Warning: Permanently added '10.128.0.231' (ED25519) to the list of known hosts. 2024/04/07 18:02:38 fuzzer started 2024/04/07 18:02:38 dialing manager at 10.128.0.163:30015 [ 24.704661][ T28] audit: type=1400 audit(1712512958.692:82): avc: denied { node_bind } for pid=3071 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 24.725279][ T28] audit: type=1400 audit(1712512958.692:83): avc: denied { name_bind } for pid=3071 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 26.249155][ T28] audit: type=1400 audit(1712512960.242:84): avc: denied { mounton } for pid=3078 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.250117][ T3078] cgroup: Unknown subsys name 'net' [ 26.272213][ T28] audit: type=1400 audit(1712512960.242:85): avc: denied { mount } for pid=3078 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.299576][ T28] audit: type=1400 audit(1712512960.272:86): avc: denied { unmount } for pid=3078 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.436295][ T3078] cgroup: Unknown subsys name 'rlimit' [ 26.526691][ T28] audit: type=1400 audit(1712512960.522:87): avc: denied { mounton } for pid=3078 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.551511][ T28] audit: type=1400 audit(1712512960.522:88): avc: denied { mount } for pid=3078 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.572224][ T3080] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.574862][ T28] audit: type=1400 audit(1712512960.522:89): avc: denied { create } for pid=3078 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.603708][ T28] audit: type=1400 audit(1712512960.522:90): avc: denied { write } for pid=3078 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2024/04/07 18:02:40 syscalls: 2893 2024/04/07 18:02:40 code coverage: enabled 2024/04/07 18:02:40 comparison tracing: enabled 2024/04/07 18:02:40 extra coverage: enabled 2024/04/07 18:02:40 delay kcov mmap: enabled 2024/04/07 18:02:40 setuid sandbox: enabled 2024/04/07 18:02:40 namespace sandbox: enabled 2024/04/07 18:02:40 Android sandbox: enabled 2024/04/07 18:02:40 fault injection: enabled 2024/04/07 18:02:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2024/04/07 18:02:40 net packet injection: enabled 2024/04/07 18:02:40 net device setup: enabled 2024/04/07 18:02:40 concurrency sanitizer: enabled 2024/04/07 18:02:40 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/04/07 18:02:40 NIC VF setup: PCI device 0000:00:11.0 is not available 2024/04/07 18:02:40 USB emulation: /dev/raw-gadget does not exist 2024/04/07 18:02:40 hci packet injection: /dev/vhci does not exist 2024/04/07 18:02:40 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2024/04/07 18:02:40 802.15.4 emulation: enabled 2024/04/07 18:02:40 swap file: enabled 2024/04/07 18:02:40 suppressing KCSAN reports in functions: '__xa_clear_mark' 'call_rcu' 'xas_clear_mark' 'dont_mount' 'jbd2_journal_stop' 'do_select' 'generic_fillattr' 'exit_mm' 'vmalloc_info_show' 'jbd2_journal_dirty_metadata' 'atime_needs_update' 'ext4_free_inodes_count' 'ext4_mb_good_group' '__count_memcg_events' 'd_instantiate_new' '__mod_memcg_state' 'kick_pool' 'process_scheduled_works' [ 26.610450][ T3078] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.624113][ T28] audit: type=1400 audit(1712512960.522:91): avc: denied { read } for pid=3078 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2024/04/07 18:02:40 starting 5 executor processes [ 27.230936][ T3089] chnl_net:caif_netlink_parms(): no params data found [ 27.282356][ T3093] chnl_net:caif_netlink_parms(): no params data found [ 27.300747][ T3094] chnl_net:caif_netlink_parms(): no params data found [ 27.366749][ T3089] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.373899][ T3089] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.381110][ T3089] bridge_slave_0: entered allmulticast mode [ 27.387355][ T3089] bridge_slave_0: entered promiscuous mode [ 27.397393][ T3089] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.404441][ T3089] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.411698][ T3089] bridge_slave_1: entered allmulticast mode [ 27.418097][ T3089] bridge_slave_1: entered promiscuous mode [ 27.457176][ T3093] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.464232][ T3093] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.471398][ T3093] bridge_slave_0: entered allmulticast mode [ 27.477677][ T3093] bridge_slave_0: entered promiscuous mode [ 27.491244][ T3101] chnl_net:caif_netlink_parms(): no params data found [ 27.500235][ T3089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.509363][ T3094] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.516426][ T3094] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.523637][ T3094] bridge_slave_0: entered allmulticast mode [ 27.530014][ T3094] bridge_slave_0: entered promiscuous mode [ 27.536249][ T3093] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.543294][ T3093] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.550428][ T3093] bridge_slave_1: entered allmulticast mode [ 27.556743][ T3093] bridge_slave_1: entered promiscuous mode [ 27.570101][ T3089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.579401][ T3094] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.586455][ T3094] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.593653][ T3094] bridge_slave_1: entered allmulticast mode [ 27.600064][ T3094] bridge_slave_1: entered promiscuous mode [ 27.612500][ T3100] chnl_net:caif_netlink_parms(): no params data found [ 27.636498][ T3093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.646512][ T3093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.672939][ T3089] team0: Port device team_slave_0 added [ 27.679708][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.692313][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.705907][ T3093] team0: Port device team_slave_0 added [ 27.712063][ T3093] team0: Port device team_slave_1 added [ 27.720322][ T3089] team0: Port device team_slave_1 added [ 27.759028][ T3089] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.766005][ T3089] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.791935][ T3089] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.807361][ T3094] team0: Port device team_slave_0 added [ 27.821419][ T3101] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.828583][ T3101] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.835791][ T3101] bridge_slave_0: entered allmulticast mode [ 27.841943][ T3101] bridge_slave_0: entered promiscuous mode [ 27.848694][ T3089] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.855646][ T3089] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.881655][ T3089] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.902544][ T3094] team0: Port device team_slave_1 added [ 27.912752][ T3093] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.919701][ T3093] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.945725][ T3093] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.956547][ T3101] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.963631][ T3101] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.970820][ T3101] bridge_slave_1: entered allmulticast mode [ 27.977331][ T3101] bridge_slave_1: entered promiscuous mode [ 27.992178][ T3100] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.999348][ T3100] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.006632][ T3100] bridge_slave_0: entered allmulticast mode [ 28.012976][ T3100] bridge_slave_0: entered promiscuous mode [ 28.024067][ T3094] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.031030][ T3094] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.056940][ T3094] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.067896][ T3093] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.074951][ T3093] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.100967][ T3093] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.117309][ T3101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.132729][ T3089] hsr_slave_0: entered promiscuous mode [ 28.138899][ T3089] hsr_slave_1: entered promiscuous mode [ 28.144790][ T3100] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.151917][ T3100] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.159114][ T3100] bridge_slave_1: entered allmulticast mode [ 28.165550][ T3100] bridge_slave_1: entered promiscuous mode [ 28.176424][ T3094] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.183383][ T3094] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.209319][ T3094] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.224607][ T3101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.244276][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.254668][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.273243][ T3101] team0: Port device team_slave_0 added [ 28.301419][ T3101] team0: Port device team_slave_1 added [ 28.317327][ T3094] hsr_slave_0: entered promiscuous mode [ 28.323210][ T3094] hsr_slave_1: entered promiscuous mode [ 28.329166][ T3094] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.336744][ T3094] Cannot create hsr debugfs directory [ 28.342710][ T3100] team0: Port device team_slave_0 added [ 28.349446][ T3100] team0: Port device team_slave_1 added [ 28.364805][ T3101] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.371869][ T3101] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.397756][ T3101] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.410173][ T3101] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.417146][ T3101] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.443044][ T3101] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.464295][ T3093] hsr_slave_0: entered promiscuous mode [ 28.470193][ T3093] hsr_slave_1: entered promiscuous mode [ 28.476044][ T3093] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.483568][ T3093] Cannot create hsr debugfs directory [ 28.499079][ T3100] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.506135][ T3100] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.532011][ T3100] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.543113][ T3100] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.550078][ T3100] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.575972][ T3100] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.627340][ T3101] hsr_slave_0: entered promiscuous mode [ 28.633289][ T3101] hsr_slave_1: entered promiscuous mode [ 28.639170][ T3101] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.646722][ T3101] Cannot create hsr debugfs directory [ 28.664179][ T3100] hsr_slave_0: entered promiscuous mode [ 28.670139][ T3100] hsr_slave_1: entered promiscuous mode [ 28.676021][ T3100] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.683567][ T3100] Cannot create hsr debugfs directory [ 28.749821][ T3093] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 28.759843][ T3093] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 28.768140][ T3093] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 28.781340][ T3093] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 28.806682][ T3094] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 28.814975][ T3094] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 28.823836][ T3094] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 