last executing test programs: 1.208243402s ago: executing program 0 (id=1): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000009385000000"], &(0x7f0000000200)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)={0x2, 0x400000000000003, 0x20, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3, 0x0, 0x0, 0x100000000000000}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010100}}, @sadb_lifetime={0x4, 0x4, 0x0, 0xfffffffffffffffe}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @broadcast}}, @sadb_x_sec_ctx={0x1, 0x18, 0x5, 0x5f}]}, 0x98}}, 0x0) 987.321955ms ago: executing program 2 (id=3): openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1e00000000000000050000000600000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000040000fbb03f0d42cdf3bc4826000000000001e50feb972479a39bd3da0000c9d73bc071b32d13a147e7a063b08bbc05", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001440)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000020000000000000002018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYRESDEC=r2], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) wait4(0x0, 0x0, 0x1000000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000002c0)='mm_page_alloc\x00', r5, 0x0, 0x2}, 0x18) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0xc0802, 0x0) ioctl$PPPIOCNEWUNIT(r6, 0xc004743e, &(0x7f00000000c0)) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000600), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f00000001c0)={0x1000003, 0x300102, 0x0, 'queue1\x00', 0xffffffff}) r8 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000340), 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r8, 0xc02c5341, &(0x7f0000000480)) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x15) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYRESDEC=r5], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x48) r10 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r10) 977.642266ms ago: executing program 0 (id=6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x3c0, 0x210, 0x9403, 0x3002, 0x210, 0x2c0, 0x2f0, 0x3d8, 0x3d8, 0x2f0, 0x3d8, 0x3, 0x0, {[{{@ipv6={@private2, @remote, [0xffffff00, 0x0, 0xffffffff], [0xffffffff, 0xffffff00, 0xffffffff], 'macvlan1\x00', 'wg2\x00', {}, {0xa4c8dd0ffa9b1578}, 0x73, 0x9, 0x4, 0x48}, 0x0, 0x1c8, 0x210, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x80, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private1}}}, {{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffffffffffffffff, 0x0, 0x2}, {0x4, 0x5, 0x5}, {0x3, 0x4}, 0xbf, 0xb}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x47b) 867.291867ms ago: executing program 0 (id=7): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) r3 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x41}}}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000040)="e0", 0x1}], 0x1, 0x0, 0x0, 0x801}, 0x4000045) recvmmsg(r2, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000540)=""/160, 0xa0}], 0x1, 0x0, 0xff9f}, 0x2}], 0x1, 0x40000020, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d2e, 0x422, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4800, 0x0, 0x0, 0x4, 0x0, 0x804000}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x3, 0x87) sendmsg$kcm(r4, &(0x7f0000000580)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f00000004c0), 0x3e}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x80, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 867.168358ms ago: executing program 3 (id=4): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a030000000000000000f0070000000900010073797a300000000080000000090a010400000000000000000700000008000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d3c00128014000180090001006c617374000000000400028010000180090001006c61737400000000140001800c000100636f756e746572000400028008000340000001"], 0xc8}, 0x1, 0x0, 0x0, 0x40000}, 0x20050800) (fail_nth: 8) 697.3975ms ago: executing program 3 (id=8): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) listen(r1, 0x106) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000000)=0x800, 0x4) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'\x00', 0x5}) ioctl$TUNSETPERSIST(r0, 0x400454c9, 0x1) ioctl$TUNSETLINK(r0, 0x400454cd, 0x306) 525.496982ms ago: executing program 2 (id=9): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x30, r1, 0x1, 0x9, 0x800000, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0xa}]}]}, 0x30}, 0x1, 0x700}, 0x34020840) 504.372853ms ago: executing program 4 (id=5): r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="0100000000000000001100097cef724331d93810", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000540)=ANY=[@ANYRESOCT=r3, @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014002000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095", @ANYRES64=r1, @ANYRESOCT=0x0, @ANYRES64=r0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='sys_enter\x00', r4}, 