[ 17.187315][ T28] audit: type=1400 audit(1714408954.056:81): avc: denied { read } for pid=2765 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.1.112' (ED25519) to the list of known hosts. 2024/04/29 16:42:37 fuzzer started 2024/04/29 16:42:37 dialing manager at 10.128.0.163:30015 [ 20.889495][ T28] audit: type=1400 audit(1714408957.756:82): avc: denied { node_bind } for pid=3074 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 20.910070][ T28] audit: type=1400 audit(1714408957.756:83): avc: denied { name_bind } for pid=3074 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 38.266087][ T28] audit: type=1400 audit(1714408975.136:84): avc: denied { mounton } for pid=3087 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 38.267683][ T3087] cgroup: Unknown subsys name 'net' [ 38.290593][ T28] audit: type=1400 audit(1714408975.136:85): avc: denied { mount } for pid=3087 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 38.320036][ T28] audit: type=1400 audit(1714408975.166:86): avc: denied { unmount } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 38.485083][ T3087] cgroup: Unknown subsys name 'rlimit' [ 38.575148][ T28] audit: type=1400 audit(1714408975.446:87): avc: denied { mounton } for pid=3087 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 38.601446][ T28] audit: type=1400 audit(1714408975.446:88): avc: denied { mount } for pid=3087 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 38.610733][ T3088] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 38.625285][ T28] audit: type=1400 audit(1714408975.446:89): avc: denied { create } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.655221][ T28] audit: type=1400 audit(1714408975.446:90): avc: denied { write } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.676569][ T28] audit: type=1400 audit(1714408975.446:91): avc: denied { read } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.696906][ T28] audit: type=1400 audit(1714408975.506:92): avc: denied { relabelto } for pid=3088 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/04/29 16:42:55 code coverage: enabled 2024/04/29 16:42:55 comparison tracing: enabled 2024/04/29 16:42:55 extra coverage: enabled 2024/04/29 16:42:55 delay kcov mmap: enabled 2024/04/29 16:42:55 setuid sandbox: enabled 2024/04/29 16:42:55 namespace sandbox: enabled 2024/04/29 16:42:55 Android sandbox: enabled 2024/04/29 16:42:55 fault injection: enabled 2024/04/29 16:42:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2024/04/29 16:42:55 net packet injection: enabled 2024/04/29 16:42:55 net device setup: enabled 2024/04/29 16:42:55 concurrency sanitizer: enabled 2024/04/29 16:42:55 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/04/29 16:42:55 NIC VF setup: PCI device 0000:00:11.0 is not available 2024/04/29 16:42:55 USB emulation: /dev/raw-gadget does not exist 2024/04/29 16:42:55 hci packet injection: /dev/vhci does not exist 2024/04/29 16:42:55 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2024/04/29 16:42:55 802.15.4 emulation: enabled 2024/04/29 16:42:55 swap file: enabled [ 38.722616][ T28] audit: type=1400 audit(1714408975.506:93): avc: denied { write } for pid=3088 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 38.725135][ T3087] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/04/29 16:42:55 starting 5 executor processes [ 39.200698][ T3098] chnl_net:caif_netlink_parms(): no params data found [ 39.219159][ T3097] chnl_net:caif_netlink_parms(): no params data found [ 39.301382][ T3098] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.308572][ T3098] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.315919][ T3098] bridge_slave_0: entered allmulticast mode [ 39.322381][ T3098] bridge_slave_0: entered promiscuous mode [ 39.329142][ T3098] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.336306][ T3098] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.343458][ T3098] bridge_slave_1: entered allmulticast mode [ 39.349955][ T3098] bridge_slave_1: entered promiscuous mode [ 39.368342][ T3097] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.375620][ T3097] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.382684][ T3097] bridge_slave_0: entered allmulticast mode [ 39.389151][ T3097] bridge_slave_0: entered promiscuous mode [ 39.397270][ T3097] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.404350][ T3097] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.411425][ T3097] bridge_slave_1: entered allmulticast mode [ 39.417831][ T3097] bridge_slave_1: entered promiscuous mode [ 39.435372][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 39.445665][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.465980][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 39.476070][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.490383][ T3098] team0: Port device team_slave_0 added [ 39.497024][ T3098] team0: Port device team_slave_1 added [ 39.523368][ T3098] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.530378][ T3098] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.556539][ T3098] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.570095][ T3097] team0: Port device team_slave_0 added [ 39.580487][ T3098] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.587543][ T3098] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.613716][ T3098] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.638459][ T3097] team0: Port device team_slave_1 added [ 39.691238][ T3097] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.698328][ T3097] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.724351][ T3097] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.741746][ T3108] chnl_net:caif_netlink_parms(): no params data found [ 39.751307][ T3097] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.758305][ T3097] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.784423][ T3097] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.799329][ T3098] hsr_slave_0: entered promiscuous mode [ 39.805157][ T3098] hsr_slave_1: entered promiscuous mode [ 39.819695][ T3126] chnl_net:caif_netlink_parms(): no params data found [ 39.837887][ T3107] chnl_net:caif_netlink_parms(): no params data found [ 39.865953][ T3097] hsr_slave_0: entered promiscuous mode [ 39.871901][ T3097] hsr_slave_1: entered promiscuous mode [ 39.878010][ T3097] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 39.885606][ T3097] Cannot create hsr debugfs directory [ 39.954466][ T3108] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.961533][ T3108] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.968802][ T3108] bridge_slave_0: entered allmulticast mode [ 39.975072][ T3108] bridge_slave_0: entered promiscuous mode [ 39.981686][ T3107] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.988814][ T3107] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.996045][ T3107] bridge_slave_0: entered allmulticast mode [ 40.002302][ T3107] bridge_slave_0: entered promiscuous mode [ 40.008950][ T3126] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.016126][ T3126] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.023252][ T3126] bridge_slave_0: entered allmulticast mode [ 40.029731][ T3126] bridge_slave_0: entered promiscuous mode [ 40.038311][ T3126] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.045578][ T3126] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.052650][ T3126] bridge_slave_1: entered allmulticast mode [ 40.058970][ T3126] bridge_slave_1: entered promiscuous mode [ 40.065160][ T3108] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.072195][ T3108] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.079384][ T3108] bridge_slave_1: entered allmulticast mode [ 40.085662][ T3108] bridge_slave_1: entered promiscuous mode [ 40.091788][ T3107] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.098950][ T3107] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.106320][ T3107] bridge_slave_1: entered allmulticast mode [ 40.112641][ T3107] bridge_slave_1: entered promiscuous mode [ 40.149753][ T3107] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 40.160181][ T3126] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 40.176291][ T3108] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 40.192564][ T3107] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 40.202898][ T3126] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 40.218901][ T3108] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 40.255981][ T3108] team0: Port device team_slave_0 added [ 40.267210][ T3107] team0: Port device team_slave_0 added [ 40.273817][ T3126] team0: Port device team_slave_0 added [ 40.282034][ T3126] team0: Port device team_slave_1 added [ 40.288294][ T3108] team0: Port device team_slave_1 added [ 40.302432][ T3107] team0: Port device team_slave_1 added [ 40.321622][ T3108] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.328703][ T3108] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.356227][ T3108] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 40.368544][ T3108] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 40.376199][ T3108] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.403610][ T3108] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 40.419570][ T3107] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.426653][ T3107] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.452844][ T3107] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 40.469952][ T3126] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.477209][ T3126] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.503938][ T3126] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 40.517997][ T3126] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 40.525245][ T3126] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.551574][ T3126] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 40.566530][ T3107] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 40.573588][ T3107] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.600054][ T3107] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 40.644345][ T3108] hsr_slave_0: entered promiscuous mode [ 40.650368][ T3108] hsr_slave_1: entered promiscuous mode [ 40.656424][ T3108] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 40.664102][ T3108] Cannot create hsr debugfs directory [ 40.669867][ T3098] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 40.686026][ T3107] hsr_slave_0: entered promiscuous mode [ 40.692063][ T3107] hsr_slave_1: entered promiscuous mode [ 40.698753][ T3107] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 40.707019][ T3107] Cannot create hsr debugfs directory [ 40.718325][ T3126] hsr_slave_0: entered promiscuous mode [ 40.724819][ T3126] hsr_slave_1: entered promiscuous mode [ 40.731169][ T3126] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 40.739527][ T3126] Cannot create hsr debugfs directory [ 40.745383][ T3098] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 40.753882][ T3098] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 40.767073][ T3098] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 40.798098][ T3097] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 40.807792][ T3097] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 40.828784][ T3097] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 40.839195][ T3097] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 40.891809][ T3126] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 40.900584][ T3126] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 40.914327][ T3126] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 40.922910][ T3126] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 40.959576][ T3107] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 40.969887][ T3108] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 40.980343][ T3108] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 40.994713][ T3107] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 41.004931][ T3107] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 41.015130][ T3108] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 41.024898][ T3108] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 41.036404][ T3107] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 41.065185][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 41.085218][ T3098] 8021q: adding VLAN 0 to HW filter on device team0 [ 41.123897][ T3177] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.131258][ T3177] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.146078][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 41.156181][ T3126] 8021q: adding VLAN 0 to HW filter on device bond0 [ 41.171164][ T3097] 8021q: adding VLAN 0 to HW filter on device team0 [ 41.181972][ T3178] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.189756][ T3178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.216733][ T3126] 8021q: adding VLAN 0 to HW filter on device team0 [ 41.227432][ T3179] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.235772][ T3179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.246433][ T3179] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.254755][ T3179] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.271234][ T3098] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 41.282397][ T3098] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 41.312876][ T3179] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.320145][ T3179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.345973][ T3179] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.353545][ T3179] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.365137][ T3107] 8021q: adding VLAN 0 to HW filter on device bond0 [ 41.377140][ T3107] 8021q: adding VLAN 0 to HW filter on device team0 [ 41.392773][ T3126] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 41.404028][ T3126] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 41.451574][ T3108] 8021q: adding VLAN 0 to HW filter on device bond0 [ 41.461482][ T3178] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.469636][ T3178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.479027][ T3178] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.486636][ T3178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.507968][ T3107] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 41.529926][ T3098] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.542324][ T3108] 8021q: adding VLAN 0 to HW filter on device team0 [ 41.555796][ T3097] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.572592][ T3126] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.582303][ T3179] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.590020][ T3179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.599123][ T3179] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.606963][ T3179] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.622426][ T3108] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 41.632973][ T3108] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 41.662021][ T3107] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.743221][ T3108] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.792251][ T3098] veth0_vlan: entered promiscuous mode [ 41.821698][ T3098] veth1_vlan: entered promiscuous mode [ 41.828761][ T3126] veth0_vlan: entered promiscuous mode [ 41.839507][ T3126] veth1_vlan: entered promiscuous mode [ 41.852661][ T3097] veth0_vlan: entered promiscuous mode [ 41.873547][ T3097] veth1_vlan: entered promiscuous mode [ 41.886128][ T3107] veth0_vlan: entered promiscuous mode [ 41.895361][ T3107] veth1_vlan: entered promiscuous mode [ 41.908578][ T3126] veth0_macvtap: entered promiscuous mode [ 41.920781][ T3107] veth0_macvtap: entered promiscuous mode [ 41.929608][ T3107] veth1_macvtap: entered promiscuous mode [ 41.942705][ T3098] veth0_macvtap: entered promiscuous mode [ 41.951024][ T3126] veth1_macvtap: entered promiscuous mode [ 41.965579][ T3107] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.977709][ T3098] veth1_macvtap: entered promiscuous mode [ 41.991528][ T3098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.002205][ T3098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.013526][ T3098] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.023047][ T3126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.033500][ T3126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.043427][ T3126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.053938][ T3126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.065936][ T3126] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.078069][ T3098] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.090521][ T3126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.100960][ T3126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.111914][ T3126] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.119336][ T3107] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.129926][ T3107] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.139845][ T3107] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.150436][ T3107] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.161152][ T3107] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.169082][ T3097] veth0_macvtap: entered promiscuous mode [ 42.176531][ T3097] veth1_macvtap: entered promiscuous mode [ 42.183826][ T3098] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.192696][ T3098] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.201459][ T3098] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.210170][ T3098] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.226966][ T3126] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.235795][ T3126] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.244957][ T3126] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.253754][ T3126] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.265682][ T3107] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.274491][ T3107] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.283152][ T3107] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.291905][ T3107] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.307892][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.318404][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.328304][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.338944][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.348752][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.359176][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.370058][ T3097] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.400762][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.411287][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.421282][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.431780][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_STARTUP_QUERY_CNT={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}]}}}]}, 0x44}}, 0x0) [ 42.441590][ T3097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.452060][ T3097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.462715][ T3097] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.475920][ T3108] veth0_vlan: entered promiscuous mode [ 42.483770][ T3108] veth1_vlan: entered promiscuous mode executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x48, 0x10, 0x8d8dfa7e83694471, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xa, 0x1, @dev}, @IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}]}}}]}, 0x48}}, 0x0) executing program 3: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000003ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='block_bio_remap\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) [ 42.507995][ T3097] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.516769][ T3097] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.525511][ T3097] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.534316][ T3097] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0/..