last executing test programs: 4.184540592s ago: executing program 2 (id=962): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x4) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xe4776000) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000240)='./file1\x00', &(0x7f0000000040)='./file0\x00') r0 = syz_io_uring_setup(0x10e, &(0x7f0000000140)={0x0, 0x334e, 0x10, 0x3, 0x801}, &(0x7f00000003c0)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000040)='./file0/file0\x00', 0x60, 0x208100}) io_uring_enter(r0, 0x7277, 0x0, 0x28, 0x0, 0x0) mount$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='nr\x00']) creat(&(0x7f0000000080)='./bus\x00', 0x154) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x8c, &(0x7f0000000440)='trans=rdma,') bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x7, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x20, 0x10, &(0x7f0000000000)={0x0, 0x5}, 0xfffffffffffffd00}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) 4.125079276s ago: executing program 2 (id=963): r0 = syz_io_uring_setup(0x1104, &(0x7f0000000300)={0x0, 0x0, 0x80, 0x0, 0x8000021e}, &(0x7f00000001c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200, 0x0, 0x1}) keyctl$link(0x8, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x100000000008, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0x26d, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x100000000008, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0x26d, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_io_uring_complete(r1) (async) syz_io_uring_complete(r1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)=0x0) syz_open_procfs(r3, &(0x7f0000000140)='fdinfo/3\x00') (async) r4 = syz_open_procfs(r3, &(0x7f0000000140)='fdinfo/3\x00') setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f00000003c0)=0x5, 0x4) exit(0x9) (async) exit(0x9) preadv(r4, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/175, 0xaf}], 0x1, 0x1, 0x0) io_uring_enter(r0, 0x47fa, 0x0, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_TEST(r4, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0xb, 0x6, 0x5, 0x0, 0x0, {0x3, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0xc0}, 0x0) io_uring_register$IORING_UNREGISTER_PBUF_RING(r0, 0x17, &(0x7f0000000000)={0x0}, 0x1) 2.981473624s ago: executing program 2 (id=973): mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x14) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000100)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000140)="ea323941fbe1ce607e874b1105e0e300b67a47805e796e30799b02a3edd9d4e72f71f6d6d66caf37dfeb27f8715ad4187e0c7bd91f0109e5fa59226a916ab55721418410d63e9280b62fc4119cb0a1580e4d351d55ec4272c9da2c8f5b22444e6dd4f668683dcb392988061bc3d7ad05e6ed759eba46667eee4211cdc7adfbc6f8ea62", 0x83}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES8, @ANYBLOB="e00000017f00000100000000c40000000000000000000000070000008635000000030112bd7feb9262a479c4917d51542a39cfb9060e1adaa9129181b43b12402b60060feb6bb7b92cbf8d7b2115828ffe07237c64010101ac1414bbe0000001ffffffffe0000002e000000200000000ffffffff00863800000000060527315505020104fe1905111073dfd3a0bde8a5246a6af27c33270602020f35b8b5390efb0d6ee29df8a1890205e7d5a9070f4764010100ac1414aaac1e000194040000830f29ffffffffe0000001ac1e00010000000000"], 0x208}, 0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0057cdbf8a68e018a6fc129e2f3f3744854abad68382ea843e91692f382347ea2c8c51a848eb007c4abed86a796b2222e030cd01e86dffed4ad5c0877fad45522c4ed3008a6903c8b71750230ee979b93850d69a7cd84e4bfcb0cb65efb1597b42d46c10c96a215b1bad2001ab4f9d031093da"], 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x20040010) 2.978188664s ago: executing program 2 (id=976): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000004500), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000}]}}) r3 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f0000000100)={0x2a, 0x803, 0x14, 0x3, 0x7fffffff, 0x2, 0x4baf, 0xd22}, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000100)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = socket$unix(0x1, 0x1, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r10 = creat(&(0x7f0000000080)='./bus\x00', 0x0) mount$9p_virtio(0x0, &(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0, 0x2008002, 0x0) fsetxattr$system_posix_acl(r10, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="020000"], 0xfe44, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000b40)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0x80000, {0x0, 0x0, 0x0, r9, {0x0, 0x9}, {0x5, 0xb}, {0xffe0, 0x3}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x10, 0x3}}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x2000c061}, 0x4008000) socket$kcm(0x11, 0x3, 0x0) r11 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) r12 = openat$selinux_policy(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r12, 0x0) write$selinux_load(r11, &(0x7f0000000000)=ANY=[], 0x190ec) shutdown(r4, 0x1) write$P9_RVERSION(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="150000006bffff", @ANYRESHEX=r2], 0x15) 2.690089141s ago: executing program 2 (id=984): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@newtclass={0x24, 0x28, 0x0, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x9, 0x4}, {0x4, 0xfffc}, {0xb, 0xf}}}, 0x24}}, 0x80800) r0 = syz_clone(0x111, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setsig(0x4203, r0, 0x1, &(0x7f0000000140)={0x1b, 0x7, 0x7}) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/ip_vs_stats_percpu\x00') r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYRESOCT=0x0, @ANYRESHEX=r1, @ANYBLOB="0000000000000000280012800b00010065727370616e0000180002800400120008009400090000000500160000000000140003006e"], 0x5c}, 0x1, 0x0, 0x0, 0x8c1}, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000080)=0x9, 0x8, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 2.638638424s ago: executing program 2 (id=987): r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_user(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x10}, 0x4322, 0x3, 0x2}) 1.444984375s ago: executing program 4 (id=1035): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x4) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xe4776000) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) mount$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='nr\x00']) creat(&(0x7f0000000080)='./bus\x00', 0x154) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x8c, &(0x7f0000000440)='trans=rdma,') bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x7, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x20, 0x10, &(0x7f0000000000)={0x0, 0x5}, 0xfffffffffffffd00}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000200)={0x9, &(0x7f0000000140)=[{0x8, 0x4, 0x3, 0x3}, {0x2, 0x81, 0x3, 0x9}, {0x9d1b, 0x8, 0xdc, 0xfffffffe}, {0x5, 0x0, 0x81, 0x800}, {0x7, 0x1, 0x5, 0x10}, {0x5, 0x2, 0x9, 0x3}, {0x5, 0x5, 0x7, 0x900000}, {0xf, 0x7, 0x8, 0x181c}, {0x2, 0x6, 0xff, 0x4}]}) 1.424141996s ago: executing program 4 (id=1037): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x24020000) syz_clone3(0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x4000000ffb, 0x3) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r2 = socket(0x1d, 0x2, 0x2) bind$inet(r2, &(0x7f00000000c0)={0x1d, 0x4e20, @loopback}, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000800)=ANY=[@ANYBLOB="90020000", @ANYRES16=0x0, @ANYBLOB="000900000000ffdbdf2502000000080001004cca436bcf610eaaa449f662b8bd77eee852f967be5a7dac890a5fb18fdd8b0d732b33777087ac24d854aa56a41042bd05eaea7535267f407771bcdb5238b09482eaa31361f49b9f117757379109d7437a5d02b8306fffda84d1cddaeedc483fa631c82015e594d5cf3c80acc5aac02723cfec4362e07dad51362d8c68abb8673c209d4d8bd4d4a547af786eb87a34fce6cbe4390091f43a524fec67191c9a5c28b81559decea9c442245194331a5e7db16640846156d6d7849297d66e4c671e06e1da56e45d78", @ANYRES32=0x0, @ANYBLOB="a401028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000900000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000050003000300000008000400010000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="44000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000014000400430008e900f8ffff0700000f018000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b00040072616e646f6d00003c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000009000400686173680000000008000100", @ANYRES32=0x0, @ANYBLOB="3c00028038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000800000008000100", @ANYRES32=0x0, @ANYBLOB="840002803c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000009000400686173680000000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000110004006163746976656261636b757000000000"], 0x290}, 0x1, 0x0, 0x0, 0x40}, 0x40) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000bc0)=@delchain={0x1f8, 0x65, 0x2, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x8, 0x2}, {0x0, 0x1}, {0x5}}, [@TCA_CHAIN={0x8, 0xb, 0x4}, @TCA_RATE={0x6, 0x5, {0xb, 0x40}}, @filter_kind_options=@f_bpf={{0x8}, {0x1bc, 0x2, [@TCA_BPF_FD={0x8}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_ACT={0x19c, 0x1, [@m_simple={0x30, 0x1e, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_simple={0x10c, 0x7, 0x0, 0x0, {{0xb}, {0x1c, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x9, 0x4, 0x10000000, 0x633, 0xe2d}}]}, {0xc7, 0x6, "9787c29d6ac649e7ec160dfef7c4cea330102e688fe12213d2bfb320865cee27f05adfbc7dae04880a34e7bf775010128401ec5a80f551da79136f2a4ff74f3588c03c976e1c54366c6747dbbdd2e1e0d6da659b84a2ea14191b4223d2b6eeb465498ad518ee2114b5e4ab0d52289fe809788321e04d9b1d9f82a03fbb49229585f49ce943954da5ad28e25a9ba91b24d4c96612e2188dd3fa1dea6994033514d8f93add809a6ee955d65ac8c2ae97714a5c600000ddb671382ebf29bf9b3697264083"}, {0xc, 0x7, {0x0, 0x79d0f023c2b305dd}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_mpls={0x5c, 0x13, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x400, 0x33c9, 0x3, 0x6, 0x5}, 0x3}}]}, {0x11, 0x6, "df76640d30b6ba21699aad3d08"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2}}}}]}, @TCA_BPF_FLAGS_GEN={0x8, 0x9, 0x1}]}}]}, 0x1f8}}, 0x20004880) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x8, 0x3, 0x2a8, 0x158, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3e0, 0xffffffff, 0xffffffff, 0x3e0, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [0x0, 0x0, 0x0, 0xff], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xe0, 0x100, 0x0, {}, [@common=@unspec=@connbytes={{0x38}, {[{0x2}, {0x7f}], 0x2, 0x2}}]}, @unspec=@NOTRACK={0x20}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [0x0, 0xffffffff], [], 'erspan0\x00', 'gre0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x308) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GET(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000540)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000fbfbdf25270000000e0001006e655f64657673696d0000000f0002006e657464657673696d3000001c0053"], 0x50}, 0x1, 0x0, 0x0, 0x24040011}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="0f00000000000000b30000000000000000000091"]) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x8, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x6, 0x1}, 0x0, 0x80034, 0x101, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x803, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) r7 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0xfffffffffffffff7]}, 0x8, 0x80000) mount$9p_fd(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESDEC=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7]) 1.423476276s ago: executing program 0 (id=1047): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_io_uring_complete(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xd, 0xb, &(0x7f00000004c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @sock_ops=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x9, 0x7ffc1ffb}]}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000280)=0x10000, 0x4) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x34000, 0xe0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x5, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000850000001100000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x3a) r3 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x17, &(0x7f0000000100)=r0, 0x4) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000080)=@in6={0xa, 0x4e22, 0x0, @mcast2}, 0x80, 0x0}, 0xb80b) sendmsg$kcm(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x80) 1.392627068s ago: executing program 4 (id=1039): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000}]}}) r3 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f0000000100)={0x2a, 0x803, 0x14, 0x3, 0x7fffffff, 0x2, 0x4baf, 0xd22}, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000100)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = socket$unix(0x1, 0x1, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r10 = creat(&(0x7f0000000080)='./bus\x00', 0x0) mount$9p_virtio(0x0, &(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0, 0x2008002, 0x0) fsetxattr$system_posix_acl(r10, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="020000"], 0xfe44, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000b40)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0x80000, {0x0, 0x0, 0x0, r9, {0x0, 0x9}, {0x5, 0xb}, {0xffe0, 0x3}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x10, 0x3}}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x2000c061}, 0x4008000) socket$kcm(0x11, 0x3, 0x0) r11 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) r12 = openat$selinux_policy(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r12, 0x0) write$selinux_load(r11, &(0x7f0000000000)=ANY=[], 0x190ec) shutdown(r4, 0x1) write$P9_RVERSION(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="150000006bffff", @ANYRESHEX=r2], 0x15) 1.384706908s ago: executing program 0 (id=1040): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001480), 0x42002, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r1, &(0x7f0000000400)={&(0x7f00000008c0)=@id={0x1e, 0x3, 0x1, {0x4e24}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x20) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) close(r6) writev(r7, &(0x7f0000000200)=[{&(0x7f0000000100)="19", 0x3a4e1e905c56cdb7}], 0x1) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x5}}, @NFT_MSG_DELSET={0x28, 0xb, 0xa, 0x407, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x1}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x10}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x64}, 0x1, 0x0, 0x0, 0x44814}, 0x48854) sendfile(r0, r8, 0x0, 0x20000023892) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r5, 0x0, 0x0, 0x4, 0x0, {0xa, 0x4e22, 