last executing test programs: 12m40.661002524s ago: executing program 32 (id=459): socket$packet(0x11, 0x3, 0x300) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x7}, 0x9866, 0x8, 0x11002, 0x0, 0xa, 0x80000011, 0x0, 0x0, 0x4, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x1108, &(0x7f0000000880)={0x0, 0x2, 0x80, 0x2, 0x21d}, &(0x7f00000003c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x6, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2, @perf_config_ext={0xffffffffffffffff, 0x5}, 0x6e35, 0x5, 0x0, 0x7, 0x8, 0x20003, 0x9, 0x0, 0x0, 0x0, 0x7ffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_io_uring_submit(r1, r2, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200, 0x0, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, 0x0, 0x0) io_uring_enter(r0, 0x471b, 0xfffffffe, 0x20, 0x0, 0xffffffffffffff68) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x2, r4, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0x20042, 0x1}) truncate(&(0x7f0000000180)='./file0\x00', 0xba) openat$autofs(0xffffffffffffff9c, 0x0, 0x200040, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r5, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f0000000d80), 0x36f, 0x20102, 0x0) 7m35.199610671s ago: executing program 33 (id=2348): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x300, 0x198, 0xffffffff, 0xffffffff, 0x198, 0xffffffff, 0x268, 0xffffff7a, 0xffffffff, 0x268, 0xffffffff, 0x7fffffe, 0x0, {[{{@ip={@broadcast, @loopback, 0x0, 0x0, 'veth1\x00', 'veth0_to_team\x00', {}, {}, 0x0, 0x0, 0x41}, 0x6, 0x130, 0x198, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "00000100cbd047da9ca965f96ad5801f0514d363ee84bb895919d9490f6785fba3c4a44f1e25ecefef2a2d6054f5260ece5ce1a56a5ef73be11d65bfe8c37674024c183ebacdf741cea92ded3a9ca54de15dd9ec8ef62f9e000000000000000000ffffff7f00", 0x7d}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x2, 0x0, 'snmp_trap\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) fstat(r3, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="d5"], 0x24}}, 0x0) recvmmsg$unix(r7, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000001600)=""/182, 0xb6}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/83, 0x53}, {&(0x7f0000000140)=""/36, 0x24}], 0x4}}], 0x1, 0x0, 0x0) write(r7, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000080000000000", 0x14) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r9) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r9, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000680)={'vxcan0\x00', 0x0}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000700)=0xc) sendmsg$nl_route(r8, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x94acc112705d84f2}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)=@ipmr_delroute={0x64, 0x19, 0x0, 0x70bd25, 0x25dfdbfc, {0x80, 0x0, 0x14, 0x0, 0xfe, 0x0, 0xfd, 0xd, 0x1c00}, [@RTA_OIF={0x8, 0x4, r10}, @RTA_MARK={0x8, 0x10, 0x6}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_IP_PROTO={0x5, 0x1b, 0x11}, @RTA_TABLE={0x8, 0xf, 0x10001}, @RTA_PRIORITY={0x8, 0x6, 0x95}, @RTA_OIF={0x8}, @RTA_UID={0x8, 0x19, r11}, @RTA_MARK={0x8, 0x10, 0xffffffff}]}, 0x64}, 0x1, 0x0, 0x0, 0xc831}, 0x10) statx(0xffffffffffffffff, &(0x7f0000002600)='./file0\x00', 0x1000, 0x200, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000002800)={{0x1, 0x1, 0x18, r5, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) sendmmsg$unix(r2, &(0x7f0000002e40)=[{{&(0x7f0000000380)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000400)="729eae759bdb5b9e38d6bccbac594487382c66df6deeeb2f79e137af88591e6239af1641e7dffc979c54361375fc4e7255152ecb198cff83f1e6abd895c0a87815ed1c08ace47d8d2159b4fe73d217ebc5605f355f930fa921a895bb1a857d26bca578f7c2c4e0be7e9d4dccdcb735361f5ef0120fd79c51335e7c914ecdae8aaef27c7a55eca382bec61998300e69247cc2a0f901ac62c18ace1fc9a31f787f41dceadba612f4c0593084689ad6fc85699747f2348e", 0xb6}, {&(0x7f0000000580)="61c5d62dcb638fc32f38a17ef62de8b1dd20d986234878c89d9c0520e132a4c612bb82754013f5f5fb6e40650ee8b9fa7a0aaced05eefac9c897bc7f66c32e6547293af5e488fb7ce308e3697879225fc8a4dcaad93e9fc4be9c91ec6a005e167315c587570f537eb50a9f5ec14a1f3ad05d2b1e3f8b29f4e73db3582fa932b47ad60ef15039fa27919b438a0060fa739929e3fe8ecbdead4c806ff5a1a34f429cc8ab59", 0xa4}, {&(0x7f0000000680)="66984cdffe3b2ba04539467fc38c96bb61a24e837cb5fd013a59688676f43ffa406835144ee55f8b7d215be0f76e668294513830f313bf904b1c2ddffd5ee62bad5907365596add4fb218555c9fd878819", 0x51}], 0x3, &(0x7f00000008c0)=[@rights={{0x18, 0x1, 0x1, [r4, r2]}}, @rights={{0x38, 0x1, 0x1, [r2, r2, r4, r3, r5, r4, r0, r5, r4, r5]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0xa0, 0x44}}, {{&(0x7f0000000980)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002040)=[{&(0x7f0000000a00)="e989dea90affe408a4de", 0xa}, {0x0}, {&(0x7f0000000c40)}, {&(0x7f0000000d40)="0075ee37dd3dc51e930944e60ffcc807fd602981132d36aa26b74e94132f57cfe465fe0acaf4fcf61a5cd059040bedaea73b1a104372882b4fafbecf2663acc4c729e50abf23f643cd27d499c9d393bcc97f997a342e", 0x56}, {&(0x7f0000000dc0)="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", 0x1000}, {0x0}], 0x6, 0x0, 0x0, 0x41010}}, {{&(0x7f0000002340)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000002540)=[{&(0x7f00000023c0)="5b690704f7061049d1bd9f5e86ed4c7e40e76a37cd3d01bde92a11252fec61a5dfa9e23faaa300ea7cc1f09679faf8254980", 0x32}, {&(0x7f0000002440)="10a1f142d027248d6cecf292be2f488b79905a4e1f709253e5792f9980d3de37e2", 0x21}, {&(0x7f0000002480)="c3d6d9a0098cb4389696401f03927209bcb3a1cc923df82e0a7ca55a158b345bed489f211183a5231806e642766eac", 0x2f}, {&(0x7f00000024c0)="14cc0ff94c1a31a0e2bf981c1fa381ad3487a7a447102196e608d530437743597d3e1679847a876b9790c26edf730188f8e4bd6993318c0d315a601a95a2f66a1f62a5d15619505ed92dd3b293676a2b001f883795cd9039009299", 0x5b}], 0x4, &(0x7f0000002840)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xffffffffffffffff, r6}}}, @cred={{0x1c, 0x1, 0x2, {r1, r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {r1, r13, r14}}}], 0x60, 0x20000080}}, {{&(0x7f00000028c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000002dc0)=[{&(0x7f0000002940)="d2eee4cfad78854f32efd733f54fd1e76f78b9e23db4c92b563063ce56002130f7681ffc4dd5cbd483499ee1f6f29dd5c2ae6d60d8611af3a35e01866af8135389887434b45d63044a88be9c2db72821d1a80c53f929f616f526af4889607ac6d8e40f17080d9d5ee1e64225161c32547da4495d0a54e61cb6573742c5b34917ac3421100fead445ef70", 0x8a}, {&(0x7f0000002a00)="cb66bd1b6c22fcbc88b6fc60fd19c4124409fcb0a573e0a4da63417df695076bbf47f2353da6161ceaa6245b503c0b4ba9e1a13fce8af4ff7a3976c34cce18e11d0441a2050712bcd7b4e7be06f9916e84a1e555f9c181a92b6e0fcb39c2596b67a1ada2472be0655ccbe020698039ffc45041bfedfa9b62b78a33f1734c1acd84ce959e70f2dbe607528bbf1f2c97850c0a74167705e09528b95aa6b1", 0x9d}, {&(0x7f0000002ac0)="2f442ca95d61e76b16e01226f9e4e955524de42389880b8c80016162888dcacdd1d2b8e9dbd2e170df1f7b9f1b9c7ab90f1612563110f39634c1c86d9503af9efc4b98115e3b11b83268288cb7b11cc0017df2072a16ae77291ba0a9cbdd460110c522acbd6fc8cc9f56f06954e4cd0b3d7a6464e88efc97af422c4de0424104e7191e891732e5967e3e566768afd3d3352f66da61f856f6f8f6d903a335b98076949e7db634e148f4976d361c1b77e7bcd77c5d10d67ba053", 0xb9}, {&(0x7f0000002b80)="8a3f4984066e69a99a3de9a036ef3c", 0xf}, {&(0x7f0000002bc0)="79087c4ea0acceec89369117c59a1274c4b3ecd853012bebba7560f3507d30680b2d0c4ebabe23d03d7b25284077c4826cad1f287fcde6a5c4904a5c52ff14e31573fbb2ac613b639e9cf9e8c8b902cad2335579603e81cfd249d10046ac0b869be4400c35afc7e040ab9783bb7707e4e2e7da7aaed48c275e9d2f447010765d668cb5bc3d98232a7b7c15402550755ee0f651b2d54ba5e144c17a74e999fa39bc39a2e41e105600d0b64138f4e4134b", 0xb0}, {&(0x7f0000002c80)="0e3b003a3f6f6a285b31886d149dd0e4e32004accad2fc97aac35d961f0f58b53dff4b9adeb44ea65a38a06ae6c18f588b973bbedb076c820b13fe4149c7e660a0f0148e05eb79f5ece0d0de6cf035fcb9e5f5efcbc91db98debf1cbd8961fd856e929ac71f3d2e46faf8da0ca5ab5d1265cd61bf84611142a8a71ea1e6d5320dc204d4dce89a8b8ccabf6064f3756ed62cc6e48646ffec72fc031333b69db", 0x9f}, {&(0x7f0000002d40)="1d5ef275a5f8c48eda47", 0xa}, {&(0x7f0000002d80)="27423440f6", 0x5}], 0x8, 0x0, 0x0, 0x10}}], 0x4, 0x40000) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f0000000a40)={[{@dioread_nolock}, {@nodelalloc}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@dax_inode}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@nombcache}, {@errors_remount}], [{@fowner_eq}, {@fsname={'fsname', 0x3d, 'grpquota'}}, {@euid_lt={'euid<', r13}}]}, 0x11, 0x553, &(0x7f0000001080)="$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") openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1cb842, 0x0) io_setup(0x20fe, &(0x7f0000000540)) 3m1.279265366s ago: executing program 34 (id=3691): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f00000002c0)={[{@test_dummy_encryption_v1}, {@usrjquota}, {@auto_da_alloc}, {@init_itable}, {@nodioread_nolock}, {@journal_checksum}, {@max_batch_time={'max_batch_time', 0x3d, 0x5}}]}, 0x1, 0x587, &(0x7f0000000940)="$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") setxattr$incfs_metadata(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280), &(0x7f0000000380)="30573472b621739984c336124406e8a5c812ca847e3bf1b82ec91d46ab", 0x1d, 0x1) socket$netlink(0x10, 0x3, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x4000, &(0x7f0000000840)={[{@noinit_itable}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@fowner_lt}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@hash}, {@uid_lt}, {@subj_role={'subj_role', 0x3d, '/dev/sg#\x00'}}, {@subj_role={'subj_role', 0x3d, 'noinit_itable'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}, 0x1, 0x512, &(0x7f0000000c40)="$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") syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) write$tun(0xffffffffffffffff, &(0x7f00000001c0)={@void, @void, @mpls={[], @ipv6=@tipc_packet={0x3, 0x6, "460ba0", 0x1a, 0x6, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x24}, {[], @payload_conn={{{0x1a, 0x0, 0x0, 0x1, 0x1, 0x6, 0x2, 0x2, 0x1, 0x0, 0x0, 0xc, 0x5, 0x0, 0xffff, 0x90, 0x2, 0x4e21, 0x4e23}}, [0x0, 0x0]}}}}}, 0x42) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[], 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000), 0xc) r6 = add_key(&(0x7f00000028c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000002800)='dns_resolver\x00', &(0x7f0000002840)={'syz', 0x1}, &(0x7f0000000000)='\x00', r6) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000240)={0x84, @rand_addr=0x64010102, 0x4e20, 0x3, 'wlc\x00', 0x0, 0xa7e, 0x70}, 0x2c) sendmsg$sock(r0, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e20, 0x0, @dev={0xfe, 0x80, '\x00', 0xfd}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) 2m48.783621536s ago: executing program 0 (id=3735): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000340)="5706935d68fdac9fc2dcfddc7c5434b2d002e9dd1c223d06c8b7109225b4e063f6e23a923de7a39fd9d2e37e62db5c541f3c105666801c523659deb1f738a72435efb18d42904cb70b04a35f931aa33d6345ab90367005a0f4c8a0487aa0530cdb61aa6009685bd53aaf59099a8ac0bdccc28fa9870add965d1f58b32ca230eaf4c27559e6779bf87bf47c720e9b3f4460a5039980193eb2606ea92747690048211a85e47752225f71495946b97920b2231c6658a7294a86194f5c", 0xbb}, {&(0x7f0000000100)="379ae519b1c2fed28320eb024b8d7b92e3b91ba968fc61f80eb20e02a72f1ec8ab0265e377ba61a751988579c1cc3d4a732d3af7217799c106ef2176d374c95ad92fe0095e29b86e6eada7235cd696bc0f6ca75c67b066f29ecb63e5d44cb34283fa56fb7aaee0e17cad", 0x6a}, {&(0x7f0000000200)="6732618837d285c2f69d869b43fd13cd6ce4e3fd0659156798b552f914cc21120bac613cdc373dea28879e2a3be8cfaeb8352bf79f31ed0104e9b43928cca3b0da40ab", 0x43}, {&(0x7f0000000400)="475367e958ae9771f883d182223f8b2c5fe0c200eaef4a78e0b6da1377d3cde327c01f94c26a894fdcf20977891c4cb280aa22722ea7f99fd008d0ad2dd6aacb18287bc14b1dd6991bd7c34863ec2a2ea690907a91f53238af17ecafaad5991d2b7b245213ed56fdfac1d38e10cb39e10c8c345647eb54abd1a578e3d7a51e224d1a90e630bad0dde6e32609b95bd38479f957fd5ae4d096f0222416ea0f16f95afed23312e3a6659acff4dd1588496119791a75c05ac1f979045e839ca19fbbc8699cd7c64f813d517608730cb343fffff99f0dc5", 0xd5}], 0x4, 0x1) 2m48.657499131s ago: executing program 0 (id=3736): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0xffffffffffffffff, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x400, 0x823}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback={0xfec0ffffffffffff}}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}]}}}]}, 0x5c}}, 0x24000800) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x1, 0x1, "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", 0x8, 0xff, 0xc, 0x8, 0xdc, 0x0, 0x1, 0x1}}}, 0x128) 2m46.59290776s ago: executing program 0 (id=3739): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8f}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0], 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0xfff, '\x00', 0x0, 0x0, 0x0, 0x1}, 0x50) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r8, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0xfffe, @dev={0xac, 0x14, 0x14, 0x20}}, {0x2, 0x4e23, @rand_addr=0x64010102}, 0x107, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x500}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r2, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x2}, {0x3, 0x3, 0x6, 0xa, 0xa, 0xfff0, 0xf1}, {0x7, 0x1, 0x2, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioprio_set$uid(0x3, 0x0, 0x0) r9 = socket$igmp(0x2, 0x3, 0x2) sendto$inet(r9, 0x0, 0xffef, 0x20048000, &(0x7f0000000240)={0x2, 0x4e22, @remote}, 0x26) quotactl$Q_SYNC(0xffffffff80000101, 0x0, 0x0, 0x0) 2m45.000049413s ago: executing program 3 (id=3746): r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4000000015000b0000000000000000000a00000004000000140001"], 0x40}}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000000000001850000000000020000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffff0, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x9a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x40000, @empty}, 0x1c) 2m44.999473874s ago: executing program 0 (id=3747): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180), 0xfea7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x17d) mount$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x80, 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000, 0x0) mount$bind(&(0x7f0000000040)='.\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x2a05004, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830500000700ffffff", @ANYRES8=r0], 0x4}}, 0x0) sendfile(r5, r4, 0x0, 0x100000002) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@private0, 0x8000000, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000000)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x0, 0x0, 0x2, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000180)={@empty, 0x8000000, 0x2, 0x3, 0x0, 0x0, 0x96}, 0x20) set_mempolicy(0x6005, &(0x7f00000001c0)=0x1003, 0x4) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000340)="5706935d68fdac9fc2dcfddc7c5434b2d002e9dd1c223d06c8b7109225b4e063f6e23a923de7a39fd9d2e37e62db5c541f3c105666801c523659deb1f738a72435efb18d42904cb70b04a35f931aa33d6345ab90367005a0f4c8a0487aa0530cdb61aa6009685bd53aaf59099a8ac0bdccc28fa9870add965d1f58b32ca230eaf4c27559e6779bf87bf47c720e9b3f4460a5039980193eb2606ea92747690048211a85e47752225f71495946b97920b2231c6658a7294a86194f5c", 0xbb}, {&(0x7f0000000100)="379ae519b1c2fed28320eb024b8d7b92e3b91ba968fc61f80eb20e02a72f1ec8ab0265e377ba61a751988579c1cc3d4a732d3af7217799c106ef2176d374c95ad92fe0095e29b86e6eada7235cd696bc0f6ca75c67b066f29ecb63e5d44cb34283fa56fb7aaee0e17cad", 0x6a}, {&(0x7f0000000200)="6732618837d285c2f69d869b43fd13cd6ce4e3fd0659156798b552f914cc21120bac613cdc373dea28879e2a3be8cfaeb8352bf79f31ed0104e9b43928cca3b0da40ab", 0x43}, {&(0x7f0000000400)="475367e958ae9771f883d182223f8b2c5fe0c200eaef4a78e0b6da1377d3cde327c01f94c26a894fdcf20977891c4cb280aa22722ea7f99fd008d0ad2dd6aacb18287bc14b1dd6991bd7c34863ec2a2ea690907a91f53238af17ecafaad5991d2b7b245213ed56fdfac1d38e10cb39e10c8c345647eb54abd1a578e3d7a51e224d1a90e630bad0dde6e32609b95bd38479f957fd5ae4d096f0222416ea0f16f95afed23312e3a6659acff4dd1588496119791a75c05ac1f979045e839ca19fbbc8699cd7c64f813d517608730cb343fffff99f0dc5", 0xd5}], 0x4, 0x1) 2m44.905618126s ago: executing program 0 (id=3748): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f00000002c0)={[{@test_dummy_encryption_v1}, {@usrjquota}, {@auto_da_alloc}, {@init_itable}, {@nodioread_nolock}, {@journal_checksum}, {@max_batch_time={'max_batch_time', 0x3d, 0x5}}]}, 0x1, 0x587, &(0x7f0000000940)="$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") setxattr$incfs_metadata(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280), &(0x7f0000000380)="30573472b621739984c336124406e8a5c812ca847e3bf1b82ec91d46ab", 0x1d, 0x1) socket$netlink(0x10, 0x3, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x4000, &(0x7f0000000840)={[{@noinit_itable}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@fowner_lt}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@hash}, {@uid_lt}, {@subj_role={'subj_role', 0x3d, '/dev/sg#\x00'}}, {@subj_role={'subj_role', 0x3d, 'noinit_itable'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}, 0x1, 0x512, &(0x7f0000000c40)="$eJzs3W1rZFcdAPD/vcmk2d3UTFVkLdgWW9ktujNJY9so0lYQfVVQ6/s1JpMQMsmEzKRuQtEsfgBBRAU/gG8EP4Ag+xFEWND3oqKI7upL3St35kbzMJMMySSzTn4/OJlz7sP5n3PJ3LkPh3sDuLJeioh3ImIsIl6NiOlielqk2OukfLnHjz5YzFMSWfbe35JIimn7deXl8Yi4Uaw2GRFf/0rEt5LjcZs7u2sL9XptqyhXW+ub1ebO7p3V9YWV2kptY25u9o35N+dfn5/JCufqZzki3vrSn370/Z99+a1ffebbv7/7l9vfyZv1hY912h0Ri+cK0EOn7lJ7W+zLt9HWRQQbkrw/pbFhtwIAgH7kx/gfjohPto//p2OsfTQHAAAAjJLs7an4VxKRAQAAACMrjYipSNJKMRZgKtK0UumM4f1oXE/rjWbr08uN7Y2lfF5EOUrp8mq9NlOMFS5HKcnLs8UY2/3ya0fKcxHxXET8cPpau1xZbNSXhn3xAwAAAK6IGy8ePv//53TazgMAAAAjptyzAAAAAIwKp/wAAAAw+pz/AwAAwEj76rvv5inbf4/30vs722uN9+8s1ZprlfXtxcpiY2uzstJorLSf2bd+Wn31RmPzs7Gxfa/aqjVb1ebO7t31xvZG6+7qoVdgAwAAAJfouRcf/C6JiL3PX2unKJ4DCHDIH4fdAGCQxobdAGBoxofdAGBoSqcuYQ8Boy45Zf7xwTuda4Xx64tpDwAAMHi3Pn78/v9EMe/0awPA/zNjfQDg6nF3D66u0llHAN4cdEuAYflQ5+OZXvN7Pryjj/v/nWsMWXamhgEAAAMz1U5JWimO06ciTSuViGfbrwUoJcur9dpMcX7w2+nSM3l5tr1mcuqYYQAAAAAAAAAAAAAAAAAAAAAAAACgI8uSyAAAAICRFpH+OWk/zT/i1vQrU4evDhx569dP3/vxvYVWa2s2YiL5+3Q+aSIiWj8ppr+WeSUAAAAAPAU65+nF5+ywWwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn86IPF/XSZcf/6xYgod4s/HpPtz8koRcT1fyQxfmC9JCLGBhB/735E3OwWP4knWZaVi1Z0i3/tguOX25ume/w0Im4MID5cZQ/y/c873b5/abzU/uz+/Rsv0nn13v+l/93/jfXY/zx7pNzL8w9/Ue0Z/37E8+Pd9z/78ZNO/EMh8sLLffbxm9/Y3e0640CV3eIfjFVtrW9Wmzu7d1bXF1ZqK7WNubnZN+bfnH99fqa6vFqvFX+7hvnBJ3755KT+X+8Rv3y4/8e2/yt99T6Lfz+89+gjnUKpW/zbL3f//b3ZI35a/PZ9qsjn82/t5/c6+YNe+PlvXjip/0s9+j95Sv9v99X/+NyrX/veH7rOObY1AIDL0NzZXVuo12tbJ2Qm+1jmkjNvPx3NGGAmno5mDCuTfbfz/3i+es65+rFMdp7Vx2MAzZg49j0di7NWmETs5XX1+Q8JAACMmP8d9J90BwkAAAAAAAAAAAAAAAAAAAC4SGd8LNlkRPS98NGYe8PpKgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAif4TAAD//4RX0Xo=") syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) write$tun(0xffffffffffffffff, &(0x7f00000001c0)={@void, @void, @mpls={[], @ipv6=@tipc_packet={0x3, 0x6, "460ba0", 0x1a, 0x6, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x24}, {[], @payload_conn={{{0x1a, 0x0, 0x0, 0x1, 0x1, 0x6, 0x2, 0x2, 0x1, 0x0, 0x0, 0xc, 0x5, 0x0, 0xffff, 0x90, 0x2, 0x4e21, 0x4e23}}, [0x0, 0x0]}}}}}, 0x42) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[], 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000), 0xc) add_key(&(0x7f00000028c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r6 = socket(0x2, 0x80805, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000240)={0x84, @rand_addr=0x64010102, 0x4e20, 0x3, 'wlc\x00', 0x0, 0xa7e, 0x70}, 0x2c) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, &(0x7f0000000000)={{0x84, @private=0xa010101, 0x4f29, 0x3, 'nq\x00', 0x5, 0x4, 0x6c}, {@loopback, 0x4e23, 0x4, 0xcd, 0x1}}, 0x44) sendmsg$sock(r0, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e20, 0x0, @dev={0xfe, 0x80, '\x00', 0xfd}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) 2m44.737310152s ago: executing program 3 (id=3749): r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f0000000340), &(0x7f0000000040)=@tcp=r0}, 0x20) recvmmsg(r0, &(0x7f00000001c0), 0x0, 0x10100, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1f0719, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89a, 0x4, @perf_bp={0x0}, 0xa822, 0x4005, 0xee, 0x3, 0x6, 0x20005, 0x9, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) syz_clone(0x41000100, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_clone(0xc30e3400, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = getpgid(r3) r5 = syz_pidfd_open(r4, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000980)={[0x4001ffffffffd]}, 0x8, 0x0) pselect6(0x40, &(0x7f0000000100)={0x0, 0x0, 0xffff, 0x2, 0x0, 0x0, 0x0, 0x400}, 0x0, &(0x7f0000000240)={0x1f, 0x3, 0x0, 0x75, 0x1000000002, 0x0, 0x0, 0x6}, 0x0, 0x0) pidfd_send_signal(r5, 0x11, 0x0, 0x4) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r2, 0x0) r6 = socket$kcm(0x10, 0x400000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b4000000000000006114d80000000000a60000000000000095000000000000003c77016c887903f98c7d64ebe7296edba9bfcbfbddd35b40259f05de8800bb263ca61cb23f0fcc32fbe980c6af4abfa650efd736f2c57faafdf6a72f7460bad39d137c5c46e08b0ad88de3c1270aa99d0cbc28adae64142813f43707ba5b1e9e369d7ad6a44e307644796b9db2180bb0064d6c473eb53a1f9c51a70085b468fcde41805b6387692b4393efa1dace8a9e069864c0a225f642"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000002000000850000003300000095"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r8, 0x2000012, 0xe, 0x0, &(0x7f0000000280)="63ec33c9e9b98600000000000000", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb}, 0x50) perf_event_open(0x0, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000180)) sendmsg$inet(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)="1c0000", 0x3}], 0x1}, 0x880) 2m44.736969362s ago: executing program 0 (id=3750): pipe(0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) setreuid(0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000000000002) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xfff, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$P9_RGETLOCK(r0, &(0x7f0000000000)={0x28, 0x37, 0x1, {0x2, 0x5, 0x9, r1, 0xa, 'syzkaller\x00'}}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="120000000200000008000000ebd0000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"], 0x50) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x31) socket$inet_tcp(0x2, 0x1, 0x0) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000100)={0x2ffc, 0x6000006, 0xfffffefc, 0x6}, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000160001f47efde4be701161000a000000040000800400", @ANYRES32=r6], 0x1c}, 0x1, 0x0, 0x0, 0x4044}, 0x804) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x80478b, &(0x7f0000000500)={[{@nodioread_nolock}, {@grpjquota}, {@minixdf}, {@discard}, {@prjquota}, {@lazytime}, {@init_itable_val={'init_itable', 0x3d, 0xffff}}]}, 0x0, 0x489, &(0x7f0000000c80)="$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") sendmmsg$inet6(r0, &(0x7f0000002940), 0x40000000000017d, 0x888) 2m44.582543027s ago: executing program 35 (id=3750): pipe(0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) setreuid(0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000000000002) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xfff, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$P9_RGETLOCK(r0, &(0x7f0000000000)={0x28, 0x37, 0x1, {0x2, 0x5, 0x9, r1, 0xa, 'syzkaller\x00'}}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="120000000200000008000000ebd0000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"], 0x50) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x31) socket$inet_tcp(0x2, 0x1, 0x0) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000100)={0x2ffc, 0x6000006, 0xfffffefc, 0x6}, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000160001f47efde4be701161000a000000040000800400", @ANYRES32=r6], 0x1c}, 0x1, 0x0, 0x0, 0x4044}, 0x804) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x80478b, &(0x7f0000000500)={[{@nodioread_nolock}, {@grpjquota}, {@minixdf}, {@discard}, {@prjquota}, {@lazytime}, {@init_itable_val={'init_itable', 0x3d, 0xffff}}]}, 0x0, 0x489, &(0x7f0000000c80)="$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") sendmmsg$inet6(r0, &(0x7f0000002940), 0x40000000000017d, 0x888) 2m43.677728858s ago: executing program 6 (id=3754): r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000340)="580000001400192340834b80040d8c560a117436c379000000000000000058000b4824ca945f6400940f6a0325010ebc000000000000008000f0fffeffe809005300fff5dd0000001000010007", 0x4d}], 0x1) 2m43.594542971s ago: executing program 6 (id=3755): pipe(&(0x7f0000000040)) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000000000002) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xfff, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x37, 0x1, {0x2, 0x5, 0x9, r1, 0xa, 'syzkaller\x00'}}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="120000000200000008000000ebd0000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"], 0x50) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x31) socket$inet_tcp(0x2, 0x1, 0x0) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000100)={0x2ffc, 0x6000006, 0xfffffefc, 0x6}, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000160001f47efde4be701161000a000000040000800400", @ANYRES32=r6], 0x1c}, 0x1, 0x0, 0x0, 0x4044}, 0x804) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x80478b, &(0x7f0000000500)={[{@nodioread_nolock}, {@grpjquota}, {@minixdf}, {@discard}, {@prjquota}, {@lazytime}, {@init_itable_val={'init_itable', 0x3d, 0xffff}}]}, 0x0, 0x489, &(0x7f0000000c80)="$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") 2m42.536008276s ago: executing program 6 (id=3758): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8f}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0], 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0xfff, '\x00', 0x0, 0x0, 0x0, 0x1}, 0x50) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r8, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0xfffe, @dev={0xac, 0x14, 0x14, 0x20}}, {0x2, 0x4e23, @rand_addr=0x64010102}, 0x107, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x500}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r2, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x2}, {0x3, 0x3, 0x6, 0xa, 0xa, 0xfff0, 0xf1}, {0x7, 0x1, 0x2, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioprio_set$uid(0x3, 0x0, 0x0) r9 = socket$igmp(0x2, 0x3, 0x2) sendto$inet(r9, 0x0, 0xffef, 0x20048000, &(0x7f0000000240)={0x2, 0x4e22, @remote}, 0x26) quotactl$Q_SYNC(0xffffffff80000101, 0x0, 0x0, 0x0) 2m42.288917254s ago: executing program 6 (id=3759): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180), 0xfea7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x17d) mount$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x80, 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000, 0x0) mount$bind(&(0x7f0000000040)='.