\x00', &(0x7f0000000240)={0x410e01, 0x0, 0x8}, 0x18) executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000540)={@link_local, @link_local, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x11}, {}, {0x8, 0x88be, 0x81000000}}}}}}, 0x0) [ 42.587548][ T3108] veth0_macvtap: entered promiscuous mode [ 42.605578][ T3108] veth1_macvtap: entered promiscuous mode [ 42.654822][ T3108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.665417][ T3108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.666875][ T3250] syz-executor.2 (3250) used greatest stack depth: 11408 bytes left [ 42.675235][ T3108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.675250][ T3108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 2: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) [ 42.675266][ T3108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.713902][ T3108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.723834][ T3108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 42.735282][ T3108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.738486][ T3260] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 42.751392][ T3108] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.772519][ T3261] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 42.781909][ T3261] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 42.794607][ T3261] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="03000000000000002400128009000100626f6e64000000001400028008001c001f674e"], 0x44}}, 0x0) [ 42.804349][ T3260] MD5 Hash not found for [fe80::bb].0->[fe80::aa].20002 [S]L3 index 0 [ 42.808484][ T3261] syz-executor.2 (3261) used greatest stack depth: 11016 bytes left [ 42.825322][ T3108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.835781][ T3108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! executing program 0: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) [ 42.845669][ T3108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.856586][ T3108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.866427][ T3108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.876949][ T3108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.886861][ T3108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 executing program 0: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, 0x0, &(0x7f0000000000)='syzkaller\x00'}, 0x90) r0 = syz_open_dev$evdev(&(0x7f0000000240), 0x20000, 0x0) ioctl$EVIOCGLED(r0, 0x80084504, &(0x7f0000000000)=""/56) [ 42.897689][ T3108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.909784][ T3108] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.936397][ T3108] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.945278][ T3108] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, 0x0, &(0x7f0000000000)='syzkaller\x00'}, 0x90) r0 = syz_open_dev$evdev(&(0x7f0000000240), 0x20000, 0x0) ioctl$EVIOCGLED(r0, 0x80084504, &(0x7f0000000000)=""/56) executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x1d, 0x2, 0x6) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0) executing program 2: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) [ 42.954574][ T3108] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.963332][ T3108] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x10000, 0x4) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x10000, 0x4) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) executing program 0: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000020c0), 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xae}]}, &(0x7f0000000100)='GPL\x00'}, 0x90) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local, {[@timestamp_addr={0x44, 0x4, 0x5}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x10000, 0x4) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) executing program 4: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x10000, 0x4) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) [ 43.158260][ T3294] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, 0x0, &(0x7f0000000000)='syzkaller\x00'}, 0x90) r0 = syz_open_dev$evdev(&(0x7f0000000240), 0x20000, 0x0) ioctl$EVIOCGLED(r0, 0x80084504, &(0x7f0000000000)=""/56) executing program 2: mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000040), 0x12) executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x10000, 0x4) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x3, 0x0, 0x1800}, {}], 0x2, 0x0) r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}, {}], 0x2) semop(0x0, &(0x7f0000000280)=[{0x0, 0x0, 0x1800}, {}], 0x2) executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local, {[@timestamp_addr={0x44, 0x4, 0x5}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local, {[@timestamp_addr={0x44, 0x4, 0x5}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) [ 43.339329][ T3315] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 43.371294][ T3324] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007500000045000000080000fa95"], &(0x7f0000000140)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x11900}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6256, 0x0, 0x0, 0x0, 0x0) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local, {[@timestamp_addr={0x44, 0x4, 0x5}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) [ 43.579937][ T28] kauditd_printk_skb: 46 callbacks suppressed [ 43.579948][ T28] audit: type=1400 audit(1714408980.446:140): avc: denied { create } for pid=3344 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000400)='./file7\x00', 0x21c0, 0x103) renameat2(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000480)='./file7\x00', 0x0) executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000400)='./file7\x00', 0x21c0, 0x103) renameat2(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000480)='./file7\x00', 0x0) executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) [ 43.646951][ T3351] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 43.665126][ T28] audit: type=1400 audit(1714408980.486:141): avc: denied { listen } for pid=3344 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x11900}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6256, 0x0, 0x0, 0x0, 0x0) executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) [ 43.730480][ T28] audit: type=1400 audit(1714408980.596:142): avc: denied { create } for pid=3353 comm="syz-executor.1" name="file7" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=chr_file permissive=1 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f00000001c0)) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet(r3, &(0x7f00000022c0)=[{{&(0x7f0000000080)={0x2, 0x4e24, @dev}, 0x10, 0x0}}], 0x1, 0x4008082) sendmmsg$inet6(r3, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="19b3813cdbe3a1d3a62ed74709869cea4828d67f78ad81485aa9eeeef79a6e822fff5918d6c37d4827b641b2f4e0fcf9e2d006a296cb2ec17dbba47292bf60258040e6ffec7ff17266422b1222d2172fc4b75485889834", 0x57}, {&(0x7f0000000440)="5e2a5fd75c30935c40d97fb995", 0xd}, {&(0x7f0000000540)}], 0x3, 0x0, 0x0, 0x20000000}, 0xa}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@getnexthop={0x34, 0x6a, 0x0, 0x70bd26, 0x0, {}, [@NHA_GROUPS={0x4}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_OIF={0x8, 0x5, r4}, @NHA_MASTER={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x4000180) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000002340), 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r5, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index}) io_uring_enter(0xffffffffffffffff, 0x4d92, 0x0, 0x0, 0x0, 0x0) [ 43.807812][ T28] audit: type=1400 audit(1714408980.626:143): avc: denied { unlink } for pid=3353 comm="syz-executor.1" name="file7" dev="sda1" ino=1953 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=chr_file permissive=1 [ 43.830585][ T28] audit: type=1400 audit(1714408980.656:144): avc: denied { map } for pid=3364 comm="syz-executor.0" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000400)='./file7\x00', 0x21c0, 0x103) renameat2(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000480)='./file7\x00', 0x0) executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x11900}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x6256, 0x0, 0x0, 0x0, 0x0) [ 43.854939][ T28] audit: type=1400 audit(1714408980.656:145): avc: denied { execute } for pid=3364 comm="syz-executor.0" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007500000045000000080000fa95"], &(0x7f0000000140)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 43.959259][ T28] audit: type=1400 audit(1714408980.816:146): avc: denied { create } for pid=3380 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 43.979286][ T28] audit: type=1400 audit(1714408980.816:147): avc: denied { connect } for pid=3380 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) [ 43.999169][ T28] audit: type=1400 