last executing test programs: 1.367799038s ago: executing program 0 (id=495): socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) close(0x3) socket$l2tp6(0xa, 0x2, 0x73) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x5, '\x00', 0x0, @flow_dissector}, 0x94) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) ioperm(0x0, 0x2, 0x7e) gettid() acct(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = mq_open(&(0x7f0000000000)='!selinu\xff\x7f\x00\x00inux\x00T\x8b\xb5\xf3\xcb\xdd\xe3\xbf2\x86\x01\x84\xdd\x8a\x8f_l\xa1L\xb1\xef\xb2\xc9\xf7+C\xb2\x8e9\xb8\xec\x1a\xe5\xaeq\x8fZ\xff\xbcY+\xaf0<\xa3\xb8\"Zm\x1c\x18\x11\x93\xb5z \xc2\x8b\xa9\xc5\x9es\t\xfe\x002\xa0-\xaf\xcdP\x9f\xe5Iv\xce*\xa8\xa3\x14i\x05\x8f\x9b\x1eB\x9f\x9d#E\x19\xdc\xfe\xc7\xeb\xb5\xcd\xc8\xe2U\xce\x00\x00', 0x6e93ebbbcc0884f2, 0x2c, &(0x7f0000000300)={0x0, 0x1, 0x3}) mq_timedsend(r1, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xa, 0x0) mq_timedreceive(r1, &(0x7f0000000340)=""/200, 0xc8, 0x0, 0x0) 1.33426119s ago: executing program 0 (id=496): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x141301) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000c80)={0xe0, 0x0, 0x2, 0x301, 0x0, 0x0, {0x7, 0x0, 0x2}, [@CTA_EXPECT_MASK={0x9c, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010101}, {0x8, 0x2, @broadcast}}}]}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'sip-20000\x00'}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'snmp_trap\x00'}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'sip-20000\x00'}]}, 0xe0}, 0x1, 0x0, 0x0, 0x40010}, 0x4008000) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) r3 = dup(r2) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x103, 0x100, 0x551}}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r4, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000802}, 0x8000) r5 = socket(0x10, 0x803, 0x0) mbind(&(0x7f0000400000/0xc00000)=nil, 0xc01100, 0x0, 0x0, 0x0, 0x2) sendto(r5, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x321}, {&(0x7f0000000280)=""/85, 0x21}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000580)=""/106, 0x659}, {&(0x7f0000000980)=""/73, 0xd}, {&(0x7f0000000200)=""/77, 0x69}, {&(0x7f00000007c0)=""/141, 0xc4}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}, 0x5}], 0x4000000000003b4, 0x2000, &(0x7f0000003700)={0x77359400}) ioctl$USBDEVFS_CONTROL(r1, 0xc0105500, &(0x7f00000000c0)={0x80, 0xa, 0x303, 0x0, 0x0, 0x6e9, 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c80)={'lo\x00'}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001580)=ANY=[@ANYBLOB="600000000206030000000000b8791fa80000000014000780080012400000000005001500010000000500010006000000050005000200000005000400000000000900020073797a310000000012000300686173683a6e65742c706f7274"], 0x60}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r6, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x3, 0x1, 0x401, 0x0, 0x0, {0x0, 0x0, 0x1}, [@CTA_SYNPROXY={0x34, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x3}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x1b}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x5}, @CTA_SYNPROXY_ITS={0x8}]}, @CTA_TUPLE_MASTER={0xc, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0xa7e4a71329317a60}, 0x20000000) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)={0x54, 0x9, 0x6, 0x201, 0x0, 0x0, {0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010100}}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x84}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) 1.253948885s ago: executing program 0 (id=500): socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000900)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) dup(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) 927.211994ms ago: executing program 1 (id=506): socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) close(0x3) socket$l2tp6(0xa, 0x2, 0x73) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x5, '\x00', 0x0, @flow_dissector}, 0x94) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) ioperm(0x0, 0x2, 0x7e) gettid() acct(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r0 = mq_open(&(0x7f0000000000)='!selinu\xff\x7f\x00\x00inux\x00T\x8b\xb5\xf3\xcb\xdd\xe3\xbf2\x86\x01\x84\xdd\x8a\x8f_l\xa1L\xb1\xef\xb2\xc9\xf7+C\xb2\x8e9\xb8\xec\x1a\xe5\xaeq\x8fZ\xff\xbcY+\xaf0<\xa3\xb8\"Zm\x1c\x18\x11\x93\xb5z \xc2\x8b\xa9\xc5\x9es\t\xfe\x002\xa0-\xaf\xcdP\x9f\xe5Iv\xce*\xa8\xa3\x14i\x05\x8f\x9b\x1eB\x9f\x9d#E\x19\xdc\xfe\xc7\xeb\xb5\xcd\xc8\xe2U\xce\x00\x00', 0x6e93ebbbcc0884f2, 0x2c, &(0x7f0000000300)={0x0, 0x1, 0x3}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xa, 0x0) mq_timedreceive(r0, &(0x7f0000000340)=""/200, 0xc8, 0x0, 0x0) 886.239367ms ago: executing program 1 (id=509): r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7, 0x8, 0x5, 0x7, 0x0, 0x5, 0x4001, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40001, 0x2, @perf_config_ext={0x7fff, 0x1}, 0x100997, 0x7ff, 0x7, 0x6, 0x800084, 0x2, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x8, 0x8, 0x100000008, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'veth1_vlan\x00', 0x0}) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x88182, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}, {&(0x7f0000000080)="7d88627a", 0x4}], 0x2) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000180)={0x15, 0x3, &(0x7f0000000140)="0416ca"}) mlock2(&(0x7f0000029000/0x2000)=nil, 0x2000, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x1, r2, 0x1, 0x9}, 0x14) r4 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@getchain={0x24, 0x11, 0x1, 0x70bd2a, 0x2000001, {0x0, 0x0, 0x0, r2, {0x7, 0xa}, {0xf, 0xffe0}, {0xd, 0x9}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20058054) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12011, r0, 0x0) 730.291726ms ago: executing program 1 (id=518): r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7, 0x8, 0x5, 0x7, 0x0, 0x5, 0x4001, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40001, 0x2, @perf_config_ext={0x7fff, 0x1}, 0x100997, 0x7ff, 0x7, 0x6, 0x800084, 0x2, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'veth1_vlan\x00', 0x0}) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x88182, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}, {&(0x7f0000000080)="7d88627a", 0x4}], 0x2) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000180)={0x15, 0x3, &(0x7f0000000140)="0416ca"}) mlock2(&(0x7f0000029000/0x2000)=nil, 0x2000, 0x0) bind$packet(r2, &(0x7f0000000680)={0x11, 0x1, r3, 0x1, 0x9}, 0x14) r5 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@getchain={0x24, 0x11, 0x1, 0x70bd2a, 0x2000001, {0x0, 0x0, 0x0, r3, {0x7, 0xa}, {0xf, 0xffe0}, {0xd, 0x9}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20058054) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12011, r0, 0x0) 681.067309ms ago: executing program 2 (id=519): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x141301) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000c80)={0xe0, 0x0, 0x2, 0x301, 0x0, 0x0, {0x7, 0x0, 0x2}, [@CTA_EXPECT_MASK={0x9c, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010101}, {0x8, 0x2, @broadcast}}}]}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'sip-20000\x00'}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'snmp_trap\x00'}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'sip-20000\x00'}]}, 0xe0}, 0x1, 0x0, 0x0, 0x40010}, 0x4008000) syz_open_dev$tty1(0xc, 0x4, 0x4) setsockopt$MRT_INIT(0xffffffffffffffff, 0x0, 0xc8, &(0x7f0000000340), 0x4) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x103, 0x100, 0x551}}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r2, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000802}, 0x8000) r3 = socket(0x10, 0x803, 0x0) mbind(&(0x7f0000400000/0xc00000)=nil, 0xc01100, 0x0, 0x0, 0x0, 