0x10) munlockall() connect$unix(r2, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r2, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000200)=ANY=[@ANYRES32=r5, @ANYRES64=r0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYRESOCT=r6], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYRES8=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) fcntl$setlease(r8, 0x400, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='leases_conflict\x00', r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='leases_conflict\x00', r7}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000040)={0x8}) ppoll(&(0x7f0000000140)=[{r1, 0x8100}], 0x1, 0x0, 0x0, 0x0) r11 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x183801, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r11, 0xd0009412, &(0x7f0000001f80)={0x0, 0x9}) syslog(0x2, &(0x7f0000000040)=""/36, 0x24) openat$tun(0xffffffffffffff9c, 0x0, 0x40241, 0x0) ioperm(0x0, 0x40, 0x0) 437.607494ms ago: executing program 3 (id=10): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x3c0, 0x210, 0x9403, 0x3002, 0x210, 0x2c0, 0x2f0, 0x3d8, 0x3d8, 0x2f0, 0x3d8, 0x3, 0x0, {[{{@ipv6={@private2, @remote, [0xffffff00, 0x0, 0xffffffff], [0xffffffff, 0xffffff00, 0xffffffff], 'macvlan1\x00', 'wg2\x00', {}, {0xa4c8dd0ffa9b1578}, 0x73, 0x9, 0x4, 0x48}, 0x0, 0x1c8, 0x210, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x80, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private1}}}, {{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffffffffffffffff, 0x0, 0x2}, {0x4, 0x5, 0x5}, {0x3, 0x4}, 0xbf, 0xb}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x47b) (fail_nth: 2) 437.351904ms ago: executing program 1 (id=2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f00000000c0)="0bbb268dd6ffa80800000000000000000000210d0000aaa8fa017242ba9380d440fe000000000000290000003b000000", 0xfe60) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x38, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x1, 0x1, 0x8, 0x20005, 0x2b, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x4c) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00'}, 0x94) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@empty, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102}, @time_exceeded={0x3, 0x4, 0x0, 0x12, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x68, 0x0, 0x0, 0x1, 0x0, @remote, @loopback}}}}}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="09000000030000000800000004"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kfree\x00', r3}, 0x18) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000080), 0x80c, &(0x7f0000000640)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB="2c756e616d653dd0"]) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r6, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000080)={0x34, r7, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 357.425625ms ago: executing program 2 (id=11): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000009385000000710000"], &(0x7f0000000200)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x18) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)={0x2, 0x400000000000003, 0x20, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3, 0x0, 0x0, 0x100000000000000}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010100}}, @sadb_lifetime={0x4, 0x4, 0x0, 0xfffffffffffffffe}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @broadcast}}, @sadb_x_sec_ctx={0x1, 0x18, 0x5, 0x5f}]}, 0x98}}, 0x0) 146.167028ms ago: executing program 3 (id=12): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000007000000070000000040000000200000006000084000000000a00000004004000000200000300000003e351aa660a19f85e09000004050000000000000000000000000000ff7f000002000000000000000003000000040000000700000004000000000000110a0000000600000008000000000000070000000000303000"], &(0x7f00000007c0)=""/4096, 0x8c, 0x1000, 0x0, 0xffff8000, 0x10000}, 0x28) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_setup(0x97e5ad60, &(0x7f0000000200)) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x10e, &(0x7f0000000280)={[{@init_itable_val={'init_itable', 0x3d, 0x957}}, {@nombcache}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2a}}, {@stripe={'stripe', 0x3d, 0x8}}, {@orlov}, {@errors_remount}]}, 0x4, 0x46b, &(0x7f00000009c0)="$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") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=0x0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) clock_nanosleep(0x9, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000006c0)="5c00000013006bcd9e3fe3dc6e48aa310b6b8703100000001f03000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x4014) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x1, 0x7fff0000}]}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f0000000080)={0x1ff, 0x3, 0x56, 0x4, 0x7, 0x7, 0x8}, 0xc) unshare(0x40000000) socket$nl_netfilter(0x10, 0x3, 0xc) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) 141.692728ms ago: executing program 2 (id=13): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x9, 0xbb, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x400000000008, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x5f}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x20}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x48) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, 