audit(1714408980.816:148): avc: denied { name_connect } for pid=3380 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_STARTUP_QUERY_CNT={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}]}}}]}, 0x44}}, 0x0) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x17, 0x0, 0x7, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000013c0)={r0, 0x0, &(0x7f00000003c0), 0x1}, 0x20) executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) [ 44.132399][ T28] audit: type=1400 audit(1714408980.886:149): avc: denied { shutdown } for pid=3382 comm="syz-executor.2" laddr=fe80::a lport=59022 faddr=fe80:: scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_STARTUP_QUERY_CNT={0x8}, @IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}]}}}]}, 0x44}}, 0x0) executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) socket$igmp(0x2, 0x3, 0x2) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f0000000640)=ANY=[@ANYBLOB="d80000000314010000000000000000000900020073797a3000000000080041007369770014003300636169663000000000000000000000000900020073"], 0xd8}}, 0x0) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x17, 0x0, 0x7, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000013c0)={r0, 0x0, &(0x7f00000003c0), 0x1}, 0x20) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000003ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='block_bio_remap\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x17, 0x0, 0x7, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000013c0)={r0, 0x0, &(0x7f00000003c0), 0x1}, 0x20) executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) socket$igmp(0x2, 0x3, 0x2) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f0000000640)=ANY=[@ANYBLOB="d80000000314010000000000000000000900020073797a3000000000080041007369770014003300636169663000000000000000000000000900020073"], 0xd8}}, 0x0) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000003ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='block_bio_remap\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) prctl$PR_SET_MM_MAP(0x41, 0x3, 0x0, 0x0) r3 = pidfd_getfd(r2, r2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000f, 0x12, r4, 0x0) executing program 3: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) [ 44.308464][ T3418] netlink: 148 bytes leftover after parsing attributes in process `syz-executor.3'. executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0/..\x00', &(0x7f0000000240)={0x410e01, 0x0, 0x8}, 0x18) executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r1 = syz_io_uring_setup(0x239, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0/..\x00', &(0x7f0000000240)={0x410e01, 0x0, 0x8}, 0x18) executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0/..\x00', &(0x7f0000000240)={0x410e01, 0x0, 0x8}, 0x18) [ 44.358387][ T3429] netlink: 148 bytes leftover after parsing attributes in process `syz-executor.2'. executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x17, 0x0, 0x7, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000013c0)={r0, 0x0, &(0x7f00000003c0), 0x1}, 0x20) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x48, 0x10, 0x8d8dfa7e83694471, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xa, 0x1, @dev}, @IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}]}}}]}, 0x48}}, 0x0) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000003ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='block_bio_remap\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff05000300000000000500030080ffffff0500030080ffffff0800020003"], 0x50}}, 0x0) executing program 4: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001400)=@bloom_filter={0x1e, 0x0, 0xb, 0x7}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000003ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='block_bio_remap\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) executing program 2: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000003ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='block_bio_remap\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000003ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='block_bio_remap\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) [ 44.552607][ T3451] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 44.561984][ T3451] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.4'. [ 44.578269][ T3451] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.4'. executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff05000300000000000500030080ffffff0500030080ffffff0800020003"], 0x50}}, 0x0) executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff05000300000000000500030080ffffff0500030080ffffff0800020003"], 0x50}}, 0x0) executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) [ 44.595594][ T3457] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 44.605150][ T3457] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001400)=@bloom_filter={0x1e, 0x0, 0xb, 0x7}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff05000300000000000500030080ffffff0500030080ffffff0800020003"], 0x50}}, 0x0) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000003ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='block_bio_remap\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 0: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000003ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000000)='block_bio_remap\x00', r1}, 0x10) write$cgroup_type(r2, &(0x7f0000000180), 0x40001) executing program 0: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 4: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) [ 44.759446][ T3476] MD5 Hash not found for [fe80::bb].0->[fe80::aa].20002 [S]L3 index 0 [ 44.767507][ T3479] MD5 Hash not found for [fe80::bb].0->[fe80::aa].20002 [S]L3 index 0 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100040000002c00048005001100010000000500030080ffffff05000300000000000500030080ffffff0500030080ffffff0800020003"], 0x50}}, 0x0) executing program 4: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) [ 44.841057][ T3486] MD5 Hash not found for [fe80::bb].0->[fe80::aa].20002 [S]L3 index 0 [ 44.862811][ T3490] MD5 Hash not found for [fe80::bb].0->[fe80::aa].20002 [S]L3 index 0 executing program 2: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) [ 44.928124][ T3497] MD5 Hash not found for [fe80::bb].0->[fe80::aa].20002 [S]L3 index 0 executing program 2: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 0: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 4: semget$private(0x0, 0x207, 0x0) semtimedop(0x0, &(0x7f00000002c0)=[{}, {0x0, 0xff78}], 0x2, 0x0) semop(0x0, &(0x7f0000000280)=[{0x3, 0x9cb2}, {}], 0x2) executing program 3: semget$private(0x0, 0x207, 0x0) semtimedop(0x0, &(0x7f00000002c0)=[{}, {0x0, 0xff78}], 0x2, 0x0) semop(0x0, &(0x7f0000000280)=[{0x3, 0x9cb2}, {}], 0x2) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 2: r0 = memfd_create(&(0x7f00000000c0)='\x14E\x82\xa0\x1f\x1c\x90o\xb4(\xc4\x9bq\x05<~J\x94\x9cH\xa4~z\x03\xe9\xa2\xe5\x7f\xf4\xaaW\xea\xd9N\xad\xcb\xed\a\x8d\xae*$ok\xfa\x156\x97\xbb\x1a1\xca\x87\x1f&\x90\x8e\xc6<\xd1\x97\x99W*\xe9\x04\x17\x8e3\xf1\xda\x14\x82k\xc8\x8d\xfca\xc5P\x0e&\x99\x91\xbb\xae]\x1egi\xcb\xc0\x17\xc3.\x92\f\f\x01y[\x89\xb8b5Q\xc8\xa7\xb1$\x89M9\xe73\x9b`\xd6\x85yN\xea\x9bn\x11\x8e\xa5gy\xb8@\xf2\xf6\x1e\xf8\x91\xc4\xc8\xea\xfaa\x959\n\xf1V\x98c\xfb\xbb\xd7\x01^*\xa22\xfd\x89\r\xc3\xde\xcc\xda\xe1\xd8c\xf9n2\x904J\xf3g\xfa?\xf6\x99\xd3\xa6qC\xbfY\xa2\xe7Qt\\\x14T\x9d\t\xef\xe9\x15\x8e\x94\xa4\xbaF\xb4\x16T\x96\xc8\xe9\xee~\x0fk\xa1\xb4\x89\xcc\x96\x1f\x86F\xdfwZ9\x84\x1e\xa0\xbf|\xf9U\x8b\x02;,\x84\xea\xad\xdeQ\x05F\x13o\x009\x83\x9ayf\xf5M\bZB~\x17\x14f\xd8l^X\x14\xdbO\"\xfc\x94\xa1\x19\xbcP\xa4\xdb\x8e \xf2\xfb\xd4-0H\x1cudcL\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x6) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x408cf, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x61]}}, 0x0, 0x43, 0x0, 0x1}, 0x20) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x8) r2 = syz_io_uring_setup(0x24f8, &(0x7f0000002ec0)={0x0, 0x0, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)=0x0) r4 = memfd_secret(0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ftruncate(r4, 0x5) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x11, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000e40)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000002c0)={0x42882}, &(0x7f0000000180)='./file0\x00', 0x18}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f00000000c0)=@newtaction={0x90, 0x30, 0x216822a75a8bdd29, 0x0, 0x0, {}, [{0x7c, 0x1, [@m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_connmark={0x15, 0x2, 0x0, 0x0, {{0xd}, {0x4}, {0x4, 0x6, "13a033565c06a08e69897f51d7f0d46cbfed22af736e77b2693b3fb00f0d98bfdfaf29999b210e639eee4b000000000000000085fc67cfa8fc1a56049ccf0c8f67f8dc2d506e3eb5c8df4701863b441d8fe39c23681214051360262bdb5c669d966a0f42b574c72433603ffa6d894729a8139fbe798f057c09498c0a31632899613c5ab9190b655f6b0a96b8a2bdb9dba20e5f557dd706d47210c8ed9ddb477d39b72124148f1445e70994b560cc70734b5019bac3a5527f5e817086c2da662b30129faf57a272c7fc09ffe6a30306f5f6105990b27bbefd0d396c4e514c"}, {0xc}, {0xc}}}]}]}, 0x90}}, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/245, 0xf5) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x4b, 0x0, &(0x7f00000004c0)) executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000020c0), 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 1: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000140)={[{}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x84}}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x7}}, {@lazytime}, {@jqfmt_vfsold}, {@usrquota}, {@data_err_abort}, {@debug}]}, 