\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x2a05004, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830500000700ffffff", @ANYRES8=r0], 0x4}}, 0x0) sendfile(r5, r4, 0x0, 0x100000002) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@private0, 0x8000000, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000000)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x0, 0x0, 0x2, 0x9}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000180)={@empty, 0x8000000, 0x2, 0x3, 0x0, 0x0, 0x96}, 0x20) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000340)="5706935d68fdac9fc2dcfddc7c5434b2d002e9dd1c223d06c8b7109225b4e063f6e23a923de7a39fd9d2e37e62db5c541f3c105666801c523659deb1f738a72435efb18d42904cb70b04a35f931aa33d6345ab90367005a0f4c8a0487aa0530cdb61aa6009685bd53aaf59099a8ac0bdccc28fa9870add965d1f58b32ca230eaf4c27559e6779bf87bf47c720e9b3f4460a5039980193eb2606ea92747690048211a85e47752225f71495946b97920b2231c6658a7294a86194f5c", 0xbb}, {&(0x7f0000000100)="379ae519b1c2fed28320eb024b8d7b92e3b91ba968fc61f80eb20e02a72f1ec8ab0265e377ba61a751988579c1cc3d4a732d3af7217799c106ef2176d374c95ad92fe0095e29b86e6eada7235cd696bc0f6ca75c67b066f29ecb63e5d44cb34283fa56fb7aaee0e17cad", 0x6a}, {&(0x7f0000000200)="6732618837d285c2f69d869b43fd13cd6ce4e3fd0659156798b552f914cc21120bac613cdc373dea28879e2a3be8cfaeb8352bf79f31ed0104e9b43928cca3b0da40ab", 0x43}, {&(0x7f0000000400)="475367e958ae9771f883d182223f8b2c5fe0c200eaef4a78e0b6da1377d3cde327c01f94c26a894fdcf20977891c4cb280aa22722ea7f99fd008d0ad2dd6aacb18287bc14b1dd6991bd7c34863ec2a2ea690907a91f53238af17ecafaad5991d2b7b245213ed56fdfac1d38e10cb39e10c8c345647eb54abd1a578e3d7a51e224d1a90e630bad0dde6e32609b95bd38479f957fd5ae4d096f0222416ea0f16f95afed23312e3a6659acff4dd1588496119791a75c05ac1f979045e839ca19fbbc8699cd7c64f813d517608730cb343fffff99f0dc5", 0xd5}], 0x4, 0x1) 2m42.165377908s ago: executing program 6 (id=3760): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f00000002c0)={[{@test_dummy_encryption_v1}, {@usrjquota}, {@auto_da_alloc}, {@init_itable}, {@nodioread_nolock}, {@journal_checksum}, {@max_batch_time={'max_batch_time', 0x3d, 0x5}}]}, 0x1, 0x587, &(0x7f0000000940)="$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") setxattr$incfs_metadata(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280), &(0x7f0000000380)="30573472b621739984c336124406e8a5c812ca847e3bf1b82ec91d46ab", 0x1d, 0x1) socket$netlink(0x10, 0x3, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x4000, &(0x7f0000000840)={[{@noinit_itable}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@fowner_lt}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@hash}, {@uid_lt}, {@subj_role={'subj_role', 0x3d, '/dev/sg#\x00'}}, {@subj_role={'subj_role', 0x3d, 'noinit_itable'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}, 0x1, 0x512, &(0x7f0000000c40)="$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") syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) write$tun(0xffffffffffffffff, &(0x7f00000001c0)={@void, @void, @mpls={[], @ipv6=@tipc_packet={0x3, 0x6, "460ba0", 0x1a, 0x6, 0x0, @empty, @dev={0xfe, 0x80, '\x00', 0x24}, {[], @payload_conn={{{0x1a, 0x0, 0x0, 0x1, 0x1, 0x6, 0x2, 0x2, 0x1, 0x0, 0x0, 0xc, 0x5, 0x0, 0xffff, 0x90, 0x2, 0x4e21, 0x4e23}}, [0x0, 0x0]}}}}}, 0x42) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[], 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000), 0xc) add_key(&(0x7f00000028c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r6 = socket(0x2, 0x80805, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000240)={0x84, @rand_addr=0x64010102, 0x4e20, 0x3, 'wlc\x00', 0x0, 0xa7e, 0x70}, 0x2c) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, &(0x7f0000000000)={{0x84, @private=0xa010101, 0x4f29, 0x3, 'nq\x00', 0x5, 0x4, 0x6c}, {@loopback, 0x4e23, 0x4, 0xcd, 0x1}}, 0x44) sendmsg$sock(r0, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e20, 0x0, @dev={0xfe, 0x80, '\x00', 0xfd}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) 2m41.777098872s ago: executing program 6 (id=3763): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x7, 0xf60d}, 0x9092, 0x4, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x49, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000a80)={0x1c, r2, 0x10ada85e65c25359, 0xfffffffd, 0x25dfdbfd, {{0x6b}, {@val={0x8}, @void}}}, 0x1c}}, 0x20000000) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r6 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r6, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)=@chain={'key_or_keyring:', r6}) 2m41.725094683s ago: executing program 36 (id=3763): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x7, 0xf60d}, 0x9092, 0x4, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x49, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000a80)={0x1c, r2, 0x10ada85e65c25359, 0xfffffffd, 0x25dfdbfd, {{0x6b}, {@val={0x8}, @void}}}, 0x1c}}, 0x20000000) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r6 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r6, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)=@chain={'key_or_keyring:', r6}) 2m41.516864261s ago: executing program 3 (id=3767): syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='mnt\x00', 0x4, &(0x7f0000000000), 0x0, 0x236, &(0x7f0000000300)="$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") creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0xb000b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={0x0, 0x18}, 0x8000, 0x9, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x7, 0x34328, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x2}, 0x10026, 0x10003, 0xfffffff8, 0x2, 0x100008, 0x20005, 0x9, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r1, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x1f8) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a6c000000060a010400000000000000000200ffff4001435d832f967b006efc04803c0001800b00010065787468647200002c00028005b014008300000008000340000000d5080004400000000008000640000000020800014000000019683735110fd017130900010073797a30000000000900020073797a32"], 0x94}}, 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x801400, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x4600, 0xe898d2275f586838) preadv2(r2, &(0x7f0000000980)=[{&(0x7f0000001200)=""/4096, 0xffffffa4}], 0x1, 0xe00, 0x9, 0x1b) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) pipe(&(0x7f0000000d00)) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r5, &(0x7f00000042c0)=[{{&(0x7f00000002c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x4e}}], 0x1, 0x2000c044) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000200)={0x0, 0x14, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="200000001100010100"/20, @ANYRES64=r8], 0x20}}, 0x0) 2m40.737020216s ago: executing program 3 (id=3769): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180), 0xfea7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x17d) mount$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x80, 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000, 0x0) mount$bind(&(0x7f0000000040)='.\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x2a05004, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830500000700ffffff", @ANYRES8=r0], 0x4}}, 0x0) sendfile(r5, r4, 0x0, 0x100000002) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@private0, 0x8000000, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000000)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x0, 0x0, 0x2, 0x9}, 0x20) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000340)="5706935d68fdac9fc2dcfddc7c5434b2d002e9dd1c223d06c8b7109225b4e063f6e23a923de7a39fd9d2e37e62db5c541f3c105666801c523659deb1f738a72435efb18d42904cb70b04a35f931aa33d6345ab90367005a0f4c8a0487aa0530cdb61aa6009685bd53aaf59099a8ac0bdccc28fa9870add965d1f58b32ca230eaf4c27559e6779bf87bf47c720e9b3f4460a5039980193eb2606ea92747690048211a85e47752225f71495946b97920b2231c6658a7294a86194f5c", 0xbb}, {&(0x7f0000000100)="379ae519b1c2fed28320eb024b8d7b92e3b91ba968fc61f80eb20e02a72f1ec8ab0265e377ba61a751988579c1cc3d4a732d3af7217799c106ef2176d374c95ad92fe0095e29b86e6eada7235cd696bc0f6ca75c67b066f29ecb63e5d44cb34283fa56fb7aaee0e17cad", 0x6a}, {&(0x7f0000000200)="6732618837d285c2f69d869b43fd13cd6ce4e3fd0659156798b552f914cc21120bac613cdc373dea28879e2a3be8cfaeb8352bf79f31ed0104e9b43928cca3b0da40ab", 0x43}, {&(0x7f0000000400)="475367e958ae9771f883d182223f8b2c5fe0c200eaef4a78e0b6da1377d3cde327c01f94c26a894fdcf20977891c4cb280aa22722ea7f99fd008d0ad2dd6aacb18287bc14b1dd6991bd7c34863ec2a2ea690907a91f53238af17ecafaad5991d2b7b245213ed56fdfac1d38e10cb39e10c8c345647eb54abd1a578e3d7a51e224d1a90e630bad0dde6e32609b95bd38479f957fd5ae4d096f0222416ea0f16f95afed23312e3a6659acff4dd1588496119791a75c05ac1f979045e839ca19fbbc8699cd7c64f813d517608730cb343fffff99f0dc5", 0xd5}], 0x4, 0x1) 2m40.617416641s ago: executing program 3 (id=3770): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000240)={0x0, 0x0}) sched_setscheduler(r1, 0x1, &(0x7f0000000180)=0x7) getpid() r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000100)={0x0, 0x0}) ioctl$TIOCL_BLANKSCREEN(r2, 0x541c, &(0x7f0000000140)) prctl$PR_SET_MM(0x23, 0x4, &(0x7f0000feb000/0x14000)=nil) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a}, 0x1c) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r5 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r4, &(0x7f0000002780)=ANY=[@ANYBLOB="1c0008200203000014"], 0xfb5) 2m40.510840905s ago: executing program 3 (id=3771): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x1008490, &(0x7f00000000c0)={[{@grpid}, {@grpquota}, {@resuid}]}, 0x4, 0x4eb, &(0x7f0000000a80)="$eJzs3c9vVFsdAPDvnXZoKQMFZaFGBRFFQ5j+ABqCC2GjMYTESFy5gNoOTdMZpum0SCuLsnRvIokr/RPcuTBh5cKdO925wYUJKnkv9CVvMS/3zqUd2g7te7Qd6Hw+ye2955xhvufMcM6Ze2B6AuhZZyNiNSKORMS9iBjO85P8iButI33cq5ePp9ZePp5Kotm8878kK0/zou3PpI7lzzkYET/7ccQvk61xG8src5PVamUhT48s1uZHGssrl2YLec74xNjE6LXLV8f3rK1nan968aPZWz//y5+/8fzvq9//dVqt0m+OZ2Xt7dhLraYXo9SW1x8Rt/YjWJf0539/+PCkve1LEXEu6//D0Ze9mwDAYdZsDkdzuD0NABx26f1/KZJCOV8LKEWhUC631vBOx1ChWm8sXhyuLz2YjmwN62QUC/dnq5XRfK3wZBSTND2WXW+kxzelL0fEqYj47cDRLF2eqlenu/nBBwB62LFN8//HA635HwA45Aa7XQEA4MCZ/wGg95j/AaD3fI7537cDAeCQcP8PAL3H/A8AvWfH+f/JwdQDADgQP719Oz2aa/nvv55+uLz0g9LDS9OVxly5tjRVnqovzJdn6vWZaqU81Wzu9HzVen1+7Mp6srG8crdWX3qweHe2NjlTuVsp7nN7AICdnTrz7J9JRKxeP5od0baXg7kaDrdCtysAdE1ftysAdI3v80Dv2sU9vmUAOOS22aL3DR3/i9BTm7/Ch+rCV63/Q6+y/g+964ut//9wz+sBHDzr/9C7ms3Env8A0GOs8QPv9O//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0KNK2ZEUytle4Kvpz0K5HHE8Ik5GMbk/W62MRsSJiPjHQHEgTY91u9IAwDsq/CfJ9/+6MHy+tLn0SPLJQHaOiF/9/s7vHk0uLi6Mpfn/X89ffJrnjx/pRgMAgHY3tma15un83HYj/+rl46nXx0FW8cXN1uaiady1/GiV9Ed/dh6MYkQMfZTk6Zb080rfHsRffRIRX9lo/6O2CKVsDaS18+nm+Gns4/sQf+P13xy/8Eb8QlaWnovZa/HlPagL9JpnN1vjZN730i6W979CnM3O2/f/wWyEenevx7+1LeNfYX3869sSP8n6/Nn19Ntr8uLKX3+yJbM53Cp7EvG1/u3iJ+vxkw7j7/ldtvFfX//muU5lzT9EXIjt47fUsmF2ZLE2P9JYXrk0W5ucqcxUHoyPT4xNjF67fHV8JFujbv3823Yx/nv94olO8dP2D3WIP7hD+7+zy/b/8dN7v/jWW+J/79vbv/+n3xI/nRO/u8v4k0M3Om7fncaf7tD+nd7/i7uM//zfK9O7fCgAcAAayytzk9VqZWGHi/Sz5k6PcfFhXsRqxHtQDRfv1UW3RyZgv210+m7XBAAAAAAAAAAAAAAA6KSxvDI3EPv7daJutxEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDD67MAAAD//w/PzvM=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events.local\x00', 0x275a, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@version_9p2000}]}}) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) memfd_create(0x0, 0x8) 2m40.441244437s ago: executing program 37 (id=3771): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x1008490, &(0x7f00000000c0)={[{@grpid}, {@grpquota}, {@resuid}]}, 0x4, 0x4eb, &(0x7f0000000a80)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events.local\x00', 0x275a, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@version_9p2000}]}}) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) memfd_create(0x0, 0x8) 2m40.34123949s ago: executing program 5 (id=3774): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000380), 0xffffffffffffffff) syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0xb, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @private=0xa010102, @private=0xa010102, {[@timestamp_addr={0x44, 0x14, 0xa, 0x1, 0x0, [{@multicast1, 0xfffffffc}, {@multicast1}]}, @generic={0x7, 0x4, "0441"}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x17}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}, {0x85, 0x0, 0x0, 0x17}}]}, 0x0}, 0x94) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r1) r4 = socket(0x10, 0x3, 0x0) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000007c0)=@newqdisc={0x30, 0x24, 0xd0f, 0x470bd30, 0x25dfdbff, {0x60, 0x0, 0x0, r6, {0x0, 0xfff2}, {0xfff1, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x44080) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x54, r3, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x3}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x79}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40000) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x5, 0xe, 0x0, &(0x7f0000000300)="0101000071a78326c799dbe888a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r2, @ANYBLOB="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"], 0x1c8}}, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x2a, &(0x7f0000000040)=ANY=[@ANYBLOB="020000000000000002000000e0"], 0x190) 2m40.232524464s ago: executing program 5 (id=3776): r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x860b01) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000005e00679a3601ffc4910700004f78d4c1a0731cccff"], 0x1c}}, 0x0) recvmmsg$unix(r1, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/4070, 0xfe6}], 0x1}}], 0x1, 0x42, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = getpid() r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp(r2, r3, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) write$char_usb(r0, &(0x7f0000000040)="e2", 0x2250) 2m40.03121951s ago: executing program 5 (id=3777): r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x20, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000791000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) r2 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000440)={'syz_tun\x00', 0x101}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2d, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000b40)=@delqdisc={0x50, 0x25, 0x8, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x6, 0xfff1}, {0x9, 0xd}, {0x4, 0x4}}, [@TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x3d, 0x7, 0xfffd, 0x8, 0x2, 0x8, 0x1}}, {0x4}}]}, @TCA_RATE={0x6, 0x5, {0x8}}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000880}, 0x20008004) r3 = socket(0x10, 0x803, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x270, 0xd8, 0x8, 0xfa04, 0xd8, 0x6c02, 0x1d8, 0x194, 0x194, 0x1d8, 0x194, 0x3, 0x0, {[{{@ip={@empty=0x1e00, @broadcast, 0x0, 0x8fb2bd54e1114dfe, 'sit0\x00', 'ip6_vti0\x00', {0xff}, {}, 0x6, 0x0, 0x32}, 0x0, 0x98, 0xd8, 0x0, {0x0, 0x74020000}, [@common=@inet=@ecn={{0x28}, {0x10, 0x30, 0x5, 0x8}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x7d, 0x4, "744e0c8559c5a9128a6df634790dc3271e33969086733af137c08495d02d"}}}, {{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@addrtype={{0x30}, {0x1a5, 0xc20, 0x1, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x19}, 0x1, 0x10, [0x18, 0x2f, 0x22, 0x8, 0x1d, 0x18, 0x15, 0x2e, 0x29, 0x32, 0xe, 0x2, 0x1a, 0x31, 0x39, 0x3f], 0x0, 0x8e, 0xffffffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x42000, 0x0) ioctl$PPPIOCNEWUNIT(r5, 0xc004743e, &(0x7f0000001c40)=0x4) ioctl$PPPIOCSMAXCID(r5, 0x40047451, &(0x7f0000000000)=0x8) sendto(r3, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r6 = syz_clone(0x100411, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) ptrace(0x10, r0) ptrace$poke(0x5, r0, &(0x7f0000000000), 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 2m39.628333164s ago: executing program 5 (id=3780): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180), 0xfea7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x17d) mount$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x80, 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000, 0x0) mount$bind(&(0x7f0000000040)='.\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x2a05004, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830500000700ffffff", @ANYRES8=r0], 0x4}}, 0x0) sendfile(r5, r4, 0x0, 0x100000002) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@private0, 0x8000000, 0x0, 0xff, 0x1}, 0x20) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000340)="5706935d68fdac9fc2dcfddc7c5434b2d002e9dd1c223d06c8b7109225b4e063f6e23a923de7a39fd9d2e37e62db5c541f3c105666801c523659deb1f738a72435efb18d42904cb70b04a35f931aa33d6345ab90367005a0f4c8a0487aa0530cdb61aa6009685bd53aaf59099a8ac0bdccc28fa9870add965d1f58b32ca230eaf4c27559e6779bf87bf47c720e9b3f4460a5039980193eb2606ea92747690048211a85e47752225f71495946b97920b2231c6658a7294a86194f5c", 0xbb}, {&(0x7f0000000100)="379ae519b1c2fed28320eb024b8d7b92e3b91ba968fc61f80eb20e02a72f1ec8ab0265e377ba61a751988579c1cc3d4a732d3af7217799c106ef2176d374c95ad92fe0095e29b86e6eada7235cd696bc0f6ca75c67b066f29ecb63e5d44cb34283fa56fb7aaee0e17cad", 0x6a}, {&(0x7f0000000200)="6732618837d285c2f69d869b43fd13cd6ce4e3fd0659156798b552f914cc21120bac613cdc373dea28879e2a3be8cfaeb8352bf79f31ed0104e9b43928cca3b0da40ab", 0x43}, {&(0x7f0000000400)="475367e958ae9771f883d182223f8b2c5fe0c200eaef4a78e0b6da1377d3cde327c01f94c26a894fdcf20977891c4cb280aa22722ea7f99fd008d0ad2dd6aacb18287bc14b1dd6991bd7c34863ec2a2ea690907a91f53238af17ecafaad5991d2b7b245213ed56fdfac1d38e10cb39e10c8c345647eb54abd1a578e3d7a51e224d1a90e630bad0dde6e32609b95bd38479f957fd5ae4d096f0222416ea0f16f95afed23312e3a6659acff4dd1588496119791a75c05ac1f979045e839ca19fbbc8699cd7c64f813d517608730cb343fffff99f0dc5", 0xd5}], 0x4, 0x1) 2m39.301329455s ago: executing program 5 (id=3781): r0 = socket$netlink(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000040)={0xe, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x68180, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6f, 0x1, @perf_config_ext={0x3fffffffb}, 0xc0c8, 0x0, 0x0, 0x3, 0x9, 0x8001, 0x7fff}, 0x0, 0xff6fffffffffffff, 0xffffffffffffffff, 0xb) syslog(0x4, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) epoll_create1(0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="200000006a0005062cbd7000fcdbdf25020000000000000008000a001f477eba"], 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) pselect6(0x0, 0x0, 0x0, &(0x7f0000000240)={0x1f, 0xfffffffffffffffe, 0xe, 0x0, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, &(0x7f0000000280)={0x0, 0x3938700}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) sendmsg$inet6(r6, &(0x7f0000000800)={&(0x7f0000000080)={0xa, 0x4e24, 0x8, @loopback, 0x6}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000100)="88", 0x1}], 0x1}, 0x53) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmmsg$inet(r7, &(0x7f0000000c40)=[{{&(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x23, 0x0}}], 0x3284b164842c97f7, 0x8014) 2m39.084504672s ago: executing program 5 (id=3782): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, 0x2, 0x3, 0x3, 0x0, 0x0, {0x0, 0x0, 0x10}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x1c}}, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x3, 0x3, 0x301, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x0, 0x0, 0x20008015}, 0x4040) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@in={0x2, 0x4e22, @empty}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="6eef9a745d1a27b8f0032eb96877086eb0ab41ad16f9b9f9bc9be20a3f2282419dafc000b58930d2e975bb6d7cd47829d3da7e4e25589754f6b8dc23eb051885bbd75fbec07fb5e5e14b1411780e9289a44577b427684e7fd6b189004b37d22b9f8a71ca8e3fd5e727b17bb3e3bcfea50add0e94a0c9368823317279f0b3ad892af6a63fcc467d74bad79ed1617cd77f89c8c0083b88a8b680e85c3dd554a4e4d90d81124595b3ff94ffe81efc45cda7e0999b99bccfc5535f5f7887c6834f861779cc50d8ca199a3ff4dc017054c1d9bdee0e0fb2b46dfa85", 0xd9}, {&(0x7f0000000380)="8054bd993a6982e94524a64df2af4b4ad5e266d11ac880d39d02be0afecd5d37416637370015e1f45a0c7487108ccf8cf706df816c0e5fb89431fd16281a63bfc53046d3c31fa4f136d42a148c422a6a9f1c4514bfd7436ca6dfc73ccf", 0x5d}, {&(0x7f0000000400)="def74f89f11c0231f1ad734cb4b0d3857d9ebf6bcfc2bd0620731653f7db5c23da35fda98eebcafb37e57c01a16023148cb0b6627e12b0b008e006e5cb8ec57c4a93cbcacff5f7adae9128f7636b359bb100d4bad85800b2931ea89a1e7c6ae86eb41b899de48eadeb3eb82139557be73a628051efb4", 0x76}, {&(0x7f0000000480)="6719171a39fb6d0fb2c603dd28d9ab431e4fa92f13111079993b023ae51ad5369d93b031291a4da0dfd0eec39d9637fcae22f0cac436a077a9acc4634ae477c3f6dd34160054bc2ac3c4df6d6e4c33223efff83a722daa9cf44f2afc992ec4aa05d3a1bd36ec7326d570cae997720ab70d12f7c8e7c4f8efccdef569c1827692ce4e3a77d99a6ae25a86f41efd60a9d618692bbc73008bdac651fb7011aa0020b15bf6189713cdac58782d5a6a36", 0xae}], 0x4}, 0x0) 2m39.036778134s ago: executing program 38 (id=3782): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, 0x2, 0x3, 0x3, 0x0, 0x0, {0x0, 0x0, 0x10}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x1c}}, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x3, 0x3, 0x301, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x0, 0x0, 0x20008015}, 0x4040) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@in={0x2, 0x4e22, @empty}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="6eef9a745d1a27b8f0032eb96877086eb0ab41ad16f9b9f9bc9be20a3f2282419dafc000b58930d2e975bb6d7cd47829d3da7e4e25589754f6b8dc23eb051885bbd75fbec07fb5e5e14b1411780e9289a44577b427684e7fd6b189004b37d22b9f8a71ca8e3fd5e727b17bb3e3bcfea50add0e94a0c9368823317279f0b3ad892af6a63fcc467d74bad79ed1617cd77f89c8c0083b88a8b680e85c3dd554a4e4d90d81124595b3ff94ffe81efc45cda7e0999b99bccfc5535f5f7887c6834f861779cc50d8ca199a3ff4dc017054c1d9bdee0e0fb2b46dfa85", 0xd9}, {&(0x7f0000000380)="8054bd993a6982e94524a64df2af4b4ad5e266d11ac880d39d02be0afecd5d37416637370015e1f45a0c7487108ccf8cf706df816c0e5fb89431fd16281a63bfc53046d3c31fa4f136d42a148c422a6a9f1c4514bfd7436ca6dfc73ccf", 0x5d}, {&(0x7f0000000400)="def74f89f11c0231f1ad734cb4b0d3857d9ebf6bcfc2bd0620731653f7db5c23da35fda98eebcafb37e57c01a16023148cb0b6627e12b0b008e006e5cb8ec57c4a93cbcacff5f7adae9128f7636b359bb100d4bad85800b2931ea89a1e7c6ae86eb41b899de48eadeb3eb82139557be73a628051efb4", 0x76}, {&(0x7f0000000480)="6719171a39fb6d0fb2c603dd28d9ab431e4fa92f13111079993b023ae51ad5369d93b031291a4da0dfd0eec39d9637fcae22f0cac436a077a9acc4634ae477c3f6dd34160054bc2ac3c4df6d6e4c33223efff83a722daa9cf44f2afc992ec4aa05d3a1bd36ec7326d570cae997720ab70d12f7c8e7c4f8efccdef569c1827692ce4e3a77d99a6ae25a86f41efd60a9d618692bbc73008bdac651fb7011aa0020b15bf6189713cdac58782d5a6a36", 0xae}], 0x4}, 0x0) 2m28.022717324s ago: executing program 7 (id=3822): syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='mnt\x00', 0x4, &(0x7f0000000000), 0x0, 0x236, &(0x7f0000000300)="$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") creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0xb000b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={0x0, 0x18}, 0x8000, 0x9, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x7, 0x34328, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x2}, 0x10026, 0x10003, 0xfffffff8, 0x2, 0x100008, 0x20005, 0x9, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r1, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x1f8) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a6c000000060a010400000000000000000200ffff4001435d832f967b006efc04803c0001800b00010065787468647200002c00028005b014008300000008000340000000d5080004400000000008000640000000020800014000000019683735110fd017130900010073797a30000000000900020073797a32"], 0x94}}, 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x801400, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x4600, 0xe898d2275f586838) preadv2(r2, &(0x7f0000000980)=[{&(0x7f0000001200)=""/4096, 0xffffffa4}], 0x1, 0xe00, 0x9, 0x1b) openat$ttyS3(0xffffffffffffff9c, 0x0, 0xc0100, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) pipe(&(0x7f0000000d00)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r5, &(0x7f00000042c0)=[{{&(0x7f00000002c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x4e}}], 0x1, 0x2000c044) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000200)={0x0, 0x14, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="200000001100010100"/20, @ANYRES64=r8], 0x20}}, 0x0) splice(r3, 0x0, r4, 0x0, 0x714f, 0x0) set_mempolicy(0x6005, &(0x7f0000000080)=0x5, 0x7) 2m26.981492999s ago: executing program 7 (id=3831): prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x88}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0xffffeffffffffffe) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)=0xc) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000001f00)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000002140)={&(0x7f00000020c0)={0x1c, r1, 0x1, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4044000}, 0x8080) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000004200"], 0x14}}, 0x44014) recvmmsg(r4, &(0x7f0000000e00)=[{{&(0x7f0000000440)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, 0x0}, 0x800}, {{&(0x7f0000000900)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000980)=""/255, 0xff}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/18, 0x12}], 0x3, &(0x7f0000000ac0)=""/34, 0x22}, 0x81}, {{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000cc0)=""/32, 0x20}, {&(0x7f00000010c0)=""/133, 0x85}], 0x2}, 0x3}], 0x3, 0x2, 0x0) 2m25.982164452s ago: executing program 7 (id=3841): r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x7fff, 0x494900) r1 = syz_io_uring_setup(0xbc3, &(0x7f0000001480)={0x0, 0x124a, 0x80, 0x0, 0x52, 0x0, r0}, &(0x7f00000008c0)=0x0, &(0x7f0000000900)=0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100), 0x802, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index=0xa, 0x0, 0x0, 0x1, 0xc, 0x0, {0x0, r5, r4}}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(r1, 0x47fb, 0x0, 0x0, 0x0, 0x0) 2m25.7478182s ago: executing program 7 (id=3843): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180), 0xfea7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x17d) mount$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x80, 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000, 0x0) mount$bind(&(0x7f0000000040)='.