0x401, @loopback, 0x2}}}, 0x3a) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 1.246362927s ago: executing program 4 (id=1041): syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x10880, &(0x7f0000000000)={[{@i_version}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xffffffffffff13e7}}]}, 0x4, 0x261, &(0x7f0000001040)="$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") openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x800, 0x0) r1 = socket(0x18, 0x3, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) sendto$inet(r2, &(0x7f0000000000), 0xffffffffffffff94, 0xe8, 0x0, 0x0) r3 = io_uring_setup(0x7d1, &(0x7f0000000580)={0x0, 0xddf9, 0x2, 0xfffffffe, 0x183}) close_range(r3, r3, 0x0) recvfrom$inet(r2, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) unshare(0x2040400) bind$bt_l2cap(r1, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x8004587d, &(0x7f00000001c0)={@desc={0x1, 0x0, @desc4}}) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) 722.663828ms ago: executing program 1 (id=1052): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=@newqdisc={0x4c, 0x24, 0xf0b, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, r1, {0x0, 0x3}, {0xffff, 0xffff}, {0xd}}, [@qdisc_kind_options=@q_codel={{0xa}, {0x2a, 0x2, [@TCA_CODEL_LIMIT={0x8, 0x2, 0x3}, @TCA_CODEL_ECN={0x8, 0x4, 0x1}, @TCA_CODEL_INTERVAL={0x8, 0x3, 0x4}]}}, @TCA_INGRESS_BLOCK={0x0, 0xd, 0x2}]}, 0x4c}}, 0x4000) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x4) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r2, &(0x7f0000000000)={0x18, 0x2, {0x3, @local}}, 0x1e) bind$pptp(r2, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xe4776000) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) mount$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='nr\x00']) creat(&(0x7f0000000080)='./bus\x00', 0x154) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x18, 0x8, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0xa, 0x0, 0x0, 0x1}, @generic={0x5, 0x0, 0x0, 0x3}, @jmp, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000100)='GPL\x00'}, 0x90) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x8c, &(0x7f0000000440)='trans=rdma,') bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x7, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x20, 0x10, &(0x7f0000000000)={0x0, 0x5}, 0xfffffffffffffd00}, 0x48) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000200)={0x5, &(0x7f0000000140)=[{0x2, 0xa0, 0x9, 0x4}, {0x9, 0xd4, 0x9c, 0xa1c3}, {0x4, 0x7, 0x46, 0x8}, {0xfffd, 0xf9, 0x0, 0x5}, {0x1, 0x0, 0xa2, 0xffffffff}]}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x40000000000004, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xe, @mcast1, 0x6}, {0xa, 0x4e23, 0x7, @remote, 0x3}, r5, 0x7}}, 0x48) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, 0x0, 0x0) 694.236999ms ago: executing program 3 (id=1053): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000}]}}) r3 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f0000000100)={0x2a, 0x803, 0x14, 0x3, 0x7fffffff, 0x2, 0x4baf, 0xd22}, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000100)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = socket$unix(0x1, 0x1, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r10 = creat(&(0x7f0000000080)='./bus\x00', 0x0) mount$9p_virtio(0x0, &(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0, 0x2008002, 0x0) fsetxattr$system_posix_acl(r10, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="020000"], 0xfe44, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000b40)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0x80000, {0x0, 0x0, 0x0, r9, {0x0, 0x9}, {0x5, 0xb}, {0xffe0, 0x3}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x10, 0x3}}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x2000c061}, 0x4008000) socket$kcm(0x11, 0x3, 0x0) r11 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) r12 = openat$selinux_policy(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r12, 0x0) write$selinux_load(r11, &(0x7f0000000000)=ANY=[], 0x190ec) shutdown(r4, 0x1) write$P9_RVERSION(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="150000006bffff", @ANYRESHEX=r2], 0x15) 397.614477ms ago: executing program 4 (id=1054): listen(0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x1) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffff, 0xfff3}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=@gettaction={0x158, 0x32, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@action_gd=@TCA_ACT_TAB={0x54, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x10000}}, {0x14, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0x10, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x5c, 0x1, [{0x10, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x18, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x14, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x10, 0x3, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x200}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8}, @action_gd=@TCA_ACT_TAB={0x70, 0x1, [{0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffb}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0x10, 0x10, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7fffffff}}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x8848}, 0x200048c4) r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0xa772da54, 0x5, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x1954, 0x300, 0x4}, &(0x7f0000000300)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x49, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r6, 0x6e2, 0x3900, 0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x4e, 0x1, 0x0) 396.171747ms ago: executing program 0 (id=1064): r0 = semget$private(0x0, 0x7, 0x191) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendmmsg$inet6(r1, &(0x7f00000063c0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x110, @dev={0xfe, 0x80, '\x00', 0x3e}, 0x9}, 0x1c, 0x0}}], 0x1, 0x20040000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000000000004f32b190b2171f17fa3d5b33f8000000bb31355704cbfa46005000000095000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socket(0x2, 0x80805, 0x0) socket(0x2, 0x80805, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @remote}, 0x6}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x7, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x2, 0x3, 0x28, 0x64, 0x0, 0x7, 0x6, 0x0, @remote, @remote}, {{0x4e22, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x2, 0x0, 0xe7}}}}}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000300)={@local, @random='?\x00', @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x2, 0x23, 0x28, 0x64, 0x0, 0x7, 0x6, 0x0, @remote, @remote}, {{0x4e22, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x7, 0x0, 0x67}}}}}}, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000004500), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_9p2000}]}}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_PEER_GET(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0d030000200000000000130000000c00098006000200"], 0x20}}, 0x0) write$P9_RVERSION(r5, &(0x7f0000000080)=ANY=[@ANYBLOB="150000006bffff", @ANYRES16=r4, @ANYRESHEX=r5], 0x15) sendmmsg$inet6(r1, &(0x7f0000004cc0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x1ff, @private0, 0x401}, 0x1c, &(0x7f00000001c0)=[{&(0x7f00000003c0)="f6", 0x1}], 0x1}}], 0x1, 0x10) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x8d40, 0x0) ioctl$TIOCPKT(r8, 0x5420, &(0x7f0000000140)) shutdown(r1, 0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000200)={0x0, 0x6, 0x1ff}, 0x8) semtimedop(r0, &(0x7f0000000200)=[{0x0, 0xffff, 0x3000}, {0x2, 0xfffa}], 0x2, 0x0) semtimedop(r0, &(0x7f00000001c0)=[{0x0, 0x9, 0x800}, {0x2, 0xce, 0x800}], 0x2, 0x0) 395.774137ms ago: executing program 1 (id=1055): semget$private(0x0, 0x7, 0x191) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendmmsg$inet6(r0, &(0x7f00000063c0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x110, @dev={0xfe, 0x80, '\x00', 0x3e}, 0x9}, 0x1c, &(0x7f0000000400)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1}}], 0x1, 0x20040000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000000000004f32b190b2171f17fa3d5b33f8000000bb31355704cbfa46005000000095000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) socket(0x2, 0x80805, 0x0) socket(0x2, 0x80805, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @remote}, 0x6}, 0x1c) syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x2, 0x3, 0x28, 0x64, 0x0, 0x7, 0x6, 0x0, @remote, @remote}, {{0x4e22, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x2, 0x0, 0xe7}}}}}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000300)={@local, @random='?\x00', @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x2, 0x23, 0x28, 0x64, 0x0, 0x7, 0x6, 0x0, @remote, @remote}, {{0x4e22, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x7, 0x0, 0x67}}}}}}, 0x0) (fail_nth: 4) 395.331497ms ago: executing program 3 (id=1056): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x4) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xe4776000) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) mount$tmpfs(0x0, 0x0, 0x0, 0x400, &(0x7f0000000100)=ANY=[@ANYRESDEC=r0, @ANYRES64=r0]) creat(&(0x7f0000000080)='./bus\x00', 0x154) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x8c, &(0x7f0000000440)='trans=rdma,') syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000001000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x4c40, &(0x7f0000000000), 0xfe, 0x27a, &(0x7f0000000980)="$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") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000040)={0x0, 0x0, 0xfd8e, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0xee01, 0x0) capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000340)) quotactl$Q_QUOTAON(0xffffffff80000201, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000010000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000116608ffff0000100018000000000000000000000000000a009500000000000000360a020000000001180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0xa, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x23, &(0x7f0000000140), &(0x7f0000000200)=0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r4 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc89d, 0xc000, 0x8, 0x20204}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1d, 0x4, 0x1, 0xbf22, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x200002, 0x1}, 0x50) io_uring_enter(r4, 0x2219, 0x7721, 0x16, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x13f}}, 0x20) 175.20174ms ago: executing program 3 (id=1057): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x20000000, '\x00', 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f00000003c0)='%ps \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r1}, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1f, 0x18, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffe}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @printk={@d, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xb0}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f0000000380)={[{@acl}]}, 0x1, 0x561, &(0x7f0000000f80)="$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") setxattr$incfs_metadata(&(0x7f0000000240)='./file1\x00', &(0x7f0000000000), &(0x7f00000002c0)="ff7f000000000000000000004406e8a5c812ca847e3bf9b837c9", 0x1a, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000180), &(0x7f0000000000)=ANY=[], 0x361, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000340)=ANY=[], 0xfe37, 0x0) 174.39333ms ago: executing program 1 (id=1058): syz_emit_ethernet(0x19b, &(0x7f0000000240)={@link_local, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "010120", 0x165, 0x3a, 0xff, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x11, "a78ce54006598080a8030037004023493b87aafaffffffffffffff23732472ee7d52d6c7d1855239575290b4fa45ad96489269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af18029f905a4749110cd9719a8ca3ff877a6857f6d6d0ad1bf6a3ee399a9dee29f4ede150ca9656dd2bd2daade5f676551f"}, {0x0, 0x1, "000000000400260004000000"}, {0x1, 0x1, "fe906d17efe3"}, {0x5, 0x15, "3aad9f93e98bf99e296930e2e3c099068e2fce7b36acbf672f42b2074101e6a38afb25e2e18279765a1ec77d4be2957688bbfb1d9f20c32e4f7c1a94d199b0e25d6984490d877fcac2adf6de1d80eb3a28f6df6d4ee49c8635ef774cf1a63c356391d82fd9afbd344309eb6e5c243e815896eeb6108b3828580577afcac0eec1fc5c299394b6688d8e895e28deceb6274e3b5ca1161dabef40f6aa6f2dae7e1afa3084309df45b297e74"}, {0x22, 0x0, "00b75cd9"}]}}}}}}, 0x0) 151.003521ms ago: executing program 3 (id=1059): mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x14) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000100)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000140)="ea323941fbe1ce607e874b1105e0e300b67a47805e796e30799b02a3edd9d4e72f71f6d6d66caf37dfeb27f8715ad4187e0c7bd91f0109e5fa59226a916ab55721418410d63e9280b62fc4119cb0a1580e4d351d55ec4272c9da2c8f5b22444e6dd4f668683dcb392988061bc3d7ad05e6ed759eba46667eee4211cdc7adfbc6f8ea62", 0x83}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="11000000000000000000000001000000060600000000000000000000000000000000000001000000de27000000000000300000000000000000000000070000000001940401009404000001e412567c36840a8dee5c810000000102036a8905d8ad1e44240c40000000df83afa8b598e875124e5b0c060000000100000007000000060000e7e20000000200000002000680008651fffffffe020f07c51c8d0ed3f6a254550e3cd1efe3d959b2060339050c4e3f8b82386d0f9dbb9f01046a90020c67f08508b9fd72f997a70010d5d26cb56c0bb87435de9773b5fd050d78c5c971d34edcc1ca80bc010101862700000003060a84c4d8120297d056050cfe465568e68ba6e0f5990707742ff4b88e02043d568202001c00000000000000000000000800000000000000000000000000000000000000000000377afc6d2b4065f00075e60a0eb721431949f499ae5a61599bc7c43e9c386892984ec3d9fa5e3ecf0c393d1ee1c5391eefa19101fa83d677edfe3e5d40552e47bb55d16685d02a", @ANYRES8, @ANYBLOB="e00000017f00000100000000c40000000000000000000000070000008635000000030112bd7feb9262a479c4917d51542a39cfb9060e1adaa9129181b43b12402b60060feb6bb7b92cbf8d7b2115828ffe07237c64010101ac1414bbe0000001ffffffffe0000002e000000200000000ffffffff00863800000000060527315505020104fe1905111073dfd3a0bde8a5246a6af27c33270602020f35b8b5390efb0d6ee29df8a1890205e7d5a9070f4764010100ac1414aaac1e000194040000830f29ffffffffe0000001ac1e00010000000000"], 0x208}, 0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="280000001c00010028bd7000fcdbdf", @ANYRES32=r1, @ANYBLOB="0057cdbf8a68e018a6fc129e2f3f3744854abad68382ea843e91692f382347ea2c8c51a848eb007c4abed86a796b2222e030cd01e86dffed4ad5c0877fad45522c4ed3008a6903c8b71750230ee979b93850d69a7cd84e4bfcb0cb65efb1597b42d46c10c96a215b1bad2001ab4f9d031093da"], 