28.832360][ T3094] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 28.860174][ T3089] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 28.868602][ T3089] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 28.888701][ T3089] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 28.902804][ T3101] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 28.911447][ T3101] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 28.927023][ T3089] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 28.937289][ T3101] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 28.956518][ T3101] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 28.970027][ T3100] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 28.978731][ T3100] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 28.987457][ T3100] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 28.997523][ T3093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.007667][ T3100] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 29.050060][ T3093] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.062700][ T3170] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.069780][ T3170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.079753][ T3170] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.086801][ T3170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.098074][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.113360][ T3094] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.128623][ T3170] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.135773][ T3170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.163634][ T3170] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.170720][ T3170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.182066][ T3089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.200532][ T3093] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.244642][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.255746][ T3089] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.268362][ T3100] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.281815][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.294750][ T3101] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.320233][ T3100] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.330667][ T3100] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.342739][ T3169] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.349792][ T3169] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.359240][ T3169] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.366334][ T3169] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.374764][ T3169] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.381912][ T3169] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.390897][ T3169] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.397968][ T3169] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.406716][ T3169] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.413751][ T3169] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.422876][ T3169] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.429913][ T3169] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.449107][ T3093] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.472251][ T3089] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.482665][ T3089] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.503892][ T3094] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.521083][ T3101] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.531645][ T3101] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.571090][ T3100] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.617884][ T3093] veth0_vlan: entered promiscuous mode [ 29.640398][ T3101] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.657947][ T3093] veth1_vlan: entered promiscuous mode [ 29.672101][ T3089] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.705817][ T3094] veth0_vlan: entered promiscuous mode [ 29.722224][ T3093] veth0_macvtap: entered promiscuous mode [ 29.736707][ T3094] veth1_vlan: entered promiscuous mode [ 29.744249][ T3093] veth1_macvtap: entered promiscuous mode [ 29.763432][ T3093] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.777697][ T3093] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.790381][ T3100] veth0_vlan: entered promiscuous mode [ 29.803197][ T3093] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.811958][ T3093] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.820795][ T3093] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.829483][ T3093] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.853978][ T3094] veth0_macvtap: entered promiscuous mode [ 29.862566][ T3094] veth1_macvtap: entered promiscuous mode [ 29.870787][ T3100] veth1_vlan: entered promiscuous mode [ 29.879667][ T3089] veth0_vlan: entered promiscuous mode [ 29.897376][ T3089] veth1_vlan: entered promiscuous mode [ 29.909216][ T3094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 29.919691][ T3094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 18:02:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ftruncate(r0, 0xc17a) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000005280)) [ 29.930343][ T3094] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.939882][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 29.939926][ T28] audit: type=1400 audit(1712512963.932:111): avc: denied { mounton } for pid=3093 comm="syz-executor.2" path="/dev/binderfs" dev="devtmpfs" ino=452 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 29.952057][ T3100] veth0_macvtap: entered promiscuous mode [ 29.986969][ T3094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 29.997591][ T3094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.004475][ T28] audit: type=1400 audit(1712512963.982:112): avc: denied { read write } for pid=3093 comm="syz-executor.2" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 30.009237][ T3094] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.031753][ T28] audit: type=1400 audit(1712512963.982:113): avc: denied { open } for pid=3093 comm="syz-executor.2" path="/dev/loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 30.041011][ T3101] veth0_vlan: entered promiscuous mode [ 30.063135][ T28] audit: type=1400 audit(1712512963.982:114): avc: denied { ioctl } for pid=3093 comm="syz-executor.2" path="/dev/loop2" dev="devtmpfs" ino=102 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 30.075764][ T3089] veth0_macvtap: entered promiscuous mode [ 30.094306][ T28] audit: type=1400 audit(1712512963.992:115): avc: denied { create } for pid=3233 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 30.103581][ T3100] veth1_macvtap: entered promiscuous mode [ 30.120007][ T28] audit: type=1400 audit(1712512963.992:116): avc: denied { connect } for pid=3233 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 30.143028][ T3094] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.145695][ T28] audit: type=1400 audit(1712512963.992:117): avc: denied { ioctl } for pid=3233 comm="syz-executor.2" path="socket:[3726]" dev="sockfs" ino=3726 ioctlcmd=0x7436 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 30.154338][ T3094] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.188135][ T3094] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.196909][ T3094] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.210154][ T28] audit: type=1400 audit(1712512964.202:118): avc: denied { write } for pid=3071 comm="syz-fuzzer" path="pipe:[1782]" dev="pipefs" ino=1782 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 30.214765][ T3089] veth1_macvtap: entered promiscuous mode 18:02:44 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) listen(r0, 0xfffffffb) 18:02:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x82000, 0x0, 0xfe, 0x0, &(0x7f0000000000)) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'prefer', '=static', @void}}}]}) [ 30.249006][ T3101] veth1_vlan: entered promiscuous mode [ 30.254571][ T28] audit: type=1400 audit(1712512964.242:119): avc: denied { create } for pid=3236 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 30.274630][ T28] audit: type=1400 audit(1712512964.242:120): avc: denied { bind } for pid=3236 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 30.278878][ T3240] tmpfs: Bad value for 'mpol' 18:02:44 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) lseek(r3, 0x7ffffc, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfd14) fallocate(r3, 0x100000003, 0x0, 0x28120001) [ 30.310128][ T3100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.320724][ T3100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.330898][ T3100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.341406][ T3100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.353556][ T3100] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.363803][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.374330][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.384243][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.394662][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 18:02:44 executing program 2: syz_emit_ethernet(0x6e, &(0x7f0000000900)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f4adf7", 0x38, 0x3a, 0x0, @private1, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "fd7d75", 0x0, 0x2f, 0x0, @loopback={0xff00000000000000}, @dev, [@srh]}}}}}}}, 0x0) [ 30.404549][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.414957][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.426462][ T3089] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.439745][ T3100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.450214][ T3100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 18:02:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000700)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x4, 0x23d, &(0x7f0000000a80)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) [ 30.460118][ T3100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.470607][ T3100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.482173][ T3248] loop2: detected capacity change from 0 to 128 [ 30.482317][ T3100] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.505770][ T3248] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 30.517103][ T3100] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.520356][ T3248] ext4 filesystem being mounted at /root/syzkaller-testdir1405739991/syzkaller.6umHEO/5/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 30.526504][ T3100] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 18:02:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) pwrite64(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x7fffffffffffffff) getsockopt$inet6_mptcp_buf(0xffffffffffffffff, 0x11c, 0x2, &(0x7f00000015c0)=""/163, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_PATHS(0xffffffffffffffff, 0xc0389423, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$tun(r1, &(0x7f0000000280)={@void, @void, @eth={@empty, @broadcast, @val={@void}, {@mpls_mc={0x8848, {[{}, {}], @ipv4=@gre={{0x5, 0x4, 0x0, 0x0, 0xd7, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1}, {{}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0, 0x0, 