\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x2a05004, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r6, @ANYBLOB="ff830500000700ffffff", @ANYRES8=r0], 0x4}}, 0x0) sendfile(r5, r4, 0x0, 0x100000002) socket$inet6_udp(0xa, 0x2, 0x0) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000340)="5706935d68fdac9fc2dcfddc7c5434b2d002e9dd1c223d06c8b7109225b4e063f6e23a923de7a39fd9d2e37e62db5c541f3c105666801c523659deb1f738a72435efb18d42904cb70b04a35f931aa33d6345ab90367005a0f4c8a0487aa0530cdb61aa6009685bd53aaf59099a8ac0bdccc28fa9870add965d1f58b32ca230eaf4c27559e6779bf87bf47c720e9b3f4460a5039980193eb2606ea92747690048211a85e47752225f71495946b97920b2231c6658a7294a86194f5c", 0xbb}, {&(0x7f0000000100)="379ae519b1c2fed28320eb024b8d7b92e3b91ba968fc61f80eb20e02a72f1ec8ab0265e377ba61a751988579c1cc3d4a732d3af7217799c106ef2176d374c95ad92fe0095e29b86e6eada7235cd696bc0f6ca75c67b066f29ecb63e5d44cb34283fa56fb7aaee0e17cad", 0x6a}, {&(0x7f0000000200)="6732618837d285c2f69d869b43fd13cd6ce4e3fd0659156798b552f914cc21120bac613cdc373dea28879e2a3be8cfaeb8352bf79f31ed0104e9b43928cca3b0da40ab", 0x43}, {&(0x7f0000000400)="475367e958ae9771f883d182223f8b2c5fe0c200eaef4a78e0b6da1377d3cde327c01f94c26a894fdcf20977891c4cb280aa22722ea7f99fd008d0ad2dd6aacb18287bc14b1dd6991bd7c34863ec2a2ea690907a91f53238af17ecafaad5991d2b7b245213ed56fdfac1d38e10cb39e10c8c345647eb54abd1a578e3d7a51e224d1a90e630bad0dde6e32609b95bd38479f957fd5ae4d096f0222416ea0f16f95afed23312e3a6659acff4dd1588496119791a75c05ac1f979045e839ca19fbbc8699cd7c64f813d517608730cb343fffff99f0dc5", 0xd5}], 0x4, 0x1) 2m25.694740413s ago: executing program 7 (id=3845): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x7, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) close(0xffffffffffffffff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0xa, 0x4e21, @empty}, 0xffac, &(0x7f0000000600)=[{&(0x7f0000002440)="a72d11a15c048c0a7d78aebc5cea1f815108f6091475aeec600831aa9d3944e60bc2ad06a619c560aa0118b28f68f1eb14549d633b4b23f179fb680716faa43414787559be90843c35ab30acad8a6740140e02721abc2eb362f7bde53b3c992d3e28ccc20ec84fdc569947047f6c09a647ee8c0a747b951e66c068ccf1af93ee9e6f9528ff79e2f989383b05a690a6bec4634b867c9446c1c644b3010e8a3514c6328323b4bbdd602b8f0dace6aea70902c4ddd2a2f2810f1348b0d0df3c1e6a5938fcfdc87e7580c6be0c6a06eca62d6f787dd16add086a21391c4c707d8b61929d1252681b84c245e0efafe2e6e73ad86a3cf59235ab0eacbb414af92ec3cdac420a064a98e8cc18bdf63f8997f96436e0fe6f06fdbf47fff353b01a861babd4a38d126bfe3e29049e6cc883e6efae6e70ef9ed124b1b09887a58c991e223b6420dca5ae238027e91b17b1707dc5c0d5f59f0ca95614f1ea1d263c1ee54dfe31ae35eb3c8e3b931dff7920c57fbba89adf2e392c1ad719b90c7ade0d38ff9792934ef1fb12f51d8e2fad12486d5883d5b1a46696fad128c6805cfb25bc6487e1e407d6b266971b09d0d864a7a550284e24b6cdc9f4ae1081a638175dffef002c76ac5558d23e41edbe68f4b4950a13aa000326dae5a857603dc5a40d6c6618a98c7b6e1eebd325ea2c14601a25658965f40864fd015d9b2fff83ee5ed3212ebd9fa429f0140f633556ac07c0c08e67a1848c9942ecc47dd4ffede9a429e9e0472be7cdbcd117e621ddf745c00a814ffff0224634472577dc0b35a9c153409f1a2bddc193b20b4d244d9cbbd59816c46000c596865f58b4e640ed4a9ab6086cede697fb113560925498da83273e679e0e28b84961eb7b9c9b4fa916590965c76b48e5d453f27a821bd2bf0946ff2413ec30f7893d1f046e18f736c40ceda26dfc4a0a62f71a3606d3f72c0a858dfd7895e2572292e11af913c6b513a141d28e501ae7c49618d104aac9abb78466a636efb88120d0eef0a501558a5aa34784a9823f2802a0bcdf318f9b436b34b42a2a7cf513f80364ad9a699d2e23eb4f3a2bbce818bd20da61882b3dac699d05dc24f29b72471b712423ace6278c43df2be7a09e815517b86d8b3ce16af3d64a575958c5fd52aac53b391f3d2a67c24c6c13ec11428b61b80a6a58cbba1790a98d190a572070f63fc0b809669895ea9865c3066b06102f6f2c7171dc7f76e1931b3e4deb569ef9d07d5f86a848f50942e93c419c3a23489f14803b08182dfd48b8d4375be6b7f805a21209c05e5927693a8834c8d5a5acbd47ed8a30a8a741d1ad77639b56b3b90c0b2023fa334befd28b2e27cbcd94b0ce7437f88ce67a925cea6d6d7e5313de6d328b1124a8b9ef83fe39ca3da97d33c60b7fd4af67d3c8fccb595a27a5bffc71e5a5b2ec966828993b0c0f83cbc55f9a7fb66a4101d5c83b77885072b6e2b2ceebe32f635509698c05089b9ff1cb1959b211e114dadb224ef2d5e7a3c55b3ac00fcdc9018577603c6301e5d4341b3d7eeb2665349d448d28d5d108f576408cbe533a6adbba18ebb2d84bb9af81108506a2f50fb56d595579000747930449fdf4ed01715ec624a0cb73636a35b9136f10b79e3d7ded09008b92e92c64e26e6b6d17f18b70b1d9813de8d2ff151c7a6a0452c660a57c33f13e2d9b88fa5f5c0505722d2e787a425e4a3e9b5efa9668e9199f5fb9fe7d5b8a57719a57df152e7f2c6a1087a2a24084f82455b65353a70559f04d5ed12defb81497ea69c1c7e69c373524770b7473c16a69c7a3648a9dd93377b89cdff61cf62512d1ee67a55ea67993937c1f55a2179bc9c8a337364cfb84d295adda1ad9700fc2f5c11cbfc1b90affb4666c6e7e23a6f7751410a5651819f29f690c6dba2b8a67e0f7f8cc377feb1854c393578994c85391ba21b3961aed477f771645571dc7d6cae72bf79c82a92a4edc3742b1398060a0a5c9e81c016b7f2ae3db529c6ff824cc28678764d8ab49d7dc68e5b0556c9e7ffb6fef442776d86fbd458741830e57f22a1f8513b92abd5b2df93a67cc560134078f0b8ecc3276e40aadef5cd579888b86b4988f396679250701f3869e7493b33692035ecd94aca5189fd0a0893ccc5bb19c0b4caca86cf90ebc2a5558f39cccb33f6773a4e425bf551fb3b6456ee1cc62fa1843a9e5539bb2d02ae6ef82533a9dbcfb562c1ab18c1f639ae7ff02083746f74a15ba2d10e4b955940a5d6f488d326a99f287c48ad463ce40367aeeff519cbad0a2d7fdbfa48bff75955467977764c2be2bd2ffa18396c46920c40c50a4037003666406d177e2cd20aee423d07169d8f611f635ba0b62b61265ff2c5548446a2423dd1038482b6852b2d9d2f90aa05d82c5e2c3d1af0c7aad72d82b3da67471af7b037bb0424a785e73f35b5a10a2ab300a195c20cd119a5390e0cd5d49c70bd80883b933e843d0d2902749dcf3c140c708a0f004b7a2f50bf311305dc01719016fcce5863815ca7951de710fcb71cd177551ff6fcd9f8bf01b93868f24c6129b6d7917125338cf62110083093fc7f862015d48450d992f2bb43e601cab19b2ea7b83962a382fc2a31fdf2358bf8a9a9e506eaa7b6eb5e7444d1ef459b24ffa51362abce902dfd84201a0e4b5a3b62757aad54fb65b83821c6bba663886de092065a565921ea3eb6781bb8ed4f4db3abcfeeb379b7e52fca790bea719918e299ab01bf5e92177d134360bf7a16a59e9d03d3dcfb0a25599237e3d41b3f0026c9402b1fb1894426303413a2cbcf7c72807ca694afa285990d07c3bca26413c9947b3b344aafc04544b8c11416e0312b028da7302e316c3966d41884b15055a49a4a0b3eac8e11f88a5615fb0af582f065d28e5a454447e9d0cfc60356439ebf7e1d0a00f5b9cc6daf2bd7195ba96b4d1a0679ff0fb1c01282c378a880f90f460889b67d76d4d0e8db6c928d113533d1d10b810303c43d8ff622c5bab7f095b96e64bf9daa48a2bdf3d9d40bac00cf1b66df61a4f7c3e21938e876f81b1179dce6a008f28eb682cae690ced0ea0d542da604d8056f2b1813ed36683c4c51aeb2650772cfb1c55d4e60604ff06344cfc271b2175a6c94defb807af240b483e24298ca73bfc743ca2ca2e77e6d5b817b3c1986601537faf59ac84c74d8bd0c068cb8e6bd03ac2dcf5793fb4a00b3c901a33aa3ee86e4f0db317b94bb8678ab26e36d305ebac4b0f7f164947148255b562dd0f87648499d45bccfb7d8c9d5624cadf8160a396e79fbcdc100058ba4606e41c02fb2cc0dc6c36196bd28acfde82a18cda2321d2d83fecd3b85380667cd1d0bc68298c6c8f10421a80c8fa86912b6c3e8ddd9d9668520d5151409e6b77f0d7730b374a68a744151bfbd123cfdf871e8c24e70d2ca3b50e84a48e0b78c1781000cfc848d43584985763a76c0ab9ba882c55e3e4aa8f2174255db38adb8350b48a77be22a869d13d183325f859b883464e5e46de5ea8a92532b9a794daaeff657cd361f7f158f8bebe36e9de1f5b9721d4263dcc9472229bc02d3f552180abfb25ca7aa36cb914d99c09fd5bb99dcab9b4e3c634d18fc7dfe84dc4425ad1e39c3e7410d49b4ea0a8a2958688c7725822f6dfc0827d19dc385e0e35a949941e4dd1aaeaab9ebe402f8c584bca7efc829f2ccfb63fd7bde1c182a67c14f9d3f033ca674e2604e89cd55a15419f956cd61a755c1b13554dae98e77be078aadfc131c9677381f1dbe6ef194eb17603a463e8b844ab46a6046e1f07d96d66de669359bff4c3d80948a4de3abb2f171a09b5d8999c379fb62244114e218c79805df7d899e5661320ee6721d652b95f09e4dfe69bd67099c73294b17ab574e0b966aa3ab44478965b9dca3cb3b9282945f24ccdd07c638ae25a84a728ca24f87ff49d718121a694be46f3616e27b1041b3c6cd24b9cf775bfc28dfbe0a009048f0599f2d5d6586cfd1e7f7fe69872d08b98f60d28e6af0d49d7f06ad71a7b5c41df261aba5de114022c7288bc265cc17909fdeadc3d7b256d7ab3b96e40f857060f16b54a6bb7248ee571f87ace5ee39eab412706cf52fa711468b21ea129c3f44bceb429fcc1a0ac2aa87b9365077dcfcfa9a1b32a0a09699197c20019a66cbd0a897feab3706c23123b888ada643d4560082033e31596b0483578968e3c9593ebd97141c228a42fc7645f92171c120aabca36657683fd7c72fcb87217f124d6fabc52f1d221d8410b47b0ad4bd944bf4085365e9b52a53911ab4ee142c5a1ebbe034c9d98c538c066f2dc0acf372eb2397dcac765055123e0ba19be22b18c886bf0f7490abe9fde91ffa62e059962bd134be8501cb5b715a744b1398e2c4c7e8afe72e189dda0654296afa1c1f99ab7d800fa40f72a758625c833b6fc7b7d42250522b456e1e7de815350c36c9cb2f4d1c9cb99109f89b456c559463f11b8b58247809b17a4ed4912bd0a47a529f1364d6dc593ea7f3eb98962078ac90e5012ee1c7b4b9ed5a8c7a9c0231b4ce425693faab64fa0f3482a04d4be2e06ee5d103694d288810a1a7f4d1e908dd82dd2016a064ece5cd67ef1dd5f4cda728fc6f1ccdd949dd8f775d862621507248ef4c83ae274969d19c7ddb02a4e8a1ab2b7aa539a442b22735ceedeefe60a1059dfaaa0979ce8d5387b5a047841fd9749b88ca91216b02d7926408a01916b7781bb7167528ccdb9a486d173437a5ba3e552c8674dff2cc9b21054e0e4f86b61b8723fca58ceef4413bffae9e9be79c5b9788f5449811ce78be9bc7a86375a670197baaef751beabcba0aa6c7c33f1cd702cb78ec39fa1f17d9da733d6abf2b80f9c51ac8f6f664b24edc53a7c9525c3016bd05c67272375fe816b2b121f2de68b885a0fd8f8b8c6c342237b632f6414a3eb3480f5f42106c5812e9bfd4e8c8dea8d08525d9aa1da7c7c2ee7ff3d31b79b211dd01e304a8ffc83a89a59f3b1e2ef5e969b6d90bea7e161066f25622fad914bff52bacd2807093dda1838b529ee57f718b374ce2841b924a42457867547a6edcb8412d85f11796742bf640b5819a9546357df778c332af5983c4373a95d9c58b52dba445eee92e6911824f0c534e7a5934d9eac9b7f6fec22002fc53a3003a3304217f567b47cd326edc5f48eb1f46bb20d1e10e72239afc9769344590cf48902aba5405b7d4baa31a912ab398a2f2d3f037614bb56a89244ece50f3a1e058d274f1e70f944eb8a305be91e561e5eb843d057a81f4deb84a6335ec81ca964cdae5f318d4e9aaea2c477cc279c00c698bcfe4b8e04c09079d8f3f5438d9d45a00f50d2f9b245c8c68eebf247e25ba8d26f8b95b21ac9ceb50c0aa2e4bdc032024db216b92f9350a90ac79341af14d3fa8ba908096e1b503341aed667bb184c672dac85fc4f335b3871c3b4e55ea219a857d2d2e135358f6b45a20b3e7de8e09b2041eb7c5084a80258fb524a983752659298a251e178b56f96bc67ae0a78ec92f92d92c9cf0edb5dcb11e739d69410ad44c8df00caa030d7d89f2ec38bd7698115c423cf3e6048793aca08ffbcdac766f1553773fa00031c1d75246e4e1eddf8948d02a3de6d67fd7329e45070f29044587f1e0db50d04e673191a63e30f96ee0d8d52738fab36a7fe2c6ab9301d401e7ca5b1f039193a580e40abbdf40c2d7e27809dec80815d37adae9fe7fb9d3a974c9fc03944d7338d000b81170be4c6792ed6b3b827194b3ae11e2acfca48498d1126aacf80f3d574256ef7f75552ff087a819e", 0xffa0}, {&(0x7f0000001040)="9d7fcf3efc63f4a6a555ba8b4726d7ccaf8a207100e69cfac4377876021d7131b838059f96bd206d4776368ed2a92432e5af71", 0x90}, {&(0x7f0000000580)="24a10f2a16837717b9ac706f53cb04bfe2f26db6fd0918ff7915774192e5003559a7667bf77c485c4952a3d5647790cab7fef3989d2359387ade1a6b3c1d57dae491b8e93df2beee9bddd174f6bd022cd4f8f38b1e40f63e0eab48ddf3775067a0c5b648690d65f30a6c084c813c06e4e167"}], 0x2, &(0x7f0000001940)=[@ip_tos_int={{0x50, 0x29, 0x32}}, @ip_ttl={{0x0, 0xf00}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @loopback}}}], 0x6d}, 0x200000d4) kexec_load(0x5, 0x1, &(0x7f0000000180)=[{&(0x7f0000000340)="766367c3d730b10b9538a1edfa0ab40aeafea0dc8397e87e4b1229d9fdb9484da9350c40505482a12ae22853fb637434f9ddf8914d70e20888c88aa45e0b81c5630c3df356799a9f6a5e2ac32d104342a598b12929e3cbe792ab9c922611133b1fa85f84da5af835ffa32ff2afdd240a793e327066db2318cd4c102b4e0cd769a910ea6f9fcaf29a42ae611a66072bccff021e75e2bada6b6b0edfc457143d95aef2bef0d800193c64f01089a8f8b39c0226139d71951be14312b5612234f695b51d771c7fdeb30e7290a6a83cc52c6eea6efa27539e1b86d2d3ab5056b1e69b5c8318f5ad8b97df860975ce71ac22be08a86e3ff6", 0xf5, 0x0, 0x1000}], 0x280000) 2m25.537426498s ago: executing program 7 (id=3847): pipe(0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) setreuid(0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xfff, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$P9_RGETLOCK(r0, &(0x7f0000000000)={0x28, 0x37, 0x1, {0x2, 0x5, 0x9, r1, 0xa, 'syzkaller\x00'}}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="120000000200000008000000ebd0000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"], 0x50) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x31) socket$inet_tcp(0x2, 0x1, 0x0) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000100)={0x2ffc, 0x6000006, 0xfffffefc, 0x6}, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000160001f47efde4be701161000a000000040000800400", @ANYRES32=r6], 0x1c}, 0x1, 0x0, 0x0, 0x4044}, 0x804) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x80478b, &(0x7f0000000500)={[{@nodioread_nolock}, {@grpjquota}, {@minixdf}, {@discard}, {@prjquota}, {@lazytime}, {@init_itable_val={'init_itable', 0x3d, 0xffff}}]}, 0x0, 0x489, &(0x7f0000000c80)="$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") sendmmsg$inet6(r0, &(0x7f0000002940), 0x40000000000017d, 0x888) 2m25.531818448s ago: executing program 39 (id=3847): pipe(0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) setreuid(0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xfff, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$P9_RGETLOCK(r0, &(0x7f0000000000)={0x28, 0x37, 0x1, {0x2, 0x5, 0x9, r1, 0xa, 'syzkaller\x00'}}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="120000000200000008000000ebd0000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"], 0x50) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x31) socket$inet_tcp(0x2, 0x1, 0x0) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000100)={0x2ffc, 0x6000006, 0xfffffefc, 0x6}, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000160001f47efde4be701161000a000000040000800400", @ANYRES32=r6], 0x1c}, 0x1, 0x0, 0x0, 0x4044}, 0x804) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x80478b, &(0x7f0000000500)={[{@nodioread_nolock}, {@grpjquota}, {@minixdf}, {@discard}, {@prjquota}, {@lazytime}, {@init_itable_val={'init_itable', 0x3d, 0xffff}}]}, 0x0, 0x489, &(0x7f0000000c80)="$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") sendmmsg$inet6(r0, &(0x7f0000002940), 0x40000000000017d, 0x888) 3.354318487s ago: executing program 4 (id=6291): pipe(&(0x7f0000000040)) lstat(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, 0x0) r1 = socket$inet6(0xa, 0x802, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r4, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xfff, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x31) sendmmsg$inet6(r1, &(0x7f0000002940), 0x40000000000017d, 0x888) 3.320767059s ago: executing program 2 (id=6292): socket$inet6(0xa, 0x800, 0x0) r0 = perf_event_open(&(0x7f0000000a00)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x2, 0x650b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x0, @perf_bp={0x0, 0xe}, 0x8, 0x32, 0x43a1bd76, 0x7, 0x9, 0x2, 0x3, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r2, &(0x7f0000001240)=""/102400, 0xffffff8c, 0x200000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), r3) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'pimreg1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000280)={'ip_vti0\x00', 0x0, 0x8, 0x20, 0x3, 0x8, {{0xb, 0x4, 0x1, 0x31, 0x2c, 0x67, 0x0, 0x6, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@cipso={0x86, 0x16, 0xffffffffffffffff, [{0x3, 0x10, "03b160681f61822ac8e9c6b36757"}]}]}}}}}) r8 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000005c0)={'ip6gretap0\x00', 0x0}) setsockopt$packet_int(r8, 0x107, 0xf, &(0x7f0000000000)=0xe9, 0x4) sendmsg$netlink(r8, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000380)=ANY=[@ANYRES64=r8, @ANYRES8=r8], 0xdd12}], 0x1, 0x0, 0x0, 0x4008000}, 0x20040051) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000005c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0xb4, r4, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000000}, 0xc001) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000180)=[{0x6, 0x80, 0x4, 0x7fff0000}]}) r10 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r10, 0x6, 0x0, 0x0, 0x0) r11 = fsmount(r10, 0x0, 0x82) fchdir(r11) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) unlinkat(r11, &(0x7f0000000140)='./file0\x00', 0x200) r12 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r12, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x28) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x1}, [{0x2, 0x1}], {0x4, 0x2}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x2c, 0x1) listxattr(0x0, 0x0, 0x0) r13 = fsmount(r12, 0x0, 0x0) openat$cgroup_subtree(r13, &(0x7f0000000040), 0x2, 0x0) 2.439475128s ago: executing program 4 (id=6303): r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/packet\x00') pread64(r0, &(0x7f0000000100)=""/253, 0xfd, 0x36) (async) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) (async) migrate_pages(r1, 0xffff, &(0x7f0000000000)=0x2, &(0x7f0000000040)=0x7) 2.38949535s ago: executing program 4 (id=6304): pipe(&(0x7f0000000040)) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000000000002) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xfff, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x37, 0x1, {0x2, 0x5, 0x9, 0x0, 0xa, 'syzkaller\x00'}}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="120000000200000008000000ebd0000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"], 0x50) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x31) socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000100)={0x2ffc, 0x6000006, 0xfffffefc, 0x6}, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000160001f47efde4be701161000a000000040000800400", @ANYRES32=r4], 0x1c}, 0x1, 0x0, 0x0, 0x4044}, 0x804) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x80478b, &(0x7f0000000500)={[{@nodioread_nolock}, {@grpjquota}, {@minixdf}, {@discard}, {@prjquota}, {@lazytime}, {@init_itable_val={'init_itable', 0x3d, 0xffff}}]}, 0x0, 0x489, &(0x7f0000000c80)="$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") sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002940), 0x40000000000017d, 0x888) 2.293050243s ago: executing program 8 (id=6308): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) dup(r0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x101c08a, &(0x7f00000001c0)=ANY=[@ANYBLOB="7379735f696d6d757461626c652c757466383d312c696f636861727365743d61736369692c73686f72746e616d653d77696e39352c73686f77657865632c6e66732c636865636b3d7374726963742c756e695f786c6174653d302c757466383d312c73686f72746e616d653d6c6f7765722c73686f72746e616d653d6c6f7765722c726f6469722c726f6469722c64656275672c757466383d302c726f6469722c71756965742c6572726f72733d72656d6f756e742d726f2c009c8a8fc4f74784ad79ec08fb556262ebc972ef94821f3565ef5f75f11e30ef1f72a065c510b17cae352940538b7b2c5d72f4627c25306b2479725add28f511a68f5f6f47f9facdd0cc574286d00ab52d6b9374b6a58eac694336ebe971f41860d01084c1a0fa6b51d80fa9f9d2c5a2e7a5284f93296217ef8f28e0a36e573296a0bfb38b94191f4b82873563f3759b5e193ecfab6ed7892542364757e47d656ad6a0fbb6e8bf138bddae620a3602991821d4844f628e6bdd8b62cca73744332f0185a54b"], 0x6, 0x2c1, &(0x7f0000001880)="$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") ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000280)=@urb_type_control={0x2, {0x9, 0x1}, 0x3, 0x4, &(0x7f0000000040)={0x5, 0x7, 0x84b6, 0x4, 0x4}, 0x8, 0x7, 0x0, 0x0, 0x8001, 0x0, &(0x7f0000000100)}) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757813"], 0x65) (async, rerun: 64) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x4, 0x0, 0x0, 0x1b, "0062ba7d820700000000000000000000096304"}) (rerun: 64) r2 = syz_open_pts(r0, 0x80) r3 = dup3(r2, r0, 0x80000) ioctl$TIOCGSERIAL(r3, 0x541e, 0x0) (async) r4 = memfd_create(&(0x7f0000000b40)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xadNaC\xa6\xf9\xa7>c\x84\xd8\xfa\xf1\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8g8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd93\xd8\x12\x8cXc5%\x03\x8d`\xdayC\x9b\x9a\xd9c\xe9\xb4\v\x99\x87\xe4\x00\x8a\x8eS\x8e\f\x05ZH\xa2\x0e\xbc\x9c\x95\b2Cf6\x9a\xe7\xb9\x86\xbe\xd0\xda\x91\xc1sl\x11PA\x93\xa5\x93\xc8\xf1w\x7fp6z\xbf\xe8[\'u\xb8\xd2$K\x12\rt\x87\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00r\xe2`\xdf\xd2\xb3\xaf\xe9\xc4!Z\xb4&\xa2\x12\xe2i\x91kC$A\xafR\xb3\xff\x1d=Z\x0e\xde\x99\xec\x10\xb4+\x13\'\x92>\x14\x00\a\xb6R\x8b\xdcz\xc3\xd1Y\xd6\xd9;s \xb0\x938\xb7D9\xdcN\xbd\xdbn\xe35\xa7\x02\x9c\xc1\xd9\x13?\xc9\xd7\xab\x9c\xf3\x82\xd1\xee^kk\xce\xdbn\x02\x1f\x80\t\xdbr\xa9\xcc\xf1\xcb\x9f@\x8c\xfc\x02W/p\x97\xb0\xbd\x8f\xdb|n2a\xee\x95u\x83\xca\x8a>}\xd3\xd0\xff6.pa\x17\xe3e\xd2\x7f\xf6\xbc\x9d\x112\x1b\x14p\xa1\xd6u\xefn\xb4\xa3\x05D\x8c\xc5l\xcc\b\xeb\xf42\xe9\xf15\xf3\xf2\xee\xd6\xed\t\xb3\xf7\x1a\x7f\xe6\xb4z\x19\xe1\xb4w\xf7\xa6\xd7\\\xfa\x96\xe2\xf9\xb1\x81\xba\xdfg\xadI\x1c\xde*_\xd5\xdf\xeeA\xcd \x91\xc9\xd4\xd1\xcd*.t\x80]\xd5~\xfb\xfb>\x9d\x91Kq]N\x87\x0f\x04L\xd4(\xf2G \xfdr~:\xc4\xc3\xfe\x14G\xadG~^l\xe0:(Y`\x0e\x90\xfa\x1c\xb6\f6\x92B\x92\xd3\xa9BG\xd2*AB\x1e\x01\xf0m+\x02\x87\x81aj;\xb6y.g\xeb\xc4\x0f\xd3\x85\xa5\x00\xa1\xa6iP\x0f\x02\x14\x90q\x94\xab\xb3\x0f\x01=\x06\x98\xa8\x87\xd9=\xce\xbef<\x1d\v\xba[\xd8]\x9e\xf30\xb8\xf1\b\x06M\x18w\xdc\x0e\x98?\x04G\xf9\x99\xab\xc1\xc0z\xe9Fu\x03\x9aj\xc0]\xb47\xd5\xb8]\x98y@\x8c\x8fM\x8c],\x1b\x03\xaa\'gv\xeb\xbf\xa8d\"\x94e3Q\xfci\xdf\xad\x819\xd1\xf3\xaa\xc8i\xf2\x8a\xc4CU3\x87Ns\x9f\x9f\xcd\x05\x06g\x9aRBg\x98\x10Ch\x1c\x96\xd3\xce', 0x7) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2000002, 0x10012, r4, 0x6f52c000) (async, rerun: 32) read(r4, &(0x7f0000000000)=""/269, 0x10d) (async, rerun: 32) r5 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x1000) (async) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r7 = fsopen(&(0x7f00000006c0)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) (async) r8 = fsmount(r7, 0x0, 0x0) fchdir(r8) (async) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x20010, 0xffffffffffffffff, 0x33ed0000) (async) r9 = open(&(0x7f0000000040)='.\x00', 0x20000, 0x0) getdents64(r9, &(0x7f0000000fc0)=""/224, 0xe0) (async) getdents64(r9, &(0x7f0000000fc0)=""/224, 0xe0) (async) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, 0x0) (async) syz_open_pts(r5, 0x40002) 2.255074064s ago: executing program 8 (id=6310): r0 = socket$netlink(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0xb, &(0x7f0000000100)=0x800000, 0x48) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000cc0)=@newtaction={0x14, 0x1c, 0x115, 0x0, 0xffffffff, {0x0, 0x0, 0x1300}}, 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x4000000) r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD_OLD(r3, 0x40045402, &(0x7f0000000140)=0x1) read(r3, 0x0, 0x0) listen(r2, 0xfffffffc) socket$inet_mptcp(0x2, 0x1, 0x106) socket$inet_mptcp(0x2, 0x1, 0x106) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x189000, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10) 2.185410937s ago: executing program 8 (id=6313): pipe(&(0x7f0000000040)) lstat(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, 0x0) r1 = socket$inet6(0xa, 0x802, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r4, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xfff, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x31) sendmmsg$inet6(r1, &(0x7f0000002940), 0x40000000000017d, 0x888) 1.961435404s ago: executing program 2 (id=6314): bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = syz_usb_connect(0x0, 0x2d, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x240, 0x0) ioctl$SIOCGSKNS(r1, 0x894c, &(0x7f0000000100)={'virt_wifi0\x00', 0xe00}) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffff1704b45adbde08004500003c0000000000019078ac1e0001ac1414aa05009078e00000e0480c000000ffffff7f330000ac1414aa000000008303000707fc640101010000"], 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/key-users\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x2) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0xa8, &(0x7f0000000040)=ANY=[@ANYBLOB="6b0ee0b3d41b1b"]) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000044c0), 0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x20000, &(0x7f0000000180)={&(0x7f00000026c0)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x2}, {0xffff, 0xffff}, {0xfff2, 0x2}}, [@qdisc_kind_options=@q_cbs={{0x8}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18, 0x1, {0x0, '\x00', 0x1, 0x7, 0xb, 0x8}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000004700)={'team0\x00', 0x0}) syz_usb_connect$cdc_ncm(0x2, 0x93, &(0x7f00000002c0)={{0x12, 0x1, 0x110, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x81, 0x2, 0x1, 0x8, 0x80, 0xa, "", {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x6, 0x24, 0x6, 0x0, 0x1, '!'}, {0x5, 0x24, 0x0, 0x1}, {0xd, 0x24, 0xf, 0x1, 0x8, 0xe, 0x240, 0x59}, {0x6, 0x24, 0x1a, 0xbb, 0x4}, [@country_functional={0x8, 0x24, 0x7, 0x6, 0x3, [0x5]}, @acm={0x4, 0x24, 0x2, 0x1}, @acm={0x4}, @mbim={0xc, 0x24, 0x1b, 0x9, 0x6, 0xf, 0x3, 0x5, 0x8}, @mbim_extended={0x8, 0x24, 0x1c, 0x3, 0x3, 0x9}]}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0x6, 0x4, 0x7}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x40, 0x7, 0xb, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x9, 0x4, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x200, 0x9e, 0x3, 0x7, 0x40, 0x4}, 0xf, &(0x7f0000000380)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x10, 0x9, 0xd5, 0x8}]}, 0x2, [{0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0x43e}}, {0x4, &(0x7f0000000440)=@lang_id={0x4, 0x3, 0x437}}]}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000004bc0)={0x0, 0x0, &(0x7f0000004b80)={&(0x7f00000047c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYBLOB="050427bd7000fedbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="4400028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e6365"], 0x60}, 0x1, 0x0, 0x0, 0x4000401}, 0x44084) 1.50127203s ago: executing program 4 (id=6315): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='rdma.current\x00', 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_devices(r0, &(0x7f0000000280)=ANY=[@ANYRES32=r0], 0xffdd) (fail_nth: 9) 1.377512994s ago: executing program 9 (id=6317): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a68000000060a0b040000000000000200020000003c000480380001800e000100627974656f726465720000002400028008000140000000170800024000000014080001400000000a08000440000000700900010073797a30000000000900020073797a320000000014000000110001000000000000000300000a"], 0x90}}, 0x0) 1.165017381s ago: executing program 8 (id=6318): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x321, 0x70bd27, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x4040000) (fail_nth: 1) 1.163909771s ago: executing program 2 (id=6320): r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000240), &(0x7f0000000300)='./file0\x00', 0x8, 0x7) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000140)=0x6, 0x4) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000200), 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="940000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002802c00018014000300fe8000000000000000000000000000aa14000400fe80000000000000000000a2ef816aaa0c0002800500010000000000080007"], 0x94}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)={0x14, 0x2, 0x1, 0x5, 0x0, 0x0, {0x2, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x20044804}, 0x40040) sendmsg$IPCTNL_MSG_CT_GET_DYING(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x6, 0x1, 0x101, 0x0, 0x0, {0x2, 0x0, 0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x2404c031}, 0x40) sendmsg$IPSET_CMD_ADD(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYRES64=r1], 0x44}, 0x1, 0x0, 0x0, 0x40}, 0x200480c4) r5 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) fstat(r6, &(0x7f0000000440)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000580)={'ip6gre0\x00', 0x0}) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), r1) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r10 = openat$selinux_policy(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r10, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r10, 0x89f8, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000001500)={'sit0\x00', 0x0, 0x70f, 0x1, 0x3, 0x6, {{0x5, 0x4, 0x2, 0x1, 0x14, 0x64, 0x0, 0x6, 0x29, 0x0, @multicast1, @private=0xa010102}}}}) r11 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x189703, 0x0) ioctl$TUNSETIFF(r11, 0x5452, &(0x7f0000000000)={'pim6reg\x00', 0x800}) close(r11) write$selinux_load(r9, &(0x7f0000000000)=ANY=[], 0xfd44) sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xfc, r8, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8001}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK={0xd4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4573}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x20000801}, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) 1.163631601s ago: executing program 9 (id=6321): syz_emit_ethernet(0x4a, &(0x7f000001f8c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff88644500003c0036002100069078e0000002ac1e000100a2f5d0475800"/74], 0x0) unshare(0x20040600) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0xcf, 0x180, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0xa5b0, 0x6}, 0x0, 0x0, 0x10000, 0x7, 0x2, 0xfffffffa, 0x8, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) fcntl$lock(r0, 0x5, &(0x7f0000000280)={0x1, 0x1, 0x6000000000000, 0x800}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0x0, 0x0, 0x0, 0x40000005, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_io_uring_setup(0x512, &(0x7f0000000280)={0x0, 0xc65d, 0x100, 0x4, 0x40}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r3 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$poke(0x4212, r3, 0x0, 0x200000000001) bpf$PROG_LOAD(0x5, 0x0, 0x0) timer_delete(0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge0\x00'}) sendmsg$nl_route(r4, 0x0, 0x0) 1.099839183s ago: executing program 9 (id=6322): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000200)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@errors_remount}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@noauto_da_alloc}, {@errors_remount}]}, 0x11, 0x553, &(0x7f0000000440)="$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") setxattr$incfs_metadata(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280), 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x1b, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000000400000000000000c3a00000410000009500575b1eb02c0b35000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0x26, &(0x7f0000000100)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x17, 0x10, 0x0, 0xffffff04, 0x61e5cc96}, 0x22) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0x7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000140)="91f8a9", 0x3}], 0x1}}], 0x1, 0x2090) rename(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180)='./file1\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0), &(0x7f00000000c0), 0x5f, 0x0) 1.037242545s ago: executing program 2 (id=6323): r0 = mq_open(&(0x7f0000000000)='e_1\x00', 0x40, 0x23, &(0x7f0000000080)={0x8000000040000000, 0x4, 0x4, 0x9}) mq_timedsend(r0, 0x0, 0x0, 0x1000000000009, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='clear_refs\x00') r2 = memfd_create(&(0x7f00000003c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xact\xf4\x06\x9c&\xf5\xe3j\xfa\tcqM\xb8R\x86\xd9\xd2.