0x1, 0x5ef, &(0x7f0000000600)="$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") perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xd3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@newqdisc={0x34, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x3}}}, 0x24}}, 0x0) [ 45.216573][ T3540] loop1: detected capacity change from 0 to 1024 [ 45.226728][ T3540] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 45.237413][ T3540] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=f04cc01c, mo2=0002] [ 45.245751][ T3540] System zones: 0-1, 3-36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@newqdisc={0x34, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x3}}}, 0x24}}, 0x0) executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) [ 45.258733][ T3540] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000800)={@in6={{0xa, 0x4e24, 0x8, @local, 0x2}}, 0x0, 0x0, 0x0, 0x0, "459082af96bd1e0267fa18df148a1ef67b4a00abedbc93fe79502d8686c85911f21d56b7ed28c474893eb25a2d779b0a5939dc2f919c979e7a6a4b025b3901cabd865b400308bccdad947a84237710a7"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x2e, 0x0, "8ddbb51a3cfd954e41e8ccb21f650fa6a867fb9bbcf0feeee4dc036d0675af58b39fa8d54ee8323507a61a95cf134ce8f605671338c7f8838a00bdfba71bc4b828c7de258b6b9ca1fc52bcc83e2a016a"}, 0xd8) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) listen(r1, 0x100) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000380)=0x3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002840)={&(0x7f00000000c0)='kmem_cache_free\x00'}, 0x16) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@mptcp=@add_addr={0x1e, 0xa, 0x2, 0xa, 0x0, @local}]}}}}}}}}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000900)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x2eb}]}}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000440)={@local, @random="d2dff5f92f83", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x20, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x1, 0x0, 0x0, {[@timestamp={0x4, 0xa}]}}}}}}}}, 0x0) syz_emit_ethernet(0x143, &(0x7f0000000140)={@local, @random="c4d7001000", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x10d, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x1}, {"f4e19915e82d820ab887c5eb02ce82fcaf2f8f8fa93974e674ce5b6f99e8096fcdd87fda9d5561ee65fe34ac1e102c7e60f12fda2d929b728b131b9a2051d3cdd40b7d789475d9d08015060a2488ab024c1b0ca176b51880075769c559c96d33bb942be65079f641ace31f65368180ed502e267ffdfeaf14e434641417f362bffd2cea3fc15af98e2f95c0e6764ef6f514de9c201a37b9680e63e15584c74ee14872bcbd84780149b0eee966492a9642159c7184154cc3f547eb0f141054d7f2561b426f05bb8f9bcf41b254a79cd7a553d270914a95079cc2f3a717a85da5ff3ae2ef000fb2fc4fe5cdf9e6687f95338ebf337acca3ca76ec"}}}}}}}, 0x0) executing program 2: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@newqdisc={0x34, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x3}}}, 0x24}}, 0x0) [ 45.315447][ T3098] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 0: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 1: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) [ 45.429931][ C1] hrtimer: interrupt took 20935 ns executing program 0: syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000140)={[{}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x84}}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x7}}, {@lazytime}, {@jqfmt_vfsold}, {@usrquota}, {@data_err_abort}, {@debug}]}, 0x1, 0x5ef, &(0x7f0000000600)="$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") perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xd3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) [ 45.686440][ T3568] loop0: detected capacity change from 0 to 1024 [ 45.707783][ T3556] syz-executor.2 (3556) used greatest stack depth: 10784 bytes left [ 45.716979][ T3568] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled executing program 1: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) [ 45.775010][ T3568] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=f04cc01c, mo2=0002] [ 45.783429][ T3568] System zones: 0-1, 3-36 [ 45.789945][ T3568] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = dup2(r0, r1) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$P9_RGETLOCK(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="668f9c"], 0x2c) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = dup2(r0, r1) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$P9_RGETLOCK(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="668f9c"], 0x2c) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = dup2(r0, r1) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$P9_RGETLOCK(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="668f9c"], 0x2c) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) [ 45.895693][ T3097] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. executing program 4: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 3: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 0: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 1: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 4: semget$private(0x0, 0x207, 0x0) semtimedop(0x0, &(0x7f00000002c0)=[{}, {0x0, 0xff78}], 0x2, 0x0) semop(0x0, &(0x7f0000000280)=[{0x3, 0x9cb2}, {}], 0x2) [ 46.531837][ T3571] chnl_net:caif_netlink_parms(): no params data found executing program 3: semget$private(0x0, 0x207, 0x0) semtimedop(0x0, &(0x7f00000002c0)=[{}, {0x0, 0xff78}], 0x2, 0x0) semop(0x0, &(0x7f0000000280)=[{0x3, 0x9cb2}, {}], 0x2) executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x71, 0x0, 0x1, 0x81}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) [ 46.726747][ T3571] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.733900][ T3571] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.748341][ T3571] bridge_slave_0: entered allmulticast mode [ 46.760903][ T3571] bridge_slave_0: entered promiscuous mode executing program 0: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 1: syz_read_part_table(0x5be, &(0x7f00000005c0)="$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") [ 46.778149][ T3571] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.785692][ T3571] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.798021][ T3571] bridge_slave_1: entered allmulticast mode [ 46.804973][ T3571] bridge_slave_1: entered promiscuous mode [ 46.858003][ T3616] loop1: detected capacity change from 0 to 2048 [ 46.862062][ T3571] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 46.874944][ T3571] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link executing program 1: [ 46.911564][ T3616] loop1: p1 p2 p3 [ 46.928372][ T3571] team0: Port device team_slave_0 added [ 46.936583][ T3571] team0: Port device team_slave_1 added [ 46.944157][ T2783] loop1: p1 p2 p3 [ 46.989720][ T3571] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 46.996764][ T3571] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 47.003259][ T3422] udevd[3422]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x34, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x12, 0x0, @opaque='\x00'/10}}}}}, 0x0) recvfrom(r0, &(0x7f00000000c0)=""/10, 0xa, 0x0, 0x0, 0x0) executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x34, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x12, 0x0, @opaque='\x00'/10}}}}}, 0x0) recvfrom(r0, &(0x7f00000000c0)=""/10, 0xa, 0x0, 0x0, 0x0) [ 47.023008][ T3571] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 47.047140][ T3086] udevd[3086]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 47.059294][ T3089] udevd[3089]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory executing program 0: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x71, 0x0, 0x1, 0x81}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) [ 47.107762][ T3571] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 47.114762][ T3571] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 47.140985][ T3571] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x10132) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}], 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000100)=0xffff, 0x4) recvmmsg(r1, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x0, 0x0) executing program 1: syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) unshare(0x42000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x408c5333, &(0x7f0000000280)) r4 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r4, &(0x7f00000005c0)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dontfrag={{0x10}}], 0x10}}], 0x1, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01080000000000000000010000000900010073797a300000000048000000030a0102000000000000000001000000080007006e6174000900030073796031000000000900010073797a3000000000140004800800024000000000080001"], 0x90}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000003000000183200000200000000000000000000008520000002000000181200000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbf", @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0xff, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x3c2}, 0x48) [ 47.240239][ T3571] hsr_slave_0: entered promiscuous mode [ 47.250776][ T3571] hsr_slave_1: entered promiscuous mode [ 47.261721][ T3571] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 47.273738][ T3571] Cannot create hsr debugfs directory [ 47.413152][ T3633] ================================================================== [ 47.421252][ T3633] BUG: KCSAN: data-race in pcpu_alloc / pcpu_free_area [ 47.428102][ T3633] [ 47.430412][ T3633] read-write to 0xffffffff884054dc of 4 bytes by task 