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x20040010) 145.152651ms ago: executing program 1 (id=1060): timer_create(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RATE_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x3c, 0x0, 0x1, 0x70bd2d, 0x0, {0x36}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x73}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040811}, 0x20042840) bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r3, 0x0) (async) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r3, 0x0) r4 = gettid() process_vm_writev(r4, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) perf_event_open(0x0, r4, 0x3, 0xffffffffffffffff, 0x5) (async) perf_event_open(0x0, r4, 0x3, 0xffffffffffffffff, 0x5) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) openat$ppp(0xffffffffffffff9c, 0x0, 0x161042, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0xffffffffffffff10, 0xffffffffffffffff, {0xfffffffffffffffd}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) (async) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="375e27bd7000fcdbdf251400000018000780"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) socket$inet_udp(0x2, 0x2, 0x0) (async) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r7, 0x11, 0x64, &(0x7f0000000080)=0x2, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5, 0x8000000}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d459d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x0, 0x1, 0x1000, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d459d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x0, 0x1, 0x1000, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x5) 122.470453ms ago: executing program 3 (id=1061): semget$private(0x0, 0x7, 0x191) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004680)={&(0x7f0000003600)=ANY=[@ANYBLOB="9feb0100180000000000000014001ffb2b9515f7c7eeb261000014000000070000000400000001000006040000000300000000"], &(0x7f0000003680)=""/4096, 0x33, 0x1000, 0x1}, 0x28) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x0, 0xffffff80, 0x178, 0x0, 0x178, 0x2d8, 0x230, 0x258, 0x2d8, 0x258, 0x2034, 0x0, {[{{@uncond, 0x1d, 0x150, 0x198, 0x12, {0x959f1400}, [@common=@unspec=@rateest={{0x68}, {'xfrm0\x00', 'veth0_to_bond\x00', 0x0, 0x1, 0x7, 0x8001, 0x3, 0x4, {}, {0x7}}}, @common=@unspec=@connlimit={{0x40}, {[0x0, 0x0, 0x0, 0xff], 0x5, 0x1, {0x4}}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xb03, 'syz1\x00', {0x200}}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [0x0, 0xff000000], 'veth0_to_team\x00', 'hsr0\x00', {}, {}, 0x0, 0x0, 0x6}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@ipv6header={{0x28}, {0x0, 0xc4, 0x1}}, @common=@mh={{0x28}, {"77e9", 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@remote, 'xfrm0\x00', {0x5}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x3e, &(0x7f0000009b00)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40ffffff07000000400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x20004015}, 0x40) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a400000000c0a01010000000000f9ff000a0000090900020073797a31000000200900010073797a310000000014000380100000800c00018006000100582e000014000000110001"], 0x68}, 0x1, 0x0, 0x0, 0x4004850}, 0x40) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c000180060001"], 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmmsg$inet6(r0, &(0x7f00000063c0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x110, @dev={0xfe, 0x80, '\x00', 0x3e}, 0x9}, 0x1c, &(0x7f0000000400)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1}}], 0x1, 0x20040000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000000000004f32b190b2171f17fa3d5b33f8000000bb31355704cbfa46005000000095000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) socket(0x2, 0x80805, 0x0) socket(0x2, 0x80805, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r5 = open(&(0x7f0000000040)='./file0\x00', 0x4000, 0xc) io_uring_enter(r5, 0x11b0, 0xea13, 0x10, &(0x7f0000000140)={[0x7ff]}, 0x8) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @remote}, 0x6}, 0x1c) syz_emit_ethernet(0x36, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaa000b9300000000000800450eff28006400000706907090cfb361530e96a75de1", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c20002907800e7"], 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x1000000009, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0xef, 0x3d27}, 0x400, 0x32, 0x43a1bd76, 0x7, 0x203, 0x7fff, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) cachestat(r6, &(0x7f0000000340)={0x8, 0x4}, &(0x7f0000000380), 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 93.973415ms ago: executing program 0 (id=1062): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x24020000) syz_clone3(&(0x7f00000021c0)={0x10000080, 0x0, 0x0, 0x0, {0x6}, 0x0, 0x0, 0x0, 0x0}, 0x58) set_mempolicy(0x3, 0x0, 0x3) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r2 = socket(0x1d, 0x2, 0x2) bind$inet(r2, &(0x7f00000000c0)={0x1d, 0x4e20, @loopback}, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000800)=ANY=[@ANYBLOB="90020000", @ANYRES16=0x0, @ANYBLOB="000900000000ffdbdf2502000000080001004cca436bcf610eaaa449f662b8bd77eee852f967be5a7dac890a5fb18fdd8b0d732b33777087ac24d854aa56a41042bd05eaea7535267f407771bcdb5238b09482eaa31361f49b9f117757379109d7437a5d02b8306fffda84d1cddaeedc483fa631c82015e594d5cf3c80acc5aac02723cfec4362e07dad51362d8c68abb8673c209d4d8bd4d4a547af786eb87a34fce6cbe4390091f43a524fec67191c9a5c28b81559decea9c442245194331a5e7db16640846156d6d7849297d66e4c671e06e1da56e45d78", @ANYRES32=0x0, @ANYBLOB="a401028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000900000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000050003000300000008000400010000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="44000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000014000400430008e900f8ffff0700000f018000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b00040072616e646f6d00003c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000009000400686173680000000008000100", @ANYRES32=0x0, @ANYBLOB="3c00028038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000800000008000100", @ANYRES32=0x0, @ANYBLOB="840002803c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000009000400686173680000000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000110004006163746976656261636b757000000000"], 0x290}, 0x1, 0x0, 0x0, 0x40}, 0x40) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000bc0)=@delchain={0x1f8, 0x65, 0x2, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x8, 0x2}, {0x0, 0x1}, {0x5}}, [@TCA_CHAIN={0x8, 0xb, 0x4}, @TCA_RATE={0x6, 0x5, {0xb, 0x40}}, @filter_kind_options=@f_bpf={{0x8}, {0x1bc, 0x2, [@TCA_BPF_FD={0x8}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_ACT={0x19c, 0x1, [@m_simple={0x30, 0x1e, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_simple={0x10c, 0x7, 0x0, 0x0, {{0xb}, {0x1c, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x9, 0x4, 0x10000000, 0x633, 0xe2d}}]}, {0xc7, 0x6, "9787c29d6ac649e7ec160dfef7c4cea330102e688fe12213d2bfb320865cee27f05adfbc7dae04880a34e7bf775010128401ec5a80f551da79136f2a4ff74f3588c03c976e1c54366c6747dbbdd2e1e0d6da659b84a2ea14191b4223d2b6eeb465498ad518ee2114b5e4ab0d52289fe809788321e04d9b1d9f82a03fbb49229585f49ce943954da5ad28e25a9ba91b24d4c96612e2188dd3fa1dea6994033514d8f93add809a6ee955d65ac8c2ae97714a5c600000ddb671382ebf29bf9b3697264083"}, {0xc, 0x7, {0x0, 0x79d0f023c2b305dd}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_mpls={0x5c, 0x13, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x400, 0x33c9, 0x3, 0x6, 0x5}, 0x3}}]}, {0x11, 0x6, "df76640d30b6ba21699aad3d08"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2}}}}]}, @TCA_BPF_FLAGS_GEN={0x8, 0x9, 0x1}]}}]}, 0x1f8}}, 0x20004880) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x8, 0x3, 0x2a8, 0x158, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3e0, 0xffffffff, 0xffffffff, 0x3e0, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [0x0, 0x0, 0x0, 0xff], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xe0, 0x100, 0x0, {}, [@common=@unspec=@connbytes={{0x38}, {[{0x2}, {0x7f}], 0x2, 0x2}}]}, @unspec=@NOTRACK={0x20}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [0x0, 0xffffffff], [], 'erspan0\x00', 'gre0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x308) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GET(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000540)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000fbfbdf25270000000e0001006e655f64657673696d0000000f0002006e657464657673696d3000001c0053"], 0x50}, 0x1, 0x0, 0x0, 0x24040011}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="0f00000000000000b30000000000000000000091"]) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x8, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x6, 0x1}, 0x0, 0x80034, 0x101, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x803, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) r7 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0xfffffffffffffff7]}, 0x8, 0x80000) mount$9p_fd(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESDEC=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7]) 48.908347ms ago: executing program 0 (id=1063): r0 = getegid() syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000c80)='./file0\x00', 0x210000, &(0x7f0000000140)={[{@jqfmt_vfsv1}, {}, {@quota}, {@noauto_da_alloc}, {@resgid={'resgid', 0x3d, r0}}, {@nodelalloc}, {@noauto_da_alloc}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x8b}}, {@orlov}]}, 0x0, 0x585, &(0x7f0000000240)="$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") close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, &(0x7f0000001a00), 0x4) chdir(&(0x7f0000000000)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x29, 0x3, 0x7, 0x9, 0x77, @private1, @private2, 0x1, 0x0, 0x700f, 0x4}}) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r4 = dup2(r3, r3) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) writev(r5, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000840), r4) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)={0x4c, 0x0, 0x2, 0x401, 0x0, 0x0, {0xa, 0x0, 0x108}, [@CTA_EXPECT_MASTER={0x4}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @local}}}]}]}, 0x4c}}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000004500), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@version_9p2000}]}}) write$P9_RVERSION(r9, &(0x7f0000000080)=ANY=[@ANYBLOB="150000006bffff", @ANYRES16=r8, @ANYRES16], 0x15) 48.492607ms ago: executing program 3 (id=1065): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000004500), 0x0, 0x0) r1 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f0000000100)={0x2a, 0x803, 0x14, 0x3, 0x7fffffff, 0x2, 0x4baf, 0xd22}, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000100)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r8 = creat(&(0x7f0000000080)='./bus\x00', 0x0) mount$9p_virtio(0x0, &(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0, 0x2008002, 0x0) fsetxattr$system_posix_acl(r8, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="020000"], 0xfe44, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000b40)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0x80000, {0x0, 0x0, 0x0, r7, {0x0, 0x9}, {0x5, 0xb}, {0xffe0, 0x3}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x10, 0x3}}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x2000c061}, 0x4008000) socket$kcm(0x11, 0x3, 0x0) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) r10 = openat$selinux_policy(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r10, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[], 0x190ec) shutdown(r2, 0x1) write$P9_RVERSION(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="150000006bffff", @ANYRESHEX=r0], 0x15) 32.304168ms ago: executing program 4 (id=1066): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001480), 0x42002, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r1, &(0x7f0000000400)={&(0x7f00000008c0)=@id={0x1e, 0x3, 0x1, {0x4e24}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x20) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) close(r6) writev(r7, &(0x7f0000000200)=[{&(0x7f0000000100)="19", 0x3a4e1e905c56cdb7}], 0x1) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x5}}, @NFT_MSG_DELSET={0x28, 0xb, 0xa, 0x407, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x1}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x10}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x64}, 0x1, 0x0, 0x0, 0x44814}, 0x48854) sendfile(r0, r8, 0x0, 0x20000023892) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r5, 0x0, 0x0, 0x4, 0x0, {0xa, 0x4e22, 0x401, @loopback, 0x2}}}, 0x3a) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 2.79948ms ago: executing program 1 (id=1067): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) syz_io_uring_complete(0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x9, 0x7ffc1ffb}]}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000280)=0x10000, 0x4) sendto$inet6(r2, &(0x7f0000847fff)='X', 0x34000, 0xe0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x5, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000850000001100000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x3a) r4 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x29, 0x17, &(0x7f0000000100)=r1, 0x4) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000080)=@in6={0xa, 0x4e22, 0x0, @mcast2}, 0x80, 0x0}, 0xb80b) sendmsg$kcm(r4, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x80) 2.08527ms ago: executing program 1 (id=1068): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x4) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xe4776000) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) mount$tmpfs(0x0, 0x0, 0x0, 0x400, &(0x7f0000000100)=ANY=[@ANYRESDEC=r0, @ANYRES64=r0]) creat(&(0x7f0000000080)='./bus\x00', 0x154) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x8c, &(0x7f0000000440)='trans=rdma,') syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000001000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x4c40, &(0x7f0000000000), 0xfe, 0x27a, &(0x7f0000000980)="$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") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000040)={0x0, 0x0, 0xfd8e, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) keyctl$chown(0x4, 0x0, 0xee01, 