0x0], "b26c5839f51b8b84625665de943643be1b64da508b3a138aff042c9db72134927c54e3d240e55298208907e24b62f84480552cb85f9794f29be401704f6545a79104ebf12234c4cc0d834542c60eea05c5e69618591a87069c41a4ddeb8a60739fcd853138988aa45d0da165f9adb5dd4094a9575c07000000"}}}}}}}}, 0xf1) signalfd(r0, &(0x7f0000001800), 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r1, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:02:44 executing program 3: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000003c0)={@ifindex, 0xffffffffffffffff, 0x14, 0x0, 0x0, @prog_fd}, 0x20) [ 30.547189][ T3248] EXT4-fs error (device loop2): ext4_validate_inode_bitmap:106: comm syz-executor.2: Corrupt inode bitmap - block_group = 0, inode_bitmap = 19 [ 30.549722][ T3100] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.572934][ T3100] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.584118][ T3093] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 30.589257][ T3101] veth0_macvtap: entered promiscuous mode [ 30.601646][ T3101] veth1_macvtap: entered promiscuous mode 18:02:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ftruncate(r0, 0xc17a) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000005280)) 18:02:44 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x2, 0x2, 0x1) bind$unix(r0, &(0x7f0000000000)=@abs, 0x6e) r1 = socket(0x2, 0x2, 0x1) bind$unix(r1, &(0x7f0000000000)=@abs, 0x6e) close(r1) [ 30.609306][ T3101] ================================================================== [ 30.617396][ T3101] BUG: KCSAN: data-race in pcpu_alloc / pcpu_block_update_hint_alloc [ 30.625470][ T3101] [ 30.627793][ T3101] read-write to 0xffffffff883db4dc of 4 bytes by task 3094 on cpu 0: [ 30.635863][ T3101] pcpu_block_update_hint_alloc+0x5db/0x6a0 [ 30.641773][ T3101] pcpu_alloc_area+0x49f/0x4d0 [ 30.646546][ T3101] pcpu_alloc+0x4b3/0x10d0 [ 30.650963][ T3101] __alloc_percpu+0x24/0x30 [ 30.655470][ T3101] xt_percpu_counter_alloc+0x72/0x110 [ 30.660850][ T3101] translate_table+0x921/0xf70 [ 30.665620][ T3101] ipt_register_table+0x9a/0x430 [ 30.670565][ T3101] iptable_filter_table_init+0x88/0xb0 [ 30.676039][ T3101] xt_find_table_lock+0x194/0x260 [ 30.681084][ T3101] xt_request_find_table_lock+0x26/0xa0 [ 30.686646][ T3101] do_ipt_get_ctl+0x554/0xbe0 [ 30.691308][ T3101] nf_getsockopt+0x18c/0x1b0 [ 30.695893][ T3101] ip_getsockopt+0x12a/0x170 [ 30.700482][ T3101] tcp_getsockopt+0xaa/0xe0 [ 30.704968][ T3101] sock_common_getsockopt+0x5b/0x70 [ 30.710165][ T3101] do_sock_getsockopt+0x121/0x1a0 [ 30.715176][ T3101] __sys_getsockopt+0x19a/0x210 [ 30.720047][ T3101] __x64_sys_getsockopt+0x66/0x80 [ 30.725061][ T3101] do_syscall_64+0xd3/0x1d0 [ 30.729546][ T3101] entry_SYSCALL_64_after_hwframe+0x72/0x7a [ 30.735427][ T3101] [ 30.737754][ T3101] read to 0xffffffff883db4dc of 4 bytes by task 3101 on cpu 1: [ 30.745277][ T3101] pcpu_alloc+0x9aa/0x10d0 [ 30.749691][ T3101] __alloc_percpu_gfp+0x26/0x30 [ 30.754520][ T3101] fib_nh_common_init+0x48/0x2b0 [ 30.759453][ T3101] fib_nh_init+0x64/0x1b0 [ 30.763782][ T3101] fib_create_info+0xa26/0x1500 [ 30.768718][ T3101] fib_table_insert+0x101/0xfa0 [ 30.775227][ T3101] fib_magic+0x1a1/0x1f0 [ 30.779454][ T3101] fib_add_ifaddr+0xd5/0x330 [ 30.784029][ T3101] fib_netdev_event+0x34f/0x430 [ 30.788877][ T3101] raw_notifier_call_chain+0x6f/0x1d0 [ 30.794232][ T3101] call_netdevice_notifiers_info+0xae/0x100 [ 30.800123][ T3101] __dev_notify_flags+0xff/0x1a0 [ 30.805038][ T3101] dev_change_flags+0xab/0xd0 [ 30.809696][ T3101] do_setlink+0x841/0x2480 [ 30.814097][ T3101] rtnl_newlink+0x11a1/0x1690 [ 30.818774][ T3101] rtnetlink_rcv_msg+0x82e/0x8e0 [ 30.823703][ T3101] netlink_rcv_skb+0x12c/0x230 [ 30.828463][ T3101] rtnetlink_rcv+0x1c/0x30 [ 30.832877][ T3101] netlink_unicast+0x58d/0x660 [ 30.837660][ T3101] netlink_sendmsg+0x5d3/0x6e0 [ 30.842403][ T3101] __sock_sendmsg+0x140/0x180 [ 30.847062][ T3101] __sys_sendto+0x1e5/0x260 [ 30.851550][ T3101] __x64_sys_sendto+0x78/0x90 [ 30.856213][ T3101] do_syscall_64+0xd3/0x1d0 18:02:44 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x2, 0x2, 0x1) bind$unix(r0, &(0x7f0000000000)=@abs, 0x6e) r1 = socket(0x2, 0x2, 0x1) bind$unix(r1, &(0x7f0000000000)=@abs, 0x6e) close(r1) [ 30.860715][ T3101] entry_SYSCALL_64_after_hwframe+0x72/0x7a [ 30.866593][ T3101] [ 30.868901][ T3101] value changed: 0x0000000a -> 0x00000009 [ 30.874594][ T3101] [ 30.876903][ T3101] Reported by Kernel Concurrency Sanitizer on: [ 30.883044][ T3101] CPU: 1 PID: 3101 Comm: syz-executor.4 Not tainted 6.9.0-rc2-syzkaller-00435-g9fe30842a90b #0 [ 30.893362][ T3101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 30.903413][ T3101] ================================================================== [ 30.925312][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.935799][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.945669][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.956082][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 18:02:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0x20, r1, 0x1, 0x0, 0x0, {0x26}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}}, 0x0) 18:02:45 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000000900)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f4adf7", 0x38, 0x3a, 0x0, @private1, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "fd7d75", 0x0, 0x2f, 0x0, @loopback={0xff00000000000000}, @dev, [@srh]}}}}}}}, 0x0) [ 30.965946][ T3089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.976441][ T3089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.987393][ T3089] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.002440][ T3101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.013007][ T3101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 18:02:45 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x121801) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000100)={0x80, 0x1, 'client1\x00', 0xffffffff80000004, "00000000ffffffe3", "20e48560d99f00"}) write$sndseq(r0, &(0x7f00000000c0)=[{0x5, 0x3, 0x0, 0x0, @time, {}, {}, @time=@time={0x3}}], 0x1c) 18:02:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x4, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x6a, 0xa, 0xff00}, [@call={0x2e}, @exit, @map_fd={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x10, 0x0, 0x0, 0x25000000}, @jmp]}, &(0x7f0000000140)='GPL\x00', 0x2, 0x161, &(0x7f0000000180)=""/149, 0x0, 0x284, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffd84, 0x10, 0x0, 0x1e}, 0x2d) [ 31.023135][ T3101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.033825][ T3101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.043797][ T3101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.054373][ T3101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.064281][ T3101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 18:02:45 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) getsockopt$nfc_llcp(r0, 0x88, 0xb, 0x0, 0x205fffff) [ 31.074705][ T3101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.086570][ T3101] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.096979][ T3089] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.105804][ T3089] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.114519][ T3089] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 18:02:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000006c0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote, 0x9}, 0x1c, 0x0, 0x0, &(0x7f00000020c0)=ANY=[@ANYBLOB="38020000000000002900000036000000004300000000000004013f040100c910ff010000000000000000000000000001c910fc0000000000000000000000000000000001000740000000000e07010101000000010000000200000000000000000000000000000001000000010000002000000000000000ffffffff00000000ffffffffffffff7f06aeb07c1c192077cc9e7c45705803ad5588ca8b194d23f748fe792cfa3d32221f25d73b8ffe64a4ddda6efcfb7483b588194d29c7a04395d8500965a9a1d07879040c44db1d5d6f618d2ab920f0bf168ddc9acc6a51edd1235146d4ae8bf30f5f82a78e8114849ee8e37364560400000035bfa8197ef2ba99103ee5f5aae28ec5c8e2675db11530f5c466d55f2244d479dc653c854406155eada3eaeb90d39149b8d13bab75a9bd1452c8c76284b9ddfbeff41344e64f1771d78a706e1c5a6d63f1c954e24a1e73f75c26e9f09ec9b606cc3470f11c4842db651926bd2263a4a0a8fe80de8b2f9cb176e51819d5f4d10a5d1f0488d5e46953fbfd750f6137fbebe89a8d462158a87f9622355104b4f68d7a6d3ad85c373ea52a25afad37ffb743a5c361158087904b09fcc806d032bac00ee0e0251fc032446e45a3e12417ff4703526ffc45f71567857777927903799e0ba453334186009d22e38099c67b5350c7e82136bba947a18fb61d36fcba1f9efe3d79485d06252702833dc8ee417f40bb9064878fb89dd75a49135e5df148c4ad1e1d5626b44c8112d822f4c9a05e693fd5ae5595627f8684016b37a2bf6d0040030000000000002900000037000000006500000000000000fb1a63687c244e6df3aecb13d6eb957495b669cc032f6d0a11a5e16eed9937b046c9dc1a61dcf9754b767df4735c3f8c37b4d5cd15a99c5a19cc62c921ad4e90d6e3695ec1891223a53600d5031b5735acafb556e22279975f958ad437c76573e544506e58455772eb11493af933099a5dc7e9e0c8b907e68e23e59d7b94bc774309e2047132758b60955301f277a9032b0bc47e660b243e9e2126733f13ab99055a0999068ada35a38d105a5efe6c7115774effe28695ecae3944413b7764eefde26ed571d857b2cb2dd1b2a4a84c1fec0799cf90f57f7a6d35e2b60cd425b9372ae4a27f453e5d7da2eacd3b98cdb10cec9152d5829c2511eb0f9600a0cd280f3d08849b6cd43d25e3dcd62f7c7dee6123a2682daf4aa9a856b31e9204c5c2b80b84dbeec05d93a64a550f1ebc326488cd620c6fe1aa266a0ce5b24be03b5037786e037cc85ed61f362e081fb694e12e54fcb9eb0f86d6d91fd159023a073278f84d6ada8f9aa25ec223d268f3291b25392c941740932bd1a82f40a8fc586db23d2f6240ce883e3c1dc1e0d07fc3aa73a9ac82a1538d129c9e66cb6a8100abe95bc4064581e8c01ce65ba3ea751db5d8c0a1173fe62b2fd2d415042a97ade4d274a466b6d997eed6bf5d7a305ead804c36b9e1c314b26676ed83412417610d3cf4d07e5b24cf3de9c790ae93850e0f8bba047b710cf340c78a80cef5f6665a647681ff5f7b6ecce8ab65e26406b6a6e0e72ff8501c545bffc00f034dc3a5b251390ae68bb61d936dc9a24e6f66c72e7911c51c716dfd4304566fb32e6c2745d232f990d0bbe0ddf9dc58398dda292c07b16da766a37c60bd9993b4f21e641036a8afa2ccdb47d7990d5a007faccb2f86664179f2e229723bce870aec3f7f4e529c92add713590ce6c0ea1a0499fb76d32636cfd18b6b39fb48f1a6d46f6ae8f45c47ee8260f9531070d170ab92739be0bdf5b76f8a9b93a5e550dfecab79d2e46085a67024b6be883c79ade2873458fda5a7f4eb62b05634356ee3b45723f4cff19c654ad441ff5b8792df7f18d841c351e195151b1b3532e742a6525c86efdb29653f35ce8e0a41c8c6d39f39531e13aeb1172893eeedd83b6afb939f8e6abc5482696aa48918000000000000002900000037"], 0x590}}], 0x1, 0x8008801) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [], 0xa, "3bf718d407efd5e1dcc7526a928a17beefc2c21bb3a90320d06665498e74950f68f35b9281082cdacabac1b320cde248d59faa0b50ec0fa8a7220343a75b160d9e16582a0df15a98b2ad"}, 0x55) [ 31.123429][ T3089] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.135394][ T3101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.145955][ T3101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.155830][ T3101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.166271][ T3101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 18:02:45 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x2, 0x2, 0x1) bind$unix(r0, &(0x7f0000000000)=@abs, 0x6e) r1 = socket(0x2, 0x2, 0x1) bind$unix(r1, &(0x7f0000000000)=@abs, 0x6e) close(r1) [ 31.176181][ T3101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.180114][ T3273] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 31.186611][ T3101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.186627][ T3101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 