54 on cpu 0: [ 47.438292][ T3633] pcpu_free_area+0x4e2/0x570 [ 47.442959][ T3633] free_percpu+0x1c6/0xb30 [ 47.447363][ T3633] prealloc_destroy+0xea/0x1a0 [ 47.452117][ T3633] htab_map_free+0x4a2/0x620 [ 47.456730][ T3633] bpf_map_free_deferred+0xae/0x150 [ 47.462022][ T3633] process_scheduled_works+0x465/0x990 [ 47.467472][ T3633] worker_thread+0x526/0x730 [ 47.472139][ T3633] kthread+0x1d1/0x210 [ 47.476244][ T3633] ret_from_fork+0x4b/0x60 [ 47.480655][ T3633] ret_from_fork_asm+0x1a/0x30 [ 47.485413][ T3633] [ 47.487740][ T3633] read to 0xffffffff884054dc of 4 bytes by task 3633 on cpu 1: [ 47.495292][ T3633] pcpu_alloc+0x9aa/0x10d0 [ 47.499731][ T3633] __alloc_percpu_gfp+0x26/0x30 [ 47.504572][ T3633] bpf_map_alloc_percpu+0xab/0x200 [ 47.509711][ T3633] prealloc_init+0x19f/0x470 [ 47.514302][ T3633] htab_map_alloc+0x637/0x8f0 [ 47.518998][ T3633] map_create+0x83c/0xb90 [ 47.523318][ T3633] __sys_bpf+0x667/0x7a0 [ 47.527558][ T3633] __x64_sys_bpf+0x43/0x50 [ 47.531970][ T3633] x64_sys_call+0x86c/0x2d30 [ 47.536554][ T3633] do_syscall_64+0xcd/0x1d0 [ 47.541053][ T3633] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 47.546939][ T3633] [ 47.549247][ T3633] value changed: 0x00000059 -> 0x00000061 [ 47.554956][ T3633] [ 47.557269][ T3633] Reported by Kernel Concurrency Sanitizer on: [ 47.563398][ T3633] CPU: 1 PID: 3633 Comm: syz-executor.1 Not tainted 6.9.0-rc6-syzkaller-00005-gb947cc5bf6d7 #0 [ 47.573731][ T3633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 47.583784][ T3633] ================================================================== [ 47.594832][ T3107] syz-executor.2 (3107) used greatest stack depth: 10488 bytes left [ 47.907304][ T3571] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 48.017324][ T3571] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 48.092619][ T3571] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 48.184322][ T3571] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 48.372601][ T3571] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 48.424892][ T3571] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 48.455464][ T3571] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 48.478470][ T3571] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 48.608739][ T49] bridge_slave_1: left allmulticast mode [ 48.614811][ T49] bridge_slave_1: left promiscuous mode [ 48.620488][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.649968][ T3671] loop4: detected capacity change from 0 to 1024 [ 48.658006][ T49] bridge_slave_0: left allmulticast mode [ 48.663893][ T49] bridge_slave_0: left promiscuous mode [ 48.670246][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.688398][ T3671] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 48.719137][ T28] kauditd_printk_skb: 15 callbacks suppressed [ 48.719150][ T28] audit: type=1400 audit(1714408985.586:165): avc: denied { create } for pid=3676 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 48.746374][ T28] audit: type=1400 audit(1714408985.586:166): avc: denied { write } for pid=3676 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 48.766761][ T28] audit: type=1400 audit(1714408985.586:167): avc: denied { nlmsg_read } for pid=3676 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 48.788360][ T28] audit: type=1400 audit(1714408985.646:168): avc: denied { setopt } for pid=3678 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 48.789297][ T3108] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 49.057877][ T49] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 49.078237][ T49] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 49.112737][ T49] bond0 (unregistering): Released all slaves [ 49.144631][ T3571] 8021q: adding VLAN 0 to HW filter on device bond0 [ 49.159763][ T3571] 8021q: adding VLAN 0 to HW filter on device team0 [ 49.188137][ T3182] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.195268][ T3182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.211455][ T34] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.218675][ T34] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.307470][ T3742] loop1: detected capacity change from 0 to 1024 [ 49.315831][ T3738] loop4: detected capacity change from 0 to 2048 [ 49.326744][ T3742] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 49.343544][ T3742] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 49.356069][ T3571] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 49.373535][ T3738] loop4: p1 p2 p3 [ 49.378633][ T3098] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 49.434938][ T49] hsr_slave_0: left promiscuous mode [ 49.450123][ T49] hsr_slave_1: left promiscuous mode [ 49.457288][ T3422] udevd[3422]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 49.468878][ T3086] udevd[3086]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 49.494027][ T49] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 49.496733][ T3089] udevd[3089]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 49.501575][ T49] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 49.531584][ T49] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 49.539116][ T49] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 49.548412][ T49] veth1_macvtap: left promiscuous mode [ 49.553992][ T49] veth0_macvtap: left promiscuous mode [ 49.560825][ T49] veth1_vlan: left promiscuous mode [ 49.566426][ T49] veth0_vlan: left promiscuous mode [ 49.662001][ T3774] loop3: detected capacity change from 0 to 1024 [ 49.679533][ T3774] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 49.699961][ T3774] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 49.732177][ T49] team0 (unregistering): Port device team_slave_1 removed [ 49.755858][ T49] team0 (unregistering): Port device team_slave_0 removed [ 49.763312][ T3126] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 49.777904][ T3785] loop0: detected capacity change from 0 to 512 [ 49.803462][ T3788] loop4: detected capacity change from 0 to 512 [ 49.829341][ T3785] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 49.835700][ T3788] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 49.842044][ T3785] ext4 filesystem being mounted at /root/syzkaller-testdir3221465283/syzkaller.oIXN7l/63/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 49.855121][ T3788] ext4 filesystem being mounted at /root/syzkaller-testdir1022145583/syzkaller.OLmyS9/42/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 49.919259][ T3785] EXT4-fs error (device loop0): ext4_do_update_inode:5082: inode #2: comm syz-executor.0: corrupted inode contents [ 49.927597][ T3798] loop1: detected capacity change from 0 to 1024 [ 49.932676][ T3785] EXT4-fs error (device loop0): ext4_dirty_inode:5942: inode #2: comm syz-executor.0: mark_inode_dirty error [ 49.946326][ T3788] EXT4-fs error (device loop4): ext4_do_update_inode:5082: inode #2: comm syz-executor.4: corrupted inode contents [ 49.953375][ T3798] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 49.962052][ T3788] EXT4-fs error (device loop4): ext4_dirty_inode:5942: inode #2: comm syz-executor.4: mark_inode_dirty error [ 49.985187][ T3788] EXT4-fs error (device loop4): ext4_do_update_inode:5082: inode #2: comm syz-executor.4: corrupted inode contents [ 49.997594][ T3785] EXT4-fs error (device loop0): ext4_do_update_inode:5082: inode #2: comm syz-executor.0: corrupted inode contents [ 50.008277][ T3571] veth0_vlan: entered promiscuous mode [ 50.012309][ T3798] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 50.019397][ T3571] veth1_vlan: entered promiscuous mode [ 50.036763][ T3785] EXT4-fs error (device loop0): __ext4_ext_dirty:202: inode #2: comm syz-executor.0: mark_inode_dirty error [ 50.051700][ T3571] veth0_macvtap: entered promiscuous mode [ 50.062221][ T3788] EXT4-fs error (device loop4): __ext4_ext_dirty:202: inode #2: comm syz-executor.4: mark_inode_dirty error [ 50.062954][ T3571] veth1_macvtap: entered promiscuous mode [ 50.081956][ T28] audit: type=1400 audit(1714408986.946:169): avc: denied { read } for pid=3805 comm="syz-executor.3" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 50.104989][ T28] audit: type=1400 audit(1714408986.946:170): avc: denied { open } for pid=3805 comm="syz-executor.3" path="/dev/cpu/0/msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 50.109810][ T3571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 50.130533][ T28] audit: type=1400 audit(1714408986.956:171): avc: denied { create } for pid=3784 comm="syz-executor.0" name=131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D338 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 50.140083][ T3571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.140129][ T3571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 50.140144][ T3571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.194779][ T28] audit: type=1400 audit(1714408987.066:172): avc: denied { write } for pid=3784 comm="syz-executor.0" name=131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D338 dev="loop0" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 50.204647][ T3571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 50.246696][ T28] audit: type=1400 audit(1714408987.106:173): avc: denied { add_name } for pid=3784 comm="syz-executor.0" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 50.249526][ T3571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.270154][ T28] audit: type=1400 audit(1714408987.106:174): avc: denied { create } for pid=3784 comm="syz-executor.0" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=lnk_file permissive=1 [ 50.279939][ T3571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 