0x2) sendto(r3, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x321}, {&(0x7f0000000280)=""/85, 0x21}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000580)=""/106, 0x659}, {&(0x7f0000000980)=""/73, 0xd}, {&(0x7f0000000200)=""/77, 0x69}, {&(0x7f00000007c0)=""/141, 0xc4}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}, 0x5}], 0x4000000000003b4, 0x2000, &(0x7f0000003700)={0x77359400}) ioctl$USBDEVFS_CONTROL(r1, 0xc0105500, &(0x7f00000000c0)={0x80, 0xa, 0x303, 0x0, 0x0, 0x6e9, 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c80)={'lo\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001580)=ANY=[@ANYBLOB="600000000206030000000000b8791fa80000000014000780080012400000000005001500010000000500010006000000050005000200000005000400000000000900020073797a310000000012000300686173683a6e65742c706f7274"], 0x60}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r4, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x3, 0x1, 0x401, 0x0, 0x0, {0x0, 0x0, 0x1}, [@CTA_SYNPROXY={0x34, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x3}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x1b}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x5}, @CTA_SYNPROXY_ITS={0x8}]}, @CTA_TUPLE_MASTER={0xc, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0xa7e4a71329317a60}, 0x20000000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)={0x54, 0x9, 0x6, 0x201, 0x0, 0x0, {0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010100}}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x84}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) 680.611869ms ago: executing program 2 (id=520): removexattr(&(0x7f0000000340)='./cgroup.cpu/cgroup.procs\x00', 0x0) fsopen(0x0, 0x0) fchdir(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) writev(r0, &(0x7f0000000240)=[{0x0}], 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0x2, 0x80805, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000100)={'syzkaller1\x00'}) 666.03208ms ago: executing program 1 (id=522): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0xffff, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) ioperm(0x0, 0x7, 0x80006) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000200)={0x0, 0x0}) times(0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x894) capset(0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3b9ac9ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0xff, 0x0, 0x6, 0x0, 0xfffffffffffffffe, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffe, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) r1 = fsopen(&(0x7f00000001c0)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x98}, 0x50) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000006f40), 0x2002, 0x0) fcntl$setstatus(r3, 0x4, 0x1800) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r3, 0x8983, &(0x7f0000000180)={0x1, 'bridge_slave_1\x00', {}, 0x5}) times(&(0x7f00000002c0)) 619.935553ms ago: executing program 3 (id=523): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010026bd70003c0200000200000008000100", @ANYRES32=r2], 0x1c}}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001100)=@newsa={0x1b0, 0x10, 0x1, 0x0, 0x0, {{@in6=@private1, @in=@private, 0x0, 0xecdf}, {@in=@broadcast, 0x0, 0x32}, @in6=@private1, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, {0x0, 0x800}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xcd}, [@algo_crypt={0x58, 0x2, {{'cbc(aes)\x00'}, 0x80, "e0fad3f10cd3a506627800000000074f"}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x70bd2a}}, @algo_auth_trunc={0x4c, 0x14, {{'hmac(sha256)\x00'}, 0x0, 0x80}}]}, 0x1b0}}, 0x4050) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file2\x00', 0x2200000, &(0x7f00000005c0)={[{@noblock_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@user_xattr}]}, 0x3, 0x56a, &(0x7f00000015c0)="$eJzs3c9rHFUcAPDvbJL+1qZQinqQQA9WajdN4o8KQutRtFjQe12SaSjZdEt2U5pYaHuwFy9SBBEL4h/g3WPxH/CvKGihSAl68BKZzWy7TbL5uXW3zucD0743M5s3b998335nZ5cNoLBGsn9KEa9GxDdJxOG2bYORbxxZ2W/p8Y3JbEliefmzP5NI8nWt/ZP8/4N55ZWI+PWriJOlte3WFxZnKtVqOpfXRxuzV0frC4unLs9WptPp9Mr4xMSZdybG33/v3a719c0Lf3//6f2Pznx9fOm7nx8euZvEuTiUb2vvxy7caq+MxEj+nAzFuVU7jnWhsX6S9PoA2JGBPM6HIpsDDsdAHvXA/9/NiFgGCioR/1BQrTygdW3fpevgF8ajD1cugNb2f3DlvZHY17w2OrCUPHNllF3vDneh/ayNX/64dzdbYpP3IW52oT2Allu3I+L04ODa+S/J57+dO91883hjq9so2usP9NL9LP95a738p/Qk/4l18p+D68TuTmwe/6WHXWimoyz/+2Dd/PfJ1DU8kNdeauZ8Q8mly9X0dES8HBEnYmhvVt/ofs6ZpQfLnba153/ZkrXfygXz43g4uPfZx0xVGpXd9Lndo9sRrz3Nf5NYM//va+a6q8c/ez4ubLGNY+m91ztt27z/7bqfAS//FPHGuuP/9I5WsvH9ydHm+TDaOivW+uvOsd86tb+9/ndfNv4HNu7/cNJ+v7a+/TZ+3PdP2mnbTs//PcnnzfKefN31SqMxNxaxJ/lk7frxp49t1Vv7Z/0/cXzj+W+9839/RHyxxf7fOXqn4679MP5T2xr/7RcefPzlD53a39r4v90sncjXbGX+2+oB7ua5AwAAAAAAgH5TiohDkZTKT8qlUrm88vmOo3GgVK3VGycv1eavTEXzu7LDMVRq3ek+3PZ5iLH887Ct+viq+kREHImIbwf2N+vlyVp1qtedBwAAAAAAAAAAAAAAAAAAgD5xsMP3/zO/D/T66IDnzk9+Q3FtGv/d+KUnoC95/YfiEv9QXOIfikv8Q3GJfygu8Q/FJf6huMQ/AAAAAAAAAAAAAAAAAAAAAAAAAAAAdNWF8+ezZXnp8Y3JrD51bWF+pnbt1FRanynPzk+WJ2tzV8vTtdp0NS1P1mY3+3vVWu3q2HjMXx9tpPXGaH1h8eJsbf5K4+Ll2cp0ejEd+k96BQAAAAAAAAAAAAAAAAAAAC+W+sLiTKVaTecUOhbORl8cxo4LyWajfDY/GXbUxGDvO6jwHAo9npgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoM2/AQAA///fKTPH") r4 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x2014, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0xfffe, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "7b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af", "584cbf2649a50f2dbc43efa8698dfa871c51852e4451b57d037ad3c045942824251d7d17b5191584cdd4fbe40a27424d", "bcfd56f1373669caaa2f19935e6996c7096ffe4f3a4745a8f762b964", {"9a3bfbc1f39cb307b3472eb9cdb042d2", "643fcbb2c5a57df67d544af6e8dafe09"}}}}}}}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x180, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x8, 0x3, 0x320, 0x1a0, 0x43, 0xa0, 0x1a0, 0x98, 0x288, 0x178, 0x178, 0x288, 0x178, 0x49, 0x0, {[{{@ip={@loopback, @local, 0xff, 0x0, 'wg2\x00', 'ip6erspan0\x00'}, 0x12a, 0x178, 0x1a0, 0x0, {0x0, 0x7a010000}, [@common=@unspec=@conntrack2={{0xc0}, {{@ipv4=@empty, [0xff000000, 0xff000000, 0xff, 0xffffff00], @ipv4=@multicast1, [0xff, 0xffffffff, 0xffffff00, 0xffffff00], @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xffffff00, 0xff000000, 0xff000000], @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [0xff000000, 0x0, 0xff], 0x1, 0x8, 0x3a, 0x4e22, 0x4e23, 0x4e22, 0x4e21, 0x0, 0x80}, 0x40, 0x90}}, @common=@unspec=@helper={{0x48}, {0x0, 'ftp-20000\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x2, 0x8}}}, {{@uncond, 0x0, 0xa8, 0xe8, 0x0, {}, [@common=@unspec=@connbytes={{0x38}, {[{0xb}]}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f1c098b60204ed02d82cf440fef5497b80c29d381d41116000"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x380) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) pwritev2(r4, &(0x7f0000000080)=[{&(0x7f0000000280)="14", 0x1}], 0x1, 0x9, 0xfffffffc, 0xa0) 618.852383ms ago: executing program 3 (id=525): socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x5, '\x00', 0x0, @flow_dissector}, 0x94) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) ioperm(0x0, 0x2, 0x7e) gettid() acct(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = mq_open(&(0x7f0000000000)='!selinu\xff\x7f\x00\x00inux\x00T\x8b\xb5\xf3\xcb\xdd\xe3\xbf2\x86\x01\x84\xdd\x8a\x8f_l\xa1L\xb1\xef\xb2\xc9\xf7+C\xb2\x8e9\xb8\xec\x1a\xe5\xaeq\x8fZ\xff\xbcY+\xaf0<\xa3\xb8\"Zm\x1c\x18\x11\x93\xb5z \xc2\x8b\xa9\xc5\x9es\t\xfe\x002\xa0-\xaf\xcdP\x9f\xe5Iv\xce*\xa8\xa3\x14i\x05\x8f\x9b\x1eB\x9f\x9d#E\x19\xdc\xfe\xc7\xeb\xb5\xcd\xc8\xe2U\xce\x00\x00', 0x6e93ebbbcc0884f2, 0x2c, &(0x7f0000000300)={0x0, 0x1, 0x3}) mq_timedsend(r1, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xa, 0x0) mq_timedreceive(r1, &(0x7f0000000340)=""/200, 0xc8, 0x0, 0x0) 615.493993ms ago: executing program 2 (id=526): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x141301) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000c80)={0xe0, 0x0, 0x2, 0x301, 0x0, 0x0, {0x7, 0x0, 0x2}, [@CTA_EXPECT_MASK={0x9c, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010101}, {0x8, 0x2, @broadcast}}}]}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'sip-20000\x00'}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'snmp_trap\x00'}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'sip-20000\x00'}]}, 0xe0}, 0x1, 0x0, 0x0, 0x40010}, 0x4008000) syz_open_dev$tty1(0xc, 0x4, 0x4) setsockopt$MRT_INIT(0xffffffffffffffff, 0x0, 0xc8, &(0x7f0000000340), 0x4) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x103, 0x100, 0x551}}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r2, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000802}, 0x8000) r3 = socket(0x10, 0x803, 0x0) mbind(&(0x7f0000400000/0xc00000)=nil, 0xc01100, 0x0, 0x0, 0x0, 0x2) sendto(r3, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x321}, {&(0x7f0000000280)=""/85, 0x21}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000580)=""/106, 0x659}, {&(0x7f0000000980)=""/73, 0xd}, {&(0x7f0000000200)=""/77, 0x69}, {&(0x7f00000007c0)=""/141, 0xc4}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}, 0x5}], 0x4000000000003b4, 0x2000, &(0x7f0000003700)={0x77359400}) ioctl$USBDEVFS_CONTROL(r1, 0xc0105500, &(0x7f00000000c0)={0x80, 0xa, 0x303, 0x0, 0x0, 0x6e9, 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c80)={'lo\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001580)=ANY=[@ANYBLOB="600000000206030000000000b8791fa80000000014000780080012400000000005001500010000000500010006000000050005000200000005000400000000000900020073797a310000000012000300686173683a6e65742c706f7274"], 0x60}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r4, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x3, 0x1, 0x401, 0x0, 0x0, {0x0, 0x0, 0x1}, [@CTA_SYNPROXY={0x34, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x3}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x1b}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x5}, @CTA_SYNPROXY_ITS={0x8}]}, @CTA_TUPLE_MASTER={0xc, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0xa7e4a71329317a60}, 0x20000000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)={0x54, 0x9, 0x6, 0x201, 0x0, 0x0, {0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010100}}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x84}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) 598.229044ms ago: executing program 4 (id=527): openat$ttyS3(0xffffffffffffff9c, 0x0, 0x42982, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2, 0xc3072, 0xffffffffffffffff, 0x200000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0d000000050000000004b72d0000800000000000000000000000000000000000b6b560bd7cf2e081c7083db03706278b", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="030000000300000003000000000000000000"], 0x50) r1 = getpid() sched_setscheduler(r1, 0x2, 0x0) mmap(&(0x7f00007a3000/0x4000)=nil, 0x4000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x8, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) ptrace$poke(0x5, r0, &(0x7f0000000200), 0x0) 558.584026ms ago: executing program 4 (id=528): r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7, 0x8, 0x5, 0x7, 0x0, 0x5, 0x4001, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40001, 0x2, @perf_config_ext={0x7fff, 0x1}, 0x100997, 0x7ff, 0x7, 0x6, 0x800084, 0x2, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x8, 0x8, 0x100000008, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'veth1_vlan\x00', 0x0}) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x88182, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}, {&(0x7f0000000080)="7d88627a", 0x4}], 0x2) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000180)={0x15, 0x3, &(0x7f0000000140)="0416ca"}) mlock2(&(0x7f0000029000/0x2000)=nil, 0x2000, 0x0) bind$packet(r2, &(0x7f0000000680)={0x11, 0x1, r3, 0x1, 0x9}, 0x14) r5 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@getchain={0x24, 0x11, 0x1, 0x70bd2a, 0x2000001, {0x0, 0x0, 0x0, r3, {0x7, 0xa}, {0xf, 0xffe0}, {0xd, 0x9}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20058054) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12011, r0, 0x0) 558.344526ms ago: executing program 3 (id=529): r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7, 0x8, 0x5, 0x7, 0x0, 0x5, 0x4001, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40001, 0x2, @perf_config_ext={0x7fff, 0x1}, 0x100997, 0x7ff, 0x7, 0x6, 0x800084, 0x2, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x8, 0x8, 0x100000008, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'veth1_vlan\x00', 0x0}) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x88182, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}, {&(0x7f0000000080)="7d88627a", 0x4}], 0x2) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000180)={0x15, 0x3, &(0x7f0000000140)="0416ca"}) mlock2(&(0x7f0000029000/0x2000)=nil, 0x2000, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x1, r2, 0x1, 0x9}, 0x14) r4 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@getchain={0x24, 0x11, 0x1, 0x70bd2a, 0x2000001, {0x0, 0x0, 0x0, r2, {0x7, 0xa}, {0xf, 0xffe0}, {0xd, 0x9}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20058054) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12011, r0, 0x0) 557.956326ms ago: executing program 1 (id=530): r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7, 0x8, 0x5, 0x7, 0x0, 0x5, 0x4001, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40001, 0x2, @perf_config_ext={0x7fff, 0x1}, 0x100997, 0x7ff, 0x7, 0x6, 0x800084, 0x2, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x8, 0x8, 0x100000008, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'veth1_vlan\x00', 0x0}) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x88182, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}, {&(0x7f0000000080)="7d88627a", 0x4}], 0x2) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000180)={0x15, 0x3, &(0x7f0000000140)="0416ca"}) mlock2(&(0x7f0000029000/0x2000)=nil, 0x2000, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x1, r2, 0x1, 0x9}, 0x14) r4 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@getchain={0x24, 0x11, 0x1, 0x70bd2a, 0x2000001, {0x0, 0x0, 0x0, r2, {0x7, 0xa}, {0xf, 0xffe0}, {0xd, 0x9}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20058054) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12011, r0, 0x0) 498.82907ms ago: executing program 1 (id=531): r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000100)={0x20000014}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000000)={0xa0000001}) ppoll(&(0x7f0000000200)=[{r3, 0x109}], 0x1, 0x0, 0x0, 0x0) epoll_wait(r3, &(0x7f0000000140)=[{}], 0x1, 0xffffffff) socket(0x10, 0x3, 0x0) r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}}, @NFT_MSG_DELFLOWTABLE={0x14, 0x18, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x9}}], {0x14, 0x11, 0x1, 0x0, 0x0, {0xa}}}, 0x50}, 0x1, 0x0, 0x0, 0x8045}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) unshare(0x22020600) pselect6(0x40, &(0x7f0000001fc0)={0x8, 0x6000, 0x9557, 0x68, 0x3908, 0xfffffffffffffff7, 0x8, 0x5}, 0x0, 0x0, 0x0, 0x0) 498.51969ms ago: executing program 3 (id=532): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r3, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="540000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002c0012800e0001006970366772657461700000001800028014000700fc00000000000000000000000000000008000a00", @ANYRES32=r6], 0x54}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="200000001000250800170000000000000a000000", @ANYRES32, @ANYBLOB="0174"], 0x20}}, 0x0) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000007c0)=@newlink={0x50, 0x10, 