\x9f\x12\xed\x10\f\xbd\x1a|\x8a\xbb\xda\xcfY\x98gU@\xf2M\xc0\xb5\xdf\x9a\x8d\xdb,n\xae\x0eT\x80\x8c\xfd\xd7\xb0\x94\x82t\x96\rKx\xc5\x9b\x8c\x87\x96\x8bc\xbc\xee\xcc\x9f\xfbF\x99V4\x8f\xdb\xed\x1b\x05\xec\xfc\xd1\xb5\xfd\xec@\xdeU\xdd\xa4\xc1\xe4L)\x8e\xe5\x91\x8e\xd4\x89\xef\x95T\x05G\xac\xb8\xc1: )mh\xc7\xf1?\xbb\x13;\xad\x95\xd70\xb6\x0e\x7f\x84r\x0e\xbf\xc5\xf6\xd4\xdd\t\x14\x18\xf7\xefi\x93\x03\xd2\xe8\bK\"\xd2\xb5\xaa\xb8\xc8\xe0\xac\x99\xe8su\xcd\xc3E\x12\xd7\xdd\x96!\x16Tu\xe3\xf0\x84#R\xd9\xe3~Wj\xb0r\x87\'\xea\a\xcfOeK\x9daW\xf4\x87@\x9c\xf3\xf1K\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x91\xe6\xdb\xc2\xa5h\'\xdfIn\x97\x0263~\xeb\xbe(i\n\xc2k4\x7f\x12\xa9e`\x01Os\x8c\xb4\xe7FeQ\xc6$\x92j_U\xfa\b\xea\xb0bYkW\xc0\x05\aC{\xcc\x03T\x17\xa5Sk\x87P\xc2\x97D\xb2\xfa\x1b\x9fe\xf4\x10\x1a\xad\x92\xce\x88\x1b\xbc\xe14\x19\xaa\xd3\r\xf4\xa2\xc3\x8f\x13\xda\x95\xec\"\x95\xc5B\x9dE\xe1\xd0_b\xf8\x97\x03\x15\xaa\x920\xdcrI\xd8\b\xfb\xc7\xe7xX\x00>d\xbb\xa71\xad\x9a\xfb\xe6\x13\x87\x93\\\xe5W\x06|\x1c\x80\xbc\x840x0, 0x4, 0x80, 0xfe, 0xd9, 0x2e, @private1, @private0, 0x40, 0x7800, 0x2, 0x2}}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000004c0)={0x3, &(0x7f0000000140)=[{0x20, 0x2, 0x81, 0xfffff034}, {0x50, 0x0, 0x8}, {0x6, 0xba, 0x2, 0xefff}]}, 0x10) sendto$inet6(r5, &(0x7f0000000180)="1a", 0x34000, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x10, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', r4, 0x2}, 0x94) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001800)={0x6, 0x3, &(0x7f00000006c0)=@framed, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000800)={0xffffffffffffffff, r8, 0x25, 0x0, @val=@netkit={@void, @value=r9}}, 0x1c) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f00000000c0)={0x18}) mq_timedreceive(r0, &(0x7f0000000140)=""/117, 0x75, 0xf0ffffff7f0000, 0x0) r10 = socket(0x2, 0x80805, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r10, 0x0, 0x60, &(0x7f0000000940)={'filter\x00', 0x7, 0x4, 0x3f0, 0x0, 0xe0, 0x308, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@arp={@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xff, 0xff000000, 0x4, 0xb, {@empty, {[0xff, 0xff, 0x0, 0xff]}}, {@empty, {[0xff, 0xff, 0x0, 0x0, 0xff, 0xff]}}, 0xff00, 0x5, 0x1, 0xffff, 0x8, 0x2, 'veth1_virt_wifi\x00', 'veth1_to_bond\x00', {}, {0xff}, 0x0, 0x100}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local, @loopback, 0x2, 0x1}}}, {{@arp={@private=0xa010101, @loopback, 0xff, 0x0, 0x5, 0x6, {@empty, {[0xff, 0xff, 0x0, 0xff, 0xff]}}, {@empty, {[0xff, 0x0, 0xff]}}, 0x5, 0x2, 0x5c9, 0x6, 0xff1f, 0x6, 'batadv_slave_1\x00', 'batadv0\x00', {0xff}, {}, 0x0, 0x11}, 0xc0, 0xe8}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@arp={@rand_addr=0x64010100, @private=0xa010100, 0xffffffff, 0x0, 0x5, 0x9, {@mac, {[0x0, 0xff, 0x0, 0xff, 0xff, 0xff]}}, {@mac=@broadcast, {[0xff, 0xff, 0x0, 0xff, 0xff, 0xff]}}, 0x3, 0x9, 0x9, 0x40, 0x6, 0x62e, 'veth1_to_hsr\x00', 'veth1\x00', {}, {}, 0x0, 0x220}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={'\xaa\xaa\xaa\xaa\xaa', 0x3b}, @mac=@dev={'\xaa\xaa\xaa\xaa\xaa', 0x31}, @broadcast, @local, 0x2}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) 1.036951015s ago: executing program 8 (id=6324): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xe723, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x3, 0x0, 0x0, 0xff}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, @generic={0x25}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) socket(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd502"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000500)=ANY=[@ANYBLOB="68f28793"], 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f0000002340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x8) syz_init_net_socket$llc(0x1a, 0x1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000200)={0x0, 0x0}, 0x0) r1 = syz_io_uring_setup(0x10d2, &(0x7f0000000240)={0x0, 0x7734, 0x80, 0xfffffffd, 0x353}, &(0x7f00000003c0)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x15523ea56aa22b9a, 0x0, 0x0, 0x0, 0x12345}) io_uring_enter(r1, 0x47bc, 0x0, 0x0, 0x0, 0x0) r4 = syz_clone(0x11, 0x0, 0xb, 0x0, 0x0, 0x0) r5 = syz_pidfd_open(r4, 0x0) pidfd_send_signal(r5, 0x0, 0x0, 0x4) socket$inet6_sctp(0xa, 0x1, 0x84) set_mempolicy(0x4003, &(0x7f0000000200)=0x7, 0x3) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000040)={0x2, 0x4e22, @loopback}, 0x10) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@rdma_args={0x48, 0x114, 0x1, {{0x317, 0xf}, {&(0x7f0000000240)=""/214, 0xd6}, &(0x7f0000000500)=[{&(0x7f0000000340)=""/204, 0xcc}, {&(0x7f0000000440)=""/129, 0x81}, {&(0x7f0000000100)=""/1, 0x1}], 0x3, 0x8, 0x5}}], 0x48, 0x20040811}, 0x0) socketpair(0x1, 0x1, 0x7, &(0x7f0000000000)) 867.410901ms ago: executing program 4 (id=6325): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f00000002c0)={[{@test_dummy_encryption_v1}, {@usrjquota}, {@auto_da_alloc}, {@init_itable}, {@nodioread_nolock}, {@journal_checksum}, {@max_batch_time={'max_batch_time', 0x3d, 0x5}}]}, 0x1, 0x587, &(0x7f0000000940)="$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") setxattr$incfs_metadata(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280), &(0x7f0000000380)="30573472b621739984c336124406e8a5c812ca847e3bf1b82ec91d46ab", 0x1d, 0x1) socket$netlink(0x10, 0x3, 0x0) socket$kcm(0xa, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[], 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000), 0xc) request_key(&(0x7f0000002800)='dns_resolver\x00', &(0x7f0000002840)={'syz', 0x1}, 0x0, 0x0) 857.063761ms ago: executing program 1 (id=6326): r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x4, @multicast}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8a, &(0x7f00000003c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000040)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0xfffd, r1, 0x0}]) write(r1, 0x0, 0x0) recvmmsg$unix(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x180, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000001200)=@raw={'raw\x00', 0x8, 0x3, 0x368, 0x0, 0x11, 0x148, 0x1d0, 0x0, 0x2d0, 0x2a8, 0x2a8, 0x2d0, 0x2a8, 0x3, 0x0, {[{{@ip={@local, @remote, 0xffffff00, 0xffffff00, 'tunl0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x8df99b1a23f10045, 0x0, 0x8}, 0x0, 0x188, 0x1d0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x8003, 0x7}}}, @common=@unspec=@conntrack2={{0xc0}, {{@ipv4=@remote, [0xffffff00, 0xff, 0xffffff00, 0xff], @ipv4=@loopback, [0x0, 0xffffff00], @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, [0xffffff00, 0xff000000, 0xffffff00], @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}, [0xff000000, 0xff000000, 0xff], 0x8, 0x6, 0x5e, 0x4e21, 0x4e23, 0x4e24, 0x4e21, 0x0, 0xe9f19ef60d79e0a7}, 0x40, 0x8e0}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0xffffffff, 'vlan0\x00', 'netdevsim0\x00', {}, {}, 0xc}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@addrtype={{0x30}, {0x242, 0x75f65a4e97d6873f, 0x1}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x3, 0x6, 0x2}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) connect$unix(r2, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) syz_emit_ethernet(0xae, &(0x7f0000000000)={@broadcast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "120008", 0x78, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xa, "a78ce54006598080a8030037004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af1803"}, {0x0, 0x1, "00e9ff06ffffaf64000000a2"}, {0x0, 0x1, "fe906d26efe3"}]}}}}}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r5, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0xc}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7b}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x47}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000080}, 0x2000000) 814.819833ms ago: executing program 4 (id=6327): ioperm(0x40, 0x9, 0x7f) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x4, 0x7, 0x50000}]}) syz_clone(0xb44040, 0x0, 0x0, 0x0, 0x0, 0x0) setitimer(0x1, &(0x7f0000000080)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) statx(0xffffffffffffffff, 0x0, 0x800, 0x404, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fstat(r0, 0x0) setresuid(0x0, 0x0, 0x0) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x2) syz_io_uring_setup(0x7394, &(0x7f0000000000)={0x0, 0x2cbe, 0x1, 0x7, 0x33b}, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="010000000a0000000800000008"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000500), 0xce, r3}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000480), 0x0}, 0x20) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x118, &(0x7f0000000140)=0x270, 0x0, 0x4) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="03040000b5"], 0xc8) 637.231549ms ago: executing program 1 (id=6328): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000140)=ANY=[@ANYRESHEX], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xa}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x7}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = socket(0x10, 0x803, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team_slave_1\x00'}) sendmsg$nl_route_sched(r1, 0x0, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x24040084) r3 = perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) getsockopt$bt_hci(r4, 0x84, 0x3, 0x0, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000100)=0x207, 0x4) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000005c0)={'wg2\x00'}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="600000000206010800000000000000000000000005000400000000000900020073797a31000000001400078008001240000000000500140008000000050005000a000000050001000600000011000300686173683a69702c706f7274"], 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_IOC_SETTIMEOUT(r3, 0x80049367, &(0x7f0000000280)=0x80000000) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000440)=0x4, 0x4) sendmsg$IPSET_CMD_ADD(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000c80)=ANY=[@ANYBLOB="5c00000009060108fffffc0000000000070000000900020073797a31000000000500010007000000340007801800018014000240fe8000000000000000000000000000bb060004400e1f00cd050007008800000006000540"], 0x5c}, 0x1, 0x0, 0x0, 0x10000042}, 0x90) 635.613889ms ago: executing program 1 (id=6329): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xe723, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001b80)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000020000006a0a00fe00000000850000000a000000b70000000000000095000000000000009cc6b3fcd62c7d376238975d43a4505f80fc88943c4f0cf08e467b592f868ee30a0e8c1bf176db2a6b2feb4b6fd3d5707bfd2d84aaa3b1d4e984c46ea7e2a447a36f5662403e1b2be4cc7c2683908a0d411a9872971c7c56f0979bd10b97163c1d6d0e196bf02f46c7e81eb72c00000000d0d26b5069f8a98f7dc8f76b74635fde9ca3c00cb9bf4e418d07fa22f0610a70f2bdf4000000000000b0c2940dd8e263aa743f7555193161f45346b1004006000000e1ffff8816326d7d25c32aac1c7d5b5be399f6609876b5887437a172fbc02a74067529194e533583412dff048f000000008b260000b2728a0481e9f0da43bb6cfb851cd364ff19ffcafe3e64be033c9d2f002cc93c1c13caec04a347383420336bec88c24a9fb6a6991ddb737d527d6acb15426415b6e8b14fdfa2c6e94bf1339454c13ad3e328a100000000b515a1000000000000000eb2e9c15b6c8f6198282df27badac8507bc7d202e0990e0"], &(0x7f0000000340)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x1, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x50) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000071000100000000000000000007000000", @ANYRES32=r3, @ANYBLOB="0c000180080001000300010020"], 0x44}}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r5 = fsmount(0xffffffffffffffff, 0x1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{0x1, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f00000006c0)=r0}, 0x20) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)={0x1b, 0x0, 0x0, 0xd3, 0x0, 0x1, 0x2d, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x12, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ldst={0x3, 0x0, 0x1, 0x0, 0x6, 0x8, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @generic={0x6, 0xc, 0xe, 0x4, 0x8da}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x78989bbe, 0x5, &(0x7f0000000140)=""/5, 0x41000, 0x61, '\x00', r3, @fallback=0x23, r4, 0x8, &(0x7f0000000440)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x8, 0x4, 0x2}, 0x10, 0xffffffffffffffff, r5, 0x4, &(0x7f00000007c0)=[r6, r7], &(0x7f0000000800)=[{0x2, 0x3, 0x5, 0x6}, {0x3, 0x4, 0xe, 0x6}, {0x2, 0x1, 0xb, 0x2}, {0x3, 0x3, 0x0, 0xc}], 0x10, 0xfffffff7}, 0x94) r8 = syz_io_uring_setup(0x54d, &(0x7f0000000540)={0x0, 0x735d, 0x100, 0x805, 0x350}, 0x0, 0x0) r9 = syz_io_uring_setup(0x10d2, &(0x7f0000000240)={0x0, 0x7734, 0x800, 0x0, 0x353, 0x0, r8}, &(0x7f0000000980)=0x0, &(0x7f0000000900)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r10, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r10, r11, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x15523ea56aa22b9a, 0x0, 0x0, 0x0, 0x12345}) io_uring_enter(r9, 0x47bc, 0x0, 0x0, 0x0, 0x0) 617.360329ms ago: executing program 1 (id=6330): bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = syz_usb_connect(0x0, 0x2d, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x240, 0x0) ioctl$SIOCGSKNS(r1, 0x894c, &(0x7f0000000100)={'virt_wifi0\x00', 0xe00}) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffff1704b45adbde08004500003c0000000000019078ac1e0001ac1414aa05009078e00000e0480c000000ffffff7f330000ac1414aa000000008303000707fc640101010000"], 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/key-users\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x2) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0xa8, &(0x7f0000000040)=ANY=[@ANYBLOB="6b0ee0b3d41b1b"]) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000044c0), 0xffffffffffffffff) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x20000, &(0x7f0000000180)={&(0x7f00000026c0)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x2}, {0xffff, 0xffff}, {0xfff2, 0x2}}, [@qdisc_kind_options=@q_cbs={{0x8}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18, 0x1, {0x0, '\x00', 0x1, 0x7, 0xb, 0x8}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000004700)={'team0\x00', 0x0}) syz_usb_connect$cdc_ncm(0x2, 0x93, &(0x7f00000002c0)={{0x12, 0x1, 0x110, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x81, 0x2, 0x1, 0x8, 0x80, 0xa, "", {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x6, 0x24, 0x6, 0x0, 0x1, '!'}, {0x5, 0x24, 0x0, 0x1}, {0xd, 0x24, 0xf, 0x1, 0x8, 0xe, 0x240, 0x59}, {0x6, 0x24, 0x1a, 0xbb, 0x4}, [@country_functional={0x8, 0x24, 0x7, 0x6, 0x3, [0x5]}, @acm={0x4, 0x24, 0x2, 0x1}, @acm={0x4}, @mbim={0xc, 0x24, 0x1b, 0x9, 0x6, 0xf, 0x3, 0x5, 0x8}, @mbim_extended={0x8, 0x24, 0x1c, 0x3, 0x3, 0x9}]}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0x6, 0x4, 0x7}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x40, 0x7, 0xb, 0x3}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x9, 0x4, 0x1}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x200, 0x9e, 0x3, 0x7, 0x40, 0x4}, 0xf, &(0x7f0000000380)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x10, 0x9, 0xd5, 0x8}]}, 0x2, [{0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0x43e}}, {0x4, &(0x7f0000000440)=@lang_id={0x4, 0x3, 0x437}}]}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000004bc0)={0x0, 0x0, &(0x7f0000004b80)={&(0x7f00000047c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYBLOB="050427bd7000fedbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="4400028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e6365"], 0x60}, 0x1, 0x0, 0x0, 0x4000401}, 0x44084) 305.36358ms ago: executing program 8 (id=6331): pipe(&(0x7f0000000040)) lstat(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, 0x0) r1 = socket$inet6(0xa, 0x802, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xfff, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/32], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$P9_RGETLOCK(r1, &(0x7f0000000000)={0x28, 0x37, 0x1, {0x2, 0x5, 0x9, r2, 0xa, 'syzkaller\x00'}}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="120000000200000008000000ebd0000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"], 0x50) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x31) sendmmsg$inet6(r1, &(0x7f0000002940), 0x40000000000017d, 0x888) 129.287306ms ago: executing program 9 (id=6332): syz_emit_ethernet(0x4a, &(0x7f000001f8c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff88644500003c0036002100069078e0000002ac1e000100a2f5d0475800"/74], 0x0) unshare(0x20040600) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0xcf, 0x180, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0xa5b0, 0x6}, 0x0, 0x0, 0x10000, 0x7, 0x2, 0xfffffffa, 0x8, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) fcntl$lock(r0, 0x5, &(0x7f0000000280)={0x1, 0x1, 0x6000000000000, 0x800}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0x0, 0x0, 0x0, 0x40000005, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_io_uring_setup(0x512, &(0x7f0000000280)={0x0, 0xc65d, 0x100, 0x4, 0x40}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r3 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$poke(0x4212, r3, 0x0, 0x200000000001) bpf$PROG_LOAD(0x5, 0x0, 0x0) timer_delete(0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge0\x00'}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) 128.956526ms ago: executing program 2 (id=6333): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a68000000060a0b040000000000000200020000003c000480380001800e000100627974656f726465720000002400028008000140000000170800024000000014080001400000000a08000440000000700900010073797a30000000000900020073797a320000000014000000110001000000000000000300000a"], 0x90}}, 0x0) 120.073446ms ago: executing program 2 (id=6334): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000e200000000611118"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000140)={0x28, 0x0, 0x2710, @local}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) syz_clone(0x140011, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x8, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0xc, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1d, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f68737200"], 0xfc}}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xe}, 0x1c) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x20) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a78000000090a010400000000000000000100000208000a400000000008000640ffffff000900010073797a3000000000080005400000001c0900020073797a3200000000080003400000008c2c000980280002800c00018008000140000000090c00018008000140000000080c0001800800014000000006"], 0xa0}, 0x1, 0x0, 0x0, 0x4404c810}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) shmget$private(0x0, 0x4000, 0x54001800, &(0x7f0000000000/0x4000)=nil) sendmsg$nl_route(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00'], 0x24}, 0x1, 0x0, 0x0, 0x4004001}, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="03062fbd7000fcdbdf25030000000c00018008000100", @ANYRES32=r8, @ANYBLOB="050005000000000005000200"], 0x30}, 0x1, 0x0, 0x0, 0x42000}, 0x4000054) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r9, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xfb, "2af01c3d0040fbffffffffffffff00"}) syz_open_pts(r9, 0x0) 110.818546ms ago: executing program 9 (id=6335): fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}]}, &(0x7f00000002c0)=0x10) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x83, 0x0, &(0x7f00000010c0)) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000000040)) 5.26361ms ago: executing program 9 (id=6336): pipe(0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) setreuid(0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000000000002) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xfff, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$P9_RGETLOCK(r0, &(0x7f0000000000)={0x28, 0x37, 0x1, {0x2, 0x5, 0x9, r1, 0xa, 'syzkaller\x00'}}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="120000000200000008000000ebd0000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"], 0x50) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x31) socket$inet_tcp(0x2, 0x1, 0x0) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000100)={0x2ffc, 0x6000006, 0xfffffefc, 0x6}, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000160001f47efde4be701161000a000000040000800400", @ANYRES32=r6], 0x1c}, 0x1, 0x0, 0x0, 0x4044}, 0x804) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x80478b, &(0x7f0000000500)={[{@nodioread_nolock}, {@grpjquota}, {@minixdf}, {@discard}, {@prjquota}, {@lazytime}, {@init_itable_val={'init_itable', 0x3d, 0xffff}}]}, 0x0, 0x489, &(0x7f0000000c80)="$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") sendmmsg$inet6(r0, &(0x7f0000002940), 0x40000000000017d, 0x888) 5.06683ms ago: executing program 1 (id=6337): mount$tmpfs(0x0, &(0x7f0000000540)='./cgroup\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{}]}) r0 = socket(0x18, 0xa, 0x80000000) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000000)) 0s ago: executing program 1 (id=6338): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xc1c, &(0x7f0000000300)={[{@discard}, {@jqfmt_vfsv0}, {@journal_dev={'journal_dev', 0x3d, 0x460b8000}}]}, 0x1, 0x52a, &(0x7f0000001440)="$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") (async) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xc1c, &(0x7f0000000300)={[{@discard}, {@jqfmt_vfsv0}, {@journal_dev={'journal_dev', 0x3d, 0x460b8000}}]}, 0x1, 0x52a, &(0x7f0000001440)="$eJzs3c9vHFcdAPDvjL22k7h1WnoABG1oCwFFWcebNqp6gHJCCFVC9AhSauyNFWXXa3nXpTaRcM9ckajECY78AZx74s4FwY1LOSDxwwLVSBwGzezY2di7tpPYXmv385FG+9688XzfizPvzbxd7wtgbF2LiO2ImIqI9yNirtyflFu8093y4z7bebi0u/NwKYkse++fSVGe74uen8ldKc85ExE/+E7Ej5PDcdubWw8WG436epmf7zTX5tubWzfvNxdX6iv11VrtzsKdW2/dfrP2BK2ZObL0leZUmfryp3/Y/sZP82rNlnt623Gauk2v7MfJTUbE984i2BBMlO2ZGnZFeCppRLwYEa8W1/9cTBS/TQBglGXZXGRzvXkAYNSlxRxYklbLuYDZSNNqtTuH91JcThutdufGvdbG6nJ3ruxqVNJ79xv1W+Vc4dWoJHl+oUg/ytcO5G9HxAsR8YvpS0W+utRqLA/zxgcAxtiVA+P/f6a74z8AMOKO/tgMADCKjP8AMH6M/wAwfoz/ADB+uuP/pSf9sSzLfnYW1QEAzoHnfwAYP8Z/ABgr33/33XzLdsvvv17+YHPjQeuDm8v19oNqc2OputRaX6uutForxXf2NI87X6PVWlt4IzY+vPrNtXZnvr25dbfZ2ljt3C2+1/tuvVIctX0OLQMABnnhlU/+nOQj8tuXii161nKoDLVmwFlLh10BYGgmhl0BYGi6q331WaAPGHmPnvGf+EMApgdgRBx3BzDT7w+EsizLzq5KwBm7/gXz/zCuyvn/SZ8ChvFz3Px/sTawNwlhJE0OuwLA0GRZctI1/+OkBwIAF9sRc/xXz/M+BBieAe//v1i+/rZ8c+BHyweP+PgsawUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAX2976v9Vymd/ZSNNqNeK5YgGgSnLvfqN+KyKej4g/TVem8/zCkOsMADyr9G9Juf7X9bnXZx8revnKfnIqIn7yq/d++eFip7P+x4ip5F/Te/s7H5f7a8cGmzmLFgAAR9sbp4vXngf5z3YeLu1t51mfv3+7e1eQx93dmYrd/fiTMVm8zkQlIi7/OynzXUnP3MWz2P4oIj7fr/1JzBZzIN1bloPx89jPnVL8iRPFTx+Ln5YLNKflv8XnTqEuMG4+yfufd/pdf2lcK177X/8zRQ/17Mr+Lz/V0m7RBz6Kv9f/TQzo/66dNMYbv/9uN3XpcNlHEV+cjNiLvdvT/+zFTwbEf/2E8f/ypZdfHVSW/TrievSP3xtrvtNcm29vbt2831xcqa/UV2u1Owt3br11+83afDFHPT94NPjH2zeeH1SWt//ygPgzx7T/q4NOeuAp9zf/e/+HXzki/tdf6xc/jZeOiJ+PiV8b2OLHLV7+3cDn7jz+8uH2Jyf5/d84YfxP/7p1aNlwAGB42ptbDxYbjfq6hMTFT+T/ZS9ANfomvnVesaaif9HPX+te0weKsuypYg3qMU5j1g24CPYv+oj477ArAwAAAAAAAAAAAAAA9HUef7E07DYCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwuv4fAAD//9VG0+g=") write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)="4e11f4292922c904e664e411cdbabcd6ba6be9561ad1a7489e010e35", 0x1c) socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) (async) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) fcntl$setlease(r3, 0x400, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x66200, 0x99) (async) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x66200, 0x99) perf_event_open(&(0x7f0000000fc0)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x4002, 0x0, 0x3, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x74, r1, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x840}, 0x0) r5 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$lock(r5, 0x410, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0xfffe}) move_mount(r5, &(0x7f0000000280)='./file1\x00', r4, &(0x7f00000002c0)='./bus\x00', 0x4) kernel console output (not intermixed with test programs): 00 R09: 0000000000000000 [ 798.737630][T20258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 798.737642][T20258] R13: 00007f12121c6038 R14: 00007f12121c5fa0 R15: 00007ffc1438b998 [ 798.737662][T20258] [ 799.276470][T20302] __nla_validate_parse: 12 callbacks suppressed [ 799.276487][T20302] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4798'. [ 799.296038][T20302] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4798'. [ 799.305376][T20302] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2048 sclass=netlink_route_socket pid=20302 comm=syz.1.4798 [ 799.319286][T20302] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4798'. [ 799.682397][T20323] netlink: 'syz.8.4806': attribute type 6 has an invalid length. [ 799.690867][T20323] netlink: 32 bytes leftover after parsing attributes in process `syz.8.4806'. [ 799.740224][T20329] netlink: 4 bytes leftover after parsing attributes in process `syz.8.4808'. [ 799.755268][T20329] bridge_slave_1: left allmulticast mode [ 799.761881][T20329] bridge_slave_1: left promiscuous mode [ 799.769232][T20329] bridge0: port 2(bridge_slave_1) entered disabled state [ 799.778738][T20329] bridge_slave_0: left allmulticast mode [ 799.784736][T20329] bridge_slave_0: left promiscuous mode [ 799.790870][T20329] bridge0: port 1(bridge_slave_0) entered disabled state [ 800.030184][T20352] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4818'. [ 800.032189][T20347] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 800.039863][T20352] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4818'. [ 800.081746][T20352] vlan3: entered promiscuous mode [ 800.087608][T20352] ip6gretap0: entered promiscuous mode [ 800.455287][T20380] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 800.638461][T20386] netlink: 'syz.4.4833': attribute type 21 has an invalid length. [ 800.650892][T20386] IPv6: NLM_F_CREATE should be specified when creating new route [ 800.661698][T20386] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 800.669454][T20386] IPv6: NLM_F_CREATE should be set when creating new route [ 800.676705][T20386] IPv6: NLM_F_CREATE should be set when creating new route [ 800.683992][T20386] IPv6: NLM_F_CREATE should be set when creating new route [ 800.715184][ T28] kauditd_printk_skb: 632 callbacks suppressed [ 800.715202][ T28] audit: type=1400 audit(1774672494.066:9820): avc: denied { read write } for pid=20385 comm="syz.4.4833" name="uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=0 [ 800.787806][ T28] audit: type=1400 audit(1774672494.104:9821): avc: denied { read write } for pid=16652 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 800.844951][T20392] FAULT_INJECTION: forcing a failure. [ 800.844951][T20392] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 800.872022][T20392] CPU: 0 UID: 0 PID: 20392 Comm: syz.4.4835 Tainted: G W syzkaller #0 PREEMPT(full) [ 800.872069][T20392] Tainted: [W]=WARN [ 800.872078][T20392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 800.872100][T20392] Call Trace: [ 800.872110][T20392] [ 800.872119][T20392] __dump_stack+0x1d/0x30 [ 800.872148][T20392] dump_stack_lvl+0x95/0xd0 [ 800.872185][T20392] dump_stack+0x15/0x1b [ 800.872263][T20392] should_fail_ex+0x263/0x280 [ 800.872292][T20392] should_fail+0xb/0x20 [ 800.872330][T20392] should_fail_usercopy+0x1a/0x20 [ 800.872433][T20392] _copy_to_user+0x20/0xa0 [ 800.872526][T20392] simple_read_from_buffer+0xb5/0x130 [ 800.872556][T20392] proc_fail_nth_read+0x10e/0x150 [ 800.872620][T20392] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 