50.311663][ T3571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.322412][ T3098] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 50.333535][ T3571] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 50.335460][ T3097] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 50.347173][ T3571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 50.360322][ T3571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.370175][ T3571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 50.380661][ T3571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.390511][ T3571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 50.401083][ T3571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.410928][ T3571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 50.421396][ T3571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 50.436296][ T3108] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 50.438815][ T3571] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 50.458470][ T3571] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.467257][ T3571] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.476525][ T3571] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.485367][ T3571] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.564069][ T3821] loop4: detected capacity change from 0 to 2048 [ 50.575087][ T3823] loop2: detected capacity change from 0 to 1024 [ 50.588393][ T3823] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 50.602309][ T3823] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=f04cc01c, mo2=0002] [ 50.624358][ T3823] System zones: 0-1, 3-36 [ 50.631353][ T3823] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 50.664341][ T3821] loop4: p1 p2 p3 [ 50.672631][ T3830] loop3: detected capacity change from 0 to 512 [ 50.767586][ T3571] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 50.784745][ T3837] loop0: detected capacity change from 0 to 512 [ 50.795211][ T3830] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 50.836927][ T3830] ext4 filesystem being mounted at /root/syzkaller-testdir123623132/syzkaller.rZl9QB/51/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 50.859169][ T3837] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 50.872616][ T3830] EXT4-fs error (device loop3): ext4_do_update_inode:5082: inode #2: comm syz-executor.3: corrupted inode contents [ 50.884963][ T3842] loop4: detected capacity change from 0 to 512 [ 50.910096][ T3842] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 50.914712][ T3837] ext4 filesystem being mounted at /root/syzkaller-testdir3221465283/syzkaller.oIXN7l/66/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 50.938440][ T3830] EXT4-fs error (device loop3): ext4_dirty_inode:5942: inode #2: comm syz-executor.3: mark_inode_dirty error [ 50.950464][ T3842] ext4 filesystem being mounted at /root/syzkaller-testdir1022145583/syzkaller.OLmyS9/45/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 50.969623][ T3830] EXT4-fs error (device loop3): ext4_do_update_inode:5082: inode #2: comm syz-executor.3: corrupted inode contents [ 50.979792][ T3842] EXT4-fs error (device loop4): ext4_do_update_inode:5082: inode #2: comm syz-executor.4: corrupted inode contents [ 50.991985][ T3830] EXT4-fs error (device loop3): __ext4_ext_dirty:202: inode #2: comm syz-executor.3: mark_inode_dirty error [ 51.006645][ T3842] EXT4-fs error (device loop4): ext4_dirty_inode:5942: inode #2: comm syz-executor.4: mark_inode_dirty error [ 51.018791][ T3842] EXT4-fs error (device loop4): ext4_do_update_inode:5082: inode #2: comm syz-executor.4: corrupted inode contents [ 51.032523][ T3842] EXT4-fs error (device loop4): __ext4_ext_dirty:202: inode #2: comm syz-executor.4: mark_inode_dirty error [ 51.032601][ T3837] EXT4-fs error (device loop0): ext4_do_update_inode:5082: inode #2: comm syz-executor.0: corrupted inode contents [ 51.073013][ T3837] EXT4-fs error (device loop0): ext4_dirty_inode:5942: inode #2: comm syz-executor.0: mark_inode_dirty error [ 51.098268][ T3126] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.101063][ T3108] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.125626][ T3837] EXT4-fs error (device loop0): ext4_do_update_inode:5082: inode #2: comm syz-executor.0: corrupted inode contents [ 51.152217][ T3837] EXT4-fs error (device loop0): __ext4_ext_dirty:202: inode #2: comm syz-executor.0: mark_inode_dirty error [ 51.186504][ T3837] syz-executor.0 (3837) used greatest stack depth: 10480 bytes left [ 51.214564][ T3867] loop2: detected capacity change from 0 to 512 [ 51.245505][ T3866] loop1: detected capacity change from 0 to 512 [ 51.262681][ T3873] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 51.278523][ T3097] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.296486][ T3866] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 51.308073][ T3867] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 51.331716][ T3866] ext4 filesystem being mounted at /root/syzkaller-testdir1785051671/syzkaller.txhqFA/55/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 51.353752][ T3867] ext4 filesystem being mounted at /root/syzkaller-testdir1323839687/syzkaller.1fxTK8/5/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 51.371405][ T3872] loop4: detected capacity change from 0 to 2048 [ 51.381406][ T3866] EXT4-fs error (device loop1): ext4_do_update_inode:5082: inode #2: comm syz-executor.1: corrupted inode contents [ 51.396406][ T3866] EXT4-fs error (device loop1): ext4_dirty_inode:5942: inode #2: comm syz-executor.1: mark_inode_dirty error [ 51.411479][ T3866] EXT4-fs error (device loop1): ext4_do_update_inode:5082: inode #2: comm syz-executor.1: corrupted inode contents [ 51.431710][ T3866] EXT4-fs error (device loop1): __ext4_ext_dirty:202: inode #2: comm syz-executor.1: mark_inode_dirty error [ 51.433874][ T3867] EXT4-fs error (device loop2): ext4_do_update_inode:5082: inode #2: comm syz-executor.2: corrupted inode contents [ 51.445838][ T3872] loop4: p1 p2 p3 [ 51.473641][ T3867] EXT4-fs error (device loop2): ext4_dirty_inode:5942: inode #2: comm syz-executor.2: mark_inode_dirty error [ 51.509968][ T3098] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.547838][ T3867] EXT4-fs error (device loop2): ext4_do_update_inode:5082: inode #2: comm syz-executor.2: corrupted inode contents [ 51.565431][ T3089] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 51.575061][ T3867] EXT4-fs error (device loop2): __ext4_ext_dirty:202: inode #2: comm syz-executor.2: mark_inode_dirty error [ 51.614486][ T3089] udevd[3089]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 51.622659][ T3891] udevd[3891]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 51.626719][ T3892] udevd[3892]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 51.684055][ T3571] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.744356][ T3903] loop3: detected capacity change from 0 to 512 [ 51.770478][ T3903] EXT4-fs (loop3): revision level too high, forcing read-only mode [ 51.787944][ T3903] EXT4-fs (loop3): orphan cleanup on readonly fs [ 51.796138][ T3903] EXT4-fs warning (device loop3): ext4_enable_quotas:7104: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 51.856006][ T3903] EXT4-fs (loop3): Cannot turn on quotas: error -117 [ 51.868959][ T3903] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #16: comm syz-executor.3: casefold flag without casefold feature [ 51.888144][ T3903] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 16 (err -117) [ 51.904971][ T3903] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 51.935041][ T3126] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 52.082752][ T3934] loop1: detected capacity change from 0 to 2048 [ 52.145823][ T3934] loop1: p1 p2 p3 [ 52.221104][ T3955] bond0: option min_links: invalid value (18446744073709486081) [ 52.228894][ T3955] bond0: option min_links: allowed values 0 - 2147483647 [ 52.780238][ T4021] loop4: detected capacity change from 0 to 2048 [ 52.846003][ T4021] loop4: p1 p2 p3 [ 52.889768][ T2783] loop4: p1 p2 p3 [ 52.947785][ T4031] bond0: option min_links: invalid value (18446744073709486081) [ 52.955489][ T4031] bond0: option min_links: allowed values 0 - 2147483647 [ 52.964893][ T3089] udevd[3089]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 52.968721][ T3422] udevd[3422]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 52.976855][ T3892] udevd[3892]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 53.166904][ T4049] bond0: option min_links: invalid value (18446744073709486081) [ 53.174612][ T4049] bond0: option min_links: allowed values 0 - 2147483647 [ 53.281465][ T4057] net_ratelimit: 13 callbacks suppressed [ 53.281480][ T4057] IPv6: addrconf: prefix option has invalid lifetime [ 53.361002][ T4064] loop0: detected capacity change from 0 to 512 [ 53.400115][ T4064] ext4: Bad value for 'sb' [ 53.533026][ T4084] bond0: option min_links: invalid value (18446744073709486081) [ 53.541484][ T4084] bond0: option min_links: allowed values 0 - 2147483647 [ 53.751048][ T28] kauditd_printk_skb: 160 callbacks suppressed [ 53.751061][ T28] audit: type=1400 audit(1714408990.616:334): avc: denied { read } for pid=4096 comm="syz-executor.3" laddr=172.20.20.44 lport=33224 faddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 53.787609][ T4106] IPv6: addrconf: prefix option has invalid lifetime [ 53.802785][ T4108] __nla_validate_parse: 43 callbacks suppressed [ 53.802801][ T4108] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 53.936597][ T4127] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 54.211481][ T4149] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 54.224732][ T28] audit: type=1400 audit(1714408991.086:335): avc: denied { bind } for pid=4143 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 54.244687][ T28] audit: type=1400 audit(1714408991.086:336): avc: denied { node_bind } for pid=4143 comm="syz-executor.4" saddr=255.255.255.255 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 54.266970][ T28] audit: type=1400 audit(1714408991.086:337): avc: denied { create } for pid=4143 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 54.335367][ T28] audit: type=1400 audit(1714408991.096:338): avc: denied { ioctl } for pid=4143 comm="syz-executor.4" path="socket:[6962]" dev="sockfs" ino=6962 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 54.362863][ T28] audit: type=1400 audit(1714408991.096:339): avc: denied { connect } for pid=4143 comm="syz-executor.4" laddr=255.255.255.255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 54.411966][ T28] audit: type=1400 audit(1714408991.226:340): avc: denied { write } for pid=4158 comm="syz-executor.3" name="001" dev="devtmpfs" ino=146 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 54.447482][ T4172] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 54.537479][ T4185] loop2: detected capacity change from 0 to 512 [ 54.543106][ T4182] loop1: detected capacity change from 0 to 512 [ 54.553581][ T4185] ext4: Bad value for 'sb' [ 54.563191][ T4182] ext4: Bad value for 'sb' [ 54.822724][ T28] audit: type=1400 audit(1714408991.686:341): avc: denied { ioctl } for pid=4221 comm="syz-executor.3" path="socket:[7720]" dev="sockfs" ino=7720 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 54.845991][ T4222] bond_slave_0: entered promiscuous mode [ 54.853522][ T4222] bond_slave_1: entered promiscuous mode [ 54.894132][ T4222] macsec1: entered promiscuous mode [ 54.899481][ T4222] bond0: entered promiscuous mode [ 54.900123][ T4232] loop4: detected capacity change from 0 to 512 [ 54.911369][ T4222] bond0: left promiscuous mode [ 54.916587][ T4222] bond_slave_0: left promiscuous mode [ 54.921973][ T4222] bond_slave_1: left promiscuous mode [ 54.932831][ T28] audit: type=1400 audit(1714408991.796:342): avc: denied { mount } for pid=4231 comm="syz-executor.4" name="/" dev="loop4" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 54.972542][ T28] audit: type=1400 audit(1714408991.826:343): avc: denied { unmount } for pid=3108 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 55.026664][ T4237] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 55.034891][ T4237] netlink: 'syz-executor.3': attribute type 8 has an invalid length. [ 55.043214][ T4237] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 55.051418][ T4237] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 55.059688][ T4237] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.066908][ T4237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.100249][ T4239] loop4: detected capacity change from 0 to 2048 [ 55.134218][ T4239] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 55.166364][ T4239] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz-executor.4: bg 0: block 136: padding at end of block bitmap is not set [ 55.190864][ T4239] syz-executor.4 (4239) used greatest stack depth: 9776 bytes left [ 55.195768][ T4250] loop3: detected capacity change from 0 to 512 [ 55.211740][ T3108] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 55.250034][ T4241] loop0: detected capacity change from 0 to 32768 [ 55.351901][ T4260] bond_slave_0: entered promiscuous mode [ 55.357649][ T4260] bond_slave_1: entered promiscuous mode [ 55.364126][ T4260] macsec1: entered promiscuous mode [ 55.369340][ T4260] bond0: entered promiscuous mode [ 55.386782][ T4260] bond0: left promiscuous mode [ 55.391821][ T4260] bond_slave_0: left promiscuous mode [ 55.397368][ T4260] bond_slave_1: left promiscuous mode [ 55.452392][ T4262] bond_slave_0: entered promiscuous mode [ 55.458288][ T4262] bond_slave_1: entered promiscuous mode [ 55.464758][ T4262] macsec1: entered promiscuous mode [ 55.470171][ T4262] bond0: entered promiscuous mode [ 55.477491][ T4262] bond0: left promiscuous mode [ 55.482437][ T4262] bond_slave_0: left promiscuous mode [ 55.487939][ T4262] bond_slave_1: left promiscuous mode [ 55.501018][ T4264] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 55.509193][ T4264] netlink: 'syz-executor.4': attribute type 8 has an invalid length. [ 55.517462][ T4264] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 55.526072][ T4264] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 55.534198][ T4264] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.541415][ T4264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.548958][ T4266] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.556445][ T4266] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.563899][ T4268] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.571103][ T4268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.591658][ T4270] loop4: detected capacity change from 0 to 512 [ 55.600852][ T4270] ext4: Bad value for 'sb' [ 55.692266][ T4279] loop1: detected capacity change from 0 to 512 [ 55.718595][ T4279] ext4: Bad value for 'sb' [ 55.724421][ T4287] loop3: detected capacity change from 0 to 128 [ 55.741025][ T4286] bond_slave_0: entered promiscuous mode [ 55.746755][ T4286] bond_slave_1: entered promiscuous mode [ 55.762938][ T4286] macsec1: entered promiscuous mode [ 55.768237][ T4286] bond0: entered promiscuous mode [ 55.776609][ T4286] bond0: left promiscuous mode [ 55.781611][ T4286] bond_slave_0: left promiscuous mode [ 55.787276][ T4286] bond_slave_1: left promiscuous mode [ 55.797687][ T3892] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 55.842936][ T4293] bond_slave_0: entered promiscuous mode [ 55.848688][ T4293] bond_slave_1: entered promiscuous mode [ 55.849200][ T4295] loop3: detected capacity change from 0 to 2048 [ 55.855064][ T4293] macsec1: entered promiscuous mode [ 55.866016][ T4293] bond0: entered promiscuous mode [ 55.876432][ T4293] bond0: left promiscuous mode [ 55.881645][ T4293] bond_slave_0: left promiscuous mode [ 55.887039][ T4293] bond_slave_1: left promiscuous mode [ 55.937499][ T4295] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 55.982218][ T4295] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz-executor.3: bg 0: block 136: padding at end of block bitmap is not set [ 56.040415][ T4304] loop2: detected capacity change from 0 to 2048 [ 56.059269][ T3126] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 56.109912][ T4304] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 56.125925][ T4312] loop3: detected capacity change from 0 to 2048 [ 56.138657][ T4304] EXT4-fs error (device loop2): ext4_validate_block_bitmap:441: comm syz-executor.2: bg 0: block 136: padding at end of block bitmap is not set [ 56.162039][ T4312] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 56.163068][ T4304] syz-executor.2 (4304) used greatest stack depth: 9584 bytes left [ 56.179128][ T4312] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz-executor.3: bg 0: block 136: padding at end of block bitmap is not set [ 56.199700][ T3571] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 56.218626][ T4316] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.226813][ T4316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.237446][ T3126] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 56.267655][ T4319] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.274981][ T4319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.278511][ T4320] loop0: detected capacity change from 0 to 2048 [ 56.305767][ T4320] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 56.322254][ T4322] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.329386][ T4322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.334881][ T4326] loop2: detected capacity change from 0 to 2048 [ 56.345475][ T4320] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz-executor.0: bg 0: block 136: padding at end of block bitmap is not set [ 56.382954][ T3097] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 56.383102][ T4326] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 56.462323][ T4326] EXT4-fs error (device loop2): ext4_validate_block_bitmap:441: comm syz-executor.2: bg 0: block 136: padding at end of block bitmap is not set [ 56.493351][ T4337] loop4: detected capacity change from 0 to 2048 [ 56.513540][ T3571] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 56.525068][ T4337] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 56.552609][ T4337] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz-executor.4: bg 0: block 136: padding at end of block bitmap is not set [ 56.604685][ T3108] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 56.620705][ T4345] loop2: detected capacity change from 0 to 2048 [ 56.645753][ T4345] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 56.662166][ T4345] EXT4-fs error (device loop2): ext4_validate_block_bitmap:441: comm syz-executor.2: bg 0: block 136: padding at end of block bitmap is not set [ 56.706407][ T3571] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 56.713513][ T4352] loop4: detected capacity change from 0 to 512 [ 56.728930][ T4352] ext4: Bad value for 'sb' [ 56.751653][ T4347] loop1: detected capacity change from 0 to 32768 [ 56.796461][ T4354] loop2: detected capacity change from 0 to 512 [ 56.814794][ T4354] ext4: Bad value for 'sb' [ 57.375572][ T4365] loop3: detected capacity change from 0 to 2048 [ 57.395203][ T4365] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.