0xf11, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x104}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x20, 0x20}}}}}}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 498.12706ms ago: executing program 2 (id=533): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0x4d, 0xfffffffb, 0x7fffffff}}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) sendmsg$nl_route_sched(r3, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001740)=@newqdisc={0x58, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdf8, {0x0, 0x0, 0x0, r5, {0x10}, {}, {0xa, 0x3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x2c, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x81, 0x0, 0x9, 0x4, 0x6, 0x4}, {0x7, 0x1, 0x0, 0x800, 0x7, 0x400}, 0x10001, 0x16f, 0x19a3}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40098}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r7 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r7, &(0x7f0000000200)="2478546ca4fa3b0bfe4ddf30cc", 0xd, 0x4000050, &(0x7f00000001c0)={0x11, 0xf7, r6, 0x1, 0xd8, 0x6, @multicast}, 0x14) 497.59012ms ago: executing program 4 (id=534): bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETA(r0, 0x560a, &(0x7f0000001040)={0x0, 0x1, 0x4, 0x20, 0x0, "0000e5ff0100"}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x2}, 0x10, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_setup(0x2000049a, &(0x7f0000000400)={0x0, 0x15cc, 0x40, 0x8000, 0x400246}, &(0x7f0000000340)=0x0, &(0x7f0000000280)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_mount_image$iso9660(&(0x7f0000000cc0), &(0x7f0000000180)='./file3\x00', 0x1004081, &(0x7f00000002c0)=ANY=[@ANYRES16=0x0, @ANYRESDEC=0x0], 0x10, 0x7f4, &(0x7f0000000d80)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b0000"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) socket$inet_icmp(0x2, 0x2, 0x1) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="5c000000090601080000000000000000070000000900020073797a31000000000500010007000000340007801800018014000240fc000000000000000000000000000000060004400e1f00000500070088000000060005404e1f0000c37852360bdb1601"], 0x5c}, 0x1, 0x0, 0x0, 0x10000042}, 0x90) r2 = socket$inet(0x2, 0x2, 0x1) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x44010) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4208, r3) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000000)=r3) sendmsg$inet(r2, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0x4f21, @loopback}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000300)="0800c8460f2a2a2a", 0x8}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000000) 419.815455ms ago: executing program 3 (id=535): socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) close(0x3) socket$l2tp6(0xa, 0x2, 0x73) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x5, '\x00', 0x0, @flow_dissector}, 0x94) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) ioperm(0x0, 0x2, 0x7e) gettid() acct(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r0 = mq_open(&(0x7f0000000000)='!selinu\xff\x7f\x00\x00inux\x00T\x8b\xb5\xf3\xcb\xdd\xe3\xbf2\x86\x01\x84\xdd\x8a\x8f_l\xa1L\xb1\xef\xb2\xc9\xf7+C\xb2\x8e9\xb8\xec\x1a\xe5\xaeq\x8fZ\xff\xbcY+\xaf0<\xa3\xb8\"Zm\x1c\x18\x11\x93\xb5z \xc2\x8b\xa9\xc5\x9es\t\xfe\x002\xa0-\xaf\xcdP\x9f\xe5Iv\xce*\xa8\xa3\x14i\x05\x8f\x9b\x1eB\x9f\x9d#E\x19\xdc\xfe\xc7\xeb\xb5\xcd\xc8\xe2U\xce\x00\x00', 0x6e93ebbbcc0884f2, 0x2c, &(0x7f0000000300)={0x0, 0x1, 0x3}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xa, 0x0) mq_timedreceive(r0, &(0x7f0000000340)=""/200, 0xc8, 0x0, 0x0) 358.475958ms ago: executing program 3 (id=536): syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6e6f6e756d7461696c3d302c636865636b3d7374726963742c756d61736b3d30303030303030303030303030303030303133363033302c756e695f786c6174653d312c756e695f786c6174653d302c666d61736b3d30303030303030303030303039303030303030303034302c757466383d302c6e6f6e756d7461696c3d302c73686f72746e616d653d77696e39352c73686f72746e616d653d6c6f7765722c73686f72746e616d653d77696e6e742c756e695f786c6174653d312c74696d655f6f66667365743d3078303030303030303030303030303166622c666c7573682c756e695f786c6174653d302c73686f72746e616d653d77696e39352c00208893fdd4787adad4209069"], 0x1, 0x2b0, &(0x7f0000000280)="$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") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) write$P9_RGETLOCK(r0, &(0x7f0000000640)=ANY=[], 0x200002e6) fcntl$setpipe(r0, 0x407, 0x7000000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0xf2de1000) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) syz_open_dev$sg(0x0, 0x6, 0xc0040) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d459d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x0, 0x1, 0x1000, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x8f0, &(0x7f0000002400)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x30e, &(0x7f0000000f00)="$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") openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000040), 0x4) socket$can_j1939(0x1d, 0x2, 0x7) 207.619147ms ago: executing program 4 (id=537): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x30, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="24000000190001000000000000c3b2000a0000000003c8000000000008000600ffffffff"], 0x24}, 0x1, 0x0, 0x0, 0x40080}, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000000)=0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x209, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x81, 0x3fff8000}, 0x404, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2008}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/31], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x18, 0x7ffc1fff}]}) getrusage(0x1, &(0x7f00000011c0)) gettid() sendmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000640)='Q', 0x1}], 0x1, 0x0, 0xa0}, 0x4004881) ioctl$sock_SIOCSPGRP(r0, 0x8902, 0x0) gettimeofday(0x0, 0xffffffffffffffff) 202.574508ms ago: executing program 2 (id=538): openat$ttyS3(0xffffffffffffff9c, 0x0, 0x42982, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2, 0xc3072, 0xffffffffffffffff, 0x200000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0d000000050000000004b72d0000800000000000000000000000000000000000b6b560bd7cf2e081c7083db03706278b", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="030000000300000003000000000000000000"], 0x50) r1 = getpid() sched_setscheduler(r1, 0x2, 0x0) mmap(&(0x7f00007a3000/0x4000)=nil, 0x4000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x8, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) ptrace$poke(0x5, r0, &(0x7f0000000200), 0x0) 127.154142ms ago: executing program 2 (id=539): socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) close(0x3) socket$l2tp6(0xa, 0x2, 0x73) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x5, '\x00', 0x0, @flow_dissector}, 0x94) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) ioperm(0x0, 0x2, 0x7e) gettid() acct(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = mq_open(&(0x7f0000000000)='!selinu\xff\x7f\x00\x00inux\x00T\x8b\xb5\xf3\xcb\xdd\xe3\xbf2\x86\x01\x84\xdd\x8a\x8f_l\xa1L\xb1\xef\xb2\xc9\xf7+C\xb2\x8e9\xb8\xec\x1a\xe5\xaeq\x8fZ\xff\xbcY+\xaf0<\xa3\xb8\"Zm\x1c\x18\x11\x93\xb5z \xc2\x8b\xa9\xc5\x9es\t\xfe\x002\xa0-\xaf\xcdP\x9f\xe5Iv\xce*\xa8\xa3\x14i\x05\x8f\x9b\x1eB\x9f\x9d#E\x19\xdc\xfe\xc7\xeb\xb5\xcd\xc8\xe2U\xce\x00\x00', 0x6e93ebbbcc0884f2, 0x2c, &(0x7f0000000300)={0x0, 0x1, 0x3}) mq_timedsend(r1, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0xa, 0x0) mq_timedreceive(r1, &(0x7f0000000340)=""/200, 0xc8, 0x0, 0x0) 126.206362ms ago: executing program 0 (id=540): socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) close(0x3) socket$l2tp6(0xa, 0x2, 0x73) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x5, '\x00', 0x0, @flow_dissector}, 0x94) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) ioperm(0x0, 