800.872706][T20392] vfs_read+0x1ab/0x7f0 [ 800.872736][T20392] ? __rcu_read_unlock+0x4e/0x70 [ 800.872768][T20392] ? __fget_files+0x184/0x1c0 [ 800.872844][T20392] ? mutex_lock+0x57/0x90 [ 800.872918][T20392] ksys_read+0xdc/0x1a0 [ 800.872940][T20392] __x64_sys_read+0x40/0x50 [ 800.872959][T20392] x64_sys_call+0x2886/0x3020 [ 800.872996][T20392] do_syscall_64+0x12c/0x370 [ 800.873037][T20392] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 800.873200][T20392] RIP: 0033:0x7f5f691fcfce [ 800.873217][T20392] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 800.873239][T20392] RSP: 002b:00007f5f67c96fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 800.873263][T20392] RAX: ffffffffffffffda RBX: 00007f5f67c976c0 RCX: 00007f5f691fcfce [ 800.873278][T20392] RDX: 000000000000000f RSI: 00007f5f67c970a0 RDI: 0000000000000008 [ 800.873325][T20392] RBP: 00007f5f67c97090 R08: 0000000000000000 R09: 0000000000000000 [ 800.873339][T20392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 800.873353][T20392] R13: 00007f5f694b6038 R14: 00007f5f694b5fa0 R15: 00007ffdfe2e57f8 [ 800.873373][T20392] [ 800.888797][ T28] audit: type=1400 audit(1774672494.122:9822): avc: denied { create } for pid=20388 comm="syz.4.4834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 801.030846][T20397] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 801.109517][ T28] audit: type=1400 audit(1774672494.122:9823): avc: denied { read write } for pid=20388 comm="syz.4.4834" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 801.145148][ T28] audit: type=1400 audit(1774672494.151:9824): avc: denied { read write } for pid=16652 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 801.170624][ T28] audit: type=1400 audit(1774672494.160:9825): avc: denied { read write } for pid=16565 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 801.261457][ T28] audit: type=1400 audit(1774672494.169:9826): avc: denied { create } for pid=20390 comm="syz.4.4835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 801.319404][ T28] audit: type=1400 audit(1774672494.169:9827): avc: denied { read write } for pid=20390 comm="syz.4.4835" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 801.334170][T20413] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 801.366402][ T28] audit: type=1400 audit(1774672494.235:9828): avc: denied { create } for pid=20391 comm="syz.2.4836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 801.430595][ T28] audit: type=1400 audit(1774672494.244:9829): avc: denied { read write } for pid=16652 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 803.457384][T20471] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 803.610180][T20478] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 805.180903][T20511] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 805.448368][T20549] syzkaller1: entered allmulticast mode [ 806.007772][T20615] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 806.071978][ T28] kauditd_printk_skb: 657 callbacks suppressed [ 806.071999][ T28] audit: type=1400 audit(1774672499.070:10487): avc: denied { read } for pid=20620 comm="syz.4.4929" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 806.114867][ T28] audit: type=1400 audit(1774672499.117:10488): avc: denied { open } for pid=20618 comm="syz.9.4928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 806.172462][ T28] audit: type=1400 audit(1774672499.117:10489): avc: denied { prog_load } for pid=20618 comm="syz.9.4928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 806.234126][ T28] audit: type=1400 audit(1774672499.117:10490): avc: denied { read write } for pid=16420 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 806.343106][ T28] audit: type=1400 audit(1774672499.126:10491): avc: denied { create } for pid=20623 comm="syz.8.4930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 806.432166][ T28] audit: type=1400 audit(1774672499.136:10492): avc: denied { execmem } for pid=20620 comm="syz.4.4929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 806.517772][ T28] audit: type=1400 audit(1774672499.136:10493): avc: denied { create } for pid=20620 comm="syz.4.4929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 806.611756][ T28] audit: type=1400 audit(1774672499.136:10494): avc: denied { create } for pid=20623 comm="syz.8.4930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 806.626742][T20640] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 806.676728][ T28] audit: type=1400 audit(1774672499.136:10495): avc: denied { open } for pid=20623 comm="syz.8.4930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 806.688582][T20639] audit: audit_backlog=65 > audit_backlog_limit=64 [ 807.643794][T20700] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 808.402042][T20730] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4973'. [ 808.488412][T20736] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 808.767152][T20763] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 808.767287][T20767] netlink: 12 bytes leftover after parsing attributes in process `syz.8.4984'. [ 809.135794][T20782] FAULT_INJECTION: forcing a failure. [ 809.135794][T20782] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 809.155577][T20782] CPU: 0 UID: 0 PID: 20782 Comm: syz.9.4995 Tainted: G W syzkaller #0 PREEMPT(full) [ 809.155704][T20782] Tainted: [W]=WARN [ 809.155714][T20782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 809.155744][T20782] Call Trace: [ 809.155753][T20782] [ 809.155762][T20782] __dump_stack+0x1d/0x30 [ 809.155795][T20782] dump_stack_lvl+0x95/0xd0 [ 809.155823][T20782] dump_stack+0x15/0x1b [ 809.155911][T20782] should_fail_ex+0x263/0x280 [ 809.155938][T20782] should_fail+0xb/0x20 [ 809.155975][T20782] should_fail_usercopy+0x1a/0x20 [ 809.156007][T20782] _copy_to_user+0x20/0xa0 [ 809.156080][T20782] simple_read_from_buffer+0xb5/0x130 [ 809.156108][T20782] proc_fail_nth_read+0x10e/0x150 [ 809.156150][T20782] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 809.156267][T20782] vfs_read+0x1ab/0x7f0 [ 809.156304][T20782] ? __rcu_read_unlock+0x4e/0x70 [ 809.156368][T20782] ? __rcu_read_unlock+0x4e/0x70 [ 809.156389][T20782] ? __fget_files+0x184/0x1c0 [ 809.156450][T20782] ? mutex_lock+0x57/0x90 [ 809.156488][T20782] ksys_read+0xdc/0x1a0 [ 809.156510][T20782] __x64_sys_read+0x40/0x50 [ 809.156531][T20782] x64_sys_call+0x2886/0x3020 [ 809.156630][T20782] do_syscall_64+0x12c/0x370 [ 809.156660][T20782] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 809.156718][T20782] RIP: 0033:0x7f3f232fcfce [ 809.156738][T20782] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 809.156761][T20782] RSP: 002b:00007f3f21d8efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 809.156787][T20782] RAX: ffffffffffffffda RBX: 00007f3f21d8f6c0 RCX: 00007f3f232fcfce [ 809.156870][T20782] RDX: 000000000000000f RSI: 00007f3f21d8f0a0 RDI: 0000000000000005 [ 809.156887][T20782] RBP: 00007f3f21d8f090 R08: 0000000000000000 R09: 0000000000000000 [ 809.156902][T20782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 809.156917][T20782] R13: 00007f3f235b6038 R14: 00007f3f235b5fa0 R15: 00007ffc5db74628 [ 809.156939][T20782] [ 809.548606][T20819] netlink: 48 bytes leftover after parsing attributes in process `syz.2.5010'. [ 809.559190][T20819] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5010'. [ 809.579357][T20819] bond2: option xmit_hash_policy: invalid value (64) [ 809.605480][T20819] bond2 (unregistering): Released all slaves [ 809.627462][T20821] netlink: 288 bytes leftover after parsing attributes in process `syz.8.5011'. [ 809.950640][T20842] netlink: 'syz.2.5019': attribute type 13 has an invalid length. [ 810.531144][T20830] syz.8.5014 invoked oom-killer: gfp_mask=0x402d02(GFP_NOIO|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN|__GFP_ACCOUNT), order=0, oom_score_adj=1000 [ 810.569350][T20830] CPU: 0 UID: 0 PID: 20830 Comm: syz.8.5014 Tainted: G W syzkaller #0 PREEMPT(full) [ 810.569394][T20830] Tainted: [W]=WARN [ 810.569403][T20830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 810.569419][T20830] Call Trace: [ 810.569428][T20830] [ 810.569438][T20830] __dump_stack+0x1d/0x30 [ 810.569551][T20830] dump_stack_lvl+0x95/0xd0 [ 810.569582][T20830] dump_stack+0x15/0x1b [ 810.569652][T20830] dump_header+0x80/0x240 [ 810.569681][T20830] oom_kill_process+0x295/0x350 [ 810.569770][T20830] out_of_memory+0x97d/0xb80 [ 810.569824][T20830] try_charge_memcg+0x62e/0xa10 [ 810.569887][T20830] obj_cgroup_charge_pages+0x23/0xc0 [ 810.570002][T20830] __memcg_kmem_charge_page+0x9e/0x170 [ 810.570053][T20830] __alloc_frozen_pages_noprof+0x18a/0x360 [ 810.570135][T20830] alloc_pages_mpol+0xb3/0x260 [ 810.570165][T20830] alloc_pages_noprof+0x8f/0x130 [ 810.570194][T20830] __vmalloc_node_range_noprof+0xa46/0x12b0 [ 810.570310][T20830] __kvmalloc_node_noprof+0x3d4/0x650 [ 810.570349][T20830] ? futex_hash_allocate+0x190/0x9d0 [ 810.570391][T20830] ? futex_hash_allocate+0x190/0x9d0 [ 810.570430][T20830] futex_hash_allocate+0x190/0x9d0 [ 810.570464][T20830] ? cap_task_prctl+0x13f/0x6e0 [ 810.570493][T20830] futex_hash_prctl+0xd8/0xf0 [ 810.570524][T20830] __se_sys_prctl+0xa3d/0x13f0 [ 810.570646][T20830] __x64_sys_prctl+0x67/0x80 [ 810.570675][T20830] x64_sys_call+0x2533/0x3020 [ 810.570710][T20830] do_syscall_64+0x12c/0x370 [ 810.570792][T20830] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 810.570815][T20830] RIP: 0033:0x7f0a7e83c799 [ 810.570833][T20830] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 810.570889][T20830] RSP: 002b:00007f0a7d28f028 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 810.570914][T20830] RAX: ffffffffffffffda RBX: 00007f0a7eab5fa0 RCX: 00007f0a7e83c799 [ 810.570932][T20830] RDX: 0000000001000000 RSI: 0000000000000001 RDI: 000000000000004e [ 810.570994][T20830] RBP: 00007f0a7e8d2c99 R08: 0000000000000000 R09: 0000000000000000 [ 810.571058][T20830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 810.571071][T20830] R13: 00007f0a7eab6038 R14: 00007f0a7eab5fa0 R15: 00007fff2b183218 [ 810.571151][T20830] [ 810.825660][T20830] memory: usage 306952kB, limit 307200kB, failcnt 70 [ 810.832640][T20830] memory+swap: usage 306952kB, limit 9007199254740988kB, failcnt 0 [ 810.832660][T20830] kmem: usage 305780kB, limit 9007199254740988kB, failcnt 0 [ 810.832750][T20830] Memory cgroup stats for /syz8: [ 810.832958][T20830] cache 4096 [ 810.856879][T20830] rss 1159168 [ 810.860175][T20830] shmem 4096 [ 810.863621][T20830] mapped_file 0 [ 810.867304][T20830] dirty 0 [ 810.870745][T20830] writeback 0 [ 810.874149][T20830] workingset_refault_anon 0 [ 810.878834][T20830] workingset_refault_file 0 [ 810.883827][T20830] swap 0 [ 810.887132][T20830] swapcached 2740224 [ 810.891286][T20830] pgpgin 142106 [ 810.894998][T20830] pgpgout 141821 [ 810.898761][T20830] pgfault 128012 [ 810.902463][T20830] pgmajfault 0 [ 810.906205][T20830] inactive_anon 4096 [ 810.910331][T20830] active_anon 1159168 [ 810.914578][T20830] inactive_file 0 [ 810.918396][T20830] active_file 4096 [ 810.922350][T20830] unevictable 0 [ 810.925996][T20830] hierarchical_memory_limit 314572800 [ 810.931719][T20830] hierarchical_memsw_limit 9223372036854771712 [ 810.943853][T20830] total_cache 4096 [ 810.961020][T20830] total_rss 1159168 [ 810.965067][T20830] total_shmem 4096 [ 810.988302][T20830] total_mapped_file 0 [ 811.004621][T20830] total_dirty 0 [ 811.012046][T20830] total_writeback 0 [ 811.021202][T20830] total_workingset_refault_anon 0 [ 811.031464][T20878] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5033'. [ 811.032807][T20830] total_workingset_refault_file 0 [ 811.063020][T20830] total_swap 0 [ 811.063221][T20878] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5033'. [ 811.073781][T20830] total_swapcached 2740224 [ 811.084558][T20830] total_pgpgin 142106 [ 811.085002][T20878] bridge2: entered promiscuous mode [ 811.091500][T20830] total_pgpgout 141821 [ 811.094653][T20878] bridge2: port 1(macvtap1) entered blocking state [ 811.106023][T20878] bridge2: port 1(macvtap1) entered disabled state [ 811.107655][T20830] total_pgfault 128012 [ 811.123012][T20878] macvtap1: entered allmulticast mode [ 811.128578][T20878] bridge2: entered allmulticast mode [ 811.148262][T20878] macvtap1: left allmulticast mode [ 811.150432][T20830] total_pgmajfault 0 [ 811.156858][T20878] bridge2: left allmulticast mode [ 811.166939][T20830] total_inactive_anon 4096 [ 811.177309][T20830] total_active_anon 1159168 [ 811.193249][T20878] bridge2: left promiscuous mode [ 811.198710][T20830] total_inactive_file 0 [ 811.203052][T20830] total_active_file 4096 [ 811.214611][T20830] total_unevictable 0 [ 811.225258][T20830] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz8,task_memcg=/syz8,task=syz.8.5014,pid=20829,uid=0 [ 811.255127][T20830] Memory cgroup out of memory: Killed process 20830 (syz.8.5014) total-vm:94164kB, anon-rss:1412kB, file-rss:22220kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 811.431588][ T28] kauditd_printk_skb: 2081 callbacks suppressed [ 811.431607][ T28] audit: type=1400 audit(1774672504.083:12554): avc: denied { read write } for pid=16500 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 811.503269][ T28] audit: type=1400 audit(1774672504.083:12555): avc: denied { open } for pid=20896 comm="syz.9.5044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 811.567382][ T28] audit: type=1400 audit(1774672504.083:12556): avc: denied { create } for pid=20896 comm="syz.9.5044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 811.626906][ T28] audit: type=1400 audit(1774672504.083:12557): avc: denied { prog_load } for pid=20896 comm="syz.9.5044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 811.685031][ T28] audit: type=1400 audit(1774672504.083:12558): avc: denied { prog_load } for pid=20896 comm="syz.9.5044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 811.706588][T20919] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 811.738518][ T28] audit: type=1400 audit(1774672504.083:12559): avc: denied { allowed } for pid=20896 comm="syz.9.5044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 811.760412][ T28] audit: type=1400 audit(1774672504.083:12560): avc: denied { prog_load } for pid=20896 comm="syz.9.5044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 811.788575][ T28] audit: type=1400 audit(1774672504.083:12561): avc: denied { read write } for pid=16500 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 811.819559][ T28] audit: type=1400 audit(1774672504.121:12562): avc: denied { prog_load } for pid=20901 comm="syz.9.5045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 811.856609][ T28] audit: type=1400 audit(1774672504.121:12563): avc: denied { create } for pid=20901 comm="syz.9.5045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 811.870427][T20938] xt_nat: multiple ranges no longer supported [ 811.903570][T20934] lo speed is unknown, defaulting to 1000 [ 811.931342][T20938] geneve2: entered promiscuous mode [ 811.941703][ T50] netdevsim netdevsim4 netdevsim0: set [1, 1] type 2 family 0 port 60520 - 0 [ 811.950821][ T50] netdevsim netdevsim4 netdevsim1: set [1, 1] type 2 family 0 port 60520 - 0 [ 811.975937][ T50] netdevsim netdevsim4 netdevsim2: set [1, 1] type 2 family 0 port 60520 - 0 [ 812.019170][T20947] netlink: 16 bytes leftover after parsing attributes in process `syz.2.5062'. [ 812.038083][ T54] netdevsim netdevsim4 netdevsim3: set [1, 1] type 2 family 0 port 60520 - 0 [ 812.086823][T20942] lo speed is unknown, defaulting to 1000 [ 812.469611][T20961] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 812.807083][T20998] netlink: 4096 bytes leftover after parsing attributes in process `syz.1.5083'. [ 812.818166][T20992] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 813.564129][T21057] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 814.236291][T21083] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 814.639736][T21126] lo speed is unknown, defaulting to 1000 [ 814.861337][T21142] syzkaller0: entered promiscuous mode [ 814.866987][T21142] syzkaller0: entered allmulticast mode [ 815.139821][T21149] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 815.897087][T21178] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 816.070989][T21188] lo speed is unknown, defaulting to 1000 [ 816.562731][T21209] netlink: 20 bytes leftover after parsing attributes in process `syz.9.5175'. [ 816.592700][T21209] netlink: 8 bytes leftover after parsing attributes in process `syz.9.5175'. [ 816.602155][T21209] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 816.768870][T21232] netlink: 48 bytes leftover after parsing attributes in process `syz.4.5184'. [ 816.785104][ T28] kauditd_printk_skb: 997 callbacks suppressed [ 816.785180][ T28] audit: type=1400 audit(1774672509.087:13558): avc: denied { read write } for pid=17339 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 816.913387][ T28] audit: type=1400 audit(2000000000.028:13559): avc: denied { execmem } for pid=21227 comm="syz.8.5183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 816.953759][ T28] audit: type=1400 audit(2000000000.028:13560): avc: denied { map_create } for pid=21227 comm="syz.8.5183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 816.995266][ T28] audit: type=1400 audit(2000000000.028:13561): avc: denied { prog_load } for pid=21227 comm="syz.8.5183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 817.010984][T21253] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 817.038197][ T28] audit: type=1400 audit(2000000000.028:13562): avc: denied { prog_load } for pid=21227 comm="syz.8.5183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 817.100127][T21264] audit: audit_backlog=65 > audit_backlog_limit=64 [ 817.104653][T21262] audit: audit_backlog=65 > audit_backlog_limit=64 [ 817.106943][T21264] audit: audit_lost=44 audit_rate_limit=0 audit_backlog_limit=64 [ 817.113516][ T28] audit: type=1400 audit(2000000000.028:13563): avc: denied { open } for pid=21227 comm="syz.8.5183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 817.124241][T21265] audit: audit_backlog=65 > audit_backlog_limit=64 [ 818.188858][T21289] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2073 sclass=netlink_route_socket pid=21289 comm=syz.4.5206 [ 818.240786][T21293] lo speed is unknown, defaulting to 1000 [ 818.330560][T21307] xt_CT: No such helper "netbios-ns" [ 818.806909][T21348] lo speed is unknown, defaulting to 1000 [ 819.685438][T21386] serio: Serial port ttyS3 [ 819.870444][T21394] netlink: 36 bytes leftover after parsing attributes in process `syz.4.5247'. [ 820.058723][T21401] lo speed is unknown, defaulting to 1000 [ 821.641564][T21439] lo speed is unknown, defaulting to 1000 [ 822.147876][ T28] kauditd_printk_skb: 489 callbacks suppressed [ 822.147916][ T28] audit: type=1400 audit(2000000004.995:14048): avc: denied { read write } for pid=16652 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 822.181815][ T28] audit: type=1400 audit(2000000005.004:14049): avc: denied { read write } for pid=17339 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 822.232783][ T28] audit: type=1400 audit(2000000005.013:14050): avc: denied { create } for pid=21458 comm="syz.1.5272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 822.316031][ T28] audit: type=1400 audit(2000000005.013:14051): avc: denied { create } for pid=21458 comm="syz.1.5272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 822.358297][ T28] audit: type=1400 audit(2000000005.023:14052): avc: denied { open } for pid=21458 comm="syz.1.5272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 822.394424][T21466] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 822.419021][ T28] audit: type=1400 audit(2000000005.023:14053): avc: denied { allowed } for pid=21458 comm="syz.1.5272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 822.472486][ T28] audit: type=1400 audit(2000000005.051:14054): avc: denied { read write } for pid=17339 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 822.547311][ T28] audit: type=1400 audit(2000000005.069:14055): avc: denied { execmem } for pid=21461 comm="syz.1.5273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 822.588061][T21483] FAULT_INJECTION: forcing a failure. [ 822.588061][T21483] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 822.600804][ T28] audit: type=1400 audit(2000000005.097:14056): avc: denied { read write } for pid=16652 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 822.664815][T21483] CPU: 0 UID: 0 PID: 21483 Comm: syz.2.5281 Tainted: G W syzkaller #0 PREEMPT(full) [ 822.664856][T21483] Tainted: [W]=WARN [ 822.664869][T21483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 822.664884][T21483] Call Trace: [ 822.664893][T21483] [ 822.664903][T21483] __dump_stack+0x1d/0x30 [ 822.664963][T21483] dump_stack_lvl+0x95/0xd0 [ 822.664990][T21483] dump_stack+0x15/0x1b [ 822.665017][T21483] should_fail_ex+0x263/0x280 [ 822.665061][T21483] should_fail+0xb/0x20 [ 822.665084][T21483] should_fail_usercopy+0x1a/0x20 [ 822.665112][T21483] _copy_from_user+0x1c/0xb0 [ 822.665172][T21483] ___sys_sendmsg+0xc1/0x1e0 [ 822.665279][T21483] __x64_sys_sendmsg+0xd4/0x160 [ 822.665339][T21483] x64_sys_call+0x194c/0x3020 [ 822.665392][T21483] do_syscall_64+0x12c/0x370 [ 822.665418][T21483] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 822.665507][T21483] RIP: 0033:0x7f72e931c799 [ 822.665524][T21483] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 822.665543][T21483] RSP: 002b:00007f72e7d77028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 822.665568][T21483] RAX: ffffffffffffffda RBX: 00007f72e9595fa0 RCX: 00007f72e931c799 [ 822.665586][T21483] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 822.665680][T21483] RBP: 00007f72e7d77090 R08: 0000000000000000 R09: 0000000000000000 [ 822.665693][T21483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 822.665708][T21483] R13: 00007f72e9596038 R14: 00007f72e9595fa0 R15: 00007fff6683b868 [ 822.665730][T21483] [ 822.675619][ T28] audit: type=1400 audit(2000000005.125:14057): avc: denied { read write } for pid=21463 comm="syz.4.5274" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 822.886812][T21488] netlink: 'syz.2.5282': attribute type 16 has an invalid length. [ 822.981671][T21488] netlink: 'syz.2.5282': attribute type 17 has an invalid length. [ 823.085328][T21487] bridge0: port 1(bridge_slave_0) entered disabled state [ 823.168512][T21487] bridge0: port 2(bridge_slave_1) entered disabled state [ 823.772854][T21488] bridge0: port 1(bridge_slave_0) entered blocking state [ 823.780090][T21488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 823.953465][T21503] FAULT_INJECTION: forcing a failure. [ 823.953465][T21503] name failslab, interval 1, probability 0, space 0, times 0 [ 823.961965][T21488] bridge0: port 2(bridge_slave_1) entered blocking state [ 823.973372][T21488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 824.015763][T21503] CPU: 0 UID: 0 PID: 21503 Comm: syz.1.5287 Tainted: G W syzkaller #0 PREEMPT(full) [ 824.015800][T21503] Tainted: [W]=WARN [ 824.015844][T21503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 824.015860][T21503] Call Trace: [ 824.015868][T21503] [ 824.015879][T21503] __dump_stack+0x1d/0x30 [ 824.015909][T21503] dump_stack_lvl+0x95/0xd0 [ 824.015984][T21503] dump_stack+0x15/0x1b [ 824.016007][T21503] should_fail_ex+0x263/0x280 [ 824.016041][T21503] should_failslab+0x8c/0xb0 [ 824.016062][T21503] kmem_cache_alloc_lru_noprof+0x6c/0x410 [ 824.016168][T21503] ? alloc_inode+0x9a/0x170 [ 824.016191][T21503] alloc_inode+0x9a/0x170 [ 824.016216][T21503] alloc_anon_inode+0x1e/0x170 [ 824.016246][T21503] aio_setup_ring+0x90/0x750 [ 824.016324][T21503] ioctx_alloc+0x2a9/0x4c0 [ 824.016356][T21503] ? fput+0x8f/0xc0 [ 824.016425][T21503] __se_sys_io_setup+0x6b/0x1b0 [ 824.016498][T21503] __x64_sys_io_setup+0x31/0x40 [ 824.016581][T21503] x64_sys_call+0x24f1/0x3020 [ 824.016615][T21503] do_syscall_64+0x12c/0x370 [ 824.016679][T21503] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 824.016707][T21503] RIP: 0033:0x7f1211f4c799 [ 824.016779][T21503] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 824.016800][T21503] RSP: 002b:00007f1210986028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 824.016822][T21503] RAX: ffffffffffffffda RBX: 00007f12121c6090 RCX: 00007f1211f4c799 [ 824.016870][T21503] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 000000000000000b [ 824.016884][T21503] RBP: 00007f1210986090 R08: 0000000000000000 R09: 0000000000000000 [ 824.016897][T21503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 824.016910][T21503] R13: 00007f12121c6128 R14: 00007f12121c6090 R15: 00007ffc1438b998 [ 824.016933][T21503] [ 826.721604][T21551] netlink: 'syz.8.5302': attribute type 10 has an invalid length. [ 826.751895][T21551] 8021q: adding VLAN 0 to HW filter on device team0 [ 826.777668][T21551] bond0: (slave team0): Enslaving as an active interface with an up link [ 827.054298][T21573] netlink: 'syz.4.5312': attribute type 1 has an invalid length. [ 827.212693][T21573] 8021q: adding VLAN 0 to HW filter on device bond7 [ 827.502635][ T28] kauditd_printk_skb: 338 callbacks suppressed [ 827.502654][ T28] audit: type=1400 audit(2000000010.008:14396): avc: denied { open } for pid=21578 comm="syz.4.5313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 827.543491][ T28] audit: type=1400 audit(2000000010.036:14397): avc: denied { create } for pid=21578 comm="syz.4.5313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=0 [ 827.591355][ T28] audit: type=1400 audit(2000000010.046:14398): avc: denied { allowed } for pid=21578 comm="syz.4.5313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 827.640356][T21583] FAULT_INJECTION: forcing a failure. [ 827.640356][T21583] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 827.640790][ T28] audit: type=1400 audit(2000000010.046:14399): avc: denied { create } for pid=21578 comm="syz.4.5313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 827.742996][T21583] CPU: 0 UID: 0 PID: 21583 Comm: syz.9.5315 Tainted: G W syzkaller #0 PREEMPT(full) [ 827.743049][T21583] Tainted: [W]=WARN [ 827.743058][T21583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 827.743072][T21583] Call Trace: [ 827.743080][T21583] [ 827.743089][T21583] __dump_stack+0x1d/0x30 [ 827.743126][T21583] dump_stack_lvl+0x95/0xd0 [ 827.743172][T21583] dump_stack+0x15/0x1b [ 827.743198][T21583] should_fail_ex+0x263/0x280 [ 827.743237][T21583] should_fail+0xb/0x20 [ 827.743264][T21583] should_fail_usercopy+0x1a/0x20 [ 827.743296][T21583] _copy_to_user+0x20/0xa0 [ 827.743376][T21583] simple_read_from_buffer+0xb5/0x130 [ 827.743403][T21583] proc_fail_nth_read+0x10e/0x150 [ 827.743490][T21583] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 827.743523][T21583] vfs_read+0x1ab/0x7f0 [ 827.743569][T21583] ? __rcu_read_unlock+0x4e/0x70 [ 827.743590][T21583] ? __rcu_read_unlock+0x4e/0x70 [ 827.743692][T21583] ? __fget_files+0x184/0x1c0 [ 827.743719][T21583] ? mutex_lock+0x57/0x90 [ 827.743752][T21583] ksys_read+0xdc/0x1a0 [ 827.743770][T21583] __x64_sys_read+0x40/0x50 [ 827.743797][T21583] x64_sys_call+0x2886/0x3020 [ 827.743829][T21583] do_syscall_64+0x12c/0x370 [ 827.743859][T21583] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 827.743885][T21583] RIP: 0033:0x7f3f232fcfce [ 827.743904][T21583] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 827.743952][T21583] RSP: 002b:00007f3f21d8efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 827.743978][T21583] RAX: ffffffffffffffda RBX: 00007f3f21d8f6c0 RCX: 00007f3f232fcfce [ 827.743996][T21583] RDX: 000000000000000f RSI: 00007f3f21d8f0a0 RDI: 0000000000000003 [ 827.744078][T21583] RBP: 00007f3f21d8f090 R08: 0000000000000000 R09: 0000000000000000 [ 827.744093][T21583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 827.744116][T21583] R13: 