18:02:45 executing program 3: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000140)={0x1, &(0x7f0000000180)=[{0x28}]}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, &(0x7f0000000080)) 18:02:45 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000000900)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f4adf7", 0x38, 0x3a, 0x0, @private1, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "fd7d75", 0x0, 0x2f, 0x0, @loopback={0xff00000000000000}, @dev, [@srh]}}}}}}}, 0x0) 18:02:45 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x121801) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000100)={0x80, 0x1, 'client1\x00', 0xffffffff80000004, "00000000ffffffe3", "20e48560d99f00"}) write$sndseq(r0, &(0x7f00000000c0)=[{0x5, 0x3, 0x0, 0x0, @time, {}, {}, @time=@time={0x3}}], 0x1c) [ 31.186640][ T3101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.188565][ T3101] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.237955][ T3101] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.246720][ T3101] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.255657][ T3101] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.264471][ T3101] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 18:02:45 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x4, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x6a, 0xa, 0xff00}, [@call={0x2e}, @exit, @map_fd={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x10, 0x0, 0x0, 0x25000000}, @jmp]}, &(0x7f0000000140)='GPL\x00', 0x2, 0x161, &(0x7f0000000180)=""/149, 0x0, 0x284, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffd84, 0x10, 0x0, 0x1e}, 0x2d) 18:02:45 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x85, &(0x7f0000000000)={r2, @in={{0x2, 0x0, @empty}}, 0x27c0}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xd0}, 0x9c) 18:02:45 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCFLSH(r0, 0x4b45, 0x2) 18:02:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000006c0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote, 0x9}, 0x1c, 0x0, 0x0, &(0x7f00000020c0)=ANY=[@ANYBLOB="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"], 0x590}}], 0x1, 0x8008801) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [], 0xa, "3bf718d407efd5e1dcc7526a928a17beefc2c21bb3a90320d06665498e74950f68f35b9281082cdacabac1b320cde248d59faa0b50ec0fa8a7220343a75b160d9e16582a0df15a98b2ad"}, 0x55) 18:02:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000380)=@nat={'nat\x00', 0x1b, 0x5, 0x420, 0x280, 0x280, 0xffffffff, 0x1c8, 0xf8, 0x280, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0xb0, 0xf8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@socket0={{0x20}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4, @port, @icmp_id}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@remote, @ipv6=@loopback, @gre_key}}}, {{@ip={@loopback, @broadcast, 0x0, 0x0, 'team_slave_1\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@osf={{0x50}, {'syz0\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@multicast1, @ipv4=@loopback, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x480) 18:02:45 executing program 3: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x2284, 0x0) 18:02:45 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'ip6tnl0\x00', 0x79}) 18:02:45 executing program 2: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000140)={0x1, &(0x7f0000000180)=[{0x28}]}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, &(0x7f0000000080)) 18:02:45 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x121801) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000100)={0x80, 0x1, 'client1\x00', 0xffffffff80000004, "00000000ffffffe3", "20e48560d99f00"}) write$sndseq(r0, &(0x7f00000000c0)=[{0x5, 0x3, 0x0, 0x0, @time, {}, {}, @time=@time={0x3}}], 0x1c) 18:02:45 executing program 4: syz_emit_ethernet(0x6e, &(0x7f0000000900)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f4adf7", 0x38, 0x3a, 0x0, @private1, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "fd7d75", 0x0, 0x2f, 0x0, @loopback={0xff00000000000000}, @dev, [@srh]}}}}}}}, 0x0) 18:02:45 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0) [ 31.432145][ T3297] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure 18:02:45 executing program 1: timer_create(0x3, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x989680}}, 0x0) r0 = socket(0x10, 0x803, 0x4) timer_create(0x3, &(0x7f0000000080)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000000c0)=0x0) timer_settime(r1, 0x1, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) [ 31.473904][ T3169] ------------[ cut here ]------------ [ 31.479436][ T3169] WARNING: CPU: 1 PID: 3169 at drivers/scsi/sg.c:2236 sg_remove_sfp_usercontext+0x3cd/0x3f0 [ 31.489732][ T3169] Modules linked in: [ 31.493675][ T3169] CPU: 1 PID: 3169 Comm: kworker/1:3 Not tainted 6.9.0-rc2-syzkaller-00435-g9fe30842a90b #0 [ 31.504013][ T3169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 31.514215][ T3169] Workqueue: events sg_remove_sfp_usercontext [ 31.520458][ T3169] RIP: 0010:sg_remove_sfp_usercontext+0x3cd/0x3f0 [ 31.526929][ T3169] Code: e1 fe 4c 89 ff e8 33 c4 f8 ff 31 ff e8 fc 10 d5 fe 48 83 c4 28 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 e4 af e1 fe 90 <0f> 0b 90 e9 36 ff ff ff e8 d6 af e1 fe 48 89 df be 03 00 00 00 e8 [ 31.546589][ T3169] RSP: 0018:ffffc90000fb3d10 EFLAGS: 00010293 [ 31.546596][ T3308] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3308 comm=syz-executor.1 [ 31.552649][ T3169] RAX: ffffffff824c713c RBX: ffff888101e0e998 RCX: ffff888115d01080 [ 31.552667][ T3169] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 31.581649][ T3169] RBP: 0000000000000002 R08: ffffffff824c706d R09: 0000000000000000 [ 31.589689][ T3169] R10: 00018881168c2000 R11: 00018881168c3fff R12: ffff8881168c2060 [ 31.597698][ T3169] R13: ffff8881168c2000 R14: ffff888101e0e900 R15: ffff888101e9c000 [ 31.605706][ T3169] FS: 0000000000000000(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 [ 31.614714][ T3169] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 18:02:45 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_ABORT_ATOMIC_WRITE(r0, 0x541b, 0xffffa45fffff) 18:02:45 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000006c0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote, 0x9}, 0x1c, 0x0, 0x0, &(0x7f00000020c0)=ANY=[@ANYBLOB="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"], 0x590}}], 0x1, 0x8008801) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [], 0xa, "3bf718d407efd5e1dcc7526a928a17beefc2c21bb3a90320d06665498e74950f68f35b9281082cdacabac1b320cde248d59faa0b50ec0fa8a7220343a75b160d9e16582a0df15a98b2ad"}, 0x55) [ 31.621358][ T3169] CR2: 0000001b2ca22000 CR3: 0000000006032000 CR4: 00000000003506f0 [ 31.629460][ T3169] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 31.637480][ T3169] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 31.645540][ T3169] Call Trace: [ 31.648821][ T3169] [ 31.651815][ T3169] ? __warn+0x13c/0x350 [ 31.656162][ T3169] ? report_bug+0x315/0x420 [ 31.660683][ T3169] ? sg_remove_sfp_usercontext+0x3cd/0x3f0 [ 31.666617][ T3169] ? handle_bug+0x3e/0x70 18:02:45 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCFLSH(r0, 0x4b45, 0x2) 18:02:45 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$packet(0x11, 0x3, 0x300) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='net_prio.prioidx\x00', 0x275a, 0x0) dup3(r3, r2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) [ 31.670983][ T3169] ? exc_invalid_op+0x1a/0x50 [ 31.675798][ T3169] ? asm_exc_invalid_op+0x1a/0x20 [ 31.680906][ T3169] ? sg_remove_sfp_usercontext+0x2fd/0x3f0 [ 31.686807][ T3169] ? sg_remove_sfp_usercontext+0x3cc/0x3f0 [ 31.692650][ T3169] ? sg_remove_sfp_usercontext+0x3cd/0x3f0 [ 31.698560][ T3169] process_scheduled_works+0x465/0x990 [ 31.704105][ T3169] worker_thread+0x526/0x730 [ 31.708739][ T3169] ? _raw_spin_lock_irqsave+0x3c/0xb0 [ 31.714172][ T3169] ? __pfx_worker_thread+0x10/0x10 [ 31.719436][ T3169] kthread+0x1d1/0x210 18:02:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000380)=@nat={'nat\x00', 0x1b, 0x5, 0x420, 0x280, 0x280, 0xffffffff, 0x1c8, 0xf8, 0x280, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0xb0, 0xf8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@socket0={{0x20}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4, @port, @icmp_id}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@remote, @ipv6=@loopback, @gre_key}}}, {{@ip={@loopback, @broadcast, 0x0, 0x0, 'team_slave_1\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@osf={{0x50}, {'syz0\x00'}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@multicast1, @ipv4=@loopback, @icmp_id, @gre_key}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x480) 18:02:45 executing program 1: keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000180)=[{0xfffffffffffffffc}], 0x1, 0x0) 18:02:45 executing program 1: r0 = socket(0x28, 0x5, 0x0) r1 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080), 0x10) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="1b", 0x40000}], 0x1}}], 0x1, 0x0) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) recvfrom$unix(r2, &(0x7f0000000280)=""/240, 0x40000, 0x2, 0x0, 0x0) 18:02:45 executing program 0: timer_create(0x3, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x989680}}, 0x0) r0 = socket(0x10, 0x803, 0x4) timer_create(0x3, &(0x7f0000000080)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000000c0)=0x0) timer_settime(r1, 0x1, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) 18:02:45 executing program 4: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000140)={0x1, &(0x7f0000000180)=[{0x28}]}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, &(0x7f0000000080)) [ 31.723525][ T3169] ? __pfx_kthread+0x10/0x10 [ 31.728249][ T3169] ret_from_fork+0x4b/0x60 [ 31.732678][ T3169] ? __pfx_kthread+0x10/0x10 [ 31.737411][ T3169] ret_from_fork_asm+0x1a/0x30 [ 31.742315][ T3169] [ 31.745367][ T3169] ---[ end trace 0000000000000000 ]--- 18:02:45 executing program 2: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x2284, 0x0) 18:02:45 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) listen(r0, 0xfffffffb) 18:02:45 executing program 4: rename(0x0, 0x0) r0 = socket(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)=0x8) 18:02:45 executing program 3: keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000180)=[{0xfffffffffffffffc}], 0x1, 0x0) 18:02:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000100)=0x1b5, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfecc) sendfile(r0, r1, &(0x7f00000000c0), 0x4) recvmmsg(r0, &(0x7f0000004c80)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/186, 0xba}], 0x1}}], 0x1, 0x22000, 0x0) 18:02:45 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_ABORT_ATOMIC_WRITE(r0, 0x541b, 0xffffa45fffff) 18:02:45 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCFLSH(r0, 0x4b45, 0x2) [ 31.834852][ T3331] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3331 comm=syz-executor.0 18:02:45 executing program 3: mknod(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) open$dir(&(0x7f0000000280)='./bus\x00', 0x260001, 0x0) r2 = open(&(0x7f00000002c0)='./bus\x00', 0x60102, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000cc0)="e1", 0xfffffecc}], 0x1) splice(r0, 