0x2, 0x7e) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r0 = mq_open(&(0x7f0000000000)='!selinu\xff\x7f\x00\x00inux\x00T\x8b\xb5\xf3\xcb\xdd\xe3\xbf2\x86\x01\x84\xdd\x8a\x8f_l\xa1L\xb1\xef\xb2\xc9\xf7+C\xb2\x8e9\xb8\xec\x1a\xe5\xaeq\x8fZ\xff\xbcY+\xaf0<\xa3\xb8\"Zm\x1c\x18\x11\x93\xb5z \xc2\x8b\xa9\xc5\x9es\t\xfe\x002\xa0-\xaf\xcdP\x9f\xe5Iv\xce*\xa8\xa3\x14i\x05\x8f\x9b\x1eB\x9f\x9d#E\x19\xdc\xfe\xc7\xeb\xb5\xcd\xc8\xe2U\xce\x00\x00', 0x6e93ebbbcc0884f2, 0x2c, &(0x7f0000000300)={0x0, 0x1, 0x3}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0xa, 0x0) mq_timedreceive(r0, &(0x7f0000000340)=""/200, 0xc8, 0x0, 0x0) 50.392797ms ago: executing program 0 (id=541): r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7, 0x8, 0x5, 0x7, 0x0, 0x5, 0x4001, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40001, 0x2, @perf_config_ext={0x7fff, 0x1}, 0x100997, 0x7ff, 0x7, 0x6, 0x800084, 0x2, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'veth1_vlan\x00', 0x0}) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x88182, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}, {&(0x7f0000000080)="7d88627a", 0x4}], 0x2) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000180)={0x15, 0x3, &(0x7f0000000140)="0416ca"}) mlock2(&(0x7f0000029000/0x2000)=nil, 0x2000, 0x0) bind$packet(r2, &(0x7f0000000680)={0x11, 0x1, r3, 0x1, 0x9}, 0x14) r5 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@getchain={0x24, 0x11, 0x1, 0x70bd2a, 0x2000001, {0x0, 0x0, 0x0, r3, {0x7, 0xa}, {0xf, 0xffe0}, {0xd, 0x9}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20058054) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12011, r0, 0x0) 49.954037ms ago: executing program 0 (id=542): r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7, 0x8, 0x5, 0x7, 0x0, 0x5, 0x4001, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40001, 0x2, @perf_config_ext={0x7fff, 0x1}, 0x100997, 0x7ff, 0x7, 0x6, 0x800084, 0x2, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'veth1_vlan\x00', 0x0}) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x88182, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}, {&(0x7f0000000080)="7d88627a", 0x4}], 0x2) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000180)={0x15, 0x3, &(0x7f0000000140)="0416ca"}) mlock2(&(0x7f0000029000/0x2000)=nil, 0x2000, 0x0) bind$packet(r2, &(0x7f0000000680)={0x11, 0x1, r3, 0x1, 0x9}, 0x14) r5 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@getchain={0x24, 0x11, 0x1, 0x70bd2a, 0x2000001, {0x0, 0x0, 0x0, r3, {0x7, 0xa}, {0xf, 0xffe0}, {0xd, 0x9}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20058054) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12011, r0, 0x0) 36.777067ms ago: executing program 4 (id=543): r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7, 0x8, 0x5, 0x7, 0x0, 0x5, 0x4001, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40001, 0x2, @perf_config_ext={0x7fff, 0x1}, 0x100997, 0x7ff, 0x7, 0x6, 0x800084, 0x2, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x8, 0x8, 0x100000008, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'veth1_vlan\x00', 0x0}) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x88182, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}, {&(0x7f0000000080)="7d88627a", 0x4}], 0x2) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000180)={0x15, 0x3, &(0x7f0000000140)="0416ca"}) mlock2(&(0x7f0000029000/0x2000)=nil, 0x2000, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x1, r2, 0x1, 0x9}, 0x14) r4 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@getchain={0x24, 0x11, 0x1, 0x70bd2a, 0x2000001, {0x0, 0x0, 0x0, r2, {0x7, 0xa}, {0xf, 0xffe0}, {0xd, 0x9}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20058054) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x12011, r0, 0x0) 0s ago: executing program 4 (id=544): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x141301) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000c80)={0xe0, 0x0, 0x2, 0x301, 0x0, 0x0, {0x7, 0x0, 0x2}, [@CTA_EXPECT_MASK={0x9c, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010101}, {0x8, 0x2, @broadcast}}}]}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'sip-20000\x00'}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'snmp_trap\x00'}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'sip-20000\x00'}]}, 0xe0}, 0x1, 0x0, 0x0, 0x40010}, 0x4008000) syz_open_dev$tty1(0xc, 0x4, 0x4) setsockopt$MRT_INIT(0xffffffffffffffff, 0x0, 0xc8, &(0x7f0000000340), 0x4) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x103, 0x100, 0x551}}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r2, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000802}, 0x8000) r3 = socket(0x10, 0x803, 0x0) mbind(&(0x7f0000400000/0xc00000)=nil, 0xc01100, 0x0, 0x0, 0x0, 0x2) sendto(r3, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x321}, {&(0x7f0000000280)=""/85, 0x21}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000580)=""/106, 0x659}, {&(0x7f0000000980)=""/73, 0xd}, {&(0x7f0000000200)=""/77, 0x69}, {&(0x7f00000007c0)=""/141, 0xc4}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}, 0x5}], 0x4000000000003b4, 0x2000, &(0x7f0000003700)={0x77359400}) ioctl$USBDEVFS_CONTROL(r1, 0xc0105500, &(0x7f00000000c0)={0x80, 0xa, 0x303, 0x0, 0x0, 0x6e9, 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c80)={'lo\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001580)=ANY=[@ANYBLOB="600000000206030000000000b8791fa80000000014000780080012400000000005001500010000000500010006000000050005000200000005000400000000000900020073797a310000000012000300686173683a6e65742c706f7274"], 0x60}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r4, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x3, 0x1, 0x401, 0x0, 0x0, {0x0, 0x0, 0x1}, [@CTA_SYNPROXY={0x34, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x3}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x1b}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x5}, @CTA_SYNPROXY_ITS={0x8}]}, @CTA_TUPLE_MASTER={0xc, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0xa7e4a71329317a60}, 0x20000000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)={0x54, 0x9, 0x6, 0x201, 0x0, 0x0, {0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010100}}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x84}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.102' (ED25519) to the list of known hosts. [ 33.788781][ T29] audit: type=1400 audit(1769102673.348:62): avc: denied { mounton } for pid=3306 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.811812][ T29] audit: type=1400 audit(1769102673.368:63): avc: denied { mount } for pid=3306 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.813919][ T3306] cgroup: Unknown subsys name 'net' [ 33.839501][ T29] audit: type=1400 audit(1769102673.398:64): avc: denied { unmount } for pid=3306 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.952527][ T3306] cgroup: Unknown subsys name 'cpuset' [ 33.958746][ T3306] cgroup: Unknown subsys name 'rlimit' [ 34.110003][ T29] audit: type=1400 audit(1769102673.668:65): avc: denied { setattr } for pid=3306 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 34.145542][ T29] audit: type=1400 audit(1769102673.678:66): avc: denied { create } for pid=3306 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.166056][ T29] audit: type=1400 audit(1769102673.678:67): avc: denied { write } for pid=3306 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.186632][ T29] audit: type=1400 audit(1769102673.678:68): avc: denied { read } for pid=3306 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.206964][ T29] audit: type=1400 audit(1769102673.698:69): avc: denied { read } for pid=3045 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 34.225827][ T3310] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 