00007f3f235b6038 R14: 00007f3f235b5fa0 R15: 00007ffc5db74628 [ 827.744139][T21583] [ 827.989197][ T28] audit: type=1400 audit(2000000010.046:14400): avc: denied { create } for pid=21578 comm="syz.4.5313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 828.031600][ T28] audit: type=1400 audit(2000000010.064:14401): avc: denied { read write } for pid=16652 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 828.085060][ T28] audit: type=1400 audit(2000000010.111:14402): avc: denied { execmem } for pid=21580 comm="syz.4.5314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 828.138510][ T28] audit: type=1400 audit(2000000010.121:14403): avc: denied { read write } for pid=16500 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 828.398255][ T28] audit: type=1400 audit(2000000010.121:14404): avc: denied { open } for pid=21582 comm="syz.9.5315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 828.439155][T21600] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 828.459025][ T28] audit: type=1400 audit(2000000010.130:14405): avc: denied { create } for pid=21582 comm="syz.9.5315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=0 [ 828.501410][T21600] netlink: 8 bytes leftover after parsing attributes in process `syz.9.5322'. [ 828.515229][T21602] netlink: 'syz.2.5323': attribute type 1 has an invalid length. [ 828.548037][T21602] 8021q: adding VLAN 0 to HW filter on device bond2 [ 828.872245][T21619] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 829.310091][T21634] netlink: 'syz.4.5336': attribute type 1 has an invalid length. [ 829.345720][T21634] 8021q: adding VLAN 0 to HW filter on device bond8 [ 830.007119][T12476] gretap0 (unregistering): left promiscuous mode [ 830.029839][T12476] bond1 (unregistering): (slave gretap1): Releasing active interface [ 830.213650][T12476] bond0 (unregistering): left promiscuous mode [ 830.223853][T12476] bond0 (unregistering): Released all slaves [ 830.242012][T12476] bond1 (unregistering): Released all slaves [ 830.268301][T12476] bond2 (unregistering): Released all slaves [ 830.291690][T12476] bond3 (unregistering): Released all slaves [ 830.310137][T12476] bond4 (unregistering): Released all slaves [ 830.319714][T21665] netlink: 'syz.8.5348': attribute type 1 has an invalid length. [ 830.329728][T12476] bond5 (unregistering): Released all slaves [ 830.366743][T21665] 8021q: adding VLAN 0 to HW filter on device bond1 [ 830.415608][T12476] veth1_to_team: left promiscuous mode [ 830.425162][T12476] hsr_slave_0: left promiscuous mode [ 830.807909][T21691] netlink: 'syz.4.5359': attribute type 1 has an invalid length. [ 830.838052][T21691] 8021q: adding VLAN 0 to HW filter on device bond9 [ 830.850759][T21691] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5359'. [ 831.162159][T21716] netlink: 'syz.1.5369': attribute type 1 has an invalid length. [ 831.197687][T21716] workqueue: Failed to create a rescuer kthread for wq "bond1": -EINTR [ 831.242480][T12476] IPVS: stop unused estimator thread 0... [ 831.475823][T21740] netlink: 32 bytes leftover after parsing attributes in process `syz.4.5378'. [ 831.943772][T21756] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=21756 comm=syz.4.5384 [ 832.410705][T21774] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 832.690998][T21798] netlink: 12 bytes leftover after parsing attributes in process `syz.9.5402'. [ 832.797773][T21803] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 832.853151][T21808] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5407'. [ 832.863118][ T28] kauditd_printk_skb: 505 callbacks suppressed [ 832.863140][ T28] audit: type=1400 audit(2000000015.013:14911): avc: denied { read write } for pid=16420 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 832.913896][ T28] audit: type=1400 audit(2000000015.050:14912): avc: denied { create } for pid=21809 comm="syz.9.5408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 832.948756][ T28] audit: type=1400 audit(2000000015.059:14913): avc: denied { create } for pid=21809 comm="syz.9.5408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 832.970240][T21812] netdevsim netdevsim4: Direct firmware load for  failed with error -2 [ 832.993751][ T28] audit: type=1400 audit(2000000015.059:14914): avc: denied { read write } for pid=16652 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 833.046742][ T28] audit: type=1400 audit(2000000015.087:14915): avc: denied { prog_load } for pid=21813 comm="syz.8.5409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 833.094695][ T28] audit: type=1400 audit(2000000015.087:14916): avc: denied { allowed } for pid=21809 comm="syz.9.5408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 833.142338][ T28] audit: type=1400 audit(2000000015.097:14917): avc: denied { read write } for pid=16500 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 833.194108][ T28] audit: type=1400 audit(2000000015.134:14918): avc: denied { open } for pid=21813 comm="syz.8.5409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 833.224810][ T54] Bluetooth: hci0: Frame reassembly failed (-84) [ 833.242511][ T28] audit: type=1400 audit(2000000015.134:14919): avc: denied { execmem } for pid=21815 comm="syz.9.5411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 833.316737][ T28] audit: type=1400 audit(2000000015.134:14920): avc: denied { open } for pid=21813 comm="syz.8.5409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 833.531886][T21837] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 834.204624][T21865] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 834.246999][T21871] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=24 sclass=netlink_audit_socket pid=21871 comm=syz.4.5434 [ 834.262878][T21871] gre0: left promiscuous mode [ 834.268104][T21871] gre0: left allmulticast mode [ 834.304032][T21871] bridge0: port 2(bridge_slave_1) entered disabled state [ 834.311534][T21871] bridge0: port 1(bridge_slave_0) entered disabled state [ 834.353630][T21871] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 834.364497][T21871] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 834.407554][T21871] bond6: left allmulticast mode [ 834.413316][T21871] geneve2: left promiscuous mode [ 834.420937][ T3659] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.439915][ T3659] netdevsim netdevsim4 netdevsim0: unset [1, 1] type 2 family 0 port 60520 - 0 [ 834.463377][ T3659] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.477524][ T3659] netdevsim netdevsim4 netdevsim1: unset [1, 1] type 2 family 0 port 60520 - 0 [ 834.491816][ T3659] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.501134][ T3659] netdevsim netdevsim4 netdevsim2: unset [1, 1] type 2 family 0 port 60520 - 0 [ 834.515283][ T3659] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.528708][ T3659] netdevsim netdevsim4 netdevsim3: unset [1, 1] type 2 family 0 port 60520 - 0 [ 835.024711][T21932] netlink: 'syz.8.5463': attribute type 1 has an invalid length. [ 835.070149][T21932] netlink: 44 bytes leftover after parsing attributes in process `syz.8.5463'. [ 835.105269][T21939] vhci_hcd vhci_hcd.0: pdev(9) rhport(0) sockfd(5) [ 835.112248][T21939] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 835.150459][T21939] vhci_hcd vhci_hcd.0: Device attached [ 835.173753][T21940] vhci_hcd: connection closed [ 835.173895][T12476] vhci_hcd vhci_hcd.9: stop threads [ 835.185372][T12476] vhci_hcd vhci_hcd.9: release socket [ 835.193944][T12476] vhci_hcd vhci_hcd.9: disconnect device [ 835.398981][ T43] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 835.549885][T21962] netlink: 132 bytes leftover after parsing attributes in process `syz.2.5473'. [ 835.726901][T21972] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 835.737916][T21972] netlink: 'syz.2.5477': attribute type 1 has an invalid length. [ 835.765093][T21972] bond3: (slave vxcan3): The slave device specified does not support setting the MAC address [ 835.780101][T21972] bond3: (slave vxcan3): Error -95 calling set_mac_address [ 835.822168][T21976] bond3: (slave bridge2): Enslaving as an active interface with a down link [ 836.644730][T22017] netlink: 28 bytes leftover after parsing attributes in process `syz.8.5495'. [ 836.659796][T22017] netlink: 196 bytes leftover after parsing attributes in process `syz.8.5495'. [ 836.672909][T22017] netlink: 28 bytes leftover after parsing attributes in process `syz.8.5495'. [ 836.685604][T22017] netlink: 196 bytes leftover after parsing attributes in process `syz.8.5495'. [ 837.727316][T22053] syzkaller0: entered promiscuous mode [ 837.733298][T22053] syzkaller0: entered allmulticast mode [ 838.261625][ T28] kauditd_printk_skb: 604 callbacks suppressed [ 838.261645][ T28] audit: type=1400 audit(2000000020.064:15525): avc: denied { read write } for pid=16565 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 838.296878][ T28] audit: type=1400 audit(2000000020.101:15526): avc: denied { read write } for pid=16652 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 838.334801][ T28] audit: type=1400 audit(2000000020.120:15527): avc: denied { create } for pid=22084 comm="syz.4.5523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 838.355442][ T28] audit: type=1400 audit(2000000020.120:15528): avc: denied { create } for pid=22084 comm="syz.4.5523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 838.377668][ T28] audit: type=1400 audit(2000000020.120:15529): avc: denied { create } for pid=22084 comm="syz.4.5523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 838.402116][ T28] audit: type=1400 audit(2000000020.148:15530): avc: denied { read write } for pid=16652 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 838.434106][ T28] audit: type=1400 audit(2000000020.157:15531): avc: denied { create } for pid=22086 comm="syz.2.5522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 838.457239][ T28] audit: type=1400 audit(2000000020.176:15532): avc: denied { read write } for pid=16565 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 838.482617][ T28] audit: type=1400 audit(2000000020.185:15533): avc: denied { name_bind } for pid=22088 comm="syz.4.5524" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 838.505148][ T28] audit: type=1400 audit(2000000020.185:15534): avc: denied { prog_load } for pid=22090 comm="syz.2.5525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 838.545340][T22095] syzkaller0: entered promiscuous mode [ 838.551926][T22095] syzkaller0: entered allmulticast mode [ 838.673462][T22103] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8439 sclass=netlink_route_socket pid=22103 comm=syz.1.5530 [ 839.699075][T22148] netlink: 20 bytes leftover after parsing attributes in process `syz.4.5545'. [ 839.737377][T22148] bond10: option ad_actor_system: mode dependency failed, not supported in mode balance-rr(0) [ 839.984391][T22148] bond10 (unregistering): Released all slaves [ 843.653174][ T28] kauditd_printk_skb: 201 callbacks suppressed [ 843.653194][ T28] audit: type=1400 audit(2000000025.115:15736): avc: denied { create } for pid=22218 comm="syz.2.5569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 843.654697][T22219] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5569'. [ 843.659641][ T28] audit: type=1400 audit(2000000025.115:15737): avc: denied { prog_load } for pid=22218 comm="syz.2.5569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 843.749448][ T28] audit: type=1400 audit(2000000025.115:15738): avc: denied { prog_load } for pid=22218 comm="syz.2.5569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 843.776792][ T28] audit: type=1400 audit(2000000025.115:15739): avc: denied { map_create } for pid=22218 comm="syz.2.5569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 843.797256][ T28] audit: type=1400 audit(2000000025.115:15740): avc: denied { create } for pid=22218 comm="syz.2.5569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 843.836405][ T28] audit: type=1400 audit(2000000025.115:15741): avc: denied { create } for pid=22218 comm="syz.2.5569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 843.857278][ T28] audit: type=1400 audit(2000000025.180:15742): avc: denied { read write } for pid=16420 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 843.886339][ T28] audit: type=1400 audit(2000000025.180:15743): avc: denied { create } for pid=22218 comm="syz.2.5569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 843.927319][ T28] audit: type=1400 audit(2000000025.190:15744): avc: denied { create } for pid=22218 comm="syz.2.5569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 843.956027][ T28] audit: type=1400 audit(2000000025.190:15745): avc: denied { create } for pid=22218 comm="syz.2.5569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 844.011945][T22236] 8021q: adding VLAN 0 to HW filter on device bond3 [ 844.083711][T22248] bond1: entered promiscuous mode [ 844.225404][T22264] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5586'. [ 844.234931][T22265] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5586'. [ 844.244357][T22264] netlink: 20 bytes leftover after parsing attributes in process `syz.2.5586'. [ 844.259215][T22265] netlink: 20 bytes leftover after parsing attributes in process `syz.2.5586'. [ 844.293599][ T3659] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 844.302646][ T3659] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 844.311803][T22264] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5586'. [ 844.323483][T22265] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5586'. [ 844.327690][ T3659] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 844.345523][T22265] netlink: 20 bytes leftover after parsing attributes in process `syz.2.5586'. [ 844.345571][T22264] netlink: 20 bytes leftover after parsing attributes in process `syz.2.5586'. [ 844.377690][ T3659] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 844.787355][T22301] bridge0: port 3(ipvlan2) entered blocking state [ 844.794249][T22301] bridge0: port 3(ipvlan2) entered disabled state [ 844.801261][T22301] ipvlan2: entered allmulticast mode [ 844.806853][T22301] bridge0: entered allmulticast mode [ 844.812737][T22301] ipvlan2: left allmulticast mode [ 844.818289][T22301] bridge0: left allmulticast mode [ 845.635521][T22346] FAULT_INJECTION: forcing a failure. [ 845.635521][T22346] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 845.649098][T22346] CPU: 1 UID: 0 PID: 22346 Comm: syz.8.5622 Tainted: G W syzkaller #0 PREEMPT(full) [ 845.649202][T22346] Tainted: [W]=WARN [ 845.649210][T22346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 845.649262][T22346] Call Trace: [ 845.649267][T22346] [ 845.649292][T22346] __dump_stack+0x1d/0x30 [ 845.649313][T22346] dump_stack_lvl+0x95/0xd0 [ 845.649330][T22346] dump_stack+0x15/0x1b [ 845.649399][T22346] should_fail_ex+0x263/0x280 [ 845.649418][T22346] should_fail+0xb/0x20 [ 845.649454][T22346] should_fail_usercopy+0x1a/0x20 [ 845.649474][T22346] _copy_from_user+0x1c/0xb0 [ 845.649495][T22346] ___sys_recvmsg+0xaa/0x3b0 [ 845.649582][T22346] do_recvmmsg+0x1ef/0x560 [ 845.649598][T22346] ? fput+0x8f/0xc0 [ 845.649690][T22346] __x64_sys_recvmmsg+0xe5/0x170 [ 845.649716][T22346] x64_sys_call+0x80f/0x3020 [ 845.649752][T22346] do_syscall_64+0x12c/0x370 [ 845.649771][T22346] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 845.649787][T22346] RIP: 0033:0x7f0a7e83c799 [ 845.649843][T22346] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 845.649857][T22346] RSP: 002b:00007f0a7d28f028 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 845.649874][T22346] RAX: ffffffffffffffda RBX: 00007f0a7eab5fa0 RCX: 00007f0a7e83c799 [ 845.649885][T22346] RDX: 0000000000000002 RSI: 0000200000003900 RDI: 0000000000000003 [ 845.649896][T22346] RBP: 00007f0a7d28f090 R08: 0000000000000000 R09: 0000000000000000 [ 845.649911][T22346] R10: 0000000000010002 R11: 0000000000000246 R12: 0000000000000001 [ 845.649928][T22346] R13: 00007f0a7eab6038 R14: 00007f0a7eab5fa0 R15: 00007fff2b183218 [ 845.649957][T22346] [ 846.811314][T22380] FAULT_INJECTION: forcing a failure. [ 846.811314][T22380] name failslab, interval 1, probability 0, space 0, times 0 [ 846.824604][T22380] CPU: 0 UID: 0 PID: 22380 Comm: syz.9.5632 Tainted: G W syzkaller #0 PREEMPT(full) [ 846.824642][T22380] Tainted: [W]=WARN [ 846.824649][T22380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 846.824662][T22380] Call Trace: [ 846.824669][T22380] [ 846.824687][T22380] __dump_stack+0x1d/0x30 [ 846.824729][T22380] dump_stack_lvl+0x95/0xd0 [ 846.824859][T22380] dump_stack+0x15/0x1b [ 846.824884][T22380] should_fail_ex+0x263/0x280 [ 846.824976][T22380] should_failslab+0x8c/0xb0 [ 846.824997][T22380] kmem_cache_alloc_noprof+0x66/0x400 [ 846.825021][T22380] ? do_getname+0x2e/0x1c0 [ 846.825079][T22380] do_getname+0x2e/0x1c0 [ 846.825102][T22380] getname_flags+0x1d/0x30 [ 846.825154][T22380] do_sys_openat2+0x60/0x130 [ 846.825189][T22380] __x64_sys_openat+0xf2/0x120 [ 846.825247][T22380] x64_sys_call+0x1e39/0x3020 [ 846.825279][T22380] do_syscall_64+0x12c/0x370 [ 846.825361][T22380] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 846.825388][T22380] RIP: 0033:0x7f3f232fcfce [ 846.825466][T22380] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 846.825485][T22380] RSP: 002b:00007f3f21d4cf18 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 846.825509][T22380] RAX: ffffffffffffffda RBX: 00007f3f21d4d6c0 RCX: 00007f3f232fcfce [ 846.825721][T22380] RDX: 0000000000000000 RSI: 00007f3f233d2330 RDI: ffffffffffffff9c [ 846.825737][T22380] RBP: 00007f3f21d4d090 R08: 0000000000000000 R09: 0000000000000000 [ 846.825751][T22380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 846.825764][T22380] R13: 00007f3f235b6218 R14: 00007f3f235b6180 R15: 00007ffc5db74628 [ 846.825783][T22380] [ 847.356475][T22398] netlink: 'syz.8.5639': attribute type 27 has an invalid length. [ 847.544055][T22403] netlink: 'syz.2.5641': attribute type 29 has an invalid length. [ 847.563904][T22403] netlink: 'syz.2.5641': attribute type 29 has an invalid length. [ 848.697629][T22435] lo speed is unknown, defaulting to 1000 [ 848.725869][T22440] bond2: entered promiscuous mode [ 848.732304][T22440] 8021q: adding VLAN 0 to HW filter on device bond2 [ 849.018699][ T28] kauditd_printk_skb: 457 callbacks suppressed [ 849.018717][ T28] audit: type=1400 audit(2000000030.138:16203): avc: denied { open } for pid=22450 comm="syz.4.5661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 849.215187][T22440] netlink: 4 bytes leftover after parsing attributes in process `syz.9.5657'. [ 849.248081][ T28] audit: type=1400 audit(2000000030.344:16204): avc: denied { read write } for pid=17339 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 849.280100][T22440] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22440 comm=syz.9.5657 [ 849.347748][ T28] audit: type=1400 audit(2000000030.437:16205): avc: denied { read write } for pid=16565 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 849.401942][ T28] audit: type=1400 audit(2000000030.465:16206): avc: denied { mounton } for pid=22455 comm="syz.1.5662" path="/syzcgroup/unified/syz1" dev="cgroup2" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=0 [ 849.434896][T22460] netdevsim netdevsim2 ì: renamed from netdevsim0 (while UP) [ 849.445502][ T28] audit: type=1400 audit(2000000030.522:16207): avc: denied { read write } for pid=16500 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 849.523176][ T28] audit: type=1400 audit(2000000030.606:16208): avc: denied { map_create } for pid=22450 comm="syz.4.5661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 849.588440][ T28] audit: type=1400 audit(2000000030.624:16209): avc: denied { read write } for pid=16500 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 849.629237][ T28] audit: type=1400 audit(2000000030.624:16210): avc: denied { create } for pid=22450 comm="syz.4.5661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 849.655676][ T28] audit: type=1400 audit(2000000030.634:16211): avc: denied { read write } for pid=22463 comm="syz.9.5665" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 849.681744][ T28] audit: type=1400 audit(2000000030.634:16212): avc: denied { open } for pid=22463 comm="syz.9.5665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 850.213469][T22485] lo speed is unknown, defaulting to 1000 [ 851.280508][T22546] netlink: 'syz.4.5701': attribute type 29 has an invalid length. [ 851.419165][T22567] FAULT_INJECTION: forcing a failure. [ 851.419165][T22567] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 851.433401][T22567] CPU: 1 UID: 0 PID: 22567 Comm: syz.4.5709 Tainted: G W syzkaller #0 PREEMPT(full) [ 851.433507][T22567] Tainted: [W]=WARN [ 851.433585][T22567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 851.433594][T22567] Call Trace: [ 851.433600][T22567] [ 851.433669][T22567] __dump_stack+0x1d/0x30 [ 851.433698][T22567] dump_stack_lvl+0x95/0xd0 [ 851.433766][T22567] dump_stack+0x15/0x1b [ 851.433782][T22567] should_fail_ex+0x263/0x280 [ 851.433802][T22567] should_fail+0xb/0x20 [ 851.433819][T22567] should_fail_usercopy+0x1a/0x20 [ 851.433916][T22567] _copy_to_user+0x20/0xa0 [ 851.433960][T22567] simple_read_from_buffer+0xb5/0x130 [ 851.433980][T22567] proc_fail_nth_read+0x10e/0x150 [ 851.434002][T22567] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 851.434037][T22567] vfs_read+0x1ab/0x7f0 [ 851.434109][T22567] ? __rcu_read_unlock+0x4e/0x70 [ 851.434124][T22567] ? __rcu_read_unlock+0x4e/0x70 [ 851.434146][T22567] ? __fget_files+0x184/0x1c0 [ 851.434163][T22567] ? mutex_lock+0x57/0x90 [ 851.434186][T22567] ksys_read+0xdc/0x1a0 [ 851.434200][T22567] __x64_sys_read+0x40/0x50 [ 851.434242][T22567] x64_sys_call+0x2886/0x3020 [ 851.434271][T22567] do_syscall_64+0x12c/0x370 [ 851.434295][T22567] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 851.434312][T22567] RIP: 0033:0x7f5f691fcfce [ 851.434329][T22567] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 851.434386][T22567] RSP: 002b:00007f5f67c96fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 851.434413][T22567] RAX: ffffffffffffffda RBX: 00007f5f67c976c0 RCX: 00007f5f691fcfce [ 851.434440][T22567] RDX: 000000000000000f RSI: 00007f5f67c970a0 RDI: 0000000000000003 [ 851.434450][T22567] RBP: 00007f5f67c97090 R08: 0000000000000000 R09: 0000000000000000 [ 851.434515][T22567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 851.434525][T22567] R13: 00007f5f694b6038 R14: 00007f5f694b5fa0 R15: 00007ffdfe2e57f8 [ 851.434538][T22567] [ 851.816280][T22591] FAULT_INJECTION: forcing a failure. [ 851.816280][T22591] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 851.894661][T22591] CPU: 0 UID: 0 PID: 22591 Comm: syz.1.5714 Tainted: G W syzkaller #0 PREEMPT(full) [ 851.894748][T22591] Tainted: [W]=WARN [ 851.894756][T22591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 851.894771][T22591] Call Trace: [ 851.894779][T22591] [ 851.894787][T22591] __dump_stack+0x1d/0x30 [ 851.894838][T22591] dump_stack_lvl+0x95/0xd0 [ 851.894865][T22591] dump_stack+0x15/0x1b [ 851.894890][T22591] should_fail_ex+0x263/0x280 [ 851.894997][T22591] should_fail+0xb/0x20 [ 851.895023][T22591] should_fail_usercopy+0x1a/0x20 [ 851.895053][T22591] _copy_to_user+0x20/0xa0 [ 851.895086][T22591] simple_read_from_buffer+0xb5/0x130 [ 851.895110][T22591] proc_fail_nth_read+0x10e/0x150 [ 851.895141][T22591] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 851.895174][T22591] vfs_read+0x1ab/0x7f0 [ 851.895233][T22591] ? __rcu_read_unlock+0x4e/0x70 [ 851.895336][T22591] ? __fget_files+0x184/0x1c0 [ 851.895364][T22591] ? mutex_lock+0x57/0x90 [ 851.895403][T22591] ksys_read+0xdc/0x1a0 [ 851.895446][T22591] __x64_sys_read+0x40/0x50 [ 851.895468][T22591] x64_sys_call+0x2886/0x3020 [ 851.895502][T22591] do_syscall_64+0x12c/0x370 [ 851.895572][T22591] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 851.895594][T22591] RIP: 0033:0x7f1211f0cfce [ 851.895669][T22591] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 851.895696][T22591] RSP: 002b:00007f1210964fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 851.895718][T22591] RAX: ffffffffffffffda RBX: 00007f12109656c0 RCX: 00007f1211f0cfce [ 851.895734][T22591] RDX: 000000000000000f RSI: 00007f12109650a0 RDI: 0000000000000008 [ 851.895748][T22591] RBP: 00007f1210965090 R08: 0000000000000000 R09: 0000000000000000 [ 851.895817][T22591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 851.895830][T22591] R13: 00007f12121c6218 R14: 00007f12121c6180 R15: 00007ffc1438b998 [ 851.895896][T22591] [ 852.234642][T22590] netlink: 8 bytes leftover after parsing attributes in process `syz.8.5719'. [ 852.280194][T22590] lo speed is unknown, defaulting to 1000 [ 853.612579][T22651] netlink: 28 bytes leftover after parsing attributes in process `syz.8.5741'. [ 853.624195][T22651] netlink: 32 bytes leftover after parsing attributes in process `syz.8.5741'. [ 853.648678][T22651] netlink: 28 bytes leftover after parsing attributes in process `syz.8.5741'. [ 853.658359][T22651] netlink: 32 bytes leftover after parsing attributes in process `syz.8.5741'. [ 853.757736][T22666] FAULT_INJECTION: forcing a failure. [ 853.757736][T22666] name failslab, interval 1, probability 0, space 0, times 0 [ 853.771085][T22666] CPU: 1 UID: 0 PID: 22666 Comm: syz.1.5748 Tainted: G W syzkaller #0 PREEMPT(full) [ 853.771124][T22666] Tainted: [W]=WARN [ 853.771132][T22666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 853.771147][T22666] Call Trace: [ 853.771155][T22666] [ 853.771163][T22666] __dump_stack+0x1d/0x30 [ 853.771193][T22666] dump_stack_lvl+0x95/0xd0 [ 853.771259][T22666] dump_stack+0x15/0x1b [ 853.771329][T22666] should_fail_ex+0x263/0x280 [ 853.771379][T22666] should_failslab+0x8c/0xb0 [ 853.771401][T22666] kmem_cache_alloc_noprof+0x66/0x400 [ 853.771425][T22666] ? ioctx_alloc+0xe3/0x4c0 [ 853.771455][T22666] ioctx_alloc+0xe3/0x4c0 [ 853.771497][T22666] __se_sys_io_setup+0x6b/0x1b0 [ 853.771526][T22666] __x64_sys_io_setup+0x31/0x40 [ 853.771555][T22666] x64_sys_call+0x24f1/0x3020 [ 853.771585][T22666] do_syscall_64+0x12c/0x370 [ 853.771659][T22666] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 853.771684][T22666] RIP: 0033:0x7f1211f4c799 [ 853.771703][T22666] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 853.771725][T22666] RSP: 002b:00007f12109a7028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 853.771803][T22666] RAX: ffffffffffffffda RBX: 00007f12121c5fa0 RCX: 00007f1211f4c799 [ 853.771819][T22666] RDX: 0000000000000000 RSI: 0000200000008240 RDI: 0000000000000003 [ 853.771834][T22666] RBP: 00007f12109a7090 R08: 0000000000000000 R09: 0000000000000000 [ 853.771924][T22666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 853.771939][T22666] R13: 00007f12121c6038 R14: 00007f12121c5fa0 R15: 00007ffc1438b998 [ 853.772009][T22666] [ 854.215720][T22703] FAULT_INJECTION: forcing a failure. [ 854.215720][T22703] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 854.229379][T22703] CPU: 1 UID: 0 PID: 22703 Comm: syz.1.5763 Tainted: G W syzkaller #0 PREEMPT(full) [ 854.229405][T22703] Tainted: [W]=WARN [ 854.229428][T22703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 854.229437][T22703] Call Trace: [ 854.229442][T22703] [ 854.229448][T22703] __dump_stack+0x1d/0x30 [ 854.229470][T22703] dump_stack_lvl+0x95/0xd0 [ 854.229486][T22703] dump_stack+0x15/0x1b [ 854.229534][T22703] should_fail_ex+0x263/0x280 [ 854.229556][T22703] should_fail+0xb/0x20 [ 854.229572][T22703] should_fail_usercopy+0x1a/0x20 [ 854.229599][T22703] _copy_from_user+0x1c/0xb0 [ 854.229634][T22703] ___sys_sendmsg+0xc1/0x1e0 [ 854.229718][T22703] ? path_openat+0x1b01/0x2050 [ 854.229748][T22703] __sys_sendmmsg+0x185/0x320 [ 854.229787][T22703] __x64_sys_sendmmsg+0x57/0x70 [ 854.229809][T22703] x64_sys_call+0x27aa/0x3020 [ 854.229836][T22703] do_syscall_64+0x12c/0x370 [ 854.229857][T22703] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 854.229873][T22703] RIP: 0033:0x7f1211f4c799 [ 854.229886][T22703] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 854.229906][T22703] RSP: 002b:00007f12109a7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 854.229928][T22703] RAX: ffffffffffffffda RBX: 00007f12121c5fa0 RCX: 00007f1211f4c799 [ 854.229947][T22703] RDX: 0000000000000001 RSI: 0000200000000240 RDI: 0000000000000003 [ 854.229963][T22703] RBP: 00007f12109a7090 R08: 0000000000000000 R09: 0000000000000000 [ 854.230027][T22703] R10: 0000000004000000 R11: 0000000000000246 R12: 0000000000000001 [ 854.230036][T22703] R13: 00007f12121c6038 R14: 00007f12121c5fa0 R15: 00007ffc1438b998 [ 854.230050][T22703] [ 854.418843][ T28] kauditd_printk_skb: 562 callbacks suppressed [ 854.418935][ T28] audit: type=1400 audit(2000000035.180:16775): avc: denied { read write } for pid=17339 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 854.451086][ T28] audit: type=1400 audit(2000000035.180:16776): avc: denied { read write } for pid=16652 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 854.478531][ T28] audit: type=1400 audit(2000000035.236:16777): avc: denied { prog_load } for pid=22704 comm="syz.1.5764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 854.499563][T22705] audit: audit_backlog=65 > audit_backlog_limit=64 [ 854.506617][T16652] audit: audit_backlog=65 > audit_backlog_limit=64 [ 854.507126][T22705] audit: audit_lost=47 audit_rate_limit=0 audit_backlog_limit=64 [ 854.513997][T16652] audit: audit_lost=48 audit_rate_limit=0 audit_backlog_limit=64 [ 854.522057][T22705] audit: backlog limit exceeded [ 854.529993][ T28] audit: type=1400 audit(2000000035.245:16778): avc: denied { allowed } for pid=22706 comm="syz.4.5765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 854.542491][T22705] audit: audit_backlog=65 > audit_backlog_limit=64 [ 854.602478][T22719] FAULT_INJECTION: forcing a failure. [ 854.602478][T22719] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 854.616303][T22719] CPU: 1 UID: 0 PID: 22719 Comm: syz.1.5769 Tainted: G W syzkaller #0 PREEMPT(full) [ 854.616430][T22719] Tainted: [W]=WARN [ 854.616438][T22719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 854.616451][T22719] Call Trace: [ 854.616457][T22719] [ 854.616465][T22719] __dump_stack+0x1d/0x30 [ 854.616493][T22719] dump_stack_lvl+0x95/0xd0 [ 854.616517][T22719] dump_stack+0x15/0x1b [ 854.616599][T22719] should_fail_ex+0x263/0x280 [ 854.616657][T22719] should_fail+0xb/0x20 [ 854.616720][T22719] should_fail_usercopy+0x1a/0x20 [ 854.616753][T22719] _copy_from_user+0x1c/0xb0 [ 854.616784][T22719] __sys_bpf+0x183/0x7e0 [ 854.616891][T22719] __x64_sys_bpf+0x41/0x50 [ 854.616962][T22719] x64_sys_call+0x10cb/0x3020 [ 854.617027][T22719] do_syscall_64+0x12c/0x370 [ 854.617058][T22719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 854.617083][T22719] RIP: 0033:0x7f1211f4c799 [ 854.617101][T22719] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 854.617132][T22719] RSP: 002b:00007f12109a7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 854.617159][T22719] RAX: ffffffffffffffda RBX: 00007f12121c5fa0 RCX: 00007f1211f4c799 [ 854.617184][T22719] RDX: 0000000000000090 RSI: 00002000000002c0 RDI: 0000000000000005 [ 854.617198][T22719] RBP: 00007f12109a7090 R08: 0000000000000000 R09: 0000000000000000 [ 854.617211][T22719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 854.617225][T22719] R13: 00007f12121c6038 R14: 00007f12121c5fa0 R15: 00007ffc1438b998 [ 854.617246][T22719] [ 854.909483][T22739] FAULT_INJECTION: forcing a failure. [ 854.909483][T22739] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 854.982331][T22739] CPU: 0 UID: 0 PID: 22739 Comm: syz.1.5774 Tainted: G W syzkaller #0 PREEMPT(full) [ 854.982427][T22739] Tainted: [W]=WARN [ 854.982435][T22739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 854.982448][T22739] Call Trace: [ 854.982458][T22739] [ 854.982468][T22739] __dump_stack+0x1d/0x30 [ 854.982509][T22739] dump_stack_lvl+0x95/0xd0 [ 854.982538][T22739] dump_stack+0x15/0x1b [ 854.982571][T22739] should_fail_ex+0x263/0x280 [ 854.982681][T22739] should_fail+0xb/0x20 [ 854.982706][T22739] should_fail_usercopy+0x1a/0x20 [ 854.982740][T22739] _copy_to_user+0x20/0xa0 [ 854.982830][T22739] simple_read_from_buffer+0xb5/0x130 [ 854.982859][T22739] proc_fail_nth_read+0x10e/0x150 [ 854.982905][T22739] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 854.982936][T22739] vfs_read+0x1ab/0x7f0 [ 854.982974][T22739] ? __rcu_read_unlock+0x4e/0x70 [ 854.983049][T22739] ? __fget_files+0x184/0x1c0 [ 854.983074][T22739] ? mutex_lock+0x57/0x90 [ 854.983186][T22739] ksys_read+0xdc/0x1a0 [ 854.983205][T22739] __x64_sys_read+0x40/0x50 [ 854.983252][T22739] x64_sys_call+0x2886/0x3020 [ 854.983280][T22739] do_syscall_64+0x12c/0x370 [ 854.983365][T22739] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 854.983429][T22739] RIP: 0033:0x7f1211f0cfce [ 854.983516][T22739] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 854.983537][T22739] RSP: 002b:00007f1210985fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 854.983562][T22739] RAX: ffffffffffffffda RBX: 00007f12109866c0 RCX: 00007f1211f0cfce [ 854.983579][T22739] RDX: 000000000000000f RSI: 00007f12109860a0 RDI: 0000000000000006 [ 854.983594][T22739] RBP: 00007f1210986090 R08: 0000000000000000 R09: 0000000000000000 [ 854.983609][T22739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 854.983657][T22739] R13: 00007f12121c6128 R14: 00007f12121c6090 R15: 00007ffc1438b998 [ 854.983677][T22739] [ 855.583728][T22774] netlink: 36 bytes leftover after parsing attributes in process `syz.8.5794'. [ 855.710955][T22782] netlink: 4 bytes leftover after parsing attributes in process `syz.8.5797'. [ 855.767963][T22791] syzkaller0: entered promiscuous mode [ 855.830806][T22803] lo speed is unknown, defaulting to 1000 [ 856.093382][T22837] FAULT_INJECTION: forcing a failure. [ 856.093382][T22837] name failslab, interval 1, probability 0, space 0, times 0 [ 856.106399][T22837] CPU: 1 UID: 0 PID: 22837 Comm: syz.2.5819 Tainted: G W syzkaller #0 PREEMPT(full) [ 856.106465][T22837] Tainted: [W]=WARN [ 856.106474][T22837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 856.106504][T22837] Call Trace: [ 856.106512][T22837] [ 856.106521][T22837] __dump_stack+0x1d/0x30 [ 856.106562][T22837] dump_stack_lvl+0x95/0xd0 [ 856.106588][T22837] dump_stack+0x15/0x1b [ 856.106610][T22837] should_fail_ex+0x263/0x280 [ 856.106660][T22837] should_failslab+0x8c/0xb0 [ 856.106691][T22837] kmem_cache_alloc_noprof+0x66/0x400 [ 856.106780][T22837] ? ioctx_alloc+0xe3/0x4c0 [ 856.106810][T22837] ioctx_alloc+0xe3/0x4c0 [ 856.106990][T22837] __se_sys_io_setup+0x6b/0x1b0 [ 856.107022][T22837] __x64_sys_io_setup+0x31/0x40 [ 856.107052][T22837] x64_sys_call+0x24f1/0x3020 [ 856.107091][T22837] do_syscall_64+0x12c/0x370 [ 856.107121][T22837] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 856.107161][T22837] RIP: 0033:0x7f72e931c799 [ 856.107184][T22837] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 856.107206][T22837] RSP: 002b:00007f72e7d77028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 856.107232][T22837] RAX: ffffffffffffffda RBX: 00007f72e9595fa0 RCX: 00007f72e931c799 [ 856.107276][T22837] RDX: 0000000000000000 RSI: 0000200000008240 RDI: 0000000000000003 [ 856.107292][T22837] RBP: 00007f72e7d77090 R08: 0000000000000000 R09: 0000000000000000 [ 856.107307][T22837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 856.107323][T22837] R13: 00007f72e9596038 R14: 00007f72e9595fa0 R15: 00007fff6683b868 [ 856.107391][T22837] [ 856.540920][T22867] FAULT_INJECTION: forcing a failure. [ 856.540920][T22867] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 856.556063][T22867] CPU: 0 UID: 0 PID: 22867 Comm: syz.1.5831 Tainted: G W syzkaller #0 PREEMPT(full) [ 856.556101][T22867] Tainted: [W]=WARN [ 856.556165][T22867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 856.556179][T22867] Call Trace: [ 856.556187][T22867] [ 856.556195][T22867] __dump_stack+0x1d/0x30 [ 856.556229][T22867] dump_stack_lvl+0x95/0xd0 [ 856.556267][T22867] dump_stack+0x15/0x1b [ 856.556289][T22867] should_fail_ex+0x263/0x280 [ 856.556323][T22867] should_fail+0xb/0x20 [ 856.556386][T22867] should_fail_usercopy+0x1a/0x20 [ 856.556416][T22867] _copy_from_user+0x1c/0xb0 [ 856.556477][T22867] ___sys_sendmsg+0xc1/0x1e0 [ 856.556515][T22867] ? path_openat+0x1b01/0x2050 [ 856.556565][T22867] __sys_sendmmsg+0x185/0x320 [ 856.556657][T22867] __x64_sys_sendmmsg+0x57/0x70 [ 856.556702][T22867] x64_sys_call+0x27aa/0x3020 [ 856.556734][T22867] do_syscall_64+0x12c/0x370 [ 856.556760][T22867] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 856.556783][T22867] RIP: 0033:0x7f1211f4c799 [ 856.556905][T22867] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 856.556928][T22867] RSP: 002b:00007f12109a7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 856.556956][T22867] RAX: ffffffffffffffda RBX: 00007f12121c5fa0 RCX: 00007f1211f4c799 [ 856.557014][T22867] RDX: 0000000000000001 RSI: 0000200000000240 RDI: 0000000000000003 [ 856.557028][T22867] RBP: 00007f12109a7090 R08: 0000000000000000 R09: 0000000000000000 [ 856.557088][T22867] R10: 0000000004000000 R11: 0000000000000246 R12: 0000000000000001 [ 856.557103][T22867] R13: 00007f12121c6038 R14: 00007f12121c5fa0 R15: 00007ffc1438b998 [ 856.557125][T22867] [ 856.809065][T22870] xt_CT: You must specify a L4 protocol and not use inversions on it [ 856.894870][T22872] netlink: 'syz.4.5835': attribute type 1 has an invalid length. [ 856.897453][T22874] FAULT_INJECTION: forcing a failure. [ 856.897453][T22874] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 856.903225][T22872] netlink: 'syz.4.5835': attribute type 22 has an invalid length. [ 856.932540][T22874] CPU: 1 UID: 0 PID: 22874 Comm: syz.1.5834 Tainted: G W syzkaller #0 PREEMPT(full) [ 856.932598][T22874] Tainted: [W]=WARN [ 856.932616][T22874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 856.932631][T22874] Call Trace: [ 856.932640][T22874] [ 856.932648][T22874] __dump_stack+0x1d/0x30 [ 856.932676][T22874] dump_stack_lvl+0x95/0xd0 [ 856.932780][T22874] dump_stack+0x15/0x1b [ 856.932802][T22874] should_fail_ex+0x263/0x280 [ 856.932831][T22874] should_fail+0xb/0x20 [ 856.932854][T22874] should_fail_usercopy+0x1a/0x20 [ 856.932945][T22874] _copy_from_user+0x1c/0xb0 [ 856.933038][T22874] ___sys_sendmsg+0xc1/0x1e0 [ 856.933085][T22874] __x64_sys_sendmsg+0xd4/0x160 [ 856.933121][T22874] x64_sys_call+0x194c/0x3020 [ 856.933202][T22874] do_syscall_64+0x12c/0x370 [ 856.933297][T22874] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 856.933323][T22874] RIP: 0033:0x7f1211f4c799 [ 856.933342][T22874] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 856.933425][T22874] RSP: 002b:00007f12109a7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 856.933450][T22874] RAX: ffffffffffffffda RBX: 00007f12121c5fa0 RCX: 00007f1211f4c799 [ 856.933542][T22874] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000003 [ 856.933560][T22874] RBP: 00007f12109a7090 R08: 0000000000000000 R09: 0000000000000000 [ 856.933577][T22874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 856.933592][T22874] R13: 00007f12121c6038 R14: 00007f12121c5fa0 R15: 00007ffc1438b998 [ 856.933613][T22874] [ 857.224678][T22890] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=384 sclass=netlink_route_socket pid=22890 comm=syz.1.5842 [ 857.303130][T22896] lo speed is unknown, defaulting to 1000 [ 857.378050][T22905] netlink: 36 bytes leftover after parsing attributes in process `syz.1.5849'. [ 857.414069][T22903] lo speed is unknown, defaulting to 1000 [ 857.657289][T22927] netlink: 'syz.4.5858': attribute type 5 has an invalid length. [ 857.666041][T22927] netlink: 32 bytes leftover after parsing attributes in process `syz.4.5858'. [ 857.843410][T22972] pim6reg1: entered promiscuous mode [ 857.857441][T22972] pim6reg1: entered allmulticast mode [ 857.916665][T22975] lo speed is unknown, defaulting to 1000 [ 857.948124][T22989] netlink: 28 bytes leftover after parsing attributes in process `syz.2.5882'. [ 858.134438][T23007] syzkaller0: entered promiscuous mode [ 858.140431][T23007] syzkaller0: entered allmulticast mode [ 858.862472][T23066] netlink: 32 bytes leftover after parsing attributes in process `syz.9.5916'. [ 858.908980][T23066] netlink: 32 bytes leftover after parsing attributes in process `syz.9.5916'. [ 858.982302][T23075] netlink: 20 bytes leftover after parsing attributes in process `syz.9.5919'. [ 859.155752][T23086] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5924'. [ 859.174549][T23086] bridge_slave_1: left allmulticast mode [ 859.199745][T23086] bridge_slave_1: left promiscuous mode [ 859.216300][T23086] bridge0: port 2(bridge_slave_1) entered disabled state [ 859.234552][T23088] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5924'. [ 859.389474][T23086] bridge_slave_0: left allmulticast mode [ 859.451443][T23086] bridge_slave_0: left promiscuous mode [ 859.457602][T23086] bridge0: port 1(bridge_slave_0) entered disabled state [ 859.556257][T23093] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 859.563948][T23093] IPv6: NLM_F_CREATE should be set when creating new route [ 859.571921][T23093] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23093 comm=syz.8.5926 [ 859.774042][ T28] kauditd_printk_skb: 1054 callbacks suppressed [ 859.774102][ T28] audit: type=1400 audit(2000000040.194:17800): avc: denied { read write } for pid=16652 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 859.779793][T23113] IPv6: Can't replace route, no match found [ 859.816978][ T28] audit: type=1400 audit(2000000040.231:17801): avc: denied { read write } for pid=16420 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 859.885638][ T28] audit: type=1400 audit(2000000040.259:17802): avc: denied { read write } for pid=23114 comm="syz.8.5936" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 859.966187][ T28] audit: type=1400 audit(2000000040.259:17803): avc: denied { name_bind } for pid=23112 comm="syz.4.5935" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 860.017919][ T28] audit: type=1400 audit(2000000040.259:17804): avc: denied { create } for pid=23112 comm="syz.4.5935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 860.048204][T23131] audit: audit_backlog=65 > audit_backlog_limit=64 [ 860.055253][ T28] audit: type=1400 audit(2000000040.259:17805): avc: denied { create } for pid=23112 comm="syz.4.5935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 860.077859][T16500] audit: audit_backlog=65 > audit_backlog_limit=64 [ 860.080891][T23132] audit: audit_backlog=65 > audit_backlog_limit=64 [ 860.094403][T16500] audit: audit_lost=60 audit_rate_limit=0 audit_backlog_limit=64 [ 861.330513][T23183] netlink: 'syz.9.5963': attribute type 10 has an invalid length. [ 861.364639][T23183] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 861.378002][T23183] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 861.496827][T23192] IPVS: sed: UDP 224.0.0.2:0 - no destination available [ 861.588994][T23215] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 862.483209][T23255] netlink: 'syz.1.5989': attribute type 4 has an invalid length. [ 862.552256][T23263] FAULT_INJECTION: forcing a failure. [ 862.552256][T23263] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 862.566092][T23263] CPU: 1 UID: 0 PID: 23263 Comm: syz.1.5994 Tainted: G W syzkaller #0 PREEMPT(full) [ 862.566134][T23263] Tainted: [W]=WARN [ 862.566141][T23263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 862.566153][T23263] Call Trace: [ 862.566175][T23263] [ 862.566185][T23263] __dump_stack+0x1d/0x30 [ 862.566212][T23263] dump_stack_lvl+0x95/0xd0 [ 862.566235][T23263] dump_stack+0x15/0x1b [ 862.566257][T23263] should_fail_ex+0x263/0x280 [ 862.566350][T23263] should_fail+0xb/0x20 [ 862.566374][T23263] should_fail_usercopy+0x1a/0x20 [ 862.566405][T23263] _copy_to_user+0x20/0xa0 [ 862.566451][T23263] simple_read_from_buffer+0xb5/0x130 [ 862.566500][T23263] proc_fail_nth_read+0x10e/0x150 [ 862.566536][T23263] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 862.566594][T23263] vfs_read+0x1ab/0x7f0 [ 862.566683][T23263] ? __rcu_read_unlock+0x4e/0x70 [ 862.566711][T23263] ? __fget_files+0x184/0x1c0 [ 862.566818][T23263] ? mutex_lock+0x57/0x90 [ 862.566857][T23263] ksys_read+0xdc/0x1a0 [ 862.566882][T23263] __x64_sys_read+0x40/0x50 [ 862.566906][T23263] x64_sys_call+0x2886/0x3020 [ 862.566986][T23263] do_syscall_64+0x12c/0x370 [ 862.567019][T23263] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 862.567046][T23263] RIP: 0033:0x7f1211f0cfce [ 862.567067][T23263] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 862.567151][T23263] RSP: 002b:00007f12109a6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 862.567175][T23263] RAX: ffffffffffffffda RBX: 00007f12109a76c0 RCX: 00007f1211f0cfce [ 862.567193][T23263] RDX: 000000000000000f RSI: 00007f12109a70a0 RDI: 0000000000000003 [ 862.567211][T23263] RBP: 00007f12109a7090 R08: 0000000000000000 R09: 0000000000000000 [ 862.567270][T23263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 862.567285][T23263] R13: 00007f12121c6038 R14: 00007f12121c5fa0 R15: 00007ffc1438b998 [ 862.567309][T23263] [ 862.808462][T23268] FAULT_INJECTION: forcing a failure. [ 862.808462][T23268] name failslab, interval 1, probability 0, space 0, times 0 [ 862.821682][T23268] CPU: 0 UID: 0 PID: 23268 Comm: syz.1.5997 Tainted: G W syzkaller #0 PREEMPT(full) [ 862.821723][T23268] Tainted: [W]=WARN [ 862.821731][T23268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 862.821746][T23268] Call Trace: [ 862.821754][T23268] [ 862.821763][T23268] __dump_stack+0x1d/0x30 [ 862.821845][T23268] dump_stack_lvl+0x95/0xd0 [ 862.821874][T23268] dump_stack+0x15/0x1b [ 862.821901][T23268] should_fail_ex+0x263/0x280 [ 862.821933][T23268] should_failslab+0x8c/0xb0 [ 862.821973][T23268] kmem_cache_alloc_noprof+0x66/0x400 [ 862.822001][T23268] ? ioctx_alloc+0xe3/0x4c0 [ 862.822034][T23268] ioctx_alloc+0xe3/0x4c0 [ 862.822255][T23268] __se_sys_io_setup+0x6b/0x1b0 [ 862.822288][T23268] __x64_sys_io_setup+0x31/0x40 [ 862.822318][T23268] x64_sys_call+0x24f1/0x3020 [ 862.822352][T23268] do_syscall_64+0x12c/0x370 [ 862.822406][T23268] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 862.822445][T23268] RIP: 0033:0x7f1211f4c799 [ 862.822465][T23268] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 862.822484][T23268] RSP: 002b:00007f12109a7028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 862.822507][T23268] RAX: ffffffffffffffda RBX: 00007f12121c5fa0 RCX: 00007f1211f4c799 [ 862.822558][T23268] RDX: 0000000000000000 RSI: 0000200000008240 RDI: 0000000000000003 [ 862.822582][T23268] RBP: 00007f12109a7090 R08: 0000000000000000 R09: 0000000000000000 [ 862.822596][T23268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 862.822634][T23268] R13: 00007f12121c6038 R14: 00007f12121c5fa0 R15: 00007ffc1438b998 [ 862.822656][T23268] [ 863.092546][T23279] IPVS: wlc: FWM 3 0x00000003 - no destination available [ 863.333339][T23298] netlink: 8 bytes leftover after parsing attributes in process `syz.9.6009'. [ 863.353695][T23298] bond0: option primary: mode dependency failed, not supported in mode balance-rr(0) [ 863.922694][T23335] netlink: 8 bytes leftover after parsing attributes in process `syz.9.6025'. [ 863.948944][T23335] 8021q: VLANs not supported on sit0 [ 864.018977][T23341] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 864.045558][T23341] SET target dimension over the limit! [ 864.231932][T23355] netlink: 144 bytes leftover after parsing attributes in process `syz.9.6032'. [ 864.663742][T23393] netlink: 'syz.4.6047': attribute type 32 has an invalid length. [ 865.133503][ T28] kauditd_printk_skb: 1025 callbacks suppressed [ 865.133522][ T28] audit: type=1400 audit(2000000045.207:18541): avc: denied { read write } for pid=16420 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 865.178696][ T28] audit: type=1400 audit(2000000045.207:18542): avc: denied { allowed } for pid=23402 comm="syz.8.6052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 865.210808][ T28] audit: type=1400 audit(2000000045.207:18543): avc: denied { create } for pid=23402 comm="syz.8.6052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 865.241874][T23408] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6054'. [ 865.251334][T23408] 8021q: VLANs not supported on ip_vti0 [ 865.255278][T23409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23409 comm=syz.8.6055 [ 865.267498][ T28] audit: type=1400 audit(2000000045.207:18544): avc: denied { open } for pid=23402 comm="syz.8.6052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 865.360373][ T28] audit: type=1400 audit(2000000045.207:18545): avc: denied { map_create } for pid=23402 comm="syz.8.6052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 865.405378][ T28] audit: type=1400 audit(2000000045.207:18546): avc: denied { prog_load } for pid=23402 comm="syz.8.6052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 865.446946][ T28] audit: type=1400 audit(2000000045.207:18547): avc: denied { prog_load } for pid=23402 comm="syz.8.6052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 865.488685][ T28] audit: type=1400 audit(2000000045.217:18548): avc: denied { prog_load } for pid=23402 comm="syz.8.6052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 865.505451][T23431] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23431 comm=syz.2.6065 [ 865.530333][ T28] audit: type=1400 audit(2000000045.217:18549): avc: denied { allowed } for pid=23402 comm="syz.8.6052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 865.560844][T23435] audit: audit_backlog=65 > audit_backlog_limit=64 [ 865.643670][T23441] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6067'. [ 865.699925][T23441] 8021q: adding VLAN 0 to HW filter on device bond4 [ 865.882971][T23449] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6070'. [ 865.902951][T23449] netlink: 'syz.4.6070': attribute type 29 has an invalid length. [ 865.920359][T23449] netlink: 'syz.4.6070': attribute type 29 has an invalid length. [ 866.326301][T23455] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6073'. [ 866.472464][T23462] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6076'. [ 866.484699][T23462] 8021q: VLANs not supported on ip_vti0 [ 866.790535][T23502] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6093'. [ 866.804667][T23502] 8021q: VLANs not supported on ip6_vti0 [ 866.837420][T23504] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6094'. [ 866.851435][T23504] 8021q: VLANs not supported on ip6_vti0 [ 866.988707][T23513] bond5: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 867.011337][T23513] bond5 (unregistering): Released all slaves [ 867.103509][T23522] 8021q: VLANs not supported on sit0 [ 867.152840][T23526] FAULT_INJECTION: forcing a failure. [ 867.152840][T23526] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 867.169940][T23526] CPU: 1 UID: 0 PID: 23526 Comm: syz.1.6102 Tainted: G W syzkaller #0 PREEMPT(full) [ 867.169982][T23526] Tainted: [W]=WARN [ 867.170069][T23526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 867.170084][T23526] Call Trace: [ 867.170092][T23526] [ 867.170103][T23526] __dump_stack+0x1d/0x30 [ 867.170135][T23526] dump_stack_lvl+0x95/0xd0 [ 867.170183][T23526] dump_stack+0x15/0x1b [ 867.170206][T23526] should_fail_ex+0x263/0x280 [ 867.170233][T23526] should_fail+0xb/0x20 [ 867.170261][T23526] should_fail_usercopy+0x1a/0x20 [ 867.170331][T23526] copy_folio_from_iter_atomic+0x269/0x1170 [ 867.170372][T23526] ? shmem_write_begin+0xfc/0x1f0 [ 867.170452][T23526] ? shmem_write_begin+0x135/0x1f0 [ 867.170486][T23526] generic_perform_write+0x2c1/0x490 [ 867.170528][T23526] shmem_file_write_iter+0xc5/0xf0 [ 867.170583][T23526] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 867.170726][T23526] vfs_write+0x5a6/0x9f0 [ 867.170748][T23526] ksys_write+0xdc/0x1a0 [ 867.170769][T23526] __x64_sys_write+0x40/0x50 [ 867.170865][T23526] x64_sys_call+0x27e1/0x3020 [ 867.170976][T23526] do_syscall_64+0x12c/0x370 [ 867.171042][T23526] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 867.171067][T23526] RIP: 0033:0x7f1211f4c799 [ 867.171095][T23526] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 867.171118][T23526] RSP: 002b:00007f12109a7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 867.171203][T23526] RAX: ffffffffffffffda RBX: 00007f12121c5fa0 RCX: 00007f1211f4c799 [ 867.171222][T23526] RDX: 000000000208e24b RSI: 0000200000000040 RDI: 0000000000000004 [ 867.171239][T23526] RBP: 00007f12109a7090 R08: 0000000000000000 R09: 0000000000000000 [ 867.171318][T23526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 867.171334][T23526] R13: 00007f12121c6038 R14: 00007f12121c5fa0 R15: 00007ffc1438b998 [ 867.171358][T23526] [ 867.660021][T23547] FAULT_INJECTION: forcing a failure. [ 867.660021][T23547] name failslab, interval 1, probability 0, space 0, times 0 [ 867.677638][T23547] CPU: 1 UID: 0 PID: 23547 Comm: syz.8.6111 Tainted: G W syzkaller #0 PREEMPT(full) [ 867.677685][T23547] Tainted: [W]=WARN [ 867.677702][T23547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 867.677717][T23547] Call Trace: [ 867.677724][T23547] [ 867.677733][T23547] __dump_stack+0x1d/0x30 [ 867.677882][T23547] dump_stack_lvl+0x95/0xd0 [ 867.677910][T23547] dump_stack+0x15/0x1b [ 867.677931][T23547] should_fail_ex+0x263/0x280 [ 867.677958][T23547] ? snd_seq_pool_new+0x32/0xe0 [ 867.678002][T23547] should_failslab+0x8c/0xb0 [ 867.678030][T23547] __kmalloc_cache_noprof+0x5f/0x410 [ 867.678061][T23547] ? __pfx_snd_seq_open+0x10/0x10 [ 867.678082][T23547] snd_seq_pool_new+0x32/0xe0 [ 867.678117][T23547] ? __pfx_snd_seq_open+0x10/0x10 [ 867.678137][T23547] seq_create_client1+0x4b/0x370 [ 867.678171][T23547] ? __pfx_snd_seq_open+0x10/0x10 [ 867.678222][T23547] snd_seq_open+0x52/0x360 [ 867.678242][T23547] ? __pfx_snd_seq_open+0x10/0x10 [ 867.678262][T23547] snd_open+0x275/0x2e0 [ 867.678292][T23547] chrdev_open+0x2eb/0x3a0 [ 867.678377][T23547] do_dentry_open+0x4ca/0xa90 [ 867.678406][T23547] ? __pfx_chrdev_open+0x10/0x10 [ 867.678453][T23547] vfs_open+0x37/0x1e0 [ 867.678481][T23547] path_openat+0x1b70/0x2050 [ 867.678522][T23547] ? _parse_integer_limit+0x170/0x190 [ 867.678580][T23547] ? kstrtouint+0x76/0xc0 [ 867.678603][T23547] do_file_open+0x16c/0x290 [ 867.678649][T23547] do_sys_openat2+0x94/0x130 [ 867.678733][T23547] __x64_sys_openat+0xf2/0x120 [ 867.678764][T23547] x64_sys_call+0x1e39/0x3020 [ 867.678878][T23547] do_syscall_64+0x12c/0x370 [ 867.678907][T23547] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 867.679012][T23547] RIP: 0033:0x7f0a7e83c799 [ 867.679032][T23547] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 867.679055][T23547] RSP: 002b:00007f0a7d28f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 867.679077][T23547] RAX: ffffffffffffffda RBX: 00007f0a7eab5fa0 RCX: 00007f0a7e83c799 [ 867.679104][T23547] RDX: 0000000000062181 RSI: 00002000000000c0 RDI: ffffffffffffff9c [ 867.679119][T23547] RBP: 00007f0a7d28f090 R08: 0000000000000000 R09: 0000000000000000 [ 867.679135][T23547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 867.679151][T23547] R13: 00007f0a7eab6038 R14: 00007f0a7eab5fa0 R15: 00007fff2b183218 [ 867.679174][T23547] [ 868.098272][T23572] FAULT_INJECTION: forcing a failure. [ 868.098272][T23572] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 868.173583][T23572] CPU: 0 UID: 0 PID: 23572 Comm: syz.1.6121 Tainted: G W syzkaller #0 PREEMPT(full) [ 868.173755][T23572] Tainted: [W]=WARN [ 868.173764][T23572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 868.173779][T23572] Call Trace: [ 868.173788][T23572] [ 868.173798][T23572] __dump_stack+0x1d/0x30 [ 