0x0) capset(0x0, &(0x7f0000000340)) quotactl$Q_QUOTAON(0xffffffff80000201, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000010000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000116608ffff0000100018000000000000000000000000000a009500000000000000360a020000000001180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0xa, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x23, &(0x7f0000000140), &(0x7f0000000200)=0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r4 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc89d, 0xc000, 0x8, 0x20204}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1d, 0x4, 0x1, 0xbf22, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x200002, 0x1}, 0x50) io_uring_enter(r4, 0x2219, 0x7721, 0x16, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x13f}}, 0x20) 0s ago: executing program 0 (id=1069): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x4) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xe4776000) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) mount$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='nr\x00']) mlock(&(0x7f00000f6000/0x4000)=nil, 0x4000) creat(&(0x7f0000000080)='./bus\x00', 0x154) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x8c, &(0x7f0000000440)='trans=rdma,') bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x19, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x7, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x5}, 0x10}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 22.480134][ T29] audit: type=1400 audit(1769339316.016:62): avc: denied { search } for pid=3193 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.502135][ T29] audit: type=1400 audit(1769339316.016:63): avc: denied { search } for pid=3193 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=478 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.524806][ T29] audit: type=1400 audit(1769339316.016:64): avc: denied { search } for pid=3193 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.547722][ T29] audit: type=1400 audit(1769339316.016:65): avc: denied { search } for pid=3193 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.570810][ T29] audit: type=1400 audit(1769339316.016:66): avc: denied { read open } for pid=3194 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.0.192' (ED25519) to the list of known hosts. [ 29.580667][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 29.580685][ T29] audit: type=1400 audit(1769339323.116:70): avc: denied { mounton } for pid=3298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 29.610028][ T29] audit: type=1400 audit(1769339323.146:71): avc: denied { mount } for pid=3298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.612515][ T3298] cgroup: Unknown subsys name 'net' [ 29.637951][ T29] audit: type=1400 audit(1769339323.176:72): avc: denied { unmount } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.757733][ T3298] cgroup: Unknown subsys name 'cpuset' [ 29.764000][ T3298] cgroup: Unknown subsys name 'rlimit' [ 29.915817][ T29] audit: type=1400 audit(1769339323.446:73): avc: denied { setattr } for pid=3298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 29.939096][ T29] audit: type=1400 audit(1769339323.456:74): avc: denied { create } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.959631][ T29] audit: type=1400 audit(1769339323.456:75): avc: denied { write } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.980163][ T29] audit: type=1400 audit(1769339323.456:76): avc: denied { read } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.000466][ T29] audit: type=1400 audit(1769339323.466:77): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 30.021443][ T29] audit: type=1400 audit(1769339323.486:78): avc: denied { mounton } for pid=3298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 30.046452][ T29] audit: type=1400 audit(1769339323.486:79): avc: denied { mount } for pid=3298 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 30.053181][ T3303] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 30.137455][ T3298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 31.350732][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 31.363529][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 31.389070][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 31.469389][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 31.489703][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.496851][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.504132][ T3315] bridge_slave_0: entered allmulticast mode [ 31.510708][ T3315] bridge_slave_0: entered promiscuous mode [ 31.536077][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.543361][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.550864][ T3315] bridge_slave_1: entered allmulticast mode [ 31.557395][ T3315] bridge_slave_1: entered promiscuous mode [ 31.568544][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.575618][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.582807][ T3313] bridge_slave_0: entered allmulticast mode [ 31.589301][ T3313] bridge_slave_0: entered promiscuous mode [ 31.595890][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.603071][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.610471][ T3311] bridge_slave_0: entered allmulticast mode [ 31.617043][ T3311] bridge_slave_0: entered promiscuous mode [ 31.637866][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.645020][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.652223][ T3313] bridge_slave_1: entered allmulticast mode [ 31.658841][ T3313] bridge_slave_1: entered promiscuous mode [ 31.665497][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.672595][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.679781][ T3311] bridge_slave_1: entered allmulticast mode [ 31.686213][ T3311] bridge_slave_1: entered promiscuous mode [ 31.697281][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 31.707748][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.720681][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.757784][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.776821][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.791466][ T3315] team0: Port device team_slave_0 added [ 31.803261][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.817688][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.831933][ T3315] team0: Port device team_slave_1 added [ 31.843076][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.850320][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.857883][ T3312] bridge_slave_0: entered allmulticast mode [ 31.864324][ T3312] bridge_slave_0: entered promiscuous mode [ 31.890004][ T3313] team0: Port device team_slave_0 added [ 31.895797][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.902950][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.910181][ T3312] bridge_slave_1: entered allmulticast mode [ 31.916642][ T3312] bridge_slave_1: entered promiscuous mode [ 31.926077][ T3311] team0: Port device team_slave_0 added [ 31.937254][ T3313] team0: Port device team_slave_1 added [ 31.943158][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.950269][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.976248][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.994955][ T3311] team0: Port device team_slave_1 added [ 32.005406][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.012409][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.038325][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.075684][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.082991][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.090243][ T3314] bridge_slave_0: entered allmulticast mode [ 32.096612][ T3314] bridge_slave_0: entered promiscuous mode [ 32.105408][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.119696][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.126749][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.153141][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.165051][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.172044][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.198079][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.209091][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.216164][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.223470][ T3314] bridge_slave_1: entered allmulticast mode [ 32.229973][ T3314] bridge_slave_1: entered promiscuous mode [ 32.242249][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.256784][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.263853][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.289951][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.309429][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.328922][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.335899][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.361871][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.378354][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.389744][ T3315] hsr_slave_0: entered promiscuous mode [ 32.395713][ T3315] hsr_slave_1: entered promiscuous mode [ 32.408475][ T3312] team0: Port device team_slave_0 added [ 32.442188][ T3312] team0: Port device team_slave_1 added [ 32.459996][ T3314] team0: Port device team_slave_0 added [ 32.470423][ T3313] hsr_slave_0: entered promiscuous mode [ 32.476745][ T3313] hsr_slave_1: entered promiscuous mode [ 32.482706][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 32.488479][ T3313] Cannot create hsr debugfs directory [ 32.508991][ T3314] team0: Port device team_slave_1 added [ 32.514951][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.521979][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.547980][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.575989][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.583057][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.609038][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.627517][ T3311] hsr_slave_0: entered promiscuous mode [ 32.633714][ T3311] hsr_slave_1: entered promiscuous mode [ 32.639760][ T3311] debugfs: 'hsr0' already exists in 'hsr' [ 32.645518][ T3311] Cannot create hsr debugfs directory [ 32.667859][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.674817][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.700861][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.729824][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.736805][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.762981][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.803473][ T3312] hsr_slave_0: entered promiscuous mode [ 32.809622][ T3312] hsr_slave_1: entered promiscuous mode [ 32.815474][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 32.821330][ T3312] Cannot create hsr debugfs directory [ 32.890285][ T3314] hsr_slave_0: entered promiscuous mode [ 32.896390][ T3314] hsr_slave_1: entered promiscuous mode [ 32.902369][ T3314] debugfs: 'hsr0' already exists in 'hsr' [ 32.908191][ T3314] Cannot create hsr debugfs directory [ 32.997461][ T3315] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 33.020114][ T3315] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 33.038453][ T3315] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 33.047375][ T3313] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 33.055900][ T3313] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 33.074643][ T3315] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 33.084939][ T3313] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 33.094096][ T3313] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 33.142298][ T3311] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 33.151749][ T3311] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 33.161116][ T3311] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 33.170782][ T3311] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 33.231427][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.240933][ T3312] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 33.253604][ T3312] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 33.263990][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.271641][ T3312] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 33.287803][ T3312] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 33.314571][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.326175][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.342965][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.350205][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.360667][ T3314] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 33.373117][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.380205][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.389055][ T3314] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 33.398727][ T3314] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 33.408091][ T3314] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 33.420643][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.427802][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.436670][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.443819][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.471497][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.523706][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.536555][ T3315] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.551024][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.558163][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.582196][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.589310][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.645388][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.654563][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.674782][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.691258][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.700428][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.708891][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.715962][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.731638][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.741810][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.749024][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.775700][ T3314] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 33.786337][ T3314] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.809560][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.816657][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.825607][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.832740][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.872121][ T3312] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 33.882567][ T3312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.922500][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.991019][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.049271][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.066291][ T3315] veth0_vlan: entered promiscuous mode [ 34.083727][ T3315] veth1_vlan: entered promiscuous mode [ 34.122399][ T3311] veth0_vlan: entered promiscuous mode [ 34.132969][ T3315] veth0_macvtap: entered promiscuous mode [ 34.144560][ T3313] veth0_vlan: entered promiscuous mode [ 34.157854][ T3313] veth1_vlan: entered promiscuous mode [ 34.165296][ T3311] veth1_vlan: entered promiscuous mode [ 34.177191][ T3315] veth1_macvtap: entered promiscuous mode [ 34.215261][ T3314] veth0_vlan: entered promiscuous mode [ 34.237435][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.246827][ T3314] veth1_vlan: entered promiscuous mode [ 34.258301][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.265715][ T3313] veth0_macvtap: entered promiscuous mode [ 34.277705][ T3311] veth0_macvtap: entered promiscuous mode [ 34.291134][ T3313] veth1_macvtap: entered promiscuous mode [ 34.298282][ T3311] veth1_macvtap: entered promiscuous mode [ 34.308417][ T52] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.321687][ T3314] veth0_macvtap: entered promiscuous mode [ 34.329658][ T3314] veth1_macvtap: entered promiscuous mode [ 34.342442][ T52] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.358808][ T52] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.367641][ T52] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.377277][ T3312] veth0_vlan: entered promiscuous mode [ 34.387537][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.400079][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.409148][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.422099][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.430792][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.440667][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.455538][ T3312] veth1_vlan: entered promiscuous mode [ 34.471286][ T52] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.494762][ T52] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.507757][ T52] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.516824][ T3315] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 34.538026][ T52] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.569294][ T52] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.581789][ T3482] tmpfs: Bad value for 'mpol' [ 34.594229][ T3312] veth0_macvtap: entered promiscuous mode [ 34.609487][ T52] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.620591][ T3312] veth1_macvtap: entered promiscuous mode [ 34.630936][ T52] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.660644][ T52] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.693001][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 34.693021][ T29] audit: type=1400 audit(1769339328.226:104): avc: denied { open } for pid=3487 comm="syz.4.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 34.722886][ T52] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.743163][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.773554][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.782442][ T3488] netlink: 256 bytes leftover after parsing attributes in process `syz.4.6'. [ 34.786350][ T29] audit: type=1400 audit(1769339328.226:105): avc: denied { perfmon } for pid=3487 comm="syz.4.6" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 34.812086][ T29] audit: type=1400 audit(1769339328.226:106): avc: denied { kernel } for pid=3487 comm="syz.4.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 34.831186][ T29] audit: type=1400 audit(1769339328.256:107): avc: denied { cpu } for pid=3487 comm="syz.4.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 34.850141][ T29] audit: type=1400 audit(1769339328.286:108): avc: denied { name_bind } for pid=3489 comm="syz.2.3" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 34.871621][ T29] audit: type=1400 audit(1769339328.296:109): avc: denied { node_bind } for pid=3489 comm="syz.2.3" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 34.877098][ T52] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.894267][ T29] audit: type=1326 audit(1769339328.296:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3487 comm="syz.4.6" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff7d782acb9 code=0x7ffc0000 [ 34.904993][ T52] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.926200][ T29] audit: type=1326 audit(1769339328.296:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3487 comm="syz.4.6" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff7d782acb9 code=0x7ffc0000 [ 34.958043][ T3491] sctp: [Deprecated]: syz.2.3 (pid 3491) Use of int in max_burst socket option deprecated. [ 34.958043][ T3491] Use struct sctp_assoc_value instead [ 34.973543][ T29] audit: type=1326 audit(1769339328.296:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3487 comm="syz.4.6" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7ff7d782acb9 code=0x7ffc0000 [ 34.996730][ T29] audit: type=1400 audit(1769339328.296:113): avc: denied { tracepoint } for pid=3487 comm="syz.4.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 35.029608][ T52] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.038471][ T52] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.050212][ T52] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.061053][ T52] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.070194][ T52] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.114795][ T3497] loop3: detected capacity change from 0 to 128 [ 35.133625][ T3497] netlink: 16 bytes leftover after parsing attributes in process `syz.3.4'. [ 35.143392][ T3497] netlink: 16 bytes leftover after parsing attributes in process `syz.3.4'. [ 35.238401][ T3507] netlink: 24 bytes leftover after parsing attributes in process `syz.3.8'. [ 35.258015][ T3503] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 35.273822][ T3503] netlink: 'syz.2.7': attribute type 1 has an invalid length. [ 35.297976][ T3496] mmap: syz.0.1 (3496) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 35.382587][ T3510] syzkaller0: entered promiscuous mode [ 35.388204][ T3510] syzkaller0: entered allmulticast mode [ 35.401288][ T3514] loop4: detected capacity change from 0 to 1024 [ 35.416192][ T3510] 0: reclassify loop, rule prio 0, protocol 800 [ 35.438965][ T3514] ======================================================= [ 35.438965][ T3514] WARNING: The mand mount option has been deprecated and [ 35.438965][ T3514] and is ignored by this kernel. Remove the mand [ 35.438965][ T3514] option from the mount to silence this warning. [ 35.438965][ T3514] ======================================================= [ 35.613841][ T3514] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.716598][ T3315] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.735658][ C0] hrtimer: interrupt took 8958 ns [ 35.773277][ T3538] Zero length message leads to an empty skb [ 35.875560][ T3547] netlink: 252 bytes leftover after parsing attributes in process `syz.2.19'. [ 35.892401][ T3543] loop3: detected capacity change from 0 to 8192 [ 35.925191][ T3550] loop2: detected capacity change from 0 to 128 [ 35.959318][ T3305] loop3: p2 p3 p4 < > [ 35.963473][ T3305] loop3: partition table partially beyond EOD, truncated [ 35.972238][ T3550] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 35.979580][ T3305] loop3: p2 size 590592 extends beyond EOD, truncated [ 36.003548][ T3305] loop3: p3 start 4294967295 is beyond EOD, truncated [ 36.010503][ T3305] loop3: p4 start 117440516 is beyond EOD, truncated [ 36.027131][ T3550] ext4 filesystem being mounted at /5/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 36.038661][ T3543] loop3: p2 p3 p4 < > [ 36.042874][ T3543] loop3: partition table partially beyond EOD, truncated [ 36.050216][ T3543] loop3: p2 size 590592 extends beyond EOD, truncated [ 36.058330][ T3543] loop3: p3 start 4294967295 is beyond EOD, truncated [ 36.065201][ T3543] loop3: p4 start 117440516 is beyond EOD, truncated [ 36.099459][ T3550] EXT4-fs warning (device loop2): ext4_dirblock_csum_verify:375: inode #2: comm syz.2.20: No space for directory leaf checksum. Please run e2fsck -D. [ 36.114853][ T3550] EXT4-fs error (device loop2): __ext4_find_entry:1626: inode #2: comm syz.2.20: checksumming directory block 0 [ 36.171784][ T3559] netlink: 4 bytes leftover after parsing attributes in process `syz.0.22'. [ 36.185197][ T3314] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 36.198928][ T3305] udevd[3305]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 36.202339][ T3563] loop3: detected capacity change from 0 to 1024 [ 36.243255][ T3563] EXT4-fs: Ignoring removed orlov option [ 36.259078][ T3305] udevd[3305]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 36.274047][ T3563] EXT4-fs: Mount option(s) incompatible with ext2 [ 36.345277][ T3569] syz.3.26 uses obsolete (PF_INET,SOCK_PACKET) [ 36.432896][ T3575] netlink: 'syz.3.28': attribute type 1 has an invalid length. [ 36.453650][ T3575] erspan1: entered allmulticast mode [ 36.588238][ T3510] syz.1.10 (3510) used greatest stack depth: 10080 bytes left [ 36.715127][ T3599] netlink: 'syz.2.39': attribute type 1 has an invalid length. [ 37.118520][ T3632] netlink: 12 bytes leftover after parsing attributes in process `syz.0.50'. [ 37.167788][ T3635] netlink: 'syz.0.51': attribute type 10 has an invalid length. [ 37.175648][ T3635] netlink: 32 bytes leftover after parsing attributes in process `syz.0.51'. [ 37.188492][ T3635] ipvlan2: entered promiscuous mode [ 37.294734][ T3651] netlink: 8 bytes leftover after parsing attributes in process `syz.0.54'. [ 37.488895][ T3675] netlink: 12 bytes leftover after parsing attributes in process `syz.2.63'. [ 37.566286][ T3688] netlink: 'syz.0.69': attribute type 1 has an invalid length. [ 37.995531][ T3749] syzkaller0: entered promiscuous mode [ 38.001141][ T3749] syzkaller0: entered allmulticast mode [ 38.655179][ T3813] netlink: 'syz.3.126': attribute type 39 has an invalid length. [ 39.056445][ T3856] bridge_slave_0: left allmulticast mode [ 39.062206][ T3856] bridge_slave_0: left promiscuous mode [ 39.068197][ T3856] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.086302][ T3856] bridge_slave_1: left allmulticast mode [ 39.092039][ T3856] bridge_slave_1: left promiscuous mode [ 39.097769][ T3856] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.117585][ T3856] bond0: (slave bond_slave_0): Releasing backup interface [ 39.138904][ T3856] bond0: (slave bond_slave_1): Releasing backup interface [ 39.152635][ T3862] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 39.173095][ T3856] team0: Port device team_slave_0 removed [ 39.183423][ T3856] team0: Port device team_slave_1 removed [ 39.191867][ T3856] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 39.199325][ T3856] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 39.208778][ T3856] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 39.216315][ T3856] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 39.226857][ T3856] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 39.281279][ T3868] capability: warning: `syz.0.148' uses deprecated v2 capabilities in a way that may be insecure [ 39.357166][ T3882] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.364576][ T3882] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.373834][ T3882] bridge0: entered allmulticast mode [ 39.699353][ T29] kauditd_printk_skb: 1987 callbacks suppressed [ 39.699370][ T29] audit: type=1400 audit(1769339333.236:2101): avc: denied { create } for pid=3945 comm="syz.2.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 39.730864][ T29] audit: type=1400 audit(1769339333.256:2102): avc: denied { prog_load } for pid=3945 comm="syz.2.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 39.755420][ T29] audit: type=1400 audit(1769339333.286:2103): avc: denied { prog_load } for pid=3942 comm="syz.0.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 39.756832][ T29] audit: type=1400 audit(1769339333.286:2104): avc: denied { load_policy } for pid=3931 comm="syz.4.176" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=0 [ 39.780266][ T29] audit: type=1400 audit(1769339333.296:2105): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.801278][ T29] audit: type=1400 audit(1769339333.316:2106): avc: denied { read write } for pid=3942 comm="syz.0.180" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.855234][ T29] audit: type=1400 audit(1769339333.366:2107): avc: denied { read } for pid=3949 comm="syz.2.183" dev="nsfs" ino=4026532743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 39.855335][ T29] audit: type=1400 audit(1769339333.366:2108): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.855369][ T29] audit: type=1400 audit(1769339333.366:2109): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.856537][ T29] audit: type=1400 audit(1769339333.396:2110): avc: denied { create } for pid=3949 comm="syz.2.