m_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.449283][ T28] audit: type=1400 audit(1714408960.795:80): avc: denied { siginh } for pid=2963 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.409218][ T2966] sftp-server (2966) used greatest stack depth: 11616 bytes left [ 15.419675][ T2964] sshd (2964) used greatest stack depth: 11528 bytes left [ 17.891063][ T28] audit: type=1400 audit(1714408964.255:81): avc: denied { read } for pid=2767 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.0.167' (ED25519) to the list of known hosts. 2024/04/29 16:42:47 fuzzer started 2024/04/29 16:42:47 dialing manager at 10.128.0.163:30015 [ 21.537276][ T28] audit: type=1400 audit(1714408967.895:82): avc: denied { node_bind } for pid=3075 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 21.558617][ T28] audit: type=1400 audit(1714408967.895:83): avc: denied { name_bind } for pid=3075 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 28.781887][ T28] audit: type=1400 audit(1714408975.135:84): avc: denied { mounton } for pid=3085 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.783625][ T3085] cgroup: Unknown subsys name 'net' [ 28.804576][ T28] audit: type=1400 audit(1714408975.135:85): avc: denied { mount } for pid=3085 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.831941][ T28] audit: type=1400 audit(1714408975.175:86): avc: denied { unmount } for pid=3085 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.967284][ T3085] cgroup: Unknown subsys name 'rlimit' [ 29.057363][ T28] audit: type=1400 audit(1714408975.415:87): avc: denied { mounton } for pid=3085 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 29.082253][ T28] audit: type=1400 audit(1714408975.415:88): avc: denied { mount } for pid=3085 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 29.105593][ T28] audit: type=1400 audit(1714408975.415:89): avc: denied { create } for pid=3085 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.113772][ T3086] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 29.126109][ T28] audit: type=1400 audit(1714408975.415:90): avc: denied { write } for pid=3085 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.155191][ T28] audit: type=1400 audit(1714408975.415:91): avc: denied { read } for pid=3085 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.175607][ T28] audit: type=1400 audit(1714408975.495:92): avc: denied { relabelto } for pid=3086 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/04/29 16:42:55 code coverage: enabled 2024/04/29 16:42:55 comparison tracing: enabled 2024/04/29 16:42:55 extra coverage: enabled 2024/04/29 16:42:55 delay kcov mmap: enabled 2024/04/29 16:42:55 setuid sandbox: enabled 2024/04/29 16:42:55 namespace sandbox: enabled 2024/04/29 16:42:55 Android sandbox: enabled 2024/04/29 16:42:55 fault injection: enabled 2024/04/29 16:42:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2024/04/29 16:42:55 net packet injection: enabled 2024/04/29 16:42:55 net device setup: enabled 2024/04/29 16:42:55 concurrency sanitizer: enabled 2024/04/29 16:42:55 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/04/29 16:42:55 NIC VF setup: PCI device 0000:00:11.0 is not available 2024/04/29 16:42:55 USB emulation: /dev/raw-gadget does not exist 2024/04/29 16:42:55 hci packet injection: /dev/vhci does not exist 2024/04/29 16:42:55 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2024/04/29 16:42:55 802.15.4 emulation: enabled 2024/04/29 16:42:55 swap file: enabled 2024/04/29 16:42:55 starting 5 executor processes [ 29.183955][ T3085] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.201122][ T28] audit: type=1400 audit(1714408975.495:93): avc: denied { write } for pid=3086 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.711274][ T3102] chnl_net:caif_netlink_parms(): no params data found [ 29.735250][ T3105] chnl_net:caif_netlink_parms(): no params data found [ 29.784472][ T3095] chnl_net:caif_netlink_parms(): no params data found [ 29.834905][ T3105] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.842035][ T3105] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.849303][ T3105] bridge_slave_0: entered allmulticast mode [ 29.855556][ T3105] bridge_slave_0: entered promiscuous mode [ 29.862291][ T3105] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.869363][ T3105] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.876592][ T3105] bridge_slave_1: entered allmulticast mode [ 29.882969][ T3105] bridge_slave_1: entered promiscuous mode [ 29.905713][ T3102] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.912794][ T3102] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.920025][ T3102] bridge_slave_0: entered allmulticast mode [ 29.926359][ T3102] bridge_slave_0: entered promiscuous mode [ 29.950631][ T3102] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.957745][ T3102] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.964862][ T3102] bridge_slave_1: entered allmulticast mode [ 29.971432][ T3102] bridge_slave_1: entered promiscuous mode [ 29.986399][ T3105] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.999735][ T3095] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.006826][ T3095] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.014055][ T3095] bridge_slave_0: entered allmulticast mode [ 30.020524][ T3095] bridge_slave_0: entered promiscuous mode [ 30.027264][ T3095] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.034331][ T3095] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.041875][ T3095] bridge_slave_1: entered allmulticast mode [ 30.049148][ T3095] bridge_slave_1: entered promiscuous mode [ 30.060847][ T3105] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.082260][ T3102] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.092357][ T3102] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.113284][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.122930][ T3118] chnl_net:caif_netlink_parms(): no params data found [ 30.139219][ T3098] chnl_net:caif_netlink_parms(): no params data found [ 30.150673][ T3105] team0: Port device team_slave_0 added [ 30.157044][ T3105] team0: Port device team_slave_1 added [ 30.163484][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.186422][ T3102] team0: Port device team_slave_0 added [ 30.210357][ T3102] team0: Port device team_slave_1 added [ 30.222855][ T3105] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.229857][ T3105] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.255930][ T3105] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.267144][ T3105] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.274092][ T3105] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.299986][ T3105] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.311143][ T3095] team0: Port device team_slave_0 added [ 30.319211][ T3095] team0: Port device team_slave_1 added [ 30.354826][ T3102] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.361989][ T3102] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.387912][ T3102] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.399567][ T3102] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.406582][ T3102] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.432569][ T3102] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.448003][ T3118] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.455061][ T3118] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.462193][ T3118] bridge_slave_0: entered allmulticast mode [ 30.468499][ T3118] bridge_slave_0: entered promiscuous mode [ 30.475264][ T3118] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.482358][ T3118] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.489484][ T3118] bridge_slave_1: entered allmulticast mode [ 30.495907][ T3118] bridge_slave_1: entered promiscuous mode [ 30.506744][ T3095] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.513707][ T3095] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.539671][ T3095] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.553032][ T3095] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.561649][ T3095] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.587614][ T3095] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.598297][ T3098] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.605432][ T3098] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.613541][ T3098] bridge_slave_0: entered allmulticast mode [ 30.619907][ T3098] bridge_slave_0: entered promiscuous mode [ 30.646190][ T3098] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.653374][ T3098] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.660565][ T3098] bridge_slave_1: entered allmulticast mode [ 30.667000][ T3098] bridge_slave_1: entered promiscuous mode [ 30.674687][ T3118] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.684810][ T3118] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.700401][ T3105] hsr_slave_0: entered promiscuous mode [ 30.706469][ T3105] hsr_slave_1: entered promiscuous mode [ 30.745167][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.759158][ T3118] team0: Port device team_slave_0 added [ 30.765616][ T3118] team0: Port device team_slave_1 added [ 30.777801][ T3095] hsr_slave_0: entered promiscuous mode [ 30.783853][ T3095] hsr_slave_1: entered promiscuous mode [ 30.789797][ T3095] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.797391][ T3095] Cannot create hsr debugfs directory [ 30.803519][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.814768][ T3102] hsr_slave_0: entered promiscuous mode [ 30.820773][ T3102] hsr_slave_1: entered promiscuous mode [ 30.826653][ T3102] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.834181][ T3102] Cannot create hsr debugfs directory [ 30.856998][ T3118] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.863943][ T3118] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.889838][ T3118] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.911294][ T3118] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.918291][ T3118] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.944188][ T3118] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.961115][ T3098] team0: Port device team_slave_0 added [ 30.967689][ T3098] team0: Port device team_slave_1 added [ 30.996744][ T3098] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.003760][ T3098] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.029661][ T3098] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.046518][ T3118] hsr_slave_0: entered promiscuous mode [ 31.052484][ T3118] hsr_slave_1: entered promiscuous mode [ 31.058798][ T3118] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 31.066400][ T3118] Cannot create hsr debugfs directory [ 31.072102][ T3098] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.079275][ T3098] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.105310][ T3098] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.156186][ T3098] hsr_slave_0: entered promiscuous mode [ 31.162203][ T3098] hsr_slave_1: entered promiscuous mode [ 31.168026][ T3098] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 31.175560][ T3098] Cannot create hsr debugfs directory [ 31.232491][ T3105] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 31.242386][ T3105] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 31.251863][ T3105] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 31.262008][ T3105] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 31.283063][ T3102] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 31.299143][ T3102] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 31.307657][ T3102] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 31.326573][ T3102] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 31.339750][ T3095] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 31.348327][ T3095] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 31.368666][ T3118] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 31.376876][ T3095] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 31.385399][ T3095] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 31.407637][ T3118] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 31.422936][ T3098] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 31.431711][ T3098] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 31.440426][ T3118] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 31.457403][ T3098] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 31.465738][ T3118] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 31.477130][ T3098] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 31.520449][ T3105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.541302][ T3102] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.554415][ T3105] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.570908][ T3175] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.578012][ T3175] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.587342][ T3175] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.594369][ T3175] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.623294][ T3102] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.640256][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.648499][ T3105] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 31.659055][ T3105] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.679343][ T3176] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.686421][ T3176] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.695004][ T3176] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.702879][ T3176] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.737604][ T3095] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.757803][ T3118] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.770317][ T3174] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.777401][ T3174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.785922][ T3174] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.793050][ T3174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.803991][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.818971][ T3118] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.838046][ T3095] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 31.848431][ T3095] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.861016][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.868251][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.881996][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.889135][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.909603][ T3102] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.918627][ T3105] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.939657][ T3098] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.965730][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.972821][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.981651][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.988718][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.022798][ T3095] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.083619][ T3105] veth0_vlan: entered promiscuous mode [ 32.120038][ T3105] veth1_vlan: entered promiscuous mode [ 32.135529][ T3118] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.151506][ T3102] veth0_vlan: entered promiscuous mode [ 32.159667][ T3098] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.175724][ T3105] veth0_macvtap: entered promiscuous mode [ 32.184506][ T3102] veth1_vlan: entered promiscuous mode [ 32.202319][ T3095] veth0_vlan: entered promiscuous mode [ 32.213984][ T3105] veth1_macvtap: entered promiscuous mode [ 32.223017][ T3095] veth1_vlan: entered promiscuous mode [ 32.238064][ T3105] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.248711][ T3105] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.266475][ T3105] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.275231][ T3105] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.284034][ T3105] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.292934][ T3105] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.305549][ T3102] veth0_macvtap: entered promiscuous mode [ 32.318924][ T3102] veth1_macvtap: entered promiscuous mode [ 32.331423][ T3095] veth0_macvtap: entered promiscuous mode [ 32.345083][ T3095] veth1_macvtap: entered promiscuous mode [ 32.361487][ T3095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.372078][ T3095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.382998][ T3095] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.391630][ T3095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.402082][ T3095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.413577][ T3095] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.430536][ T3095] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.439446][ T3095] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.448269][ T3095] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.457048][ T3095] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.468214][ T3102] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.478711][ T3102] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.488627][ T3102] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.499074][ T3102] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.510064][ T3102] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.519024][ T3102] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.530324][ T3102] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.540231][ T3102] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.550758][ T3102] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.561464][ T3102] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.576790][ T3118] veth0_vlan: entered promiscuous mode executing program 2: semget$private(0x0, 0x207, 0x0) semtimedop(0x0, &(0x7f00000002c0)=[{}, {0x0, 0xff78}], 0x2, 0x0) semop(0x0, &(0x7f0000000280)=[{0x3, 0x9cb2}, {}], 0x2) [ 32.591395][ T3102] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.600194][ T3102] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.608899][ T3102] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.617594][ T3102] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.629114][ T3098] veth0_vlan: entered promiscuous mode [ 32.638629][ T3118] veth1_vlan: entered promiscuous mode executing program 0: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x3, 0x0, 0x1800}, {}], 0x2, 0x0) r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}, {}], 0x2) semop(0x0, &(0x7f0000000280)=[{0x0, 0x0, 0x1800}, {}], 0x2) [ 32.659229][ T3098] veth1_vlan: entered promiscuous mode [ 32.692582][ T3118] veth0_macvtap: entered promiscuous mode [ 32.702151][ T3098] veth0_macvtap: entered promiscuous mode executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local, {[@timestamp_addr={0x44, 0x4, 0x5}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x10000, 0x4) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) [ 32.719785][ T3118] veth1_macvtap: entered promiscuous mode [ 32.736504][ T3098] veth1_macvtap: entered promiscuous mode [ 32.751959][ T3118] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'veth0_vlan\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="540000001000010800"/20, @ANYRES32=r2, @ANYBLOB="000000000000000004001400300016802c000180280001"], 0x54}}, 0x0) [ 32.762490][ T3118] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.772351][ T3118] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.782854][ T3118] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.792778][ T3118] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.803259][ T3118] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007500000045000000080000fa95"], &(0x7f0000000140)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 32.812515][ T3250] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 32.815284][ T3118] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.831027][ T3118] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.841669][ T3118] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.851529][ T3118] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) socket$igmp(0x2, 0x3, 0x2) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f0000000640)=ANY=[@ANYBLOB="d80000000314010000000000000000000900020073797a3000000000080041007369770014003300636169663000000000000000000000000900020073"], 0xd8}}, 0x0) [ 32.861999][ T3118] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.871861][ T3118] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.882374][ T3118] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.895608][ T3118] batman_adv: batadv0: Interface activated: batadv_slave_1 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r1, 0x10d, 0xd4, 0x0, &(0x7f0000000000)) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r1, 0x10d, 0xd4, 0x0, &(0x7f0000000000)) [ 32.905456][ T3252] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 32.908507][ T3256] netlink: 148 bytes leftover after parsing attributes in process `syz-executor.0'. [ 32.927032][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.941158][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.951010][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 executing program 1: set_mempolicy(0x4005, &(0x7f0000000040)=0x1001, 0x4) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) mmap(&(0x7f0000bfd000/0x400000)=nil, 0x400000, 0x0, 0x12, r0, 0x0) [ 32.961448][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.971368][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.981808][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.991643][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.002139][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 0: set_mempolicy(0x4005, &(0x7f0000000040)=0x1001, 0x4) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) mmap(&(0x7f0000bfd000/0x400000)=nil, 0x400000, 0x0, 0x12, r0, 0x0) executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x60, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x0}]}]}, 0x60}}, 0x0) [ 33.014543][ T3098] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.024610][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.035133][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.045071][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.055558][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 1: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) executing program 0: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) [ 33.065377][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.075884][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.085756][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.096209][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.107552][ T3098] batman_adv: batadv0: Interface activated: batadv_slave_1 executing program 0: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r1, 0x10d, 0xd4, 0x0, &(0x7f0000000000)) [ 33.117026][ T3098] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.125741][ T3098] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.134602][ T3098] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.143438][ T3098] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.155521][ T3118] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 executing program 0: mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = syz_io_uring_setup(0x5169, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000240)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x42, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) executing program 1: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) [ 33.164356][ T3118] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.173354][ T3118] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.182079][ T3118] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff05000300000000000500030080ffffff0500030080ffffff0800020003"], 0x50}}, 0x0) executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x60, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x0}]}]}, 0x60}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001400)=@bloom_filter={0x1e, 0x0, 0xb, 0x7}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = syz_io_uring_setup(0x5169, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000240)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x42, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) executing program 0: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) executing program 3: mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = syz_io_uring_setup(0x5169, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000240)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x42, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) executing program 1: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, 0x0, &(0x7f0000000000)='syzkaller\x00'}, 0x90) r0 = syz_open_dev$evdev(&(0x7f0000000240), 0x20000, 0x0) ioctl$EVIOCGLED(r0, 0x80084504, &(0x7f0000000000)=""/56) executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r1, 0x10d, 0xd4, 0x0, &(0x7f0000000000)) executing program 3: set_mempolicy(0x4005, &(0x7f0000000040)=0x1001, 0x4) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) mmap(&(0x7f0000bfd000/0x400000)=nil, 0x400000, 0x0, 0x12, r0, 0x0) executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x1d, 0x2, 0x6) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0) executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x1d, 0x2, 0x6) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0) executing program 4: set_mempolicy(0x4005, &(0x7f0000000040)=0x1001, 0x4) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) mmap(&(0x7f0000bfd000/0x400000)=nil, 0x400000, 0x0, 0x12, r0, 0x0) executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x10000, 0x4) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x3, 0x0, 0x1800}, {}], 0x2, 0x0) r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}, {}], 0x2) semop(0x0, &(0x7f0000000280)=[{0x0, 0x0, 0x1800}, {}], 0x2) executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x60, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x0}]}]}, 0x60}}, 0x0) executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="03000000000000002400128009000100626f6e64000000001400028008001c001f674e"], 0x44}}, 0x0) executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x3, 0x0, 0x1800}, {}], 0x2, 0x0) r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}, {}], 0x2) semop(0x0, &(0x7f0000000280)=[{0x0, 0x0, 0x1800}, {}], 0x2) executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x10000, 0x4) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x1d, 0x2, 0x6) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0) executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x10000, 0x4) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) executing program 1: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) executing program 2: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) executing program 0: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x50, 0x10, 0x49920d862a92153b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x6}]}, 0x50}}, 0x0) executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x3, 0x0, 0x1800}, {}], 0x2, 0x0) r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}, {}], 0x2) semop(0x0, &(0x7f0000000280)=[{0x0, 0x0, 0x1800}, {}], 0x2) executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x3, 0x0, 0x1800}, {}], 0x2, 0x0) r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}, {}], 0x2) semop(0x0, &(0x7f0000000280)=[{0x0, 0x0, 0x1800}, {}], 0x2) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="03000000000000002400128009000100626f6e64000000001400028008001c001f674e"], 0x44}}, 0x0) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local, {[@timestamp_addr={0x44, 0x4, 0x5}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x3, 0x0, 0x1800}, {}], 0x2, 0x0) r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}, {}], 0x2) semop(0x0, &(0x7f0000000280)=[{0x0, 0x0, 0x1800}, {}], 0x2) executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x3, 0x0, 0x1800}, {}], 0x2, 0x0) r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}, {}], 0x2) semop(0x0, &(0x7f0000000280)=[{0x0, 0x0, 0x1800}, {}], 0x2) executing program 1: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x10000, 0x4) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) [ 33.640725][ T3335] syz-executor.3 (3335) used greatest stack depth: 10920 bytes left [ 33.667987][ T3340] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xae}]}, &(0x7f0000000100)='GPL\x00'}, 0x90) executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x10000, 0x4) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x50, 0x10, 0x49920d862a92153b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x6}]}, 0x50}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x3, 0x0, 0x1800}, {}], 0x2, 0x0) r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}, {}], 0x2) semop(0x0, &(0x7f0000000280)=[{0x0, 0x0, 0x1800}, {}], 0x2) executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x1d, 0x2, 0x6) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0) executing program 4: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x10000, 0x4) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x10000, 0x4) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x50, 0x10, 0x49920d862a92153b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x6}]}, 0x50}}, 0x0) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local, {[@timestamp_addr={0x44, 0x4, 0x5}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x11900}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6256, 0x0, 0x0, 0x0, 0x0) [ 34.011363][ T3392] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local, {[@timestamp_addr={0x44, 0x4, 0x5}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) [ 34.093696][ T28] kauditd_printk_skb: 50 callbacks suppressed [ 34.093796][ T28] audit: type=1400 audit(1714408980.445:144): avc: denied { create } for pid=3399 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x11900}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6256, 0x0, 0x0, 0x0, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) [ 34.135661][ T3405] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) [ 34.194537][ T28] audit: type=1400 audit(1714408980.485:145): avc: denied { listen } for pid=3399 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 34.214252][ T28] audit: type=1400 audit(1714408980.505:146): avc: denied { open } for pid=3399 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007500000045000000080000fa95"], &(0x7f0000000140)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) [ 34.233881][ T28] audit: type=1400 audit(1714408980.505:147): avc: denied { kernel } for pid=3399 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000400)='./file7\x00', 0x21c0, 0x103) renameat2(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000480)='./file7\x00', 0x0) executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x11900}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6256, 0x0, 0x0, 0x0, 0x0) executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) socket$igmp(0x2, 0x3, 0x2) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f0000000640)=ANY=[@ANYBLOB="d80000000314010000000000000000000900020073797a3000000000080041007369770014003300636169663000000000000000000000000900020073"], 0xd8}}, 0x0) executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) socket$igmp(0x2, 0x3, 0x2) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f0000000640)=ANY=[@ANYBLOB="d80000000314010000000000000000000900020073797a3000000000080041007369770014003300636169663000000000000000000000000900020073"], 0xd8}}, 0x0) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) [ 34.370616][ T28] audit: type=1400 audit(1714408980.725:148): avc: denied { create } for pid=3425 comm="syz-executor.4" name="file7" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=chr_file permissive=1 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'veth0_vlan\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="540000001000010800"/20, @ANYRES32=r2, @ANYBLOB="000000000000000004001400300016802c000180280001"], 0x54}}, 0x0) executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007500000045000000080000fa95"], &(0x7f0000000140)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000400)='./file7\x00', 0x21c0, 0x103) renameat2(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000480)='./file7\x00', 0x0) [ 34.430631][ T3432] netlink: 148 bytes leftover after parsing attributes in process `syz-executor.2'. [ 34.441041][ T28] audit: type=1400 audit(1714408980.755:149): avc: denied { execute } for pid=3427 comm="syz-executor.1" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) [ 34.465878][ T28] audit: type=1400 audit(1714408980.765:150): avc: denied { unlink } for pid=3425 comm="syz-executor.4" name="file7" dev="sda1" ino=1961 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=chr_file permissive=1 [ 34.503068][ T3441] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 34.519928][ T3435] netlink: 148 bytes leftover after parsing attributes in process `syz-executor.1'. executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x11900}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6256, 0x0, 0x0, 0x0, 0x0) executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) socket$igmp(0x2, 0x3, 0x2) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f0000000640)=ANY=[@ANYBLOB="d80000000314010000000000000000000900020073797a3000000000080041007369770014003300636169663000000000000000000000000900020073"], 0xd8}}, 0x0) executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x11900}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6256, 0x0, 0x0, 0x0, 0x0) executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) socket$igmp(0x2, 0x3, 0x2) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f0000000640)=ANY=[@ANYBLOB="d80000000314010000000000000000000900020073797a3000000000080041007369770014003300636169663000000000000000000000000900020073"], 0xd8}}, 0x0) executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0/..\x00', &(0x7f0000000240)={0x410e01, 0x0, 0x8}, 0x18) [ 34.618288][ T3456] netlink: 148 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x11900}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6256, 0x0, 0x0, 0x0, 0x0) executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x11900}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6256, 0x0, 0x0, 0x0, 0x0) [ 34.666451][ T28] audit: type=1400 audit(1714408981.025:151): avc: denied { create } for pid=3458 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 34.672577][ T3463] netlink: 148 bytes leftover after parsing attributes in process `syz-executor.3'. executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'veth0_vlan\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="540000001000010800"/20, @ANYRES32=r2, @ANYBLOB="000000000000000004001400300016802c000180280001"], 0x54}}, 0x0) executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x11900}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6256, 0x0, 0x0, 0x0, 0x0) executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0/..\x00', &(0x7f0000000240)={0x410e01, 0x0, 0x8}, 0x18) [ 34.733053][ T28] audit: type=1400 audit(1714408981.045:152): avc: denied { connect } for pid=3458 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 34.752956][ T28] audit: type=1400 audit(1714408981.045:153): avc: denied { name_connect } for pid=3458 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000003ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='block_bio_remap\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000540)={@link_local, @link_local, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x11}, {}, {0x8, 0x88be, 0x81000000}}}}}}, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000003ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='block_bio_remap\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) [ 34.803963][ T3471] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001400)=@bloom_filter={0x1e, 0x0, 0xb, 0x7}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x17, 0x0, 0x7, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000013c0)={r0, 0x0, &(0x7f00000003c0), 0x1}, 0x20) executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff05000300000000000500030080ffffff0500030080ffffff0800020003"], 0x50}}, 0x0) executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff05000300000000000500030080ffffff0500030080ffffff0800020003"], 0x50}}, 0x0) executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0/..\x00', &(0x7f0000000240)={0x410e01, 0x0, 0x8}, 0x18) executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0/..\x00', &(0x7f0000000240)={0x410e01, 0x0, 0x8}, 0x18) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001400)=@bloom_filter={0x1e, 0x0, 0xb, 0x7}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'veth0_vlan\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="540000001000010800"/20, @ANYRES32=r2, @ANYBLOB="000000000000000004001400300016802c000180280001"], 0x54}}, 0x0) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000003ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='block_bio_remap\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) executing program 3: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0/..\x00', &(0x7f0000000240)={0x410e01, 0x0, 0x8}, 0x18) executing program 4: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) [ 35.030971][ T3501] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. executing program 0: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0/..\x00', &(0x7f0000000240)={0x410e01, 0x0, 0x8}, 0x18) [ 35.102276][ T3509] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 35.111718][ T3509] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.4'. [ 35.128572][ T3509] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000003ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='block_bio_remap\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff05000300000000000500030080ffffff0500030080ffffff0800020003"], 0x50}}, 0x0) executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) [ 35.162781][ T3513] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 35.172284][ T3513] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.0'. executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000003ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='block_bio_remap\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) executing program 0: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff05000300000000000500030080ffffff0500030080ffffff0800020003"], 0x50}}, 0x0) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000003ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='block_bio_remap\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) [ 35.274508][ T3526] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff05000300000000000500030080ffffff0500030080ffffff0800020003"], 0x50}}, 0x0) executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 0: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 4: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) [ 35.315959][ T3526] MD5 Hash not found for [fe80::bb].0->[fe80::aa].20002 [S]L3 index 0 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff05000300000000000500030080ffffff0500030080ffffff0800020003"], 0x50}}, 0x0) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 2: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) [ 35.490200][ T3552] MD5 Hash not found for [fe80::bb].0->[fe80::aa].20002 [S]L3 