0x0, r2, 0x0, 0xffffffe1, 0x0) 18:02:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x7ff}, {0x80}, {0x6, 0x0, 0x0, 0x80}]}, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) 18:02:45 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) listen(r0, 0xfffffffb) 18:02:45 executing program 0: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x2284, 0x0) 18:02:45 executing program 2: r0 = socket(0x28, 0x5, 0x0) r1 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080), 0x10) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="1b", 0x40000}], 0x1}}], 0x1, 0x0) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) recvfrom$unix(r2, &(0x7f0000000280)=""/240, 0x40000, 0x2, 0x0, 0x0) 18:02:45 executing program 4: timer_create(0x3, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x989680}}, 0x0) r0 = socket(0x10, 0x803, 0x4) timer_create(0x3, &(0x7f0000000080)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000000c0)=0x0) timer_settime(r1, 0x1, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) 18:02:45 executing program 0: keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000180)=[{0xfffffffffffffffc}], 0x1, 0x0) 18:02:45 executing program 1: rename(0x0, 0x0) r0 = socket(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)=0x8) 18:02:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)="580000001400192340834b80040d8c560a0677bc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000a04fcff", 0x58}], 0x1) 18:02:45 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCFLSH(r0, 0x4b45, 0x2) 18:02:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'netdevsim0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x3, 0x261, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000080)=@udp, 0x2}, 0x20) 18:02:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x7ff}, {0x80}, {0x6, 0x0, 0x0, 0x80}]}, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) 18:02:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_FT_IES(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f00000012c0)={0x44, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_IE={0x27, 0x2a, [@rann={0x7e, 0x60, {{}, 0x0, 0x0, @device_b}}, @mesh_config={0x71, 0x7}, @sec_chan_ofs={0x3e, 0x1}]}]}, 0x44}}, 0x0) 18:02:46 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x54, 0x12, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0xc8}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x3, "11000000"}]}, 0x54}}, 0x0) 18:02:46 executing program 4: r0 = syz_clone(0x17020500, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_pidfd_open(r0, 0x0) r2 = pidfd_getfd(r1, r1, 0x0) setns(r2, 0x66020000) r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002a80)='ns/cgroup\x00') ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) 18:02:46 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x88}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x64f25913, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r0, &(0x7f0000000400)="fb"}, 0x20) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001880)=@newlink={0x148, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x118, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x108, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x58, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1ff, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfff, 0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x151}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4ab, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x65b, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x80000001, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0xffff0000}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x4, 0x2}}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xa54, 0x18}}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x800}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x6}}]}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x10000, 0x10010}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x68}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x95ee}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x8001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x101, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xae7f, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x6}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x148}, 0x1, 0xba01}, 0x0) 18:02:46 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r0}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x8, 0xb, &(0x7f0000000340)=""/233, 0x0, 0x11}, 0x80) [ 32.002919][ T3360] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3360 comm=syz-executor.4 [ 32.024057][ T3366] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list 18:02:46 executing program 3: r0 = socket(0x28, 0x5, 0x0) r1 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080), 0x10) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="1b", 0x40000}], 0x1}}], 0x1, 0x0) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) recvfrom$unix(r2, &(0x7f0000000280)=""/240, 0x40000, 0x2, 0x0, 0x0) 18:02:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)="580000001400192340834b80040d8c560a0677bc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000a04fcff", 0x58}], 0x1) 18:02:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) pwrite64(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x7fffffffffffffff) getsockopt$inet6_mptcp_buf(0xffffffffffffffff, 0x11c, 0x2, &(0x7f00000015c0)=""/163, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_PATHS(0xffffffffffffffff, 0xc0389423, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$tun(r1, &(0x7f0000000280)={@void, @void, @eth={@empty, @broadcast, @val={@void}, {@mpls_mc={0x8848, {[{}, {}], @ipv4=@gre={{0x5, 0x4, 0x0, 0x0, 0xd7, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1}, {{}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0, 0x0, 0x0], "b26c5839f51b8b84625665de943643be1b64da508b3a138aff042c9db72134927c54e3d240e55298208907e24b62f84480552cb85f9794f29be401704f6545a79104ebf12234c4cc0d834542c60eea05c5e69618591a87069c41a4ddeb8a60739fcd853138988aa45d0da165f9adb5dd4094a9575c07000000"}}}}}}}}, 0xf1) signalfd(r0, &(0x7f0000001800), 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r1, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:02:46 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) unshare(0x22020400) ppoll(&(0x7f0000000140)=[{r0}], 0x1, 0x0, 0x0, 0x0) 18:02:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_FT_IES(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f00000012c0)={0x44, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_IE={0x27, 0x2a, [@rann={0x7e, 0x60, {{}, 0x0, 0x0, @device_b}}, @mesh_config={0x71, 0x7}, @sec_chan_ofs={0x3e, 0x1}]}]}, 0x44}}, 0x0) 18:02:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x7ff}, {0x80}, {0x6, 0x0, 0x0, 0x80}]}, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) 18:02:46 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x0, 0x18c, 0x203, 0x4d000000, 0x19030000, 0x460, 0x2e0, 0x2e0, 0x460, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x300, 0x348, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x16}]}}, @common=@hl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@private, 'veth1_macvtap\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) [ 32.122408][ T3378] syz-executor.0 (3378) used greatest stack depth: 10976 bytes left 18:02:46 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r0}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x8, 0xb, &(0x7f0000000340)=""/233, 0x0, 0x11}, 0x80) 18:02:46 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x18, 0x1401, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 18:02:46 executing program 2: r0 = syz_clone(0x17020500, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_pidfd_open(r0, 0x0) r2 = pidfd_getfd(r1, r1, 0x0) setns(r2, 0x66020000) r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002a80)='ns/cgroup\x00') ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) 18:02:46 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x88}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x64f25913, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r0, &(0x7f0000000400)="fb"}, 0x20) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001880)=@newlink={0x148, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x118, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x108, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x58, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1ff, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfff, 0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x151}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4ab, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x65b, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x80000001, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0xffff0000}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x4, 0x2}}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xa54, 0x18}}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x800}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x6}}]}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x10000, 0x10010}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x68}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x95ee}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x8001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x101, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xae7f, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x6}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x148}, 0x1, 0xba01}, 0x0) 18:02:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)="580000001400192340834b80040d8c560a0677bc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000a04fcff", 0x58}], 0x1) 18:02:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) pwrite64(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x7fffffffffffffff) getsockopt$inet6_mptcp_buf(0xffffffffffffffff, 0x11c, 0x2, &(0x7f00000015c0)=""/163, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_PATHS(0xffffffffffffffff, 0xc0389423, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$tun(r1, &(0x7f0000000280)={@void, @void, @eth={@empty, @broadcast, @val={@void}, {@mpls_mc={0x8848, {[{}, {}], @ipv4=@gre={{0x5, 0x4, 0x0, 0x0, 0xd7, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1}, {{}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0, 0x0, 0x0], "b26c5839f51b8b84625665de943643be1b64da508b3a138aff042c9db72134927c54e3d240e55298208907e24b62f84480552cb85f9794f29be401704f6545a79104ebf12234c4cc0d834542c60eea05c5e69618591a87069c41a4ddeb8a60739fcd853138988aa45d0da165f9adb5dd4094a9575c07000000"}}}}}}}}, 0xf1) signalfd(r0, &(0x7f0000001800), 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r1, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:02:46 executing program 1: r0 = socket(0x28, 0x5, 0x0) r1 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r1, 0x0) connect$vsock_stream(r0, &(0x7f0000000080), 0x10) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="1b", 0x40000}], 0x1}}], 0x1, 0x0) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) recvfrom$unix(r2, &(0x7f0000000280)=""/240, 0x40000, 0x2, 0x0, 0x0) 18:02:46 