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 40.025851][ T3965] __nla_validate_parse: 9 callbacks suppressed [ 40.025933][ T3965] netlink: 12 bytes leftover after parsing attributes in process `syz.4.189'. [ 40.041140][ T3965] netlink: 12 bytes leftover after parsing attributes in process `syz.4.189'. [ 40.053988][ T3964] netlink: 12 bytes leftover after parsing attributes in process `syz.2.188'. [ 40.063196][ T3967] netlink: 14 bytes leftover after parsing attributes in process `syz.0.190'. [ 40.082804][ T3967] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 40.122261][ T3967] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 40.140919][ T3967] bond0 (unregistering): Released all slaves [ 40.284216][ T4007] netlink: 12 bytes leftover after parsing attributes in process `syz.1.205'. [ 40.324971][ T4011] netlink: 8 bytes leftover after parsing attributes in process `syz.0.206'. [ 40.464168][ T4034] netlink: 4 bytes leftover after parsing attributes in process `syz.1.217'. [ 40.474649][ T4034] netlink: 12 bytes leftover after parsing attributes in process `syz.1.217'. [ 40.558945][ T4046] netlink: 12 bytes leftover after parsing attributes in process `syz.0.221'. [ 40.741064][ T4080] netlink: 12 bytes leftover after parsing attributes in process `syz.4.235'. [ 40.856260][ T4096] A link change request failed with some changes committed already. Interface dummy0 may have been left with an inconsistent configuration, please check. [ 41.098258][ T4138] netlink: 'syz.2.257': attribute type 29 has an invalid length. [ 41.424660][ T4187] bridge_slave_0: left allmulticast mode [ 41.430467][ T4187] bridge_slave_0: left promiscuous mode [ 41.436217][ T4187] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.450172][ T4187] bridge_slave_1: left allmulticast mode [ 41.455955][ T4187] bridge_slave_1: left promiscuous mode [ 41.461935][ T4187] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.469549][ T4190] netlink: 'syz.0.279': attribute type 10 has an invalid length. [ 41.484075][ T4187] team0: Port device team_slave_0 removed [ 41.494229][ T4187] team0: Port device team_slave_1 removed [ 41.501174][ T4187] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 41.508654][ T4187] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 41.519095][ T4187] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 41.526583][ T4187] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 41.538451][ T4187] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 41.554732][ T4190] team0: entered promiscuous mode [ 41.562517][ T4190] 8021q: adding VLAN 0 to HW filter on device team0 [ 41.571832][ T4190] bridge0: port 1(team0) entered blocking state [ 41.578411][ T4190] bridge0: port 1(team0) entered disabled state [ 41.585522][ T4190] team0: entered allmulticast mode [ 41.592559][ T4190] bridge0: port 1(team0) entered blocking state [ 41.598897][ T4190] bridge0: port 1(team0) entered forwarding state [ 41.953479][ T4249] FAULT_INJECTION: forcing a failure. [ 41.953479][ T4249] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 41.966724][ T4249] CPU: 0 UID: 0 PID: 4249 Comm: syz.3.309 Not tainted syzkaller #0 PREEMPT(voluntary) [ 41.966752][ T4249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 41.966764][ T4249] Call Trace: [ 41.966774][ T4249] [ 41.966781][ T4249] __dump_stack+0x1d/0x30 [ 41.966820][ T4249] dump_stack_lvl+0x95/0xd0 [ 41.966921][ T4249] dump_stack+0x15/0x1b [ 41.966947][ T4249] should_fail_ex+0x263/0x280 [ 41.967019][ T4249] should_fail+0xb/0x20 [ 41.967041][ T4249] should_fail_usercopy+0x1a/0x20 [ 41.967065][ T4249] _copy_to_user+0x20/0xa0 [ 41.967138][ T4249] simple_read_from_buffer+0xb5/0x130 [ 41.967220][ T4249] proc_fail_nth_read+0x10e/0x150 [ 41.967247][ T4249] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 41.967272][ T4249] vfs_read+0x1ab/0x7f0 [ 41.967302][ T4249] ? __rcu_read_unlock+0x4e/0x70 [ 41.967390][ T4249] ? __fget_files+0x184/0x1c0 [ 41.967478][ T4249] ? mutex_lock+0x57/0x90 [ 41.967497][ T4249] ksys_read+0xdc/0x1a0 [ 41.967528][ T4249] __x64_sys_read+0x40/0x50 [ 41.967675][ T4249] x64_sys_call+0x2889/0x3000 [ 41.967714][ T4249] do_syscall_64+0xc0/0x2a0 [ 41.967787][ T4249] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.967806][ T4249] RIP: 0033:0x7fc921beb58e [ 41.967820][ T4249] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 41.967836][ T4249] RSP: 002b:00007fc920686fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 41.967866][ T4249] RAX: ffffffffffffffda RBX: 00007fc9206876c0 RCX: 00007fc921beb58e [ 41.967877][ T4249] RDX: 000000000000000f RSI: 00007fc9206870a0 RDI: 0000000000000008 [ 41.967888][ T4249] RBP: 00007fc920687090 R08: 0000000000000000 R09: 0000000000000000 [ 41.967957][ T4249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.967968][ T4249] R13: 00007fc921ea6038 R14: 00007fc921ea5fa0 R15: 00007ffe43591198 [ 41.968025][ T4249] [ 42.769370][ T4339] netlink: 'syz.4.346': attribute type 29 has an invalid length. [ 42.801266][ T4340] netlink: 'syz.4.346': attribute type 29 has an invalid length. [ 43.125429][ T31] Bluetooth: hci0: Frame reassembly failed (-84) [ 43.227237][ T4410] netlink: 'syz.3.373': attribute type 5 has an invalid length. [ 43.551875][ T4440] bridge_slave_1: left allmulticast mode [ 43.557691][ T4440] bridge_slave_1: left promiscuous mode [ 43.563474][ T4440] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.571358][ T4440] bridge_slave_0: left allmulticast mode [ 43.577198][ T4440] bridge_slave_0: left promiscuous mode [ 43.582878][ T4440] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.660534][ T4443] capability: warning: `syz.3.386' uses 32-bit capabilities (legacy support in use) [ 43.952878][ T4471] netlink: 'syz.3.399': attribute type 5 has an invalid length. [ 43.995850][ T4473] bond1: option downdelay: invalid value (18446744073709551615) [ 44.003662][ T4473] bond1: option downdelay: allowed values 0 - 2147483647 [ 44.018046][ T4473] bond1 (unregistering): Released all slaves [ 44.835110][ T29] kauditd_printk_skb: 3376 callbacks suppressed [ 44.835178][ T29] audit: type=1400 audit(1769339338.366:5487): avc: denied { map_create } for pid=4550 comm="syz.2.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 44.860666][ T29] audit: type=1400 audit(1769339338.376:5488): avc: denied { prog_load } for pid=4550 comm="syz.2.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 44.879875][ T29] audit: type=1400 audit(1769339338.376:5489): avc: denied { prog_load } for pid=4550 comm="syz.2.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 44.908506][ T29] audit: type=1400 audit(1769339338.446:5490): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.935616][ T29] audit: type=1400 audit(1769339338.466:5491): avc: denied { mounton } for pid=4553 comm="syz.4.434" path="/61/file0" dev="tmpfs" ino=358 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 44.993725][ T29] audit: type=1400 audit(1769339338.526:5492): avc: denied { create } for pid=4553 comm="syz.4.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 45.026418][ T29] audit: type=1400 audit(1769339338.556:5493): avc: denied { load_policy } for pid=4553 comm="syz.4.434" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=0 [ 45.046644][ T29] audit: type=1400 audit(1769339338.556:5494): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.071623][ T29] audit: type=1400 audit(1769339338.586:5495): avc: denied { create } for pid=4556 comm="syz.0.435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=0 [ 45.091401][ T29] audit: type=1326 audit(1769339338.586:5497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4556 comm="syz.0.435" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f358072acb9 code=0x7ffc0000 [ 45.186992][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 46.572089][ T4720] netdevsim netdevsim3 netdevsim0: entered promiscuous mode [ 46.615354][ T4720] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 46.803703][ T4751] __nla_validate_parse: 20 callbacks suppressed [ 46.803810][ T4751] netlink: 4 bytes leftover after parsing attributes in process `syz.3.514'. [ 46.888827][ T4758] netlink: 20 bytes leftover after parsing attributes in process `syz.2.516'. [ 47.844356][ T4860] netlink: 12 bytes leftover after parsing attributes in process `syz.0.560'. [ 47.908022][ T4870] FAULT_INJECTION: forcing a failure. [ 47.908022][ T4870] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 47.921258][ T4870] CPU: 1 UID: 0 PID: 4870 Comm: syz.0.565 Not tainted syzkaller #0 PREEMPT(voluntary) [ 47.921302][ T4870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 47.921363][ T4870] Call Trace: [ 47.921370][ T4870] [ 47.921378][ T4870] __dump_stack+0x1d/0x30 [ 47.921404][ T4870] dump_stack_lvl+0x95/0xd0 [ 47.921447][ T4870] dump_stack+0x15/0x1b [ 47.921468][ T4870] should_fail_ex+0x263/0x280 [ 47.921489][ T4870] should_fail+0xb/0x20 [ 47.921505][ T4870] should_fail_usercopy+0x1a/0x20 [ 47.921555][ T4870] _copy_from_user+0x1c/0xb0 [ 47.921580][ T4870] memdup_user+0x5e/0xd0 [ 47.921610][ T4870] strndup_user+0x68/0xb0 [ 47.921642][ T4870] __se_sys_mount+0x4d/0x2e0 [ 47.921660][ T4870] ? fput+0x8f/0xc0 [ 47.921723][ T4870] ? ksys_write+0x194/0x1a0 [ 47.921741][ T4870] __x64_sys_mount+0x67/0x80 [ 47.921761][ T4870] x64_sys_call+0x2cca/0x3000 [ 47.921785][ T4870] do_syscall_64+0xc0/0x2a0 [ 47.921868][ T4870] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 47.921890][ T4870] RIP: 0033:0x7f358072acb9 [ 47.921906][ T4870] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 47.921925][ T4870] RSP: 002b:00007f357f187028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 47.921946][ T4870] RAX: ffffffffffffffda RBX: 00007f35809a5fa0 RCX: 00007f358072acb9 [ 47.921995][ T4870] RDX: 00002000000002c0 RSI: 0000200000000280 RDI: 0000200000000100 [ 47.922009][ T4870] RBP: 00007f357f187090 R08: 0000200000000440 R09: 0000000000000000 [ 47.922023][ T4870] R10: 000000000000008c R11: 0000000000000246 R12: 0000000000000001 [ 47.922055][ T4870] R13: 00007f35809a6038 R14: 00007f35809a5fa0 R15: 00007ffc63acb728 [ 47.922083][ T4870] [ 48.239097][ T4899] netlink: 12 bytes leftover after parsing attributes in process `syz.0.576'. [ 48.374199][ T4922] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.381351][ T4922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.388822][ T4922] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.396051][ T4922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.409929][ T4922] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 48.447153][ T4931] netlink: 12 bytes leftover after parsing attributes in process `syz.3.589'. [ 48.558869][ T4948] FAULT_INJECTION: forcing a failure. [ 48.558869][ T4948] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 48.572169][ T4948] CPU: 0 UID: 0 PID: 4948 Comm: syz.2.595 Not tainted syzkaller #0 PREEMPT(voluntary) [ 48.572203][ T4948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 48.572220][ T4948] Call Trace: [ 48.572228][ T4948] [ 48.572235][ T4948] __dump_stack+0x1d/0x30 [ 48.572261][ T4948] dump_stack_lvl+0x95/0xd0 [ 48.572320][ T4948] dump_stack+0x15/0x1b [ 48.572341][ T4948] should_fail_ex+0x263/0x280 [ 48.572363][ T4948] should_fail+0xb/0x20 [ 48.572386][ T4948] should_fail_usercopy+0x1a/0x20 [ 48.572415][ T4948] _copy_from_user+0x1c/0xb0 [ 48.572507][ T4948] memdup_user+0x5e/0xd0 [ 48.572540][ T4948] strndup_user+0x68/0xb0 [ 48.572591][ T4948] __se_sys_mount+0x8e/0x2e0 [ 48.572655][ T4948] ? fput+0x8f/0xc0 [ 48.572686][ T4948] ? ksys_write+0x194/0x1a0 [ 48.572705][ T4948] __x64_sys_mount+0x67/0x80 [ 48.572772][ T4948] x64_sys_call+0x2cca/0x3000 [ 48.572799][ T4948] do_syscall_64+0xc0/0x2a0 [ 48.572850][ T4948] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 48.572873][ T4948] RIP: 0033:0x7fba7a60acb9 [ 48.572890][ T4948] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 48.572909][ T4948] RSP: 002b:00007fba79067028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 48.572930][ T4948] RAX: ffffffffffffffda RBX: 00007fba7a885fa0 RCX: 00007fba7a60acb9 [ 48.572944][ T4948] RDX: 00002000000002c0 RSI: 0000200000000280 RDI: 0000200000000100 [ 48.572966][ T4948] RBP: 00007fba79067090 R08: 0000200000000440 R09: 0000000000000000 [ 48.573028][ T4948] R10: 000000000000008c R11: 0000000000000246 R12: 0000000000000001 [ 48.573078][ T4948] R13: 00007fba7a886038 R14: 00007fba7a885fa0 R15: 00007fff95a57278 [ 48.573099][ T4948] [ 48.821142][ T4962] netlink: 'syz.2.600': attribute type 24 has an invalid length. [ 48.829426][ T4962] netlink: 'syz.2.600': attribute type 24 has an invalid length. [ 48.891328][ T4968] netlink: 12 bytes leftover after parsing attributes in process `syz.0.603'. [ 49.022833][ T4992] FAULT_INJECTION: forcing a failure. [ 49.022833][ T4992] name failslab, interval 1, probability 0, space 0, times 0 [ 49.035804][ T4992] CPU: 1 UID: 0 PID: 4992 Comm: syz.4.613 Not tainted syzkaller #0 PREEMPT(voluntary) [ 49.035834][ T4992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 49.035849][ T4992] Call Trace: [ 49.035856][ T4992] [ 49.035864][ T4992] __dump_stack+0x1d/0x30 [ 49.035958][ T4992] dump_stack_lvl+0x95/0xd0 [ 49.035978][ T4992] dump_stack+0x15/0x1b [ 49.035999][ T4992] should_fail_ex+0x263/0x280 [ 49.036019][ T4992] should_failslab+0x8c/0xb0 [ 49.036038][ T4992] __kmalloc_cache_noprof+0x64/0x4a0 [ 49.036178][ T4992] ? __se_sys_mount+0xef/0x2e0 [ 49.036203][ T4992] ? memdup_user+0x99/0xd0 [ 49.036274][ T4992] __se_sys_mount+0xef/0x2e0 [ 49.036291][ T4992] ? fput+0x8f/0xc0 [ 49.036317][ T4992] ? ksys_write+0x194/0x1a0 [ 49.036402][ T4992] __x64_sys_mount+0x67/0x80 [ 49.036420][ T4992] x64_sys_call+0x2cca/0x3000 [ 49.036442][ T4992] do_syscall_64+0xc0/0x2a0 [ 49.036468][ T4992] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 49.036490][ T4992] RIP: 0033:0x7ff7d782acb9 [ 49.036504][ T4992] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 49.036528][ T4992] RSP: 002b:00007ff7d6287028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 49.036594][ T4992] RAX: ffffffffffffffda RBX: 00007ff7d7aa5fa0 RCX: 00007ff7d782acb9 [ 49.036606][ T4992] RDX: 00002000000002c0 RSI: 0000200000000280 RDI: 0000200000000100 [ 49.036619][ T4992] RBP: 00007ff7d6287090 R08: 0000200000000440 R09: 0000000000000000 [ 49.036630][ T4992] R10: 000000000000008c R11: 0000000000000246 R12: 0000000000000001 [ 49.036642][ T4992] R13: 00007ff7d7aa6038 R14: 00007ff7d7aa5fa0 R15: 00007ffcb1089bc8 [ 49.036659][ T4992] [ 49.236588][ T4998] netlink: 12 bytes leftover after parsing attributes in process `syz.2.615'. [ 49.261283][ T4996] ipvlan1: entered promiscuous mode [ 49.266561][ T4996] ipvlan1: entered allmulticast mode [ 49.272071][ T4996] veth0_vlan: entered allmulticast mode [ 49.284316][ T4996] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4996 comm=syz.0.614 [ 49.303873][ T4996] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4996 comm=syz.0.614 [ 49.431915][ T5024] FAULT_INJECTION: forcing a failure. [ 49.431915][ T5024] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 49.438616][ T5027] netlink: 12 bytes leftover after parsing attributes in process `syz.0.628'. [ 49.445111][ T5024] CPU: 1 UID: 0 PID: 5024 Comm: syz.2.627 Not tainted syzkaller #0 PREEMPT(voluntary) [ 49.445266][ T5024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 49.445308][ T5024] Call Trace: [ 49.445330][ T5024] [ 49.445358][ T5024] __dump_stack+0x1d/0x30 [ 49.445436][ T5024] dump_stack_lvl+0x95/0xd0 [ 49.445541][ T5024] dump_stack+0x15/0x1b [ 49.445613][ T5024] should_fail_ex+0x263/0x280 [ 49.445680][ T5024] should_fail+0xb/0x20 [ 49.445736][ T5024] should_fail_usercopy+0x1a/0x20 [ 49.445875][ T5024] _copy_from_user+0x1c/0xb0 [ 49.445954][ T5024] __se_sys_mount+0x10d/0x2e0 [ 49.446110][ T5024] ? fput+0x8f/0xc0 [ 49.446188][ T5024] ? ksys_write+0x194/0x1a0 [ 49.446272][ T5024] __x64_sys_mount+0x67/0x80 [ 49.446337][ T5024] x64_sys_call+0x2cca/0x3000 [ 49.446421][ T5024] do_syscall_64+0xc0/0x2a0 [ 49.446601][ T5024] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 49.446689][ T5024] RIP: 0033:0x7fba7a60acb9 [ 49.446750][ T5024] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 49.446770][ T5024] RSP: 002b:00007fba79067028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 