0x0, 0xf00) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000340)='kfree\x00'}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_io_uring_setup(0x18d6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000}, &(0x7f0000ffe000), &(0x7f0000ffe000)) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r5, 0x2, &(0x7f0000000180), 0xfe) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ff"], 0x48) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x101c088, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x6, 0x2c3, &(0x7f0000000900)="$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") r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r7}, 0x10) statfs(&(0x7f0000000180)='./file1\x00', &(0x7f00000004c0)=""/214) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="4400000002060500f10de2cd44057eeb000000000c000300686173683a69700005000400000000000900020073797a310000000005000500020000000500010006"], 0x44}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x44, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast1=0xe0004001}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x10000047}, 0x0) sendmsg$kcm(r0, &(0x7f00000017c0)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x7, @dev={0xfe, 0x80, '\x00', 0x3e}, 0x31, 0x2}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000004c0)="7f", 0x1}], 0x1, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000084000000070000007ffffffff5000000b8"], 0xd0}, 0x480c4) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000009385000000710000"], &(0x7f0000000180)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r9}, 0x18) r10 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_GETFSUUID(r10, 0x80111500, &(0x7f0000000080)) 73.260699ms ago: executing program 4 (id=14): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], 0x0, 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x18) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)={0x2, 0x400000000000003, 0x20, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3, 0x0, 0x0, 0x100000000000000}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010100}}, @sadb_lifetime={0x4, 0x4, 0x0, 0xfffffffffffffffe}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @broadcast}}, @sadb_x_sec_ctx={0x1, 0x18, 0x5, 0x5f}]}, 0x98}}, 0x0) 0s ago: executing program 0 (id=15): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x8, 0x3, 0x2f0, 0x0, 0x8, 0xfa04, 0xc0, 0x6c02, 0x258, 0x194, 0x194, 0x258, 0x194, 0x3, 0x0, {[{{@ip={@empty=0x1e00, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'veth0_virt_wifi\x00', {}, {}, 0x6}, 0x0, 0x98, 0xc0, 0x0, {0x0, 0x74020000}, [@common=@inet=@socket1={{0x28}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@ip={@broadcast, @dev, 0x0, 0x0, '\x00', 'tunl0\x00'}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:man_t:s0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x350) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f00000005c0)={[{@delalloc}, {@nodelalloc}, {@barrier_val={'barrier', 0x3d, 0x6}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x571, &(0x7f0000000f00)="$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") r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], &(0x7f0000000200)='syzkaller\x00', 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x40000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x114}, 0x94) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x3c0, 0x210, 0x9403, 0x3002, 0x210, 0x2c0, 0x2f0, 0x3d8, 0x3d8, 0x2f0, 0x3d8, 0x3, 0x0, {[{{@ipv6={@private2, @remote, [0xffffff00, 0x0, 0xffffffff], [0xffffffff, 0xffffff00, 0xffffffff], 'macvlan1\x00', 'wg2\x00', {}, {0xa4c8dd0ffa9b1578}, 0x73, 0x9, 0x4, 0x48}, 0x0, 0x1c8, 0x210, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x80, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private1}}}, {{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffffffffffffffff, 0x0, 0x2}, {0x4, 0x5, 0x5}, {0x3, 0x4}, 0xbf, 0xb}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x47b) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.90' (ED25519) to the list of known hosts. [ 33.275973][ T29] audit: type=1400 audit(1752535012.178:62): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.277200][ T3295] cgroup: Unknown subsys name 'net' [ 33.298726][ T29] audit: type=1400 audit(1752535012.178:63): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.326116][ T29] audit: type=1400 audit(1752535012.208:64): avc: denied { unmount } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.466684][ T3295] cgroup: Unknown subsys name 'cpuset' [ 33.472913][ T3295] cgroup: Unknown subsys name 'rlimit' [ 33.663777][ T29] audit: type=1400 audit(1752535012.558:65): avc: denied { setattr } for pid=3295 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 33.687069][ T29] audit: type=1400 audit(1752535012.558:66): avc: denied { create } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.707549][ T29] audit: type=1400 audit(1752535012.558:67): avc: denied { write } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.728006][ T29] audit: type=1400 audit(1752535012.558:68): avc: denied { read } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.736843][ T3297] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 33.748310][ T29] audit: type=1400 audit(1752535012.568:69): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 33.781824][ T29] audit: type=1400 audit(1752535012.568:70): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 33.805313][ T29] audit: type=1400 audit(1752535012.668:71): avc: denied { relabelto } for pid=3297 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 33.833199][ T3295] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 35.033066][ T3308] chnl_net:caif_netlink_parms(): no params data found [ 35.079496][ T3309] chnl_net:caif_netlink_parms(): no params data found [ 35.132620][ T3305] chnl_net:caif_netlink_parms(): no params data found [ 35.186472][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 35.195117][ T3304] chnl_net:caif_netlink_parms(): no params data found [ 35.213171][ T3308] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.220376][ T3308] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.227611][ T3308] bridge_slave_0: entered allmulticast mode [ 35.234101][ T3308] bridge_slave_0: entered promiscuous mode [ 35.245506][ T3308] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.252640][ T3308] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.261182][ T3308] bridge_slave_1: entered allmulticast mode [ 35.267603][ T3308] bridge_slave_1: entered promiscuous mode [ 35.279091][ T3309] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.286234][ T3309] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.293455][ T3309] bridge_slave_0: entered allmulticast mode [ 35.300137][ T3309] bridge_slave_0: entered promiscuous mode [ 35.306880][ T3309] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.313948][ T3309] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.321224][ T3309] bridge_slave_1: entered allmulticast mode [ 35.327730][ T3309] bridge_slave_1: entered promiscuous mode [ 35.384647][ T3308] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.399859][ T3309] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.410434][ T3309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.424797][ T3308] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.439006][ T3305] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.446144][ T3305] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.453342][ T3305] bridge_slave_0: entered allmulticast mode [ 35.459856][ T3305] bridge_slave_0: entered promiscuous mode [ 35.466753][ T3305] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.473840][ T3305] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.481103][ T3305] bridge_slave_1: entered allmulticast mode [ 35.487811][ T3305] bridge_slave_1: entered promiscuous mode [ 35.511438][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.518554][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.526939][ T3312] bridge_slave_0: entered allmulticast mode [ 35.533304][ T3312] bridge_slave_0: entered promiscuous mode [ 35.558479][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.565682][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.573811][ T3312] bridge_slave_1: entered allmulticast mode [ 35.580222][ T3312] bridge_slave_1: entered promiscuous mode [ 35.592439][ T3308] team0: Port device team_slave_0 added [ 35.608740][ T3309] team0: Port device team_slave_0 added [ 35.620279][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.630019][ T3308] team0: Port device team_slave_1 added [ 35.641542][ T3305] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.655647][ T3304] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.662718][ T3304] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.669959][ T3304] bridge_slave_0: entered allmulticast mode [ 35.676434][ T3304] bridge_slave_0: entered promiscuous mode [ 35.683177][ T3304] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.690311][ T3304] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.697471][ T3304] bridge_slave_1: entered allmulticast mode [ 35.703946][ T3304] bridge_slave_1: entered promiscuous mode [ 35.710878][ T3309] team0: Port device team_slave_1 added [ 35.722699][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.737453][ T3305] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.746852][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.753884][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.779862][ T3309] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.791007][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.798036][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.824426][ T3308] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.853858][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.860857][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.886914][ T3309] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.897977][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.904950][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.930929][ T3308] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.942922][ T3304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.965018][ T3305] team0: Port device team_slave_0 added [ 35.973681][ T3305] team0: Port device team_slave_1 added [ 35.981720][ T3304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.991748][ T3312] team0: Port device team_slave_0 added [ 36.017318][ T3312] team0: Port device team_slave_1 added [ 36.060017][ T3308] hsr_slave_0: entered promiscuous mode [ 36.066127][ T3308] hsr_slave_1: entered promiscuous mode [ 36.073985][ T3309] hsr_slave_0: entered promiscuous mode [ 36.080079][ T3309] hsr_slave_1: entered promiscuous mode [ 36.086135][ T3309] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 36.093701][ T3309] Cannot create hsr debugfs directory [ 36.099508][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.106570][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.132486][ T3305] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.144000][ T3304] team0: Port device team_slave_0 added [ 36.150138][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.157202][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.183184][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.207716][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.214730][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.240767][ T3305] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.252343][ T3304] team0: Port device team_slave_1 added [ 36.263245][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.270282][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.296237][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.338907][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.345994][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.372137][ T3304] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.383958][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.391036][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.417057][ T3304] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.472453][ T3312] hsr_slave_0: entered promiscuous mode [ 36.478573][ T3312] hsr_slave_1: entered promiscuous mode [ 36.484500][ T3312] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 36.492204][ T3312] Cannot create hsr debugfs directory [ 36.514887][ T3305] hsr_slave_0: entered promiscuous mode [ 36.520793][ T3305] hsr_slave_1: entered promiscuous mode [ 36.526813][ T3305] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 36.534610][ T3305] Cannot create hsr debugfs directory [ 36.557705][ T3304] hsr_slave_0: entered promiscuous mode [ 36.563717][ T3304] hsr_slave_1: entered promiscuous mode [ 36.569569][ T3304] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 36.577204][ T3304] Cannot create hsr debugfs directory [ 36.693044][ T3308] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 36.703598][ T3308] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 36.725013][ T3308] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 36.752585][ T3308] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 36.786075][ T3309] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 36.800860][ T3309] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 36.817052][ T3309] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 36.827839][ T3312] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 36.856505][ T3309] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 36.865264][ T3312] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 36.881118][ T3312] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 36.890323][ T3304] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 36.904874][ T3312] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 36.913518][ T3304] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 36.922955][ T3304] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 36.932033][ T3304] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 36.968618][ T3308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.986424][ T3305] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 36.995320][ T3305] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 37.011305][ T3305] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 37.020200][ T3305] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 37.044815][ T3308] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.058825][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.065943][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.084197][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.091280][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.116905][ T3309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.133768][ T3308] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.149535][ T3309] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.190062][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.198835][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.206026][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.215890][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.223028][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.237849][ T3304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.249237][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.277683][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.284999][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.293863][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.300939][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.314174][ T3305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.324588][ T3304] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.346182][ T146] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.353340][ T146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.372086][ T146] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.379265][ T146] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.389258][ T3305] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.400046][ T3308] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.418306][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.425440][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.438208][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.445300][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.457734][ T3312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.482002][ T3304] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 37.492521][ T3304] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.547782][ T3305] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.572790][ T3309] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.624476][ T3304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.648047][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.715364][ T3305] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.774852][ T3308] veth0_vlan: entered promiscuous mode [ 37.803773][ T3309] veth0_vlan: entered promiscuous mode [ 37.817137][ T3308] veth1_vlan: entered promiscuous mode [ 37.823224][ T3304] veth0_vlan: entered promiscuous mode [ 37.835588][ T3309] veth1_vlan: entered promiscuous mode [ 37.846434][ T3304] veth1_vlan: entered promiscuous mode [ 37.905082][ T3308] veth0_macvtap: entered promiscuous mode [ 37.924910][ T3305] veth0_vlan: entered promiscuous mode [ 37.931356][ T3304] veth0_macvtap: entered promiscuous mode [ 37.941596][ T3308] veth1_macvtap: entered promiscuous mode [ 37.949559][ T3309] veth0_macvtap: entered promiscuous mode [ 37.958616][ T3304] veth1_macvtap: entered promiscuous mode [ 37.967833][ T3309] veth1_macvtap: entered promiscuous mode [ 37.982531][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.000778][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.008675][ T3305] veth1_vlan: entered promiscuous mode [ 38.017553][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.028579][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.037013][ T3312] veth0_vlan: entered promiscuous mode [ 38.043785][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.054291][ T3308] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.063103][ T3308] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.071877][ T3308] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.080619][ T3308] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.094638][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.102921][ T3304] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.111807][ T3304] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.120600][ T3304] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.129393][ T3304] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.142721][ T3312] veth1_vlan: entered promiscuous mode [ 38.150157][ T3309] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.158991][ T3309] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.167802][ T3309] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.176600][ T3309] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.214206][ T3312] veth0_macvtap: entered promiscuous mode [ 38.232690][ T3312] veth1_macvtap: entered promiscuous mode [ 38.240933][ T3308] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 38.257698][ T3305] veth0_macvtap: entered promiscuous mode [ 38.272799][ T3305] veth1_macvtap: entered promiscuous mode [ 38.290228][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 38.290242][ T29] audit: type=1400 audit(1752535017.178:90): avc: denied { read write } for pid=3308 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 38.320642][ T29] audit: type=1400 audit(1752535017.178:91): avc: denied { open } for pid=3308 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 38.344724][ T29] audit: type=1400 audit(1752535017.178:92): avc: denied { ioctl } for pid=3308 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 38.370249][ T29] audit: type=1400 audit(1752535017.188:93): avc: denied { prog_load } for pid=3474 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 38.388986][ T29] audit: type=1400 audit(1752535017.188:94): avc: denied { bpf } for pid=3474 comm="syz.0.