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x88}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x64f25913, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r0, &(0x7f0000000400)="fb"}, 0x20) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001880)=@newlink={0x148, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x118, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x108, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x58, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1ff, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfff, 0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x151}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4ab, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x65b, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x80000001, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0xffff0000}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x4, 0x2}}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xa54, 0x18}}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x800}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x6}}]}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x10000, 0x10010}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x68}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x95ee}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x8001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x101, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xae7f, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x6}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x148}, 0x1, 0xba01}, 0x0) 18:02:46 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x88}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x64f25913, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r0, &(0x7f0000000400)="fb"}, 0x20) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001880)=@newlink={0x148, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x118, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x108, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x58, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1ff, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfff, 0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x151}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4ab, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x65b, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x80000001, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0xffff0000}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x4, 0x2}}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xa54, 0x18}}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x800}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x6}}]}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x10000, 0x10010}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x68}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x95ee}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x8001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x101, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xae7f, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x6}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x148}, 0x1, 0xba01}, 0x0) 18:02:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ftruncate(r0, 0xc17a) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000005280)) 18:02:46 executing program 4: r0 = syz_clone(0x17020500, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_pidfd_open(r0, 0x0) r2 = pidfd_getfd(r1, r1, 0x0) setns(r2, 0x66020000) r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002a80)='ns/cgroup\x00') ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) 18:02:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000680)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="73d8000000001f000000000000030000", @ANYRES32=0x0, @ANYBLOB="21002500000000000000080045e3ff1300000000042f"]}) 18:02:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_FT_IES(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f00000012c0)={0x44, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_IE={0x27, 0x2a, [@rann={0x7e, 0x60, {{}, 0x0, 0x0, @device_b}}, @mesh_config={0x71, 0x7}, @sec_chan_ofs={0x3e, 0x1}]}]}, 0x44}}, 0x0) 18:02:46 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r0}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x8, 0xb, &(0x7f0000000340)=""/233, 0x0, 0x11}, 0x80) 18:02:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x0, 0x18c, 0x203, 0x4d000000, 0x19030000, 0x460, 0x2e0, 0x2e0, 0x460, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x300, 0x348, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x16}]}}, @common=@hl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@private, 'veth1_macvtap\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) 18:02:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x88}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x64f25913, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r0, &(0x7f0000000400)="fb"}, 0x20) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001880)=@newlink={0x148, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x118, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x108, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x58, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1ff, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfff, 0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x151}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4ab, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x65b, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x80000001, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0xffff0000}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x4, 0x2}}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xa54, 0x18}}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x800}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x6}}]}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x10000, 0x10010}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x68}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x95ee}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x8001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x101, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xae7f, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x6}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x148}, 0x1, 0xba01}, 0x0) 18:02:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)="580000001400192340834b80040d8c560a0677bc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000a04fcff", 0x58}], 0x1) 18:02:46 executing program 4: r0 = memfd_create(&(0x7f0000000d00)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x05\x00\x00\x00\x00\x00\x00\x00_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8o8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd93\xf0y\xd6\xb0\xf2\x9f\xa7\xcf\xad\x86\\\xec\xec\xd6\x9d\bT\xcd\xa2\xea', 0xe) read(r0, &(0x7f0000000240)=""/32, 0x20) 18:02:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, 0x0, 0x0) 18:02:46 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x88}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x64f25913, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r0, &(0x7f0000000400)="fb"}, 0x20) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001880)=@newlink={0x148, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x118, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x108, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x58, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1ff, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfff, 0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x151}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4ab, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x65b, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x80000001, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0xffff0000}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x4, 0x2}}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xa54, 0x18}}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x800}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x6}}]}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x10000, 0x10010}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x68}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x95ee}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x8001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x101, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xae7f, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x6}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x148}, 0x1, 0xba01}, 0x0) 18:02:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$TCSETSF(r0, 0x5406, 0x0) 18:02:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$bt_hci(r0, 0x84, 0x7f, &(0x7f0000000080)=""/4057, &(0x7f0000001180)=0xfd9) 18:02:46 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x20, 0x30}, 0xc) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000180)="1a", 0x1, 0x0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000c80)="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", 0x34000, 0xbcff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0), 0xc) sendto$inet6(r1, &(0x7f0000000140)='$', 0x1, 0x20054, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 18:02:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000200)="580000001400192340834b80040d8c560a0677bc45ff810500000000000058000b480400945f64009400050028925a69000000000000008000f0fffeffe809000000fff5dd0000001000010008081000418e00004004fcff", 0x58}], 0x1) 18:02:46 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r0}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x8, 0xb, &(0x7f0000000340)=""/233, 0x0, 0x11}, 0x80) 18:02:46 executing program 4: r0 = syz_clone(0x17020500, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_pidfd_open(r0, 0x0) r2 = pidfd_getfd(r1, r1, 0x0) setns(r2, 0x66020000) r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002a80)='ns/cgroup\x00') ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) 18:02:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x0, 0x18c, 0x203, 0x4d000000, 0x19030000, 0x460, 0x2e0, 0x2e0, 0x460, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x300, 0x348, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x16}]}}, @common=@hl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@private, 'veth1_macvtap\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) 18:02:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x88}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x64f25913, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r0, &(0x7f0000000400)="fb"}, 0x20) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001880)=@newlink={0x148, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x118, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x108, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x58, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1ff, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfff, 0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x151}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4ab, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x65b, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x80000001, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0xffff0000}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x4, 