868.173883][T23572] dump_stack_lvl+0x95/0xd0 [ 868.173911][T23572] dump_stack+0x15/0x1b [ 868.173983][T23572] should_fail_ex+0x263/0x280 [ 868.174044][T23572] should_fail+0xb/0x20 [ 868.174071][T23572] should_fail_usercopy+0x1a/0x20 [ 868.174103][T23572] _copy_from_user+0x1c/0xb0 [ 868.174139][T23572] ___sys_sendmsg+0xc1/0x1e0 [ 868.174218][T23572] __x64_sys_sendmsg+0xd4/0x160 [ 868.174374][T23572] x64_sys_call+0x194c/0x3020 [ 868.174407][T23572] do_syscall_64+0x12c/0x370 [ 868.174490][T23572] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 868.174513][T23572] RIP: 0033:0x7f1211f4c799 [ 868.174531][T23572] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 868.174554][T23572] RSP: 002b:00007f12109a7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 868.174646][T23572] RAX: ffffffffffffffda RBX: 00007f12121c5fa0 RCX: 00007f1211f4c799 [ 868.174661][T23572] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000007 [ 868.174677][T23572] RBP: 00007f12109a7090 R08: 0000000000000000 R09: 0000000000000000 [ 868.174709][T23572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 868.174725][T23572] R13: 00007f12121c6038 R14: 00007f12121c5fa0 R15: 00007ffc1438b998 [ 868.174748][T23572] [ 868.404666][T23583] netlink: 'syz.1.6127': attribute type 7 has an invalid length. [ 868.444746][T23577] lo speed is unknown, defaulting to 1000 [ 868.695668][T23607] __nla_validate_parse: 5 callbacks suppressed [ 868.695687][T23607] netlink: 12 bytes leftover after parsing attributes in process `syz.8.6137'. [ 868.720105][T23607] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6137'. [ 868.729772][T23607] 8021q: VLANs not supported on sit0 [ 868.900329][T23616] team0: Port device dummy0 removed [ 868.911549][T23616] bridge_slave_0: left allmulticast mode [ 868.917555][T23616] bridge_slave_0: left promiscuous mode [ 868.945595][T23616] bridge0: port 1(bridge_slave_0) entered disabled state [ 868.957364][T23616] bridge_slave_1: left allmulticast mode [ 868.963424][T23616] bridge_slave_1: left promiscuous mode [ 868.979451][T23616] bridge0: port 2(bridge_slave_1) entered disabled state [ 869.003348][T23616] bond0: (slave bond_slave_0): Releasing backup interface [ 869.015668][T23616] bond0: (slave bond_slave_1): Releasing backup interface [ 869.049954][T23616] team0: Port device team_slave_0 removed [ 869.064328][T23623] netlink: 52 bytes leftover after parsing attributes in process `syz.8.6144'. [ 869.097711][T23616] team0: Port device team_slave_1 removed [ 869.104632][T23616] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 869.123162][T23616] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 869.143512][T23616] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 869.159372][T23616] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 869.172204][T23616] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 869.478754][T23644] netlink: 'syz.2.6154': attribute type 1 has an invalid length. [ 869.505420][T23644] 8021q: adding VLAN 0 to HW filter on device bond5 [ 870.431916][T23678] tap0: tun_chr_ioctl cmd 1074025677 [ 870.438382][T23678] tap0: linktype set to 825 [ 870.504694][ T28] kauditd_printk_skb: 599 callbacks suppressed [ 870.504713][ T28] audit: type=1400 audit(2000000050.221:19147): avc: denied { read write } for pid=16565 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 870.558836][ T28] audit: type=1400 audit(2000000050.240:19148): avc: denied { open } for pid=23681 comm="syz.2.6163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 870.613942][ T28] audit: type=1400 audit(2000000050.240:19149): avc: denied { prog_load } for pid=23681 comm="syz.2.6163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 870.655238][ T28] audit: type=1400 audit(2000000050.240:19150): avc: denied { create } for pid=23681 comm="syz.2.6163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 870.702767][ T28] audit: type=1400 audit(2000000050.268:19151): avc: denied { read write } for pid=16420 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 870.772773][ T28] audit: type=1400 audit(2000000050.277:19152): avc: denied { read write } for pid=16565 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 870.836795][ T28] audit: type=1400 audit(2000000050.287:19153): avc: denied { open } for pid=23683 comm="syz.8.6164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 870.890287][ T28] audit: type=1400 audit(2000000050.296:19154): avc: denied { create } for pid=23683 comm="syz.8.6164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 870.943739][ T28] audit: type=1400 audit(2000000050.305:19155): avc: denied { create } for pid=23683 comm="syz.8.6164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 870.948426][T23700] bond0: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 870.986485][ T28] audit: type=1400 audit(2000000050.305:19156): avc: denied { create } for pid=23683 comm="syz.8.6164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 871.038228][T23702] lo speed is unknown, defaulting to 1000 [ 871.229413][T23718] serio: Serial port ttyS3 [ 871.742386][T23743] sch_fq: defrate 4294967295 ignored. [ 871.768793][T23745] netlink: 'syz.8.6188': attribute type 4 has an invalid length. [ 871.830676][T23749] vhci_hcd vhci_hcd.0: pdev(8) rhport(0) sockfd(4) [ 871.837339][T23749] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 871.991403][T23749] vhci_hcd vhci_hcd.0: Device attached [ 871.998167][T23751] vhci_hcd: connection closed [ 871.998354][T12476] vhci_hcd vhci_hcd.8: stop threads [ 872.017888][T12476] vhci_hcd vhci_hcd.8: release socket [ 872.035641][T12476] vhci_hcd vhci_hcd.8: disconnect device [ 872.287063][T23760] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(11) [ 872.293710][T23760] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 872.327066][T23760] vhci_hcd vhci_hcd.0: Device attached [ 872.342239][T23760] vhci_hcd vhci_hcd.0: pdev(4) rhport(1) sockfd(13) [ 872.349070][T23760] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 872.384584][T23760] vhci_hcd vhci_hcd.0: Device attached [ 872.397869][T23763] vhci_hcd: connection closed [ 872.397937][ T54] vhci_hcd vhci_hcd.4: stop threads [ 872.399010][T23761] vhci_hcd: connection closed [ 872.402875][ T54] vhci_hcd vhci_hcd.4: release socket [ 872.419678][ T54] vhci_hcd vhci_hcd.4: disconnect device [ 872.426804][ T54] vhci_hcd vhci_hcd.4: stop threads [ 872.434302][ T54] vhci_hcd vhci_hcd.4: release socket [ 872.441115][ T54] vhci_hcd vhci_hcd.4: disconnect device [ 872.744011][T23790] lo speed is unknown, defaulting to 1000 [ 873.320756][T23809] netlink: 'syz.4.6208': attribute type 21 has an invalid length. [ 873.338020][T23814] netlink: 'syz.4.6208': attribute type 21 has an invalid length. [ 873.346262][T23814] netlink: 156 bytes leftover after parsing attributes in process `syz.4.6208'. [ 873.362357][T23809] netlink: 156 bytes leftover after parsing attributes in process `syz.4.6208'. [ 873.572316][T23834] FAULT_INJECTION: forcing a failure. [ 873.572316][T23834] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 873.588136][T23834] CPU: 1 UID: 0 PID: 23834 Comm: syz.9.6218 Tainted: G W syzkaller #0 PREEMPT(full) [ 873.588176][T23834] Tainted: [W]=WARN [ 873.588184][T23834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 873.588197][T23834] Call Trace: [ 873.588204][T23834] [ 873.588259][T23834] __dump_stack+0x1d/0x30 [ 873.588291][T23834] dump_stack_lvl+0x95/0xd0 [ 873.588369][T23834] dump_stack+0x15/0x1b [ 873.588394][T23834] should_fail_ex+0x263/0x280 [ 873.588438][T23834] should_fail+0xb/0x20 [ 873.588465][T23834] should_fail_usercopy+0x1a/0x20 [ 873.588558][T23834] _copy_from_user+0x1c/0xb0 [ 873.588589][T23834] kstrtouint_from_user+0x69/0xf0 [ 873.588620][T23834] proc_fail_nth_write+0x50/0x160 [ 873.588746][T23834] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 873.588789][T23834] vfs_write+0x269/0x9f0 [ 873.588812][T23834] ? __rcu_read_unlock+0x4e/0x70 [ 873.588835][T23834] ? __fget_files+0x184/0x1c0 [ 873.588930][T23834] ? mutex_lock+0x57/0x90 [ 873.588968][T23834] ksys_write+0xdc/0x1a0 [ 873.588991][T23834] __x64_sys_write+0x40/0x50 [ 873.589079][T23834] x64_sys_call+0x27e1/0x3020 [ 873.589166][T23834] do_syscall_64+0x12c/0x370 [ 873.589197][T23834] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 873.589287][T23834] RIP: 0033:0x7f3f232fcfce [ 873.589304][T23834] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 873.589325][T23834] RSP: 002b:00007f3f21d8efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 873.589426][T23834] RAX: ffffffffffffffda RBX: 00007f3f21d8f6c0 RCX: 00007f3f232fcfce [ 873.589487][T23834] RDX: 0000000000000001 RSI: 00007f3f21d8f0a0 RDI: 0000000000000003 [ 873.589512][T23834] RBP: 00007f3f21d8f090 R08: 0000000000000000 R09: 0000000000000000 [ 873.589528][T23834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 873.589566][T23834] R13: 00007f3f235b6038 R14: 00007f3f235b5fa0 R15: 00007ffc5db74628 [ 873.589624][T23834] [ 874.338217][T23863] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 874.375874][T23863] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 874.486560][ T23] lo speed is unknown, defaulting to 1000 [ 874.492458][ T23] syz0: Port: 1 Link DOWN [ 874.512480][T23867] bond6: option lacp_rate: mode dependency failed, not supported in mode balance-xor(2) [ 874.573242][T23867] bond6 (unregistering): Released all slaves [ 874.644533][T12359] netdevsim netdevsim8 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 874.655334][T23868] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23868 comm=syz.2.6229 [ 874.687319][T12359] netdevsim netdevsim8 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 874.725779][T12359] netdevsim netdevsim8 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 874.747064][T12359] netdevsim netdevsim8 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 875.059038][T23887] netlink: 'syz.1.6234': attribute type 1 has an invalid length. [ 875.093696][T23887] 8021q: adding VLAN 0 to HW filter on device bond1 [ 875.328327][T23906] netlink: 'syz.9.6242': attribute type 29 has an invalid length. [ 875.336887][T23906] netlink: 'syz.9.6242': attribute type 3 has an invalid length. [ 875.348055][T23906] netlink: 132 bytes leftover after parsing attributes in process `syz.9.6242'. [ 875.358651][T23906] sch_fq: defrate 7 ignored. [ 875.852422][ T28] kauditd_printk_skb: 15312 callbacks suppressed [ 875.852442][ T28] audit: type=1400 audit(2000000055.226:29009): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 875.862383][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 875.891423][T16565] audit: audit_backlog=65 > audit_backlog_limit=64 [ 875.900383][ T3039] audit: audit_lost=1979 audit_rate_limit=0 audit_backlog_limit=64 [ 875.904216][T16565] audit: audit_lost=1980 audit_rate_limit=0 audit_backlog_limit=64 [ 875.908768][ T3039] audit: backlog limit exceeded [ 875.917070][T23929] audit: audit_backlog=65 > audit_backlog_limit=64 [ 875.922119][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 875.935563][ T3039] audit: audit_lost=1981 audit_rate_limit=0 audit_backlog_limit=64 [ 875.936265][T16565] audit: backlog limit exceeded [ 876.108851][T23940] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6257'. [ 876.156296][T23945] FAULT_INJECTION: forcing a failure. [ 876.156296][T23945] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 876.216501][T23945] CPU: 1 UID: 0 PID: 23945 Comm: syz.1.6260 Tainted: G W syzkaller #0 PREEMPT(full) [ 876.216540][T23945] Tainted: [W]=WARN [ 876.216612][T23945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 876.216627][T23945] Call Trace: [ 876.216636][T23945] [ 876.216645][T23945] __dump_stack+0x1d/0x30 [ 876.216684][T23945] dump_stack_lvl+0x95/0xd0 [ 876.216713][T23945] dump_stack+0x15/0x1b [ 876.216753][T23945] should_fail_ex+0x263/0x280 [ 876.216780][T23945] should_fail_alloc_page+0xf2/0x100 [ 876.216820][T23945] __alloc_frozen_pages_noprof+0x108/0x360 [ 876.216853][T23945] alloc_pages_mpol+0xb3/0x260 [ 876.216883][T23945] folio_alloc_mpol_noprof+0x39/0x80 [ 876.216977][T23945] shmem_get_folio_gfp+0x3da/0xd60 [ 876.217016][T23945] shmem_fallocate+0x628/0x920 [ 876.217068][T23945] vfs_fallocate+0x3b6/0x450 [ 876.217166][T23945] __x64_sys_fallocate+0x7a/0xd0 [ 876.217195][T23945] x64_sys_call+0x298e/0x3020 [ 876.217228][T23945] do_syscall_64+0x12c/0x370 [ 876.217258][T23945] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 876.217285][T23945] RIP: 0033:0x7f1211f4c799 [ 876.217353][T23945] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 876.217378][T23945] RSP: 002b:00007f12109a7028 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 876.217480][T23945] RAX: ffffffffffffffda RBX: 00007f12121c5fa0 RCX: 00007f1211f4c799 [ 876.217528][T23945] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000003 [ 876.217545][T23945] RBP: 00007f12109a7090 R08: 0000000000000000 R09: 0000000000000000 [ 876.217561][T23945] R10: 0000000002000402 R11: 0000000000000246 R12: 0000000000000001 [ 876.217577][T23945] R13: 00007f12121c6038 R14: 00007f12121c5fa0 R15: 00007ffc1438b998 [ 876.217601][T23945] [ 876.928363][T23971] netlink: 108 bytes leftover after parsing attributes in process `syz.2.6270'. [ 877.460106][T23987] FAULT_INJECTION: forcing a failure. [ 877.460106][T23987] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 877.593306][T23987] CPU: 0 UID: 0 PID: 23987 Comm: syz.8.6276 Tainted: G W syzkaller #0 PREEMPT(full) [ 877.593348][T23987] Tainted: [W]=WARN [ 877.593358][T23987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 877.593374][T23987] Call Trace: [ 877.593383][T23987] [ 877.593394][T23987] __dump_stack+0x1d/0x30 [ 877.593494][T23987] dump_stack_lvl+0x95/0xd0 [ 877.593524][T23987] dump_stack+0x15/0x1b [ 877.593600][T23987] should_fail_ex+0x263/0x280 [ 877.593630][T23987] should_fail+0xb/0x20 [ 877.593660][T23987] should_fail_usercopy+0x1a/0x20 [ 877.593694][T23987] _copy_to_user+0x20/0xa0 [ 877.593764][T23987] simple_read_from_buffer+0xb5/0x130 [ 877.593788][T23987] proc_fail_nth_read+0x10e/0x150 [ 877.593825][T23987] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 877.593887][T23987] vfs_read+0x1ab/0x7f0 [ 877.593917][T23987] ? __rcu_read_unlock+0x4e/0x70 [ 877.593942][T23987] ? __fget_files+0x184/0x1c0 [ 877.594035][T23987] ? mutex_lock+0x57/0x90 [ 877.594086][T23987] ksys_read+0xdc/0x1a0 [ 877.594111][T23987] __x64_sys_read+0x40/0x50 [ 877.594129][T23987] x64_sys_call+0x2886/0x3020 [ 877.594197][T23987] do_syscall_64+0x12c/0x370 [ 877.594230][T23987] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 877.594258][T23987] RIP: 0033:0x7f0a7e7fcfce [ 877.594279][T23987] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 877.594309][T23987] RSP: 002b:00007f0a7d28efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 877.594370][T23987] RAX: ffffffffffffffda RBX: 00007f0a7d28f6c0 RCX: 00007f0a7e7fcfce [ 877.594389][T23987] RDX: 000000000000000f RSI: 00007f0a7d28f0a0 RDI: 0000000000000003 [ 877.594406][T23987] RBP: 00007f0a7d28f090 R08: 0000000000000000 R09: 0000000000000000 [ 877.594425][T23987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 877.594441][T23987] R13: 00007f0a7eab6038 R14: 00007f0a7eab5fa0 R15: 00007fff2b183218 [ 877.594473][T23987] [ 878.235718][T23999] IPVS: length: 1152 != 8 [ 878.240841][T23999] netlink: 16 bytes leftover after parsing attributes in process `syz.2.6281'. [ 878.253609][T23999] gre1: entered promiscuous mode [ 878.966292][T24018] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 879.021603][T24018] 8021q: adding VLAN 0 to HW filter on device bond3 [ 879.963431][T24038] FAULT_INJECTION: forcing a failure. [ 879.963431][T24038] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 879.988171][T24038] CPU: 0 UID: 0 PID: 24038 Comm: syz.8.6294 Tainted: G W syzkaller #0 PREEMPT(full) [ 879.988270][T24038] Tainted: [W]=WARN [ 879.988277][T24038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 879.988291][T24038] Call Trace: [ 879.988302][T24038] [ 879.988312][T24038] __dump_stack+0x1d/0x30 [ 879.988344][T24038] dump_stack_lvl+0x95/0xd0 [ 879.988374][T24038] dump_stack+0x15/0x1b [ 879.988439][T24038] should_fail_ex+0x263/0x280 [ 879.988482][T24038] should_fail_alloc_page+0xf2/0x100 [ 879.988511][T24038] __alloc_frozen_pages_noprof+0x108/0x360 [ 879.988583][T24038] alloc_pages_mpol+0xb3/0x260 [ 879.988616][T24038] alloc_pages_noprof+0x8f/0x130 [ 879.988648][T24038] pte_alloc_one+0x1c/0xc0 [ 879.988670][T24038] handle_mm_fault+0x15bc/0x3020 [ 879.988743][T24038] ? lock_mm_and_find_vma+0x8b/0x440 [ 879.988773][T24038] do_user_addr_fault+0x3fd/0x1050 [ 879.988880][T24038] ? kstrtouint+0x76/0xc0 [ 879.988938][T24038] exc_page_fault+0x62/0xa0 [ 879.988962][T24038] asm_exc_page_fault+0x26/0x30 [ 879.989055][T24038] RIP: 0010:__get_user_4+0x14/0x20 [ 879.989090][T24038] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 ba 00 f0 ff ff ff 7f 00 00 48 39 d0 48 0f 47 c2 0f 01 cb <8b> 10 31 c0 0f 01 ca c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 [ 879.989110][T24038] RSP: 0018:ffffc900027e7e08 EFLAGS: 00050287 [ 879.989129][T24038] RAX: 00007f0a7d1e0000 RBX: ffff888104e82180 RCX: ffffffff81a4cc66 [ 879.989145][T24038] RDX: 00007ffffffff000 RSI: 0000000000000000 RDI: ffff888104e826b8 [ 879.989235][T24038] RBP: ffffc900027e7f48 R08: 0001888104e826bf R09: 0000000000000000 [ 879.989255][T24038] R10: ffffc900027e7e58 R11: 0001c900027e7e58 R12: ffff88810ae8bcc0 [ 879.989283][T24038] R13: ffff888104e82180 R14: 00007f0a7d1e0000 R15: 0000000000000000 [ 879.989303][T24038] ? lookup_ioctx+0x26/0x1e0 [ 879.989338][T24038] lookup_ioctx+0x35/0x1e0 [ 879.989376][T24038] __se_sys_io_submit+0x57/0x280 [ 879.989506][T24038] __x64_sys_io_submit+0x43/0x50 [ 879.989539][T24038] x64_sys_call+0x19d5/0x3020 [ 879.989608][T24038] do_syscall_64+0x12c/0x370 [ 879.989635][T24038] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 879.989661][T24038] RIP: 0033:0x7f0a7e83c799 [ 879.989681][T24038] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 879.989717][T24038] RSP: 002b:00007f0a7d28f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 879.989743][T24038] RAX: ffffffffffffffda RBX: 00007f0a7eab5fa0 RCX: 00007f0a7e83c799 [ 879.989762][T24038] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f0a7d1e0000 [ 879.989779][T24038] RBP: 00007f0a7d28f090 R08: 0000000000000000 R09: 0000000000000000 [ 879.989795][T24038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 879.989811][T24038] R13: 00007f0a7eab6038 R14: 00007f0a7eab5fa0 R15: 00007fff2b183218 [ 879.989856][T24038] [ 880.422233][T24050] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6298'. [ 880.505346][T24052] lo speed is unknown, defaulting to 1000 [ 881.206808][ T28] kauditd_printk_skb: 48465 callbacks suppressed [ 881.206829][ T28] audit: type=1400 audit(2000000060.230:42954): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 881.258184][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 881.274596][ T28] audit: type=1400 audit(2000000060.249:42955): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 881.321675][ T28] audit: type=1400 audit(2000000060.249:42956): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 881.369062][ T28] audit: type=1400 audit(2000000060.249:42957): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 881.411977][ T28] audit: type=1400 audit(2000000060.249:42958): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 881.417348][ T3039] audit: audit_lost=13489 audit_rate_limit=0 audit_backlog_limit=64 [ 881.448196][ T28] audit: type=1400 audit(2000000060.249:42959): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 881.469063][ T3039] audit: backlog limit exceeded [ 881.485968][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 881.574112][T24093] FAULT_INJECTION: forcing a failure. [ 881.574112][T24093] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 881.606866][T24093] CPU: 1 UID: 0 PID: 24093 Comm: syz.4.6315 Tainted: G W syzkaller #0 PREEMPT(full) [ 881.606935][T24093] Tainted: [W]=WARN [ 881.606945][T24093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 881.606981][T24093] Call Trace: [ 881.606989][T24093] [ 881.606997][T24093] __dump_stack+0x1d/0x30 [ 881.607074][T24093] dump_stack_lvl+0x95/0xd0 [ 881.607099][T24093] dump_stack+0x15/0x1b [ 881.607124][T24093] should_fail_ex+0x263/0x280 [ 881.607306][T24093] should_fail+0xb/0x20 [ 881.607401][T24093] should_fail_usercopy+0x1a/0x20 [ 881.607438][T24093] _copy_from_iter+0xcf/0xea0 [ 881.607509][T24093] ? rep_movs_alternative+0x4a/0x90 [ 881.607545][T24093] ? _copy_from_iter+0x13e/0xea0 [ 881.607582][T24093] copy_page_from_iter+0x178/0x2a0 [ 881.607677][T24093] skb_copy_datagram_from_iter+0x22d/0x480 [ 881.607742][T24093] tun_get_user+0x90b/0x27c0 [ 881.607778][T24093] ? ref_tracker_alloc+0x1eb/0x2f0 [ 881.607807][T24093] tun_chr_write_iter+0x15e/0x210 [ 881.607844][T24093] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 881.607936][T24093] vfs_write+0x5a6/0x9f0 [ 881.607965][T24093] ksys_write+0xdc/0x1a0 [ 881.607985][T24093] __x64_sys_write+0x40/0x50 [ 881.608053][T24093] x64_sys_call+0x27e1/0x3020 [ 881.608209][T24093] do_syscall_64+0x12c/0x370 [ 881.608302][T24093] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 881.608331][T24093] RIP: 0033:0x7f5f6923c799 [ 881.608348][T24093] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 881.608367][T24093] RSP: 002b:00007f5f67c97028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 881.608392][T24093] RAX: ffffffffffffffda RBX: 00007f5f694b5fa0 RCX: 00007f5f6923c799 [ 881.608409][T24093] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000003 [ 881.608505][T24093] RBP: 00007f5f67c97090 R08: 0000000000000000 R09: 0000000000000000 [ 881.608521][T24093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 881.608535][T24093] R13: 00007f5f694b6038 R14: 00007f5f694b5fa0 R15: 00007ffdfe2e57f8 [ 881.608554][T24093] [ 881.869408][T24106] FAULT_INJECTION: forcing a failure. [ 881.869408][T24106] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 881.901672][T24106] CPU: 1 UID: 0 PID: 24106 Comm: syz.8.6318 Tainted: G W syzkaller #0 PREEMPT(full) [ 881.901791][T24106] Tainted: [W]=WARN [ 881.901799][T24106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 881.901813][T24106] Call Trace: [ 881.901822][T24106] [ 881.901831][T24106] __dump_stack+0x1d/0x30 [ 881.901864][T24106] dump_stack_lvl+0x95/0xd0 [ 881.901899][T24106] dump_stack+0x15/0x1b [ 881.901958][T24106] should_fail_ex+0x263/0x280 [ 881.901986][T24106] should_fail+0xb/0x20 [ 881.902012][T24106] should_fail_usercopy+0x1a/0x20 [ 881.902113][T24106] _copy_to_user+0x20/0xa0 [ 881.902155][T24106] simple_read_from_buffer+0xb5/0x130 [ 881.902180][T24106] proc_fail_nth_read+0x10e/0x150 [ 881.902213][T24106] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 881.902279][T24106] vfs_read+0x1ab/0x7f0 [ 881.902310][T24106] ? __rcu_read_unlock+0x4e/0x70 [ 881.902359][T24106] ? __fget_files+0x184/0x1c0 [ 881.902464][T24106] ? mutex_lock+0x57/0x90 [ 881.902498][T24106] ksys_read+0xdc/0x1a0 [ 881.902518][T24106] __x64_sys_read+0x40/0x50 [ 881.902606][T24106] x64_sys_call+0x2886/0x3020 [ 881.902641][T24106] do_syscall_64+0x12c/0x370 [ 881.902669][T24106] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 881.902719][T24106] RIP: 0033:0x7f0a7e7fcfce [ 881.902755][T24106] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 881.902777][T24106] RSP: 002b:00007f0a7d28efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 881.902801][T24106] RAX: ffffffffffffffda RBX: 00007f0a7d28f6c0 RCX: 00007f0a7e7fcfce [ 881.902817][T24106] RDX: 000000000000000f RSI: 00007f0a7d28f0a0 RDI: 0000000000000003 [ 881.902831][T24106] RBP: 00007f0a7d28f090 R08: 0000000000000000 R09: 0000000000000000 [ 881.902915][T24106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 881.902929][T24106] R13: 00007f0a7eab6038 R14: 00007f0a7eab5fa0 R15: 00007fff2b183218 [ 881.902947][T24106] [ 882.222702][T24128] xt_hashlimit: max too large, truncated to 1048576 [ 883.016829][T24156] ================================================================== [ 883.025396][T24156] BUG: KCSAN: data-race in mas_state_walk / mas_wmb_replace [ 883.032739][T24156] [ 883.035268][T24156] write to 0xffff88810517eb00 of 8 bytes by task 24155 on cpu 1: [ 883.043287][T24156] mas_wmb_replace+0x20d/0x1610 [ 883.048182][T24156] mas_wr_store_entry+0x16b6/0x2ed0 [ 883.053516][T24156] mas_store_prealloc+0x72e/0xa70 [ 883.061096][T24156] vma_complete+0x3c7/0x850 [ 883.065911][T24156] __split_vma+0x593/0x640 [ 883.070456][T24156] vma_modify+0xb2e/0xd00 [ 883.074914][T24156] vma_modify_flags+0x182/0x210 [ 883.079907][T24156] mprotect_fixup+0x312/0x5d0 [ 883.084786][T24156] do_mprotect_pkey+0x67b/0x920 [ 883.089758][T24156] __x64_sys_mprotect+0x48/0x60 [ 883.094624][T24156] x64_sys_call+0x2768/0x3020 [ 883.099593][T24156] do_syscall_64+0x12c/0x370 [ 883.104210][T24156] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 883.110476][T24156] [ 883.112815][T24156] read to 0xffff88810517eb00 of 8 bytes by task 24156 on cpu 0: [ 883.120666][T24156] mas_state_walk+0x119/0x650 [ 883.125539][T24156] mas_walk+0x60/0x150 [ 883.129610][T24156] lock_vma_under_rcu+0xc9/0x210 [ 883.134645][T24156] do_user_addr_fault+0x232/0x1050 [ 883.140353][T24156] exc_page_fault+0x62/0xa0 [ 883.144979][T24156] asm_exc_page_fault+0x26/0x30 [ 883.150024][T24156] [ 883.152352][T24156] value changed: 0xffff888137e9c3c1 -> 0xffff88810517eb00 [ 883.159555][T24156] [ 883.161987][T24156] Reported by Kernel Concurrency Sanitizer on: [ 883.168162][T24156] CPU: 0 UID: 0 PID: 24156 Comm: syz.1.6338 Tainted: G W syzkaller #0 PREEMPT(full) [ 883.179575][T24156] Tainted: [W]=WARN [ 883.183476][T24156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 883.194200][T24156] ================================================================== [ 886.562741][ T28] kauditd_printk_skb: 32097 callbacks suppressed [ 886.562761][ T28] audit: type=1400 audit(2000000065.244:74704): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 886.577575][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 886.595533][ T28] audit: type=1400 audit(2000000065.253:74705): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 886.599868][ T3039] audit: audit_lost=13608 audit_rate_limit=0 audit_backlog_limit=64 [ 886.624798][ T28] audit: type=1400 audit(2000000065.253:74706): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 886.630685][ T3039] audit: backlog limit exceeded [ 886.652796][ T28] audit: type=1400 audit(2000000065.253:74707): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 886.659071][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 886.680739][ T28] audit: type=1400 audit(2000000065.253:74708): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 886.687339][ T3039] audit: audit_lost=13609 audit_rate_limit=0 audit_backlog_limit=64 [ 891.921522][ T28] kauditd_printk_skb: 47654 callbacks suppressed [ 891.921536][ T28] audit: type=1400 audit(2000000070.257:121150): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 891.936623][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 891.953031][ T28] audit: type=1400 audit(2000000070.267:121151): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 891.960470][ T3039] audit: audit_lost=14014 audit_rate_limit=0 audit_backlog_limit=64 [ 891.984319][ T28] audit: type=1400 audit(2000000070.267:121152): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 891.992991][ T3039] audit: backlog limit exceeded [ 892.015401][ T28] audit: type=1400 audit(2000000070.267:121153): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 892.021110][ T3039] audit: audit_backlog=65 > audit_backlog_limit=64 [ 892.042179][ T28] audit: type=1400 audit(2000000070.267:121154): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 892.042210][ T28] audit: type=1400 audit(2000000070.267:121155): avc: denied { read } for pid=3039 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0