index 0 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 2: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 2: semget$private(0x0, 0x207, 0x0) semtimedop(0x0, &(0x7f00000002c0)=[{}, {0x0, 0xff78}], 0x2, 0x0) semop(0x0, &(0x7f0000000280)=[{0x3, 0x9cb2}, {}], 0x2) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000020c0), 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000020c0), 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) executing program 3: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000140)={[{}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x84}}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x7}}, {@lazytime}, {@jqfmt_vfsold}, {@usrquota}, {@data_err_abort}, {@debug}]}, 0x1, 0x5ef, &(0x7f0000000600)="$eJzs3c9vVFUbAOD3TqelpXxfCzEqLmQSYyBRWlrANMYFbA1p8EfcuLHSgkiBhtZo0YSS4MbEuDHGxJUL8b9QIltWunLhQleGhKhhaeKYmd5bOu2dlg5tL3KfJxl67zlz55zL9O0598w5dwIorVrjn0rE3oiYSSIGkoWlvGqkmbXF593966NTjUcS9fprfySRpGnZ85P0Z396cG9E/PhDEnu6Vpc7O3/53MT09NSldH947vzM8Oz85YNnz0+cmTozdWH0hdGxahwdGznU0XldyUk7ce3d9wc+GX/zm6/+Tka+/WU8iWPxcvrE5eexWWpRa/6fJKuz+sc2u7CCdKW/J8vf4qRaYIXYkOz9646IJ2IguuLemzcQH79SaOWALVVPIupASSXiH0oq6wdk1/Yrr4MrhfRKgO1w5/jiAMDq+K8ujg1Gb3NsYOfdJJYP6yQR0dnIXKtdEXHr5vi10zfHr8UWjcMB+RauRsSTefGfNON/MHpjsBn/lZb4b/QLTqY/G+mvdlj+yqFi8Q/bZzH+e9eM/2gT/28ti/+3Oyy/dm/znb6W+O/r9JQAAAAAAACgtG4cj4jn8z7/ryzN/4mc+T/9EXFsE8qvrdhf/fl/5fYmFAPkuHM84qXc+b+VbPbvYFe69b/mfIDu5PTZ6alDEfH/iDgQ3Tsa+yNrlHHw0z1ftsurpfP/skej/FvpXMC0HrerO1qPmZyYm3jQ8wYi7lyNeCp3/m+y1P4nOe1/4+/BzH2WsefZ6yfb5a0f/8BWqX8dsT+3/b9314qk3f05jh45OjZyaLjZHxjOegWrPf3hZ9+1K7/T+HeLCXhwjfZ/59rxP5gsv1/P7MbLODxfrbfL67T/35O83rzlTE+a9sHE3NylkYie5ERXI7UlfXTjdYZHURYPWbw04v/AM2uP/+X1//siYmHFayd/tq4pzjz+T/9v7eqj/w/FacT/5Iba/41vjF4f/D57sWMrboZ3f+3/kWZbfyBNMf4Hi77I4qmnNT0nHKt5WdtdXwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FFQiYlcklaGl7UplaCiiPyIei52V6Yuzc8+dvvjehclGXvP7/yvZN/0OLO4n2ff/Dy7bH12xfzgidkfE5119zf2hUxenJ4s+eQAAAAAAAAAAAAAAAAAAAHhI9K9e//9rf5r3e1fBlQO2XrXoCgCFyYn/n4qoB7D9tP9QXuIfykv8Q3mJfygv8Q/lJf6hvMQ/lJf4BwAAAACAR8rufTd+TiJi4cW+5qOhJ83rLrRmwFarFF0BoDBu8QPlZeoPlJdrfCBZJ7+37UHrHbmWmVMPcDAAAAAAAAAAAAAAlM7+vdb/Q1lZ/w/lZf0/lFe2/n9fwfUAtp9rfCDWWcmfu/5/3aMAAAAAAAAAAAAAgM00O3/53MT09NQlG28UWnolIjbjdWobeXK9Xr/S+C14WN6C//hGNhX+YanPio1srd/9HVXc3yQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKDVvwEAAP//BJwjLw==") perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xd3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000140)={[{}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x84}}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x7}}, {@lazytime}, {@jqfmt_vfsold}, {@usrquota}, {@data_err_abort}, {@debug}]}, 0x1, 0x5ef, &(0x7f0000000600)="$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") perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xd3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x4b, 0x0, &(0x7f00000004c0)) [ 35.720659][ T3587] loop3: detected capacity change from 0 to 1024 [ 35.724018][ T3586] loop1: detected capacity change from 0 to 1024 [ 35.734452][ T3587] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 35.736377][ T3586] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 35.754727][ T3587] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=f04cc01c, mo2=0002] [ 35.760354][ T3586] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=f04cc01c, mo2=0002] executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = dup2(r0, r1) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$P9_RGETLOCK(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="668f9c"], 0x2c) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = dup2(r0, r1) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$P9_RGETLOCK(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="668f9c"], 0x2c) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) [ 35.771195][ T3586] System zones: 0-1, 3-36 [ 35.776023][ T3587] System zones: 0-1, 3-36 [ 35.783091][ T3586] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.783990][ T3587] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = dup2(r0, r1) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$P9_RGETLOCK(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="668f9c"], 0x2c) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@newqdisc={0x34, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x3}}}, 0x24}}, 0x0) executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000020c0), 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) [ 35.864607][ T3102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.884386][ T3098] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@newqdisc={0x34, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x3}}}, 0x24}}, 0x0) executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@newqdisc={0x34, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x3}}}, 0x24}}, 0x0) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@newqdisc={0x34, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x3}}}, 0x24}}, 0x0) executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000140)={[{}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x84}}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x7}}, {@lazytime}, {@jqfmt_vfsold}, {@usrquota}, {@data_err_abort}, {@debug}]}, 0x1, 0x5ef, &(0x7f0000000600)="$eJzs3c9vVFUbAOD3TqelpXxfCzEqLmQSYyBRWlrANMYFbA1p8EfcuLHSgkiBhtZo0YSS4MbEuDHGxJUL8b9QIltWunLhQleGhKhhaeKYmd5bOu2dlg5tL3KfJxl67zlz55zL9O0598w5dwIorVrjn0rE3oiYSSIGkoWlvGqkmbXF593966NTjUcS9fprfySRpGnZ85P0Z396cG9E/PhDEnu6Vpc7O3/53MT09NSldH947vzM8Oz85YNnz0+cmTozdWH0hdGxahwdGznU0XldyUk7ce3d9wc+GX/zm6/+Tka+/WU8iWPxcvrE5eexWWpRa/6fJKuz+sc2u7CCdKW/J8vf4qRaYIXYkOz9646IJ2IguuLemzcQH79SaOWALVVPIupASSXiH0oq6wdk1/Yrr4MrhfRKgO1w5/jiAMDq+K8ujg1Gb3NsYOfdJJYP6yQR0dnIXKtdEXHr5vi10zfHr8UWjcMB+RauRsSTefGfNON/MHpjsBn/lZb4b/QLTqY/G+mvdlj+yqFi8Q/bZzH+e9eM/2gT/28ti/+3Oyy/dm/znb6W+O/r9JQAAAAAAACgtG4cj4jn8z7/ryzN/4mc+T/9EXFsE8qvrdhf/fl/5fYmFAPkuHM84qXc+b+VbPbvYFe69b/mfIDu5PTZ6alDEfH/iDgQ3Tsa+yNrlHHw0z1ftsurpfP/skej/FvpXMC0HrerO1qPmZyYm3jQ8wYi7lyNeCp3/m+y1P4nOe1/4+/BzH2WsefZ6yfb5a0f/8BWqX8dsT+3/b9314qk3f05jh45OjZyaLjZHxjOegWrPf3hZ9+1K7/T+HeLCXhwjfZ/59rxP5gsv1/P7MbLODxfrbfL67T/35O83rzlTE+a9sHE3NylkYie5ERXI7UlfXTjdYZHURYPWbw04v/AM2uP/+X1//siYmHFayd/tq4pzjz+T/9v7eqj/w/FacT/5Iba/41vjF4f/D57sWMrboZ3f+3/kWZbfyBNMf4Hi77I4qmnNT0nHKt5WdtdXwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FFQiYlcklaGl7UplaCiiPyIei52V6Yuzc8+dvvjehclGXvP7/yvZN/0OLO4n2ff/Dy7bH12xfzgidkfE5119zf2hUxenJ4s+eQAAAAAAAAAAAAAAAAAAAHhI9K9e//9rf5r3e1fBlQO2XrXoCgCFyYn/n4qoB7D9tP9QXuIfykv8Q3mJfygv8Q/lJf6hvMQ/lJf4BwAAAACAR8rufTd+TiJi4cW+5qOhJ83rLrRmwFarFF0BoDBu8QPlZeoPlJdrfCBZJ7+37UHrHbmWmVMPcDAAAAAAAAAAAAAAlM7+vdb/Q1lZ/w/lZf0/lFe2/n9fwfUAtp9rfCDWWcmfu/5/3aMAAAAAAAAAAAAAgM00O3/53MT09NQlG28UWnolIjbjdWobeXK9Xr/S+C14WN6C//hGNhX+YanPio1srd/9HVXc3yQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKDVvwEAAP//BJwjLw==") perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xd3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@newqdisc={0x34, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x3}}}, 0x24}}, 0x0) executing program 3: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 0: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) [ 36.040750][ T3618] loop1: detected capacity change from 0 to 1024 [ 36.073917][ T3618] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = dup2(r0, r1) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$P9_RGETLOCK(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="668f9c"], 0x2c) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) [ 36.085025][ T3618] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=f04cc01c, mo2=0002] [ 36.093407][ T3618] System zones: 0-1, 3-36 [ 36.100403][ T3618] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@newqdisc={0x34, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x3}}}, 0x24}}, 0x0) executing program 4: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) [ 36.167584][ T3102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.181095][ C1] hrtimer: interrupt took 17121 ns executing program 1: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 2: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = dup2(r0, r1) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$P9_RGETLOCK(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="668f9c"], 0x2c) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) [ 36.649153][ T3633] syz-executor.4 (3633) used greatest stack depth: 10784 bytes left executing program 0: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 3: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000140)={[{}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x84}}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x7}}, {@lazytime}, {@jqfmt_vfsold}, {@usrquota}, {@data_err_abort}, {@debug}]}, 0x1, 0x5ef, &(0x7f0000000600)="$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") perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xd3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) executing program 4: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) [ 36.878958][ T3648] loop3: detected capacity change from 0 to 1024 executing program 1: semget$private(0x0, 0x207, 0x0) semtimedop(0x0, &(0x7f00000002c0)=[{}, {0x0, 0xff78}], 0x2, 0x0) semop(0x0, &(0x7f0000000280)=[{0x3, 0x9cb2}, {}], 0x2) [ 36.926840][ T3648] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 36.968353][ T3648] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=f04cc01c, mo2=0002] [ 36.996734][ T3648] System zones: 0-1, 3-36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x34, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x12, 0x0, @opaque='\x00'/10}}}}}, 0x0) recvfrom(r0, &(0x7f00000000c0)=""/10, 0xa, 0x0, 0x0, 0x0) [ 37.016424][ T3648] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x10132) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}], 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000100)=0xffff, 