0x2}}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xa54, 0x18}}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x800}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x6}}]}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x10000, 0x10010}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x68}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x95ee}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x8001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x101, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xae7f, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x6}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x148}, 0x1, 0xba01}, 0x0) 18:02:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x92}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) 18:02:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, 0x0, 0x0) 18:02:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x88}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x64f25913, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4}, 0x48) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r0, &(0x7f0000000400)="fb"}, 0x20) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001880)=@newlink={0x148, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x118, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x108, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x58, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1ff, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xfff, 0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x151}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4ab, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x65b, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x80000001, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0xffff0000}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x4, 0x2}}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xa54, 0x18}}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x800}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x6}}]}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x10000, 0x10010}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x68}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x95ee}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3, 0x8001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x101, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xae7f, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x6}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x148}, 0x1, 0xba01}, 0x0) 18:02:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$TCSETSF(r0, 0x5406, 0x0) 18:02:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0x20, r1, 0x1, 0x0, 0x0, {0x26}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}}, 0x0) 18:02:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000200)="580000001400192340834b80040d8c560a0677bc45ff810500000000000058000b480400945f64009400050028925a69000000000000008000f0fffeffe809000000fff5dd0000001000010008081000418e00004004fcff", 0x58}], 0x1) 18:02:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) creat(&(0x7f0000000e00)='./file2aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000240)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000480)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x20}, 0x5000) dup3(r1, r0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000480)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x20}, 0x5000) 18:02:46 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x0, 0x18c, 0x203, 0x4d000000, 0x19030000, 0x460, 0x2e0, 0x2e0, 0x460, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x300, 0x348, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x16}]}}, @common=@hl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@private, 'veth1_macvtap\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) 18:02:46 executing program 4: 18:02:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000040)='./file0\x00', 0x300001a, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES64], 0xd, 0x2a3, &(0x7f00000001c0)="$eJzs3c9qK2UUAPAzyTSNukgQN4rggC5clVu3bhrlCmJXSgR1ocF7L0gSLrQQsIKxqz6BS9/DR3DjxjcQ3Aru2kVlZDIzTULTP9SYQv39Vof55pzvZL6SrnLmq9fHwyfPkzg+/T3a7SQae7EXZ0l0oxG1HyINAODhOMvz+Cu/S2baWH83AMAmlP//S/fdCwCwGZ989vlHvf39xx9nWTte7ZxM+klEjE8m/XK99yy+iVE8jUfRifOI/EIZf/Dh/uNIs0I33hpPJ/0ic/zlr1X93p8Rs/zd6ER3df5uVlrIn076W/FiZNF7tlW32olXVue/syI/+q14+82F/neiE799Hc9jFE+iyJ3nf7+bZe/nP55+90WxTZGfNKK/PbtvLm9u8lwAAAAAAAAAAAAAAAAAAAAAAHjYdrIsKcf3zOb3FJeq+TvN89n6TlbrLs/nKfOTulA5HyiPakTPNI+f6vk6j7Isy6sb5/lpvJZ6sQAAAAAAAAAAAAAAAAAAAAAUDr89Gg5Go6cHawnqaQD1z/rvWmdv4cobcTQcNK8uuH37vRanDRS9XntzpGms6bHcFLxQ9LP2ytvzw/00yqA+mLXu9fJ7ZdGj4SCrluqHPBwkN+3Vrg/u5/lSpK34t43lsz+J83z5TNsXrS5ntdb0NFovrVz6O8/z29V594/yjKoryWzExu1236qClR+wCNqXz+KXqwte+ZXRXMsXDwAAAAAAAAAAAAAAAAAAcMn8R78rFo+vTW38Z00BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwIbN3/9fB+2IWL5yKZhWydfdUwWtODi8548IAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA/8A/AQAA//8EJ08+") perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x14507e, 0x0) 18:02:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, 0x0, 0x0) 18:02:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x24, 0x0, 0x0) 18:02:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000180)=0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x85, &(0x7f0000000000)={r2, @in={{0x2, 0x0, @empty}}, 0x27c0}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xd0}, 0x9c) 18:02:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') lseek(r0, 0xfffffffffffffffe, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x0) 18:02:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x4, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x6a, 0xa, 0xff00}, [@call={0x2e}, @exit, @map_fd={0x18, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x10, 0x0, 0x0, 0x25000000}, @jmp]}, &(0x7f0000000140)='GPL\x00', 0x2, 0x161, &(0x7f0000000180)=""/149, 0x0, 0x284, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffd84, 0x10, 0x0, 0x1e}, 0x2d) 18:02:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$TCSETSF(r0, 0x5406, 0x0) 18:02:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0x20, r1, 0x1, 0x0, 0x0, {0x26}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}}, 0x0) 18:02:46 executing program 0: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x15}) timerfd_settime(r1, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r0, &(0x7f0000000100)=[{}], 0x1, 0x4007f, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x9}) 18:02:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000200)="580000001400192340834b80040d8c560a0677bc45ff810500000000000058000b480400945f64009400050028925a69000000000000008000f0fffeffe809000000fff5dd0000001000010008081000418e00004004fcff", 0x58}], 0x1) 18:02:46 executing program 4: ioperm(0x0, 0x7, 0x7) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4\x00', 0x0, 0x0) [ 32.722914][ T3480] loop3: detected capacity change from 0 to 256 18:02:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, 0x0, 0x0) 18:02:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x24, 0x0, 0x0) 18:02:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f0000000080), 0x4) 18:02:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x801, 0x0, 0x0) 18:02:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$TCSETSF(r0, 0x5406, 0x0) 18:02:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x60, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0xa}, @NFTA_EXTHDR_LEN={0x8, 0x4, 0x1, 0x0, 0x66}, @NFTA_EXTHDR_TYPE={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xd4}}, 0x0) 18:02:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0xffff}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x90, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x68, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0x16}, @NFTA_CT_DIRECTION={0x5}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0xd}]}}}, {0x3c, 0x1, 0x0, 0x1, @meta={{0x9}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x15}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x10}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x7}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x16}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x104}}, 0x48800) 18:02:46 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x1) ioctl$TIOCGSOFTCAR(r0, 0x89f3, 0xfffffffffffffffd) 18:02:46 executing program 2: r0 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000001a40)=[{&(0x7f0000000000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="8d", 0x1}], 0x1}], 0x1, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x76, &(0x7f0000000080)={r2}, 0x8) 18:02:46 executing program 4: r0 = timerfd_create(0x0, 0x0) unshare(0x400) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{0x77359400}, {0x0, 0x989680}}, 0x0) timerfd_gettime(r0, 0x0) 18:02:46 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0xfe1d, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @dev}]}, &(0x7f0000000440)=0x10) 18:02:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x801, 0x0, 0x0) 18:02:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ftruncate(r0, 0xc17a) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000005280)) 18:02:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x24, 0x0, 0x0) 18:02:46 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) listen(0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000047000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x3, 0x8000, 0x1}, 0x48) 18:02:46 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r0 = socket(0x11, 0x2, 0x0) getsockopt$nfc_llcp(r0, 0x107, 0x8, 0x0, 0x20000000) 18:02:46 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xd, 0xb, &(0x7f0000000040)=@framed={{}, [@printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xb2}}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x90) 18:02:46 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x0, 0x2}, @jmp={0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) 18:02:46 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000b200000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) 18:02:46 executing program 1: r0 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000001a40)=[{&(0x7f0000000000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="8d", 0x1}], 0x1}], 0x1, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x76, &(0x7f0000000080)={r2}, 0x8) 18:02:47 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='selinuxfs\x00', 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000002480)=""/232, 0xe8) 18:02:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x24, 0x0, 0x0) 18:02:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x801, 0x0, 0x0) 18:02:47 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x4, &(0x7f0000003e00)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x64}]}, &(0x7f0000000040)='GPL\x00'}, 0x90) 18:02:47 executing program 3: syz_emit_ethernet(0x8e, &(0x7f0000000000)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f700", 0x58, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "fd9063", 0x0, 0x2c, 0x0, @mcast1, @loopback={0x0, 0xffffac1414aa}, [@routing={0x0, 0x4, 0x0, 0x0, 0x0, [@private2, @mcast1]}]}}}}}}}, 