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 38.409249][ T29] audit: type=1400 audit(1752535017.188:95): avc: denied { perfmon } for pid=3474 comm="syz.0.1" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 38.429897][ T29] audit: type=1400 audit(1752535017.188:96): avc: denied { create } for pid=3474 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 38.437009][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.448928][ T29] audit: type=1400 audit(1752535017.188:97): avc: denied { write } for pid=3474 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 38.460816][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.501054][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.517694][ T3312] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.526509][ T3312] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.535276][ T3312] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.544160][ T3312] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.561819][ T3481] Cannot find del_set index 4 as target [ 38.568590][ T29] audit: type=1400 audit(1752535017.418:98): avc: denied { read write } for pid=3478 comm="syz.2.3" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 38.592565][ T29] audit: type=1400 audit(1752535017.418:99): avc: denied { open } for pid=3478 comm="syz.2.3" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 38.632761][ T36] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=36 comm=kworker/1:1 [ 38.647378][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.667500][ T3305] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.676293][ T3305] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.685025][ T3305] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.687941][ T3486] FAULT_INJECTION: forcing a failure. [ 38.687941][ T3486] name failslab, interval 1, probability 0, space 0, times 1 [ 38.693938][ T3305] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.706518][ T3486] CPU: 0 UID: 0 PID: 3486 Comm: syz.3.4 Not tainted 6.16.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 38.706557][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 38.706651][ T3486] Call Trace: [ 38.706660][ T3486] [ 38.706669][ T3486] __dump_stack+0x1d/0x30 [ 38.706697][ T3486] dump_stack_lvl+0xe8/0x140 [ 38.706801][ T3486] dump_stack+0x15/0x1b [ 38.706825][ T3486] should_fail_ex+0x265/0x280 [ 38.706865][ T3486] should_failslab+0x8c/0xb0 [ 38.706895][ T3486] kmem_cache_alloc_node_noprof+0x57/0x320 [ 38.706969][ T3486] ? __alloc_skb+0x101/0x320 [ 38.707049][ T3486] __alloc_skb+0x101/0x320 [ 38.707103][ T3486] netlink_alloc_large_skb+0xba/0xf0 [ 38.707151][ T3486] netlink_sendmsg+0x3cf/0x6b0 [ 38.707179][ T3486] ? __pfx_netlink_sendmsg+0x10/0x10 [ 38.707203][ T3486] __sock_sendmsg+0x145/0x180 [ 38.707236][ T3486] ____sys_sendmsg+0x31e/0x4e0 [ 38.707284][ T3486] ___sys_sendmsg+0x17b/0x1d0 [ 38.707423][ T3486] __x64_sys_sendmsg+0xd4/0x160 [ 38.707490][ T3486] x64_sys_call+0x2999/0x2fb0 [ 38.707518][ T3486] do_syscall_64+0xd2/0x200 [ 38.707542][ T3486] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 38.707578][ T3486] ? clear_bhb_loop+0x40/0x90 [ 38.707606][ T3486] ? clear_bhb_loop+0x40/0x90 [ 38.707744][ T3486] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 38.707773][ T3486] RIP: 0033:0x7ff624f2e929 [ 38.707799][ T3486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 38.707822][ T3486] RSP: 002b:00007ff623597038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 38.707851][ T3486] RAX: ffffffffffffffda RBX: 00007ff625155fa0 RCX: 00007ff624f2e929 [ 38.707868][ T3486] RDX: 0000000020050800 RSI: 00002000000000c0 RDI: 0000000000000006 [ 38.707953][ T3486] RBP: 00007ff623597090 R08: 0000000000000000 R09: 0000000000000000 [ 38.708043][ T3486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 38.708058][ T3486] R13: 0000000000000000 R14: 00007ff625155fa0 R15: 00007ffc5b5643b8 [ 38.708216][ T3486] [ 38.927111][ T3491] tun0: tun_chr_ioctl cmd 1074025677 [ 38.932547][ T3491] tun0: linktype set to 774 [ 39.016546][ T3497] random: crng reseeded on system resumption [ 39.048133][ T3501] FAULT_INJECTION: forcing a failure. [ 39.048133][ T3501] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 39.061290][ T3501] CPU: 1 UID: 0 PID: 3501 Comm: syz.3.10 Not tainted 6.16.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 39.061316][ T3501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 39.061331][ T3501] Call Trace: [ 39.061337][ T3501] [ 39.061346][ T3501] __dump_stack+0x1d/0x30 [ 39.061368][ T3501] dump_stack_lvl+0xe8/0x140 [ 39.061390][ T3501] dump_stack+0x15/0x1b [ 39.061418][ T3501] should_fail_ex+0x265/0x280 [ 39.061538][ T3501] should_fail+0xb/0x20 [ 39.061567][ T3501] should_fail_usercopy+0x1a/0x20 [ 39.061603][ T3501] _copy_from_user+0x1c/0xb0 [ 39.061700][ T3501] do_ip6t_set_ctl+0x3a9/0x840 [ 39.061769][ T3501] ? kstrtoull+0x111/0x140 [ 39.061805][ T3501] ? __rcu_read_unlock+0x4f/0x70 [ 39.061891][ T3501] nf_setsockopt+0x196/0x1b0 [ 39.061917][ T3501] ipv6_setsockopt+0x11a/0x130 [ 39.061980][ T3501] tcp_setsockopt+0x95/0xb0 [ 39.062022][ T3501] sock_common_setsockopt+0x69/0x80 [ 39.062070][ T3501] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 39.062102][ T3501] __sys_setsockopt+0x184/0x200 [ 39.062203][ T3501] __x64_sys_setsockopt+0x64/0x80 [ 39.062243][ T3501] x64_sys_call+0x2bd5/0x2fb0 [ 39.062333][ T3501] do_syscall_64+0xd2/0x200 [ 39.062355][ T3501] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 39.062387][ T3501] ? clear_bhb_loop+0x40/0x90 [ 39.062414][ T3501] ? clear_bhb_loop+0x40/0x90 [ 39.062450][ T3501] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.062535][ T3501] RIP: 0033:0x7ff624f2e929 [ 39.062580][ T3501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.062603][ T3501] RSP: 002b:00007ff623597038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 39.062626][ T3501] RAX: ffffffffffffffda RBX: 00007ff625155fa0 RCX: 00007ff624f2e929 [ 39.062642][ T3501] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 39.062656][ T3501] RBP: 00007ff623597090 R08: 000000000000047b R09: 0000000000000000 [ 39.062671][ T3501] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 39.062686][ T3501] R13: 0000000000000000 R14: 00007ff625155fa0 R15: 00007ffc5b5643b8 [ 39.062749][ T3501] [ 39.374662][ T3511] loop3: detected capacity change from 0 to 512 [ 39.383272][ T3510] loop2: detected capacity change from 0 to 256 [ 39.391624][ T3511] EXT4-fs: Ignoring removed orlov option [ 39.437731][ T3511] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 39.450929][ T3511] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 39.471425][ T3291] ================================================================== [ 39.479555][ T3291] BUG: KCSAN: data-race in fill_mg_cmtime / shmem_unlink [ 39.486624][ T3291] [ 39.488987][ T3291] write to 0xffff8881030b9264 of 4 bytes by task 3298 on cpu 0: [ 39.496646][ T3291] shmem_unlink+0x13c/0x170 [ 39.501186][ T3291] shmem_rename2+0x1a1/0x290 [ 39.505809][ T3291] vfs_rename+0x7d9/0xa20 [ 39.510181][ T3291] do_renameat2+0x764/0xab0 [ 39.514696][ T3291] __x64_sys_rename+0x58/0x70 [ 39.519396][ T3291] x64_sys_call+0x2aee/0x2fb0 [ 39.524094][ T3291] do_syscall_64+0xd2/0x200 [ 39.528608][ T3291] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.534519][ T3291] [ 39.536852][ T3291] read to 0xffff8881030b9264 of 4 bytes by task 3291 on cpu 1: [ 39.544417][ T3291] fill_mg_cmtime+0x5b/0x260 [ 39.549023][ T3291] generic_fillattr+0x24a/0x340 [ 39.553896][ T3291] shmem_getattr+0x181/0x200 [ 39.558956][ T3291] vfs_getattr_nosec+0x146/0x1e0 [ 39.563908][ T3291] vfs_statx+0x113/0x390 [ 39.568179][ T3291] vfs_fstatat+0x115/0x170 [ 39.572607][ T3291] __se_sys_newfstatat+0x55/0x260 [ 39.577649][ T3291] __x64_sys_newfstatat+0x55/0x70 [ 39.582690][ T3291] x64_sys_call+0x2c22/0x2fb0 [ 39.587388][ T3291] do_syscall_64+0xd2/0x200 [ 39.591904][ T3291] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.597822][ T3291] [ 39.600156][ T3291] value changed: 0x15f91637 -> 0x16db3b21 [ 39.605888][ T3291] [ 39.608225][ T3291] Reported by Kernel Concurrency Sanitizer on: [ 39.614381][ T3291] CPU: 1 UID: 0 PID: 3291 Comm: udevd Not tainted 6.16.0-rc6-syzkaller #0 PREEMPT(voluntary) [ 39.624653][ T3291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 39.634729][ T3291] ================================================================== [ 39.652873][ T3518] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 39.688080][ T3511] EXT4-fs (loop3): 1 orphan inode deleted [ 39.693932][ T3511] EXT4-fs (loop3): 1 truncate cleaned up [ 39.704246][ T3511] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.739285][ T3518] loop0: detected capacity change from 0 to 1024 [ 39.746436][ T3518] ======================================================= [ 39.746436][ T3518] WARNING: The mand mount option has been deprecated and [ 39.746436][ T3518] and is ignored by this kernel. Remove the mand [ 39.746436][ T3518] option from the mount to silence this warning. [ 39.746436][ T3518] ======================================================= [ 39.787194][ T3518] EXT4-fs: Ignoring removed nobh option [ 39.792870][ T3518] EXT4-fs: Ignoring removed bh option [ 39.795304][ T3520] netlink: 'syz.3.12': attribute type 10 has an invalid length. [ 39.806112][ T3520] netlink: 40 bytes leftover after parsing attributes in process `syz.3.12'. [ 39.816790][ T3520] team0: entered promiscuous mode [ 39.821956][ T3520] team_slave_0: entered promiscuous mode [ 39.827776][ T3520] team_slave_1: entered promiscuous mode [ 39.833516][ T3520] team0: entered allmulticast mode [ 39.839205][ T3520] team_slave_0: entered allmulticast mode [ 39.845030][ T3520] team_slave_1: entered allmulticast mode [ 39.853592][ T3520] bridge0: port 3(team0) entered blocking state [ 39.854368][ T3518] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 39.859939][ T3520] bridge0: port 3(team0) entered disabled state [ 39.889360][ T3518] Cannot find del_set index 4 as target [ 39.910823][ T3308] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.935441][ T3520] bridge0: port 3(team0) entered blocking state [ 39.941777][ T3520] bridge0: port 3(team0) entered forwarding state [ 39.950258][ T3515] syz.2.13 (3515) used greatest stack depth: 9712 bytes left [ 40.022978][ T3304] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.