0x4) recvmmsg(r1, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x0, 0x0) executing program 2: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) [ 37.112684][ T3098] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 3: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x13, &(0x7f00000009c0)=@framed={{0x18, 0x2}, [@printk={@p, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x1, 0xa, 0x7}, {}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, @printk={@p, {0x3, 0x0, 0x6, 0xa, 0x1, 0xfff8, 0xe1}, {0x5}, {}, {}, {}, {0x85, 0x0, 0x0, 0x5}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 4: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 0: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACSEC_INC_SCI={0x5, 0x9, 0x1}, @IFLA_MACSEC_ES={0x5, 0xa, 0x1}]}}}]}, 0x44}}, 0x0) executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x34, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x12, 0x0, @opaque='\x00'/10}}}}}, 0x0) recvfrom(r0, &(0x7f00000000c0)=""/10, 0xa, 0x0, 0x0, 0x0) [ 37.746387][ T3672] ================================================================== [ 37.754500][ T3672] BUG: KCSAN: data-race in pcpu_alloc / pcpu_block_update_hint_alloc [ 37.762599][ T3672] [ 37.764926][ T3672] read-write to 0xffffffff884054dc of 4 bytes by task 3673 on cpu 0: [ 37.773001][ T3672] pcpu_block_update_hint_alloc+0x5db/0x6a0 [ 37.778913][ T3672] pcpu_alloc_area+0x49f/0x4d0 [ 37.783692][ T3672] pcpu_alloc+0x4b3/0x10d0 [ 37.788152][ T3672] __alloc_percpu_gfp+0x26/0x30 [ 37.793023][ T3672] bpf_map_alloc_percpu+0xab/0x200 [ 37.798153][ T3672] prealloc_init+0x19f/0x470 [ 37.802758][ T3672] htab_map_alloc+0x637/0x8f0 [ 37.807458][ T3672] map_create+0x83c/0xb90 [ 37.811804][ T3672] __sys_bpf+0x667/0x7a0 [ 37.816073][ T3672] __x64_sys_bpf+0x43/0x50 [ 37.820543][ T3672] x64_sys_call+0x86c/0x2d30 [ 37.825153][ T3672] do_syscall_64+0xcd/0x1d0 [ 37.829675][ T3672] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.835602][ T3672] [ 37.837932][ T3672] read to 0xffffffff884054dc of 4 bytes by task 3672 on cpu 1: [ 37.845485][ T3672] pcpu_alloc+0x9aa/0x10d0 [ 37.849939][ T3672] __alloc_percpu_gfp+0x26/0x30 [ 37.854804][ T3672] bpf_map_alloc_percpu+0xab/0x200 [ 37.859927][ T3672] prealloc_init+0x19f/0x470 [ 37.864530][ T3672] htab_map_alloc+0x637/0x8f0 [ 37.869227][ T3672] map_create+0x83c/0xb90 [ 37.873571][ T3672] __sys_bpf+0x667/0x7a0 [ 37.877842][ T3672] __x64_sys_bpf+0x43/0x50 [ 37.882281][ T3672] x64_sys_call+0x86c/0x2d30 [ 37.886887][ T3672] do_syscall_64+0xcd/0x1d0 [ 37.891410][ T3672] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.897321][ T3672] [ 37.899645][ T3672] value changed: 0x00000002 -> 0xfffffffa [ 37.905364][ T3672] [ 37.907690][ T3672] Reported by Kernel Concurrency Sanitizer on: [ 37.913840][ T3672] CPU: 1 PID: 3672 Comm: syz-executor.4 Not tainted 6.9.0-rc6-syzkaller-00005-gb947cc5bf6d7 #0 [ 37.924168][ T3672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 37.935007][ T3672] ================================================================== [ 38.887322][ T3712] loop0: detected capacity change from 0 to 2048 [ 38.947870][ T3712] loop0: p1 p2 p3 [ 38.973309][ T2785] loop0: p1 p2 p3 [ 39.060690][ T3087] udevd[3087]: inotify_add_watch(7, /dev/loop0p1, 10) failed: No such file or directory [ 39.063356][ T3084] udevd[3084]: inotify_add_watch(7, /dev/loop0p2, 10) failed: No such file or directory [ 39.072545][ T3303] udevd[3303]: inotify_add_watch(7, /dev/loop0p3, 10) failed: No such file or directory [ 39.132221][ T3727] loop0: detected capacity change from 0 to 1024 [ 39.141196][ T3727] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 39.202684][ T3727] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 39.232763][ T28] kauditd_printk_skb: 15 callbacks suppressed [ 39.232776][ T28] audit: type=1400 audit(1714408985.585:169): avc: denied { read } for pid=3731 comm="syz-executor.2" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 39.267865][ T28] audit: type=1400 audit(1714408985.605:170): avc: denied { open } for pid=3731 comm="syz-executor.2" path="/dev/cpu/0/msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 39.268684][ T3734] loop4: detected capacity change from 0 to 512 [ 39.306517][ T3095] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.365672][ T3737] loop2: detected capacity change from 0 to 2048 [ 39.374279][ T3734] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 39.391772][ T3734] ext4 filesystem being mounted at /root/syzkaller-testdir2472006226/syzkaller.DWVire/44/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 39.415302][ T3734] EXT4-fs error (device loop4): ext4_do_update_inode:5082: inode #2: comm syz-executor.4: corrupted inode contents [ 39.438943][ T3734] EXT4-fs error (device loop4): ext4_dirty_inode:5942: inode #2: comm syz-executor.4: mark_inode_dirty error [ 39.461594][ T3737] loop2: p1 p2 p3 [ 39.479316][ T3734] EXT4-fs error (device loop4): ext4_do_update_inode:5082: inode #2: comm syz-executor.4: corrupted inode contents [ 39.511575][ T3734] EXT4-fs error (device loop4): __ext4_ext_dirty:202: inode #2: comm syz-executor.4: mark_inode_dirty error [ 39.532256][ T2785] loop2: p1 p2 p3 [ 39.570156][ T28] audit: type=1400 audit(1714408985.925:171): avc: denied { setopt } for pid=3742 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.578332][ T3087] udevd[3087]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 39.622236][ T3303] udevd[3303]: inotify_add_watch(7, /dev/loop2p3, 10) failed: No such file or directory [ 39.643772][ T3084] udevd[3084]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory [ 39.676879][ T28] audit: type=1400 audit(1714408985.955:172): avc: denied { create } for pid=3732 comm="syz-executor.4" name=131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D338 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 39.682745][ T3118] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.710203][ T28] audit: type=1400 audit(1714408985.955:173): avc: denied { write } for pid=3732 comm="syz-executor.4" name=131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D338 dev="loop4" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 39.753856][ T28] audit: type=1400 audit(1714408985.965:174): avc: denied { add_name } for pid=3732 comm="syz-executor.4" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 39.774671][ T28] audit: type=1400 audit(1714408985.965:175): avc: denied { create } for pid=3732 comm="syz-executor.4" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=lnk_file permissive=1 [ 39.780253][ T3084] udevd[3084]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory [ 39.802906][ T3755] loop0: detected capacity change from 0 to 1024 [ 39.810011][ T3087] udevd[3087]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 39.827110][ T3747] udevd[3747]: inotify_add_watch(7, /dev/loop2p3, 10) failed: No such file or directory [ 39.832349][ T3755] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 39.865203][ T3764] loop1: detected capacity change from 0 to 1024 [ 39.883889][ T3764] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 39.914082][ T3764] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 39.939224][ T3095] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.961857][ T3102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.055081][ T3779] loop2: detected capacity change from 0 to 1024 [ 40.083989][ T3779] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 40.101984][ T3790] loop0: detected capacity change from 0 to 1024 [ 40.111461][ T3779] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.130739][ T3790] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.175579][ T3105] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.264879][ T3095] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.270004][ T3804] loop1: detected capacity change from 0 to 512 [ 40.288578][ T3804] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.301189][ T3804] ext4 filesystem being mounted at /root/syzkaller-testdir2173761665/syzkaller.HNadUT/54/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 40.333892][ T3804] EXT4-fs error (device loop1): ext4_do_update_inode:5082: inode #2: comm syz-executor.1: corrupted inode contents [ 40.338917][ T3813] loop0: detected capacity change from 0 to 512 [ 40.354611][ T3804] EXT4-fs error (device loop1): ext4_dirty_inode:5942: inode #2: comm syz-executor.1: mark_inode_dirty error [ 40.370370][ T3804] EXT4-fs error (device loop1): ext4_do_update_inode:5082: inode #2: comm syz-executor.1: corrupted inode contents [ 40.384065][ T3804] EXT4-fs error (device loop1): __ext4_ext_dirty:202: inode #2: comm syz-executor.1: mark_inode_dirty error [ 40.401150][ T3813] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.413912][ T3813] ext4 filesystem being mounted at /root/syzkaller-testdir2546531777/syzkaller.lwaQ7y/61/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 40.452468][ T3102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.490831][ T3813] EXT4-fs error (device loop0): ext4_do_update_inode:5082: inode #2: comm syz-executor.0: corrupted inode contents [ 40.513551][ T3813] EXT4-fs error (device loop0): ext4_dirty_inode:5942: inode #2: comm syz-executor.0: mark_inode_dirty error [ 40.530644][ T3813] EXT4-fs error (device loop0): ext4_do_update_inode:5082: inode #2: comm syz-executor.0: corrupted inode contents [ 40.553699][ T3813] EXT4-fs error (device loop0): __ext4_ext_dirty:202: inode #2: comm syz-executor.0: mark_inode_dirty error [ 40.595335][ T3095] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.596330][ T3834] loop4: detected capacity change from 0 to 512 [ 40.619848][ T3834] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.644929][ T3834] ext4 filesystem being mounted at /root/syzkaller-testdir2472006226/syzkaller.DWVire/51/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 40.684737][ T28] audit: type=1400 audit(1714408987.035:176): avc: denied { create } for pid=3841 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 40.724065][ T3834] EXT4-fs error (device loop4): ext4_do_update_inode:5082: inode #2: comm syz-executor.4: corrupted inode contents [ 40.747762][ T3850] loop1: detected capacity change from 0 to 512 [ 40.798621][ T3850] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.814976][ T3834] EXT4-fs error (device loop4): ext4_dirty_inode:5942: inode #2: comm syz-executor.4: mark_inode_dirty error [ 40.822164][ T3850] ext4 filesystem being mounted at /root/syzkaller-testdir2173761665/syzkaller.HNadUT/58/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 40.854283][ T3850] EXT4-fs error (device loop1): ext4_do_update_inode:5082: inode #2: comm syz-executor.1: corrupted inode contents [ 40.878668][ T3850] EXT4-fs error (device loop1): ext4_dirty_inode:5942: inode #2: comm syz-executor.1: mark_inode_dirty error [ 40.891474][ T3834] EXT4-fs error (device loop4): ext4_do_update_inode:5082: inode #2: comm syz-executor.4: corrupted inode contents [ 40.897289][ T3850] EXT4-fs error (device loop1): ext4_do_update_inode:5082: inode #2: comm syz-executor.1: corrupted inode contents [ 40.918862][ T3867] loop2: detected capacity change from 0 to 512 [ 40.920759][ T3850] EXT4-fs error (device loop1): __ext4_ext_dirty:202: inode #2: comm syz-executor.1: mark_inode_dirty error [ 40.942296][ T3834] EXT4-fs error (device loop4): __ext4_ext_dirty:202: inode #2: comm syz-executor.4: mark_inode_dirty error [ 40.982984][ T3102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.003119][ T3867] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.026410][ T3867] ext4 filesystem being mounted at /root/syzkaller-testdir2318092420/syzkaller.Nrn1DF/49/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 41.058555][ T3867] EXT4-fs error (device loop2): ext4_do_update_inode:5082: inode #2: comm syz-executor.2: corrupted inode contents [ 41.059090][ T3118] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.089904][ T3867] EXT4-fs error (device loop2): ext4_dirty_inode:5942: inode #2: comm syz-executor.2: mark_inode_dirty error [ 41.103962][ T3867] EXT4-fs error (device loop2): ext4_do_update_inode:5082: inode #2: comm syz-executor.2: corrupted inode contents [ 41.131077][ T3867] EXT4-fs error (device loop2): __ext4_ext_dirty:202: inode #2: comm syz-executor.2: mark_inode_dirty error [ 41.153497][ T3105] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.186557][ T3884] loop1: detected capacity change from 0 to 512 [ 41.194890][ T3885] loop4: detected capacity change from 0 to 512 [ 41.239421][ T3885] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.244082][ T3884] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.266859][ T3884] ext4 filesystem being mounted at /root/syzkaller-testdir2173761665/syzkaller.HNadUT/59/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 41.281618][ T3885] ext4 filesystem being mounted at /root/syzkaller-testdir2472006226/syzkaller.DWVire/52/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 41.305251][ T3900] loop0: detected capacity change from 0 to 512 [ 41.324927][ T3885] EXT4-fs error (device loop4): ext4_do_update_inode:5082: inode #2: comm syz-executor.4: corrupted inode contents [ 41.332418][ T3884] EXT4-fs error (device loop1): ext4_do_update_inode:5082: inode #2: comm syz-executor.1: corrupted inode contents [ 41.352052][ T3884] EXT4-fs error (device loop1): ext4_dirty_inode:5942: inode #2: comm syz-executor.1: mark_inode_dirty error [ 41.365165][ T3900] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.367044][ T3884] EXT4-fs error (device loop1): ext4_do_update_inode:5082: inode #2: comm syz-executor.1: corrupted inode contents [ 41.390270][ T3900] ext4 filesystem being mounted at /root/syzkaller-testdir2546531777/syzkaller.lwaQ7y/71/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 41.400743][ T3885] EXT4-fs error (device loop4): ext4_dirty_inode:5942: inode #2: comm syz-executor.4: mark_inode_dirty error [ 41.405028][ T3884] EXT4-fs error (device loop1): __ext4_ext_dirty:202: inode #2: comm syz-executor.1: mark_inode_dirty error [ 41.431687][ T3885] EXT4-fs error (device loop4): ext4_do_update_inode:5082: inode #2: comm syz-executor.4: corrupted inode contents [ 41.461696][ T3900] EXT4-fs error (device loop0): ext4_do_update_inode:5082: inode #2: comm syz-executor.0: corrupted inode contents [ 41.474840][ T3885] EXT4-fs error (device loop4): __ext4_ext_dirty:202: inode #2: comm syz-executor.4: mark_inode_dirty error [ 41.474975][ T3900] EXT4-fs error (device loop0): ext4_dirty_inode:5942: inode #2: comm syz-executor.0: mark_inode_dirty error [ 41.507964][ T3900] EXT4-fs error (device loop0): ext4_do_update_inode:5082: inode #2: comm syz-executor.0: corrupted inode contents [ 41.521473][ T3102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.521810][ T3900] EXT4-fs error (device loop0): __ext4_ext_dirty:202: inode #2: comm syz-executor.0: mark_inode_dirty error [ 41.558818][ T3885] syz-executor.4 (3885) used greatest stack depth: 10320 bytes left [ 41.581905][ T3118] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.582419][ T3095] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.784130][ T28] audit: type=1400 audit(1714408988.135:177): avc: denied { setopt } for pid=3933 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 41.864695][ T28] audit: type=1400 audit(1714408988.215:178): avc: denied { create } for pid=3941 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 41.968746][ T3957] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 42.206507][ T3989] loop1: detected capacity change from 0 to 512 [ 42.221538][ T3989] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 42.232024][ T3989] EXT4-fs (loop1): orphan cleanup on readonly fs [ 42.238921][ T3990] loop3: detected capacity change from 0 to 2048 [ 42.239807][ T3989] EXT4-fs warning (device loop1): ext4_enable_quotas:7104: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 42.266053][ T3989] EXT4-fs (loop1): Cannot turn on quotas: error -117 [ 42.281123][ T3989] EXT4-fs error (device loop1): ext4_orphan_get:1394: inode #16: comm syz-executor.1: casefold flag without casefold feature [ 42.302610][ T3989] EXT4-fs error (device loop1): ext4_orphan_get:1399: comm syz-executor.1: couldn't read orphan inode 16 (err -117) [ 42.323084][ T3989] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 42.326210][ T3990] loop3: p1 p2 p3 [ 42.364903][ T4001] loop0: detected capacity change from 0 to 512 [ 42.420119][ T4001] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 42.428250][ T4005] loop4: detected capacity change from 0 to 512 [ 42.438898][ T4005] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 42.455210][ T4005] EXT4-fs (loop4): orphan cleanup on readonly fs [ 42.462130][ T4005] EXT4-fs warning (device loop4): ext4_enable_quotas:7104: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 42.468139][ T4001] EXT4-fs (loop0): orphan cleanup on readonly fs [ 42.489206][ T3102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.498361][ T4005] EXT4-fs (loop4): Cannot turn on quotas: error -117 [ 42.506284][ T4001] EXT4-fs warning (device loop0): ext4_enable_quotas:7104: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 42.521498][ T4001] EXT4-fs (loop0): Cannot turn on quotas: error -117 [ 42.521528][ T4005] EXT4-fs error (device loop4): ext4_orphan_get:1394: inode #16: comm syz-executor.4: casefold flag without casefold feature [ 42.531895][ T4001] EXT4-fs error (device loop0): ext4_orphan_get:1394: inode #16: comm syz-executor.0: casefold flag without casefold feature [ 42.564668][ T4001] EXT4-fs error (device loop0): ext4_orphan_get:1399: comm syz-executor.0: couldn't read orphan inode 16 (err -117) [ 42.569240][ T4005] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 16 (err -117) [ 42.589514][ T4001] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 42.617176][ T4005] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 42.737434][ T3095] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.778630][ T4037] loop2: detected capacity change from 0 to 512 [ 42.799140][ T3118] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.802749][ T4039] loop1: detected capacity change from 0 to 2048 [ 42.823311][ T4037] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 42.851306][ T4037] EXT4-fs (loop2): orphan cleanup on readonly fs [ 42.859201][ T4037] EXT4-fs warning (device loop2): ext4_enable_quotas:7104: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 42.894225][ T4037] EXT4-fs (loop2): Cannot turn on quotas: error -117 [ 42.895326][ T4039] loop1: p1 p2 p3 [ 42.902196][ T4037] EXT4-fs error (device loop2): ext4_orphan_get:1394: inode #16: comm syz-executor.2: casefold flag without casefold feature [ 42.926644][ T4037] EXT4-fs error (device loop2): ext4_orphan_get:1399: comm syz-executor.2: couldn't read orphan inode 16 (err -117) [ 42.928713][ T4051] loop0: detected capacity change from 0 to 512 [ 42.943156][ T4037] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 42.968421][ T2785] loop1: p1 p2 p3 [ 42.977488][ T4051] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 43.011331][ T4051] EXT4-fs (loop0): orphan cleanup on readonly fs [ 43.022227][ T4051] EXT4-fs warning (device loop0): ext4_enable_quotas:7104: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 43.040274][ T3105] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.060017][ T4051] EXT4-fs (loop0): Cannot turn on quotas: error -117 [ 43.071545][ T4051] EXT4-fs error (device loop0): ext4_orphan_get:1394: inode #16: comm syz-executor.0: casefold flag without casefold feature [ 43.087202][ T4051] EXT4-fs error (device loop0): ext4_orphan_get:1399: comm syz-executor.0: couldn't read orphan inode 16 (err -117) [ 43.109515][ T4051] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 43.160223][ T4064] loop2: detected capacity change from 0 to 512 [ 43.188106][ T3095] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.208559][ T4064] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 43.236976][ T4064] EXT4-fs (loop2): orphan cleanup on readonly fs [ 43.252246][ T4064] EXT4-fs warning (device loop2): ext4_enable_quotas:7104: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 43.297017][ T4064] EXT4-fs (loop2): Cannot turn on quotas: error -117 [ 43.310862][ T4081] loop0: detected capacity change from 0 to 512 [ 43.319436][ T4064] EXT4-fs error (device loop2): ext4_orphan_get:1394: inode #16: comm syz-executor.2: casefold flag without casefold feature [ 43.323539][ T4083] loop3: detected capacity change from 0 to 512 [ 43.342518][ T4064] EXT4-fs error (device loop2): ext4_orphan_get:1399: comm syz-executor.2: couldn't read orphan inode 16 (err -117) [ 43.372206][ T4081] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 43.388829][ T4081] EXT4-fs (loop0): orphan cleanup on readonly fs [ 43.390821][ T4064] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 43.408390][ T4081] EXT4-fs warning (device loop0): ext4_enable_quotas:7104: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 43.439614][ T4096] bond0: option min_links: invalid value (18446744073709486081) [ 43.447369][ T4096] bond0: option min_links: allowed values 0 - 2147483647 [ 43.454985][ T4083] EXT4-fs (loop3): revision level too high, forcing read-only mode [ 43.463142][ T4081] EXT4-fs (loop0): Cannot turn on quotas: error -117 [ 43.463702][ T3105] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.481686][ T4083] EXT4-fs (loop3): orphan cleanup on readonly fs [ 43.498412][ T4081] EXT4-fs error (device loop0): ext4_orphan_get:1394: inode #16: comm syz-executor.0: casefold flag without casefold feature [ 43.518111][ T4083] EXT4-fs warning (device loop3): ext4_enable_quotas:7104: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 43.537105][ T4081] EXT4-fs error (device loop0): ext4_orphan_get:1399: comm syz-executor.0: couldn't read orphan inode 16 (err -117) [ 43.562096][ T4104] No control pipe specified [ 43.571330][ T4083] EXT4-fs (loop3): Cannot turn on quotas: error -117 [ 43.581189][ T4081] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 43.602022][ T4083] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #16: comm syz-executor.3: casefold flag without casefold feature [ 43.627169][ T4083] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 43.638681][ T4110] loop2: detected capacity change from 0 to 512 [ 43.649911][ T4083] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 43.672955][ T4110] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 43.692778][ T4110] EXT4-fs (loop2): orphan cleanup on readonly fs [ 43.703941][ T3095] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.713371][ T3098] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.726202][ T4110] EXT4-fs warning (device loop2): ext4_enable_quotas:7104: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 43.748921][ T4110] EXT4-fs (loop2): Cannot turn on quotas: error -117 [ 43.756784][ T4110] EXT4-fs error (device loop2): ext4_orphan_get:1394: inode #16: comm syz-executor.2: casefold flag without casefold feature [ 43.769953][ T4110] EXT4-fs error (device loop2): ext4_orphan_get:1399: comm syz-executor.2: couldn't read orphan inode 16 (err -117) [ 43.823790][ T4110] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 43.868713][ T4127] No control pipe specified [ 43.886543][ T3105] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.941988][ T4136] bond0: option min_links: invalid value (18446744073709486081) [ 43.949734][ T4136] bond0: option min_links: allowed values 0 - 2147483647 [ 43.958436][ T4139] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 44.067675][ T4156] net_ratelimit: 10 callbacks suppressed [ 44.067689][ T4156] IPv6: addrconf: prefix option has invalid lifetime [ 44.358092][ T28] kauditd_printk_skb: 99 callbacks suppressed [ 44.358106][ T28] audit: type=1400 audit(1714408990.715:269): avc: denied { bind } for pid=4211 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 44.384329][ T28] audit: type=1400 audit(1714408990.715:270): avc: denied { node_bind } for pid=4211 comm="syz-executor.2" saddr=255.255.255.255 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 44.442924][ T28] audit: type=1400 audit(1714408990.775:271): avc: denied { create } for pid=4211 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 44.461354][ T4229] __nla_validate_parse: 52 callbacks suppressed [ 44.461371][ T4229] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 44.464079][ T28] audit: type=1400 audit(1714408990.775:272): avc: denied { ioctl } for pid=4211 comm="syz-executor.2" path="socket:[6836]" dev="sockfs" ino=6836 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 44.504526][ T28] audit: type=1400 audit(1714408990.775:273): avc: denied { connect } for pid=4211 comm="syz-executor.2" laddr=255.255.255.255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 44.526376][ T28] audit: type=1400 audit(1714408990.785:274): avc: denied { write } for pid=4222 comm="syz-executor.2" name="001" dev="devtmpfs" ino=146 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 44.933480][ T28] audit: type=1326 audit(1714408991.275:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4296 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fdf17113ea9 code=0x0 [ 44.980173][ T4301] loop0: detected capacity change from 0 to 512 [ 45.000129][ T4301] ext4: Bad value for 'sb' [ 45.092105][ T4320] loop2: detected capacity change from 0 to 512 [ 45.107904][ T4320] ext4: Bad value for 'sb' [ 45.113892][ T28] audit: type=1400 audit(1714408991.465:276): avc: denied { create } for pid=4300 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 45.151975][ T28] audit: type=1400 audit(1714408991.495:277): avc: denied { connect } for pid=4300 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 45.176008][ T4325] loop3: detected capacity change from 0 to 512 [ 45.193578][ T4325] ext4: Bad value for 'sb' [ 45.215611][ T28] audit: type=1400 audit(1714408991.545:278): avc: denied { read } for pid=4300 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 45.894619][ T4364] loop0: detected capacity change from 0 to 512 [ 45.957746][ T4368] loop0: detected capacity change from 0 to 128 [ 46.070023][ T4378] loop3: detected capacity change from 0 to 512 [ 46.078555][ T4378] ext4: Bad value for 'sb' [ 46.089307][ T4380] loop0: detected capacity change from 0 to 512 [ 46.097691][ T4380] ext4: Bad value for 'sb' [ 46.127052][ T3087] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 46.135118][ T4384] loop2: detected capacity change from 0 to 128 [ 46.219772][ T4389] loop2: detected capacity change from 0 to 512 [ 46.243354][ T4389] ext4: Bad value for 'sb' [ 46.334428][ T4398] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 46.342647][ T4398] netlink: 'syz-executor.1': attribute type 8 has an invalid length. [ 46.350775][ T4398] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 46.358904][ T4398] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 46.369985][ T4398] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.377062][ T4398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.480327][ T4403] loop1: detected capacity change from 0 to 2048 [ 46.507223][ T4403] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 46.524486][ T4403] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz-executor.1: bg 0: block 136: padding at end of block bitmap is not set [ 46.544208][ T4403] syz-executor.1 (4403) used greatest stack depth: 9792 bytes left [ 46.553309][ T3102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.619816][ T4410] loop1: detected capacity change from 0 to 2048 [ 46.647741][ T4410] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 46.662981][ T4410] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz-executor.1: bg 0: block 136: padding at end of block bitmap is not set [ 46.683976][ T3102] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.739499][ T4418] bond_slave_0: entered promiscuous mode [ 46.745189][ T4418] bond_slave_1: entered promiscuous mode [ 46.752220][ T4418] macsec1: entered promiscuous mode [ 46.757482][ T4418] bond0: entered promiscuous mode [ 46.764744][ T4418] bond0: left promiscuous mode [ 46.769771][ T4418] bond_slave_0: left promiscuous mode [ 46.775161][ T4418] bond_slave_1: left promiscuous mode [ 46.874148][ T4420] loop1: detected capacity change from 0 to 32768 [ 46.899993][ T4422] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 46.908156][ T4422] netlink: 'syz-executor.4': attribute type 8 has an invalid length. [ 46.916354][ T4422] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 46.924477][ T4422] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 46.933493][ T4422] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.940614][ T4422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.024843][ T4426] loop4: detected capacity change from 0 to 2048 [ 47.041934][ T4428] loop0: detected capacity change from 0 to 2048 [ 47.059115][ T4426] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 47.083171][ T4428] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 47.108010][ T4426] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz-executor.4: bg 0: block 136: padding at end of block bitmap is not set [ 47.129766][ T4437] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 47.130548][ T4428] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz-executor.0: bg 0: block 136: padding at end of block bitmap is not set [ 47.138013][ T4437] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.159666][ T4437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.170271][ T3118] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 47.187204][ T3095] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 47.284897][ T4447] loop0: detected capacity change from 0 to 512 [ 47.293068][ T4447] ext4: Bad value for 'sb'