34.227945][ T29] audit: type=1400 audit(1769102673.698:70): avc: denied { mounton } for pid=3306 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 34.261373][ T29] audit: type=1400 audit(1769102673.698:71): avc: denied { mount } for pid=3306 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 34.288692][ T3306] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 35.421718][ T3322] chnl_net:caif_netlink_parms(): no params data found [ 35.476292][ T3325] chnl_net:caif_netlink_parms(): no params data found [ 35.496330][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 35.533565][ T3323] chnl_net:caif_netlink_parms(): no params data found [ 35.544803][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 35.591553][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.598660][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.605787][ T3322] bridge_slave_0: entered allmulticast mode [ 35.612371][ T3322] bridge_slave_0: entered promiscuous mode [ 35.634192][ T3322] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.641336][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.648484][ T3322] bridge_slave_1: entered allmulticast mode [ 35.654948][ T3322] bridge_slave_1: entered promiscuous mode [ 35.666167][ T3325] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.673244][ T3325] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.680409][ T3325] bridge_slave_0: entered allmulticast mode [ 35.686858][ T3325] bridge_slave_0: entered promiscuous mode [ 35.705947][ T3325] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.713084][ T3325] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.720226][ T3325] bridge_slave_1: entered allmulticast mode [ 35.726652][ T3325] bridge_slave_1: entered promiscuous mode [ 35.753506][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.762666][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.769754][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.776918][ T3318] bridge_slave_0: entered allmulticast mode [ 35.783397][ T3318] bridge_slave_0: entered promiscuous mode [ 35.804468][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.813796][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.820952][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.828221][ T3318] bridge_slave_1: entered allmulticast mode [ 35.834884][ T3318] bridge_slave_1: entered promiscuous mode [ 35.846241][ T3325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.869128][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.876212][ T3323] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.883458][ T3323] bridge_slave_0: entered allmulticast mode [ 35.889794][ T3323] bridge_slave_0: entered promiscuous mode [ 35.897311][ T3325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.906603][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.913766][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.920875][ T3319] bridge_slave_0: entered allmulticast mode [ 35.927336][ T3319] bridge_slave_0: entered promiscuous mode [ 35.942387][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.949574][ T3323] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.956764][ T3323] bridge_slave_1: entered allmulticast mode [ 35.963157][ T3323] bridge_slave_1: entered promiscuous mode [ 35.973667][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.980724][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.987981][ T3319] bridge_slave_1: entered allmulticast mode [ 35.994344][ T3319] bridge_slave_1: entered promiscuous mode [ 36.001271][ T3322] team0: Port device team_slave_0 added [ 36.007992][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.030656][ T3322] team0: Port device team_slave_1 added [ 36.037231][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.050928][ T3325] team0: Port device team_slave_0 added [ 36.066138][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.079921][ T3325] team0: Port device team_slave_1 added [ 36.086728][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.101089][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.120321][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.129667][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.136660][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.162623][ T3322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.178675][ T3318] team0: Port device team_slave_0 added [ 36.189611][ T3318] team0: Port device team_slave_1 added [ 36.199825][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.206791][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.232735][ T3322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.248176][ T3325] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.255195][ T3325] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.281162][ T3325] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.304267][ T3323] team0: Port device team_slave_0 added [ 36.310086][ T3325] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.317107][ T3325] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.343059][ T3325] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.359389][ T3319] team0: Port device team_slave_0 added [ 36.365855][ T3323] team0: Port device team_slave_1 added [ 36.372559][ T3319] team0: Port device team_slave_1 added [ 36.386413][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.393412][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.419417][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.447123][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.454136][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.480077][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.499283][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.506276][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.532342][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.544157][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.551133][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.577180][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.593454][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.600453][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.626415][ T3323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.649607][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.656651][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.682601][ T3323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.695957][ T3322] hsr_slave_0: entered promiscuous mode [ 36.702150][ T3322] hsr_slave_1: entered promiscuous mode [ 36.720058][ T3325] hsr_slave_0: entered promiscuous mode [ 36.726241][ T3325] hsr_slave_1: entered promiscuous mode [ 36.732188][ T3325] debugfs: 'hsr0' already exists in 'hsr' [ 36.737919][ T3325] Cannot create hsr debugfs directory [ 36.779456][ T3319] hsr_slave_0: entered promiscuous mode [ 36.785644][ T3319] hsr_slave_1: entered promiscuous mode [ 36.791555][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 36.797364][ T3319] Cannot create hsr debugfs directory [ 36.810058][ T3318] hsr_slave_0: entered promiscuous mode [ 36.816283][ T3318] hsr_slave_1: entered promiscuous mode [ 36.822218][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 36.827943][ T3318] Cannot create hsr debugfs directory [ 36.835810][ T3323] hsr_slave_0: entered promiscuous mode [ 36.841923][ T3323] hsr_slave_1: entered promiscuous mode [ 36.847787][ T3323] debugfs: 'hsr0' already exists in 'hsr' [ 36.853600][ T3323] Cannot create hsr debugfs directory [ 37.057847][ T3325] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 37.068749][ T3325] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 37.081391][ T3325] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 37.093095][ T3325] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 37.114491][ T3322] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 37.125031][ T3322] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 37.134242][ T3322] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 37.146229][ T3322] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 37.173713][ T3319] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 37.185671][ T3319] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 37.196490][ T3319] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 37.205680][ T3319] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 37.228978][ T3323] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.248397][ T3323] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.258201][ T3323] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.271823][ T3323] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 37.300170][ T3318] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 37.309958][ T3318] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 37.321502][ T3318] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 37.332419][ T3318] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 37.348007][ T3325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.378226][ T3325] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.390885][ T898] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.397996][ T898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.415171][ T56] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.422284][ T56] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.453109][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.474482][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.490509][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.501594][ T3322] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.518537][ T3323] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.527097][ T418] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.534230][ T418] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.544811][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.557879][ T911] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.564949][ T911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.573964][ T911] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.581013][ T911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.590071][ T911] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.597125][ T911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.616602][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.623753][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.636266][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.643471][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.660559][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.698794][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.721642][ T3325] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.730457][ T911] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.737611][ T911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.765056][ T1606] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.772203][ T1606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.826643][ T3318] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.863387][ T3323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.890259][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.908162][ T3322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.975724][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.013591][ T3323] veth0_vlan: entered promiscuous mode [ 38.037927][ T3323] veth1_vlan: entered promiscuous mode [ 38.057703][ T3319] veth0_vlan: entered promiscuous mode [ 38.080187][ T3325] veth0_vlan: entered promiscuous mode [ 38.087818][ T3319] veth1_vlan: entered promiscuous mode [ 38.098317][ T3325] veth1_vlan: entered promiscuous mode [ 38.130618][ T3323] veth0_macvtap: entered promiscuous mode [ 38.156576][ T3323] veth1_macvtap: entered promiscuous mode [ 38.163420][ T3325] veth0_macvtap: entered promiscuous mode [ 38.180154][ T3319] veth0_macvtap: entered promiscuous mode [ 38.192644][ T3325] veth1_macvtap: entered promiscuous mode [ 38.204265][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.216952][ T3319] veth1_macvtap: entered promiscuous mode [ 38.224416][ T3318] veth0_vlan: entered promiscuous mode [ 38.234929][ T3325] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.246174][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.255631][ T3325] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.266335][ T3318] veth1_vlan: entered promiscuous mode [ 38.281741][ T418] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.292475][ T3322] veth0_vlan: entered promiscuous mode [ 38.299117][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.310202][ T418] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.323992][ T418] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.336371][ T3322] veth1_vlan: entered promiscuous mode [ 38.344034][ T418] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.354414][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.363372][ T418] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.372347][ T418] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.389093][ T418] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.405254][ T418] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.426722][ T3323] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 38.448518][ T418] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.464639][ T3318] veth0_macvtap: entered promiscuous mode [ 38.472275][ T418] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.483563][ T3318] veth1_macvtap: entered promiscuous mode [ 38.489955][ T418] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.508747][ T418] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.522635][ T3322] veth0_macvtap: entered promiscuous mode [ 38.543911][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.560772][ T3322] veth1_macvtap: entered promiscuous mode [ 38.574302][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.584290][ T1602] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.613442][ T1602] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.634224][ T1602] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.658560][ T3497] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.665810][ T3497] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.699816][ T3497] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 38.709310][ T3497] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 38.744713][ T1602] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.757530][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.768062][ T1602] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.784034][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.792765][ T37] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.806493][ T37] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.823670][ T37] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.840539][ T37] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.871741][ T37] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.902288][ T37] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.931967][ T37] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.941996][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 38.942086][ T29] audit: type=1400 audit(1769102678.508:108): avc: denied { create } for pid=3504 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 38.964136][ T3508] netlink: 16 bytes leftover after parsing attributes in process `syz.1.6'. [ 38.976893][ T29] audit: type=1400 audit(1769102678.518:109): avc: denied { map_create } for pid=3506 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 38.995867][ T29] audit: type=1400 audit(1769102678.518:110): avc: denied { map_read map_write } for pid=3506 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 39.016821][ T29] audit: type=1400 audit(1769102678.558:111): avc: denied { prog_run } for pid=3504 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 39.035550][ T29] audit: type=1400 audit(1769102678.568:112): avc: denied { setopt } for pid=3504 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 39.037311][ T3510] netlink: 'syz.1.6': attribute type 10 has an invalid length. [ 39.054962][ T29] audit: type=1400 audit(1769102678.578:113): avc: denied { create } for pid=3507 comm="syz.4.