][ T3719] vfs_fsync_range+0xa6/0x140 [ 42.994054][ T3719] generic_file_write_iter+0x191/0x1d0 [ 42.999504][ T3719] iter_file_splice_write+0x5e6/0x970 [ 43.004868][ T3719] direct_splice_actor+0x16c/0x2c0 [ 43.009971][ T3719] splice_direct_to_actor+0x305/0x670 [ 43.015342][ T3719] do_splice_direct+0xd7/0x150 [ 43.020101][ T3719] do_sendfile+0x3ab/0x960 [ 43.024504][ T3719] __x64_sys_sendfile64+0x110/0x150 [ 43.029695][ T3719] x64_sys_call+0x2c9f/0x2d70 [ 43.034362][ T3719] do_syscall_64+0xc9/0x1c0 [ 43.038850][ T3719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.044736][ T3719] [ 43.047039][ T3719] value changed: 0x0000000000000007 -> 0x0000000000000084 [ 43.054128][ T3719] [ 43.056433][ T3719] Reported by Kernel Concurrency Sanitizer on: [ 43.062576][ T3719] CPU: 1 PID: 3719 Comm: syz-executor.4 Not tainted 6.10.0-rc4-syzkaller-00033-g14d7c92f8df9 #0 2024/06/18 14:29:15 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 43.072973][ T3719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 43.083013][ T3719] ==================================================================