0x0) 18:02:47 executing program 2: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000007000000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000000000000850000001a00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 18:02:47 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, 0x0) 18:02:47 executing program 3: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@map=0x1, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 18:02:47 executing program 1: r0 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000001a40)=[{&(0x7f0000000000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="8d", 0x1}], 0x1}], 0x1, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x76, &(0x7f0000000080)={r2}, 0x8) 18:02:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}]}, @NFT_MSG_NEWSETELEM={0x3c, 0x1e, 0xa, 0x105, 0x0, 0x0, {0x7}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x4}, @NFTA_SET_ELEM_KEY={0x4}]}]}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0xc0}}, 0x0) 18:02:47 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) symlinkat(0x0, 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00') 18:02:47 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000180)='3', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00', 0x9) write$binfmt_elf64(r0, &(0x7f0000001580)=ANY=[], 0x40e2) 18:02:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x801, 0x0, 0x0) 18:02:47 executing program 0: syz_emit_ethernet(0x8e, &(0x7f0000000000)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f700", 0x58, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "fd9063", 0x0, 0x2c, 0x0, @mcast1, @loopback={0x0, 0xffffac1414aa}, [@routing={0x0, 0x4, 0x0, 0x0, 0x0, [@private2, @mcast1]}]}}}}}}}, 0x0) 18:02:47 executing program 3: unshare(0x22020400) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 18:02:47 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='selinuxfs\x00', 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000002480)=""/232, 0xe8) 18:02:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f0000000080)=""/151, 0x97) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) 18:02:47 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, 0x0) 18:02:47 executing program 3: r0 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000001a40)=[{&(0x7f0000000000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="8d", 0x1}], 0x1}], 0x1, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x76, &(0x7f0000000080)={r2}, 0x8) 18:02:47 executing program 4: syz_read_part_table(0x5ed, &(0x7f0000000600)="$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") mount$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000180)={'filter\x00', 0x7, 0x4, 0x1fffffbf, 0x220, 0x220, 0x220, 0x330, 0x330, 0x330, 0x4, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @remote, @remote}}}, {{@arp={@multicast2, @loopback, 0x0, 0x0, 0x0, 0x0, {@mac=@multicast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'netdevsim0\x00', 'dvmrp1\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @local, @remote}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="32baa0ff85d5", @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x468) 18:02:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}]}, @NFT_MSG_NEWSETELEM={0x3c, 0x1e, 0xa, 0x105, 0x0, 0x0, {0x7}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x4}, @NFTA_SET_ELEM_KEY={0x4}]}]}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0xc0}}, 0x0) 18:02:47 executing program 3: capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@map=0x1, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 18:02:47 executing program 1: syz_emit_ethernet(0x8e, &(0x7f0000000000)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f700", 0x58, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "fd9063", 0x0, 0x2c, 0x0, @mcast1, @loopback={0x0, 0xffffac1414aa}, [@routing={0x0, 0x4, 0x0, 0x0, 0x0, [@private2, @mcast1]}]}}}}}}}, 0x0) 18:02:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0xee01) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, 0x0, &(0x7f0000000080)) 18:02:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@getnexthop={0x20, 0x6a, 0xb0d, 0x0, 0x0, {0x3, 0x0, 0x0, 0x2}, [@NHA_MASTER={0x8, 0xe}]}, 0x20}}, 0x0) 18:02:47 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000180)='3', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00', 0x9) write$binfmt_elf64(r0, &(0x7f0000001580)=ANY=[], 0x40e2) 18:02:47 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, 0x0) [ 33.234692][ T3575] loop4: detected capacity change from 0 to 2048 18:02:47 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = dup3(r1, r0, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000240)={0x1d, r4}, 0x18) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r3, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x4c}}, 0x0) sendmsg$can_j1939(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x1d, 0x0, 0x0, {}, 0xff}, 0x18, &(0x7f0000000280)={0x0}}, 0x0) 18:02:47 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='selinuxfs\x00', 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000002480)=""/232, 0xe8) 18:02:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}]}, @NFT_MSG_NEWSETELEM={0x3c, 0x1e, 0xa, 0x105, 0x0, 0x0, {0x7}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x4}, @NFTA_SET_ELEM_KEY={0x4}]}]}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0xc0}}, 0x0) 18:02:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) utimensat(r0, 0x0, &(0x7f0000000040)={{0x0, 0xea60}, {0x0, 0x3ffffffe}}, 0x0) 18:02:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbf22}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x3, &(0x7f0000000040)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x20000000}, @exit], &(0x7f0000000000)='GPL\x00', 0x3, 0xe5, &(0x7f0000000240)=""/229, 0x0, 0x17}, 0x80) 18:02:47 executing program 2: syz_emit_ethernet(0x8e, &(0x7f0000000000)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f700", 0x58, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "fd9063", 0x0, 0x2c, 0x0, @mcast1, @loopback={0x0, 0xffffac1414aa}, [@routing={0x0, 0x4, 0x0, 0x0, 0x0, [@private2, @mcast1]}]}}}}}}}, 0x0) 18:02:47 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x203, 0x8401) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "ec59dc5d72795ee9711e26a702d4e7a14019d24773a7cefe76e263a443e8c0ad0c73c049796fef70bf76dd7dcc21c3556810a6e989f2a694d414cbf13171724b7f5432e86cb60a905f573c876f6ee7def7b164bb812e29b3f0ba51303cbbd51d0eee700bf6419114c322503b8d339b4b9f809ecb0ccc3d9c1e6a0ddd9df6e1244716541137654482d00241999f6426641feca790e79c4b977b83b3f39c4269be09c492ad17d173206b7e5517a742348e5a41ad0f25c77c8cb2b73de92781ba2290b0b2415e0544caac3b12866b27fbeae2f8b22e164a177da1bc6991d38725b36f2e028d9bd91dad315ec97ba2cb7f9383afce6894cb56535bca0c970263bbcb"}) ioctl$USBDEVFS_SUBMITURB(r1, 0x802c550a, &(0x7f0000000080)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 18:02:47 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, 0x0) 18:02:47 executing program 1: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='selinuxfs\x00', 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000002480)=""/232, 0xe8) 18:02:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000a40)={0x14}, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000380)=""/156, 0x9c}], 0x1}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_USC={0x10}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000009240)={&(0x7f0000002a40)=ANY=[@ANYBLOB='D\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r2, @ANYBLOB="00000300000000000b0000000b0001006367726f7570000014000200100003"], 0x44}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) 18:02:47 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000380)={0x7fffffff, 0x0, 'client0\x00', 0x0, "8cb1233e7226e9b5", "83db88ff7e29e6add8d1b3a74c64b9e3a848a3b0d41788693b2c19c8a61ecbf7"}) 18:02:47 executing program 1: r0 = memfd_create(&(0x7f0000000d00)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x05\x00\x00\x00\x00\x00\x00\x00_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8o8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd93\xf0y\xd6\xb0\xf2\x9f\xa7\xcf\xad\x86\\\xec\xec\xd6\x9d\bT\xcd\xa2\xea', 0xe) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xffffff1f, 0x12, r1, 0x0) io_setup(0x5dc, &(0x7f0000000500)=0x0) io_submit(r2, 0x1, &(0x7f0000000940)=[&(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000540)="1a", 0x1}]) [ 33.498248][ T3610] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3610 comm=syz-executor.2 [ 33.514542][ T3610] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:02:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000040)={[{@grpquota}, {@resgid}, {@barrier_val={'barrier', 0x3d, 0x80}}, {@max_batch_time={'max_batch_time', 0x3d, 0x3}}, {@lazytime}, {@jqfmt_vfsold}, {@usrquota}, {@data_err_abort}]}, 0x1, 0x5e8, &(0x7f0000000600)="$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") [ 33.578707][ T3610] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 33.595178][ T3610] Zero length message leads to an empty skb 18:02:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) utimensat(r0, 0x0, &(0x7f0000000040)={{0x0, 0xea60}, {0x0, 0x3ffffffe}}, 0x0) [ 33.632102][ T3616] loop2: detected capacity change from 0 to 1024 [ 33.646932][ T3616] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 18:02:47 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$evdev(&(0x7f0000001100), 0x0, 0x0) ioctl$EVIOCSABS3F(r0, 0x80284504, 0x0) 18:02:47 executing program 1: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x40, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x14, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8}, @TCA_FQ_FLOW_MAX_RATE={0x8}]}}]}, 0x40}}, 0x0) [ 33.671288][ T3616] EXT4-fs error (device loop2): ext4_ext_check_inode:520: inode #3: comm syz-executor.2: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 33.690051][ T3616] EXT4-fs error (device loop2): ext4_quota_enable:7063: comm syz-executor.2: Bad quota inode: 3, type: 0 [ 33.706605][ T3616] EXT4-fs warning (device loop2): ext4_enable_quotas:7104: Failed to enable quota tracking (type=0, err=-117, ino=3). Please run e2fsck to fix. [ 33.722948][ T3616] EXT4-fs (loop2): mount failed 18:02:47 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = open(&(0x7f0000000100)='.\x00', 0x555502, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) dup3(r4, r3, 0x0) 18:02:47 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000002800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2042, 0x0) [ 33.742552][ T3623] sch_fq: defrate 0 ignored. 18:02:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000a40)={0x14}, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000380)=""/156, 0x9c}], 0x1}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_USC={0x10}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000009240)={&(0x7f0000002a40)=ANY=[@ANYBLOB='D\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r2, @ANYBLOB="00000300000000000b0000000b0001006367726f7570000014000200100003"], 0x44}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) 18:02:47 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141440080002007f0020010c00028005000100000000001c00228008000340000000000800014000000000080002400000000