49.446814][ T5024] RAX: ffffffffffffffda RBX: 00007fba7a885fa0 RCX: 00007fba7a60acb9 [ 49.446858][ T5024] RDX: 00002000000002c0 RSI: 0000200000000280 RDI: 0000200000000100 [ 49.446913][ T5024] RBP: 00007fba79067090 R08: 0000200000000440 R09: 0000000000000000 [ 49.447039][ T5024] R10: 000000000000008c R11: 0000000000000246 R12: 0000000000000001 [ 49.447081][ T5024] R13: 00007fba7a886038 R14: 00007fba7a885fa0 R15: 00007fff95a57278 [ 49.447145][ T5024] [ 49.843971][ T29] kauditd_printk_skb: 2978 callbacks suppressed [ 49.843989][ T29] audit: type=1400 audit(1769339343.356:8412): avc: denied { mounton } for pid=5043 comm="syz.2.635" path="/116/bus" dev="tmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 49.872894][ T29] audit: type=1400 audit(1769339343.356:8413): avc: denied { read write } for pid=5043 comm="syz.2.635" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.886303][ T5053] audit: audit_backlog=65 > audit_backlog_limit=64 [ 49.896964][ T29] audit: type=1400 audit(1769339343.356:8414): avc: denied { read write } for pid=5043 comm="syz.2.635" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 49.903509][ T5053] audit: audit_lost=22 audit_rate_limit=0 audit_backlog_limit=64 [ 49.903529][ T5053] audit: backlog limit exceeded [ 49.936769][ T5052] audit: audit_backlog=65 > audit_backlog_limit=64 [ 49.940350][ T29] audit: type=1400 audit(1769339343.356:8415): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.946883][ T5052] audit: audit_lost=23 audit_rate_limit=0 audit_backlog_limit=64 [ 49.946933][ T5052] audit: backlog limit exceeded [ 50.069717][ T5069] netlink: 12 bytes leftover after parsing attributes in process `syz.1.645'. [ 50.097149][ T5071] FAULT_INJECTION: forcing a failure. [ 50.097149][ T5071] name failslab, interval 1, probability 0, space 0, times 0 [ 50.110031][ T5071] CPU: 1 UID: 0 PID: 5071 Comm: syz.1.646 Not tainted syzkaller #0 PREEMPT(voluntary) [ 50.110064][ T5071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 50.110081][ T5071] Call Trace: [ 50.110090][ T5071] [ 50.110169][ T5071] __dump_stack+0x1d/0x30 [ 50.110202][ T5071] dump_stack_lvl+0x95/0xd0 [ 50.110231][ T5071] dump_stack+0x15/0x1b [ 50.110257][ T5071] should_fail_ex+0x263/0x280 [ 50.110285][ T5071] should_failslab+0x8c/0xb0 [ 50.110437][ T5071] kmem_cache_alloc_noprof+0x68/0x490 [ 50.110464][ T5071] ? getname_flags+0x7f/0x3b0 [ 50.110565][ T5071] ? should_fail_ex+0xd9/0x280 [ 50.110591][ T5071] getname_flags+0x7f/0x3b0 [ 50.110674][ T5071] user_path_at+0x28/0x130 [ 50.110707][ T5071] __se_sys_mount+0x25b/0x2e0 [ 50.110732][ T5071] ? fput+0x8f/0xc0 [ 50.110817][ T5071] __x64_sys_mount+0x67/0x80 [ 50.110845][ T5071] x64_sys_call+0x2cca/0x3000 [ 50.110878][ T5071] do_syscall_64+0xc0/0x2a0 [ 50.110955][ T5071] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 50.110986][ T5071] RIP: 0033:0x7f1081deacb9 [ 50.111006][ T5071] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 50.111110][ T5071] RSP: 002b:00007f1080847028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 50.111129][ T5071] RAX: ffffffffffffffda RBX: 00007f1082065fa0 RCX: 00007f1081deacb9 [ 50.111142][ T5071] RDX: 00002000000002c0 RSI: 0000200000000280 RDI: 0000200000000100 [ 50.111154][ T5071] RBP: 00007f1080847090 R08: 0000200000000440 R09: 0000000000000000 [ 50.111166][ T5071] R10: 000000000000008c R11: 0000000000000246 R12: 0000000000000001 [ 50.111177][ T5071] R13: 00007f1082066038 R14: 00007f1082065fa0 R15: 00007ffc2268d148 [ 50.111195][ T5071] [ 50.340950][ T5080] netlink: 'syz.4.649': attribute type 12 has an invalid length. [ 50.488138][ T5099] netlink: 12 bytes leftover after parsing attributes in process `syz.1.658'. [ 50.515340][ T5101] FAULT_INJECTION: forcing a failure. [ 50.515340][ T5101] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 50.528589][ T5101] CPU: 0 UID: 0 PID: 5101 Comm: syz.1.659 Not tainted syzkaller #0 PREEMPT(voluntary) [ 50.528614][ T5101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 50.528626][ T5101] Call Trace: [ 50.528632][ T5101] [ 50.528677][ T5101] __dump_stack+0x1d/0x30 [ 50.528700][ T5101] dump_stack_lvl+0x95/0xd0 [ 50.528722][ T5101] dump_stack+0x15/0x1b [ 50.528740][ T5101] should_fail_ex+0x263/0x280 [ 50.528796][ T5101] should_fail+0xb/0x20 [ 50.528888][ T5101] should_fail_usercopy+0x1a/0x20 [ 50.528935][ T5101] strncpy_from_user+0x27/0x250 [ 50.529045][ T5101] getname_flags+0xad/0x3b0 [ 50.529067][ T5101] user_path_at+0x28/0x130 [ 50.529093][ T5101] __se_sys_mount+0x25b/0x2e0 [ 50.529111][ T5101] ? fput+0x8f/0xc0 [ 50.529196][ T5101] __x64_sys_mount+0x67/0x80 [ 50.529213][ T5101] x64_sys_call+0x2cca/0x3000 [ 50.529235][ T5101] do_syscall_64+0xc0/0x2a0 [ 50.529261][ T5101] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 50.529324][ T5101] RIP: 0033:0x7f1081deacb9 [ 50.529423][ T5101] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 50.529447][ T5101] RSP: 002b:00007f1080847028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 50.529480][ T5101] RAX: ffffffffffffffda RBX: 00007f1082065fa0 RCX: 00007f1081deacb9 [ 50.529499][ T5101] RDX: 00002000000002c0 RSI: 0000200000000280 RDI: 0000200000000100 [ 50.529654][ T5101] RBP: 00007f1080847090 R08: 0000200000000440 R09: 0000000000000000 [ 50.529666][ T5101] R10: 000000000000008c R11: 0000000000000246 R12: 0000000000000001 [ 50.529677][ T5101] R13: 00007f1082066038 R14: 00007f1082065fa0 R15: 00007ffc2268d148 [ 50.529728][ T5101] [ 50.876777][ T5116] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5116 comm=syz.3.665 [ 51.937018][ T5264] __nla_validate_parse: 4 callbacks suppressed [ 51.937037][ T5264] netlink: 12 bytes leftover after parsing attributes in process `syz.3.725'. [ 51.953850][ T5266] FAULT_INJECTION: forcing a failure. [ 51.953850][ T5266] name failslab, interval 1, probability 0, space 0, times 0 [ 51.966557][ T5266] CPU: 1 UID: 0 PID: 5266 Comm: syz.1.726 Not tainted syzkaller #0 PREEMPT(voluntary) [ 51.966618][ T5266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 51.966631][ T5266] Call Trace: [ 51.966638][ T5266] [ 51.966646][ T5266] __dump_stack+0x1d/0x30 [ 51.966678][ T5266] dump_stack_lvl+0x95/0xd0 [ 51.966791][ T5266] dump_stack+0x15/0x1b [ 51.966818][ T5266] should_fail_ex+0x263/0x280 [ 51.966845][ T5266] should_failslab+0x8c/0xb0 [ 51.966903][ T5266] __kmalloc_node_track_caller_noprof+0xb8/0x590 [ 51.966934][ T5266] ? sidtab_sid2str_get+0xa0/0x130 [ 51.966972][ T5266] ? _raw_spin_unlock_irqrestore+0x9/0x30 [ 51.967066][ T5266] kmemdup_noprof+0x2b/0x70 [ 51.967108][ T5266] sidtab_sid2str_get+0xa0/0x130 [ 51.967143][ T5266] security_sid_to_context_core+0x1eb/0x2e0 [ 51.967208][ T5266] security_sid_to_context+0x27/0x40 [ 51.967242][ T5266] avc_audit_post_callback+0x10f/0x520 [ 51.967448][ T5266] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 51.967491][ T5266] common_lsm_audit+0x1ba/0x230 [ 51.967524][ T5266] ? try_to_unlazy+0x2a7/0x400 [ 51.967555][ T5266] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 51.967602][ T5266] slow_avc_audit+0x14c/0x190 [ 51.967642][ T5266] avc_has_perm+0x144/0x190 [ 51.967667][ T5266] selinux_mount+0x2a3/0x2f0 [ 51.967774][ T5266] security_sb_mount+0x5b/0xa0 [ 51.967792][ T5266] ? path_mount+0x89/0xb90 [ 51.967833][ T5266] path_mount+0xa9/0xb90 [ 51.967857][ T5266] ? user_path_at+0xbf/0x130 [ 51.967886][ T5266] __se_sys_mount+0x28c/0x2e0 [ 51.967905][ T5266] ? fput+0x8f/0xc0 [ 51.968005][ T5266] __x64_sys_mount+0x67/0x80 [ 51.968029][ T5266] x64_sys_call+0x2cca/0x3000 [ 51.968124][ T5266] do_syscall_64+0xc0/0x2a0 [ 51.968188][ T5266] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 51.968213][ T5266] RIP: 0033:0x7f1081deacb9 [ 51.968235][ T5266] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 51.968334][ T5266] RSP: 002b:00007f1080847028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 51.968360][ T5266] RAX: ffffffffffffffda RBX: 00007f1082065fa0 RCX: 00007f1081deacb9 [ 51.968378][ T5266] RDX: 00002000000002c0 RSI: 0000200000000280 RDI: 0000200000000100 [ 51.968395][ T5266] RBP: 00007f1080847090 R08: 0000200000000440 R09: 0000000000000000 [ 51.968408][ T5266] R10: 000000000000008c R11: 0000000000000246 R12: 0000000000000002 [ 51.968423][ T5266] R13: 00007f1082066038 R14: 00007f1082065fa0 R15: 00007ffc2268d148 [ 51.968502][ T5266] [ 52.450042][ T5305] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=205 sclass=netlink_route_socket pid=5305 comm=syz.4.740 [ 52.463541][ T5303] netlink: 12 bytes leftover after parsing attributes in process `syz.1.739'. [ 52.481202][ T5308] FAULT_INJECTION: forcing a failure. [ 52.481202][ T5308] name failslab, interval 1, probability 0, space 0, times 0 [ 52.493891][ T5308] CPU: 0 UID: 0 PID: 5308 Comm: syz.2.741 Not tainted syzkaller #0 PREEMPT(voluntary) [ 52.493930][ T5308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 52.493945][ T5308] Call Trace: [ 52.493953][ T5308] [ 52.493960][ T5308] __dump_stack+0x1d/0x30 [ 52.493986][ T5308] dump_stack_lvl+0x95/0xd0 [ 52.494051][ T5308] dump_stack+0x15/0x1b [ 52.494133][ T5308] should_fail_ex+0x263/0x280 [ 52.494160][ T5308] should_failslab+0x8c/0xb0 [ 52.494188][ T5308] __kmalloc_node_track_caller_noprof+0xb8/0x590 [ 52.494222][ T5308] ? sidtab_sid2str_get+0xa0/0x130 [ 52.494321][ T5308] ? _raw_spin_unlock_irqrestore+0x9/0x30 [ 52.494415][ T5308] kmemdup_noprof+0x2b/0x70 [ 52.494459][ T5308] sidtab_sid2str_get+0xa0/0x130 [ 52.494500][ T5308] security_sid_to_context_core+0x1eb/0x2e0 [ 52.494609][ T5308] security_sid_to_context+0x27/0x40 [ 52.494704][ T5308] avc_audit_post_callback+0x10f/0x520 [ 52.494829][ T5308] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 52.494898][ T5308] common_lsm_audit+0x1ba/0x230 [ 52.494933][ T5308] ? try_to_unlazy+0x2a7/0x400 [ 52.495017][ T5308] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 52.495130][ T5308] slow_avc_audit+0x14c/0x190 [ 52.495169][ T5308] avc_has_perm+0x144/0x190 [ 52.495214][ T5308] selinux_mount+0x2a3/0x2f0 [ 52.495294][ T5308] security_sb_mount+0x5b/0xa0 [ 52.495313][ T5308] ? path_mount+0x89/0xb90 [ 52.495401][ T5308] path_mount+0xa9/0xb90 [ 52.495425][ T5308] ? user_path_at+0xbf/0x130 [ 52.495464][ T5308] __se_sys_mount+0x28c/0x2e0 [ 52.495550][ T5308] ? fput+0x8f/0xc0 [ 52.495584][ T5308] __x64_sys_mount+0x67/0x80 [ 52.495604][ T5308] x64_sys_call+0x2cca/0x3000 [ 52.495629][ T5308] do_syscall_64+0xc0/0x2a0 [ 52.495743][ T5308] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 52.495773][ T5308] RIP: 0033:0x7fba7a60acb9 [ 52.495793][ T5308] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 52.495848][ T5308] RSP: 002b:00007fba79067028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 52.495873][ T5308] RAX: ffffffffffffffda RBX: 00007fba7a885fa0 RCX: 00007fba7a60acb9 [ 52.495890][ T5308] RDX: 00002000000002c0 RSI: 0000200000000280 RDI: 0000200000000100 [ 52.495907][ T5308] RBP: 00007fba79067090 R08: 0000200000000440 R09: 0000000000000000 [ 52.495923][ T5308] R10: 000000000000008c R11: 0000000000000246 R12: 0000000000000002 [ 52.495938][ T5308] R13: 00007fba7a886038 R14: 00007fba7a885fa0 R15: 00007fff95a57278 [ 52.496034][ T5308] [ 52.792327][ T5317] 8021q: VLANs not supported on ip6tnl0 [ 52.897668][ T5340] netlink: 12 bytes leftover after parsing attributes in process `syz.2.753'. [ 52.970123][ T5349] FAULT_INJECTION: forcing a failure. [ 52.970123][ T5349] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 52.983511][ T5349] CPU: 1 UID: 0 PID: 5349 Comm: syz.4.758 Not tainted syzkaller #0 PREEMPT(voluntary) [ 52.983621][ T5349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 52.983639][ T5349] Call Trace: [ 52.983653][ T5349] [ 52.983661][ T5349] __dump_stack+0x1d/0x30 [ 52.983755][ T5349] dump_stack_lvl+0x95/0xd0 [ 52.983781][ T5349] dump_stack+0x15/0x1b [ 52.983800][ T5349] should_fail_ex+0x263/0x280 [ 52.983878][ T5349] should_fail+0xb/0x20 [ 52.983898][ T5349] should_fail_usercopy+0x1a/0x20 [ 52.983919][ T5349] _copy_from_user+0x1c/0xb0 [ 52.983975][ T5349] kstrtouint_from_user+0x69/0xf0 [ 52.983993][ T5349] ? 0xffffffff81000000 [ 52.984005][ T5349] ? selinux_file_permission+0x1e1/0x320 [ 52.984058][ T5349] proc_fail_nth_write+0x50/0x160 [ 52.984118][ T5349] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 52.984143][ T5349] vfs_write+0x269/0x9f0 [ 52.984240][ T5349] ? __rcu_read_unlock+0x4e/0x70 [ 52.984331][ T5349] ? __fget_files+0x184/0x1c0 [ 52.984351][ T5349] ? mutex_lock+0x57/0x90 [ 52.984492][ T5349] ksys_write+0xdc/0x1a0 [ 52.984509][ T5349] __x64_sys_write+0x40/0x50 [ 52.984525][ T5349] x64_sys_call+0x2847/0x3000 [ 52.984549][ T5349] do_syscall_64+0xc0/0x2a0 [ 52.984575][ T5349] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 52.984622][ T5349] RIP: 0033:0x7ff7d77eb58e [ 52.984635][ T5349] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 52.984698][ T5349] RSP: 002b:00007ff7d6286fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 52.984725][ T5349] RAX: ffffffffffffffda RBX: 00007ff7d62876c0 RCX: 00007ff7d77eb58e [ 52.984746][ T5349] RDX: 0000000000000001 RSI: 00007ff7d62870a0 RDI: 0000000000000004 [ 52.984757][ T5349] RBP: 00007ff7d6287090 R08: 0000000000000000 R09: 0000000000000000 [ 52.984768][ T5349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 52.984780][ T5349] R13: 00007ff7d7aa6038 R14: 00007ff7d7aa5fa0 R15: 00007ffcb1089bc8 [ 52.984797][ T5349] [ 53.301567][ T5369] netlink: 12 bytes leftover after parsing attributes in process `syz.3.766'. [ 53.499375][ T5388] netlink: 'syz.1.772': attribute type 1 has an invalid length. [ 53.507517][ T5388] netlink: 'syz.1.772': attribute type 1 has an invalid length. [ 53.515412][ T5388] netlink: 'syz.1.772': attribute type 1 has an invalid length. [ 53.523660][ T5388] netlink: 'syz.1.772': attribute type 1 has an invalid length. [ 53.531623][ T5388] netlink: 'syz.1.772': attribute type 1 has an invalid length. [ 53.539662][ T5388] netlink: 'syz.1.772': attribute type 1 has an invalid length. [ 53.547490][ T5388] netlink: 'syz.1.772': attribute type 1 has an invalid length. [ 53.573047][ T5391] IPVS: set_ctl: invalid protocol: 135 172.20.20.23:20000 [ 53.724990][ T5407] netlink: 48 bytes leftover after parsing attributes in process `syz.1.778'. [ 53.751982][ T5409] netlink: 12 bytes leftover after parsing attributes in process `syz.1.779'. [ 54.204634][ T5436] netlink: 12 bytes leftover after parsing attributes in process `syz.1.790'. [ 54.447538][ T5471] netlink: 12 bytes leftover after parsing attributes in process `syz.3.803'. [ 54.729343][ T5506] netlink: 12 bytes leftover after parsing attributes in process `syz.3.817'. [ 54.850731][ T29] kauditd_printk_skb: 2272 callbacks suppressed [ 54.850830][ T29] audit: type=1400 audit(1769339348.386:10684): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.883649][ T29] audit: type=1400 audit(1769339348.416:10685): avc: denied { read } for pid=5517 comm="syz.3.823" dev="nsfs" ino=4026532393 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 54.905305][ T29] audit: type=1400 audit(1769339348.416:10686): avc: denied { prog_load } for pid=5517 comm="syz.3.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 54.924444][ T29] audit: type=1400 audit(1769339348.416:10687): avc: denied { create } for pid=5517 comm="syz.3.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 54.945246][ T29] audit: type=1400 audit(1769339348.416:10688): avc: denied { create } for pid=5517 comm="syz.3.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 54.966100][ T29] audit: type=1400 audit(1769339348.416:10689): avc: denied { create } for pid=5517 comm="syz.3.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 54.986315][ T29] audit: type=1400 audit(1769339348.416:10690): avc: denied { prog_load } for pid=5517 comm="syz.3.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 54.992499][ T5520] audit: audit_backlog=65 > audit_backlog_limit=64 [ 55.005457][ T29] audit: type=1400 audit(1769339348.416:10691): avc: denied { mounton } for pid=5517 comm="syz.3.823" path="/189/file0" dev="tmpfs" ino=1070 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 55.011995][ T5520] audit: audit_lost=26 audit_rate_limit=0 audit_backlog_limit=64 [ 55.159911][ T5529] netlink: 12 bytes leftover after parsing attributes in process `syz.4.828'. [ 55.323553][ T5553] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 55.330861][ T5553] IPv6: NLM_F_CREATE should be set when creating new route [ 55.338104][ T5553] IPv6: NLM_F_CREATE should be set when creating new route [ 56.113263][ T5622] validate_nla: 26 callbacks suppressed [ 56.113283][ T5622] netlink: 'syz.3.863': attribute type 5 has an invalid length. [ 56.217326][ T5634] sctp: [Deprecated]: syz.3.869 (pid 5634) Use of struct sctp_assoc_value in delayed_ack socket option. [ 56.217326][ T5634] Use struct sctp_sack_info instead [ 56.278588][ T5638] netlink: 'syz.4.870': attribute type 15 has an invalid length. [ 57.321566][ T5706] __nla_validate_parse: 5 callbacks suppressed [ 57.321584][ T5706] netlink: 12 bytes leftover after parsing attributes in process `syz.2.895'. [ 57.497505][ T5732] syz.3.907 (5732): attempted to duplicate a private mapping with mremap. This is not supported. [ 57.590731][ T5743] netlink: 12 bytes leftover after parsing attributes in process `syz.1.909'. [ 57.708549][ T5757] netlink: 4 bytes leftover after parsing attributes in process `syz.1.915'. [ 57.786117][ T5761] macvlan1: entered promiscuous mode [ 57.810814][ T5761] macvlan1: left promiscuous mode [ 58.619366][ T5858] serio: Serial port ttyS3 [ 59.966251][ T29] kauditd_printk_skb: 2420 callbacks suppressed [ 59.966299][ T29] audit: type=1400 audit(1769339353.496:13111): avc: denied { create } for pid=5912 comm="syz.1.975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 59.993583][ T29] audit: type=1400 audit(1769339353.496:13112): avc: denied { create } for pid=5910 comm="syz.0.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 60.015784][ T29] audit: type=1400 audit(1769339353.506:13113): avc: denied { create } for pid=5910 comm="syz.0.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 60.035337][ T29] audit: type=1400 audit(1769339353.506:13114): avc: denied { execmem } for pid=5912 comm="syz.1.975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 60.054751][ T29] audit: type=1400 audit(1769339353.526:13115): avc: denied { create } for pid=5912 comm="syz.1.975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 60.075451][ T29] audit: type=1400 audit(1769339353.526:13116): avc: denied { create } for pid=5912 comm="syz.1.975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 60.095946][ T29] audit: type=1400 audit(1769339353.536:13117): avc: denied { open } for pid=5912 comm="syz.1.975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 60.141433][ T29] audit: type=1400 audit(1769339353.566:13118): avc: denied { map_create } for pid=5911 comm="syz.4.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 60.160707][ T29] audit: type=1400 audit(1769339353.566:13119): avc: denied { prog_load } for pid=5911 comm="syz.4.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 60.179902][ T29] audit: type=1400 audit(1769339353.586:13120): avc: denied { read write } for pid=5911 comm="syz.4.977" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 60.312018][ T5947] SELinux: syz.2.987 (5947) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 60.521134][ T5980] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1001'. [ 60.702001][ T6005] FAULT_INJECTION: forcing a failure. [ 60.702001][ T6005] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 60.715330][ T6005] CPU: 1 UID: 0 PID: 6005 Comm: syz.3.1011 Not tainted syzkaller #0 PREEMPT(voluntary) [ 60.715371][ T6005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 60.715388][ T6005] Call Trace: [ 60.715396][ T6005] [ 60.715406][ T6005] __dump_stack+0x1d/0x30 [ 60.715437][ T6005] dump_stack_lvl+0x95/0xd0 [ 60.715469][ T6005] dump_stack+0x15/0x1b [ 60.715501][ T6005] should_fail_ex+0x263/0x280 [ 60.715521][ T6005] should_fail+0xb/0x20 [ 60.715537][ T6005] should_fail_usercopy+0x1a/0x20 [ 60.715557][ T6005] _copy_from_iter+0xcf/0xea0 [ 60.715588][ T6005] ? lockref_put_return+0xf7/0x130 [ 60.715612][ T6005] ? __rcu_read_unlock+0x4e/0x70 [ 60.715630][ T6005] copy_page_from_iter+0x178/0x2a0 [ 60.715669][ T6005] tun_get_user+0xbbd/0x27c0 [ 60.715695][ T6005] ? ref_tracker_alloc+0x1f2/0x2f0 [ 60.715717][ T6005] tun_chr_write_iter+0x15e/0x210 [ 60.715791][ T6005] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 60.715810][ T6005] vfs_write+0x5a6/0x9f0 [ 60.715846][ T6005] ksys_write+0xdc/0x1a0 [ 60.715892][ T6005] __x64_sys_write+0x40/0x50 [ 60.715912][ T6005] x64_sys_call+0x2847/0x3000 [ 60.715940][ T6005] do_syscall_64+0xc0/0x2a0 [ 60.715966][ T6005] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 60.715986][ T6005] RIP: 0033:0x7fc921beb58e [ 60.716007][ T6005] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 60.716033][ T6005] RSP: 002b:00007fc920686fb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 60.716113][ T6005] RAX: ffffffffffffffda RBX: 00007fc9206876c0 RCX: 00007fc921beb58e [ 60.716132][ T6005] RDX: 0000000000000036 RSI: 0000200000000300 RDI: 00000000000000c8 [ 60.716168][ T6005] RBP: 00007fc920687090 R08: 0000000000000000 R09: 0000000000000000 [ 60.716185][ T6005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 60.716201][ T6005] R13: 00007fc921ea6038 R14: 00007fc921ea5fa0 R15: 00007ffe43591198 [ 60.716279][ T6005] [ 61.084369][ T6015] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1014'. [ 61.140546][ T6026] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1026'. [ 61.302200][ T6044] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27766 sclass=netlink_route_socket pid=6044 comm=syz.3.1027 [ 61.456498][ T6056] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1032'. [ 61.744428][ T6081] FAULT_INJECTION: forcing a failure. [ 61.744428][ T6081] name failslab, interval 1, probability 0, space 0, times 0 [ 61.757503][ T6081] CPU: 0 UID: 0 PID: 6081 Comm: syz.1.1042 Not tainted syzkaller #0 PREEMPT(voluntary) [ 61.757537][ T6081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 61.757554][ T6081] Call Trace: [ 61.757563][ T6081] [ 61.757573][ T6081] __dump_stack+0x1d/0x30 [ 61.757605][ T6081] dump_stack_lvl+0x95/0xd0 [ 61.757701][ T6081] dump_stack+0x15/0x1b [ 61.757786][ T6081] should_fail_ex+0x263/0x280 [ 61.757815][ T6081] should_failslab+0x8c/0xb0 [ 61.757843][ T6081] kmem_cache_alloc_node_noprof+0x6a/0x4a0 [ 61.757871][ T6081] ? __alloc_skb+0x2f0/0x4b0 [ 61.757892][ T6081] __alloc_skb+0x2f0/0x4b0 [ 61.757925][ T6081] ? __alloc_skb+0x219/0x4b0 [ 61.757949][ T6081] __ip_append_data+0x19a3/0x2460 [ 61.757982][ T6081] ? __pfx_ip_reply_glue_bits+0x10/0x10 [ 61.758016][ T6081] ? __rcu_read_unlock+0x33/0x70 [ 61.758074][ T6081] ? ipv4_mtu+0x210/0x230 [ 61.758093][ T6081] ip_send_unicast_reply+0x6ac/0xbf0 [ 61.758127][ T6081] tcp_v4_send_reset+0xf0f/0x11e0 [ 61.758153][ T6081] ? tcp_v4_send_reset+0xc55/0x11e0 [ 61.758262][ T6081] tcp_v4_rcv+0x15a9/0x1f80 [ 61.758292][ T6081] ? __pfx_tcp_v4_rcv+0x10/0x10 [ 61.758315][ T6081] ip_protocol_deliver_rcu+0x397/0x780 [ 61.758368][ T6081] ip_local_deliver_finish+0x1fc/0x2f0 [ 61.758396][ T6081] ip_local_deliver+0xe8/0x1e0 [ 61.758423][ T6081] ? __pfx_ip_local_deliver_finish+0x10/0x10 [ 61.758474][ T6081] ip_rcv_finish+0x194/0x1c0 [ 61.758568][ T6081] ip_rcv+0x62/0x160 [ 61.758604][ T6081] ? __pfx_ip_rcv_finish+0x10/0x10 [ 61.758694][ T6081] ? __pfx_ip_rcv+0x10/0x10 [ 61.758721][ T6081] __netif_receive_skb+0xff/0x270 [ 61.758760][ T6081] ? tun_rx_batched+0xd1/0x440 [ 61.758836][ T6081] netif_receive_skb+0x4b/0x2d0 [ 61.758911][ T6081] ? should_failslab+0x8c/0xb0 [ 61.758932][ T6081] ? tun_rx_batched+0xd1/0x440 [ 61.758999][ T6081] tun_rx_batched+0x106/0x440 [ 61.759020][ T6081] ? eth_type_trans+0x215/0x3d0 [ 61.759125][ T6081] tun_get_user+0x2011/0x27c0 [ 61.759149][ T6081] ? ref_tracker_alloc+0x1f2/0x2f0 [ 61.759172][ T6081] tun_chr_write_iter+0x15e/0x210 [ 61.759323][ T6081] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 61.759342][ T6081] vfs_write+0x5a6/0x9f0 [ 61.759377][ T6081] ksys_write+0xdc/0x1a0 [ 61.759393][ T6081] __x64_sys_write+0x40/0x50 [ 61.759409][ T6081] x64_sys_call+0x2847/0x3000 [ 61.759487][ T6081] do_syscall_64+0xc0/0x2a0 [ 61.759721][ T6081] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 61.759752][ T6081] RIP: 0033:0x7f1081dab58e [ 61.759766][ T6081] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 61.759787][ T6081] RSP: 002b:00007f1080846fb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 61.759805][ T6081] RAX: ffffffffffffffda RBX: 00007f10808476c0 RCX: 00007f1081dab58e [ 61.759895][ T6081] RDX: 0000000000000036 RSI: 0000200000000300 RDI: 00000000000000c8 [ 61.759909][ T6081] RBP: 00007f1080847090 R08: 0000000000000000 R09: 0000000000000000 [ 61.759921][ T6081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 61.759961][ T6081] R13: 00007f1082066038 R14: 00007f1082065fa0 R15: 00007ffc2268d148 [ 61.759978][ T6081] [ 62.136517][ T6089] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1045'. [ 62.228704][ T6101] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1052'. [ 62.553117][ T6107] FAULT_INJECTION: forcing a failure. [ 62.553117][ T6107] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 62.566917][ T6107] CPU: 1 UID: 0 PID: 6107 Comm: syz.1.1055 Not tainted syzkaller #0 PREEMPT(voluntary) [ 62.567034][ T6107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 62.567131][ T6107] Call Trace: [ 62.567139][ T6107] [ 62.567149][ T6107] __dump_stack+0x1d/0x30 [ 62.567228][ T6107] dump_stack_lvl+0x95/0xd0 [ 62.567284][ T6107] dump_stack+0x15/0x1b [ 62.567348][ T6107] should_fail_ex+0x263/0x280 [ 62.567370][ T6107] should_fail+0xb/0x20 [ 62.567428][ T6107] should_fail_usercopy+0x1a/0x20 [ 62.567451][ T6107] _copy_to_user+0x20/0xa0 [ 62.567500][ T6107] simple_read_from_buffer+0xb5/0x130 [ 62.567546][ T6107] proc_fail_nth_read+0x10e/0x150 [ 62.567584][ T6107] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 62.567622][ T6107] vfs_read+0x1ab/0x7f0 [ 62.567787][ T6107] ? __rcu_read_unlock+0x4e/0x70 [ 62.567807][ T6107] ? __fget_files+0x184/0x1c0 [ 62.567878][ T6107] ? mutex_lock+0x57/0x90 [ 62.567905][ T6107] ksys_read+0xdc/0x1a0 [ 62.567945][ T6107] __x64_sys_read+0x40/0x50 [ 62.568039][ T6107] x64_sys_call+0x2889/0x3000 [ 62.568067][ T6107] do_syscall_64+0xc0/0x2a0 [ 62.568104][ T6107] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 62.568133][ T6107] RIP: 0033:0x7f1081dab58e [ 62.568159][ T6107] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 62.568184][ T6107] RSP: 002b:00007f1080846fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 62.568209][ T6107] RAX: ffffffffffffffda RBX: 00007f10808476c0 RCX: 00007f1081dab58e [ 62.568227][ T6107] RDX: 000000000000000f RSI: 00007f10808470a0 RDI: 0000000000000007 [ 62.568243][ T6107] RBP: 00007f1080847090 R08: 0000000000000000 R09: 0000000000000000 [ 62.568264][ T6107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 62.568279][ T6107] R13: 00007f1082066038 R14: 00007f1082065fa0 R15: 00007ffc2268d148 [ 62.568303][ T6107] [ 62.801108][ T6120] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1059'. [ 62.981724][ T6146] ================================================================== [ 62.989886][ T6146] BUG: KCSAN: data-race in hrtimer_interrupt / print_cpu [ 62.996947][ T6146] [ 62.999291][ T6146] read-write to 0xffff888237c1b854 of 4 bytes by interrupt on cpu 0: [ 63.007385][ T6146] hrtimer_interrupt+0x70/0x460 [ 63.012288][ T6146] __sysvec_apic_timer_interrupt+0x5f/0x1d0 [ 63.018224][ T6146] sysvec_apic_timer_interrupt+0x6f/0x80 [ 63.023902][ T6146] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 63.029924][ T6146] _raw_spin_unlock_irq+0x12/0x30 [ 63.035021][ T6146] get_signal+0xc18/0xf60 [ 63.039486][ T6146] arch_do_signal_or_restart+0x96/0x450 [ 63.045060][ T6146] irqentry_exit+0xf7/0x510 [ 63.049592][ T6146] asm_exc_page_fault+0x26/0x30 [ 63.054482][ T6146] [ 63.056825][ T6146] read to 0xffff888237c1b854 of 4 bytes by task 6146 on cpu 1: [ 63.064382][ T6146] print_cpu+0x338/0x660 [ 63.068758][ T6146] timer_list_show+0x107/0x170 [ 63.073561][ T6146] seq_read_iter+0x636/0x940 [ 63.078192][ T6146] proc_reg_read_iter+0x110/0x180 [ 63.083266][ T6146] copy_splice_read+0x471/0x6c0 [ 63.088162][ T6146] splice_direct_to_actor+0x26e/0x670 [ 63.093584][ T6146] do_splice_direct+0x119/0x1a0 [ 63.098483][ T6146] do_sendfile+0x380/0x650 [ 63.102939][ T6146] __x64_sys_sendfile64+0x105/0x150 [ 63.108180][ T6146] x64_sys_call+0x2db1/0x3000 [ 63.112900][ T6146] do_syscall_64+0xc0/0x2a0 [ 63.117451][ T6146] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 63.123660][ T6146] [ 63.126060][ T6146] value changed: 0x00006d45 -> 0x00006d46 [ 63.131803][ T6146] [ 63.134183][ T6146] Reported by Kernel Concurrency Sanitizer on: [ 63.140356][ T6146] CPU: 1 UID: 0 PID: 6146 Comm: syz.4.1066 Not tainted syzkaller #0 PREEMPT(voluntary) [ 63.150102][ T6146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 63.160185][ T6146] ================================================================== [ 65.356606][ T29] kauditd_printk_skb: 1369 callbacks suppressed [ 65.356624][ T29] audit: type=1400 audit(1769339358.886:14490): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0