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 39.065655][ T29] audit: type=1400 audit(1769102678.598:114): avc: denied { ioctl } for pid=3506 comm="syz.1.6" path="socket:[4060]" dev="sockfs" ino=4060 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.125131][ T29] audit: type=1400 audit(1769102678.648:115): avc: denied { create } for pid=3507 comm="syz.4.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 39.125161][ T29] audit: type=1400 audit(1769102678.648:116): avc: denied { create } for pid=3507 comm="syz.4.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 39.125204][ T29] audit: type=1400 audit(1769102678.668:117): avc: denied { create } for pid=3507 comm="syz.4.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 39.125416][ T3495] Zero length message leads to an empty skb [ 39.127048][ T3510] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.129541][ T3510] team0: Port device bond0 added [ 39.185673][ T3508] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6'. [ 39.231338][ T3508] team0 (unregistering): Port device team_slave_0 removed [ 39.293483][ T3508] team0 (unregistering): Port device team_slave_1 removed [ 39.330705][ T3508] team0 (unregistering): Port device bond0 removed [ 39.339135][ T3516] loop4: detected capacity change from 0 to 1024 [ 39.350470][ T3518] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9'. [ 39.365365][ T3516] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.407526][ T3516] ext4 filesystem being mounted at /1/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 39.465416][ T3527] netlink: 76 bytes leftover after parsing attributes in process `syz.2.13'. [ 39.584075][ T3322] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.617456][ T3536] syzkaller0: entered promiscuous mode [ 39.623102][ T3536] syzkaller0: entered allmulticast mode [ 39.720196][ T3543] hub 2-0:1.0: USB hub found [ 39.724984][ T3543] hub 2-0:1.0: 8 ports detected [ 39.742966][ T3543] lo speed is unknown, defaulting to 1000 [ 39.749834][ T3543] lo speed is unknown, defaulting to 1000 [ 39.756566][ T3543] lo speed is unknown, defaulting to 1000 [ 39.809178][ T3545] loop4: detected capacity change from 0 to 512 [ 39.816537][ T3543] infiniband syz1: set active [ 39.821336][ T3543] infiniband syz1: added lo [ 39.825934][ T3429] lo speed is unknown, defaulting to 1000 [ 39.838419][ T3543] RDS/IB: syz1: added [ 39.843022][ T3543] smc: adding ib device syz1 with port count 1 [ 39.849657][ T3543] smc: ib device syz1 port 1 has no pnetid [ 39.856775][ T3502] lo speed is unknown, defaulting to 1000 [ 39.865497][ T3545] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 39.874548][ T3543] lo speed is unknown, defaulting to 1000 [ 39.884361][ T3545] ext4 filesystem being mounted at /4/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 39.918940][ T3543] lo speed is unknown, defaulting to 1000 [ 39.922267][ T3545] netlink: 4 bytes leftover after parsing attributes in process `syz.4.19'. [ 39.944283][ T3545] EXT4-fs error (device loop4): ext4_lookup:1785: inode #12: comm syz.4.19: iget: bad i_size value: 2533274857506816 [ 39.961716][ T3545] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.975552][ T3543] lo speed is unknown, defaulting to 1000 [ 40.001567][ T3551] netlink: 36 bytes leftover after parsing attributes in process `syz.4.20'. [ 40.010440][ T3551] netlink: 16 bytes leftover after parsing attributes in process `syz.4.20'. [ 40.019351][ T3551] netlink: 36 bytes leftover after parsing attributes in process `syz.4.20'. [ 40.028706][ T3551] netlink: 36 bytes leftover after parsing attributes in process `syz.4.20'. [ 40.037106][ T3543] lo speed is unknown, defaulting to 1000 [ 40.078531][ T3543] lo speed is unknown, defaulting to 1000 [ 40.118591][ T3502] IPVS: starting estimator thread 0... [ 40.196494][ T3543] syz.2.18 (3543) used greatest stack depth: 10488 bytes left [ 40.212307][ T3562] IPVS: using max 2160 ests per chain, 108000 per kthread [ 40.238425][ T3574] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(11) [ 40.245141][ T3574] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 40.252712][ T3574] vhci_hcd vhci_hcd.0: Device attached [ 40.270769][ T3576] vhci_hcd: connection closed [ 40.271081][ T1602] vhci_hcd vhci_hcd.2: stop threads [ 40.281122][ T1602] vhci_hcd vhci_hcd.2: release socket [ 40.286590][ T1602] vhci_hcd vhci_hcd.2: disconnect device [ 40.327506][ T3586] loop0: detected capacity change from 0 to 512 [ 40.334979][ T3586] ext3: Bad value for 'init_itable' [ 40.376179][ T3592] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 40.388780][ T3592] netlink: 'syz.0.24': attribute type 13 has an invalid length. [ 40.457613][ T3592] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.464880][ T3592] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.513677][ T3592] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 40.525888][ T3592] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 40.596788][ T1602] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.616632][ T1602] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.635115][ T1602] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.676182][ T1602] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.699905][ T3492] IPVS: starting estimator thread 0... [ 40.708314][ T3591] delete_channel: no stack [ 40.791984][ T3627] IPVS: using max 2688 ests per chain, 134400 per kthread [ 40.949638][ T3656] bridge_slave_0: left allmulticast mode [ 40.955426][ T3656] bridge_slave_0: left promiscuous mode [ 40.961109][ T3656] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.978637][ T3656] bridge_slave_1: left allmulticast mode [ 40.984518][ T3656] bridge_slave_1: left promiscuous mode [ 40.990191][ T3656] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.008337][ T10] IPVS: starting estimator thread 0... [ 41.010134][ T3656] bond0: (slave bond_slave_0): Releasing backup interface [ 41.051442][ T3680] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3680 comm=syz.3.34 [ 41.064086][ T3656] bond0: (slave bond_slave_1): Releasing backup interface [ 41.095659][ T3656] team0: Port device team_slave_0 removed [ 41.102090][ T3673] IPVS: using max 2592 ests per chain, 129600 per kthread [ 41.109735][ T3656] team0: Port device team_slave_1 removed [ 41.176632][ T3656] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 41.208409][ T3712] netlink: 24 bytes leftover after parsing attributes in process `syz.4.35'. [ 41.232339][ T3656] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 41.245054][ T3656] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 41.245380][ C0] hrtimer: interrupt took 94609 ns [ 41.283813][ T3717] netdevsim netdevsim2: Direct firmware load for / [ 41.283813][ T3717] failed with error -2 [ 41.407136][ T3732] loop0: detected capacity change from 0 to 512 [ 41.438680][ T3735] Driver unsupported XDP return value 0 on prog (id 18) dev N/A, expect packet loss! [ 41.448747][ T3732] EXT4-fs error (device loop0): ext4_orphan_get:1391: inode #15: comm syz.0.41: inode has both inline data and extents flags [ 41.462652][ T3732] EXT4-fs error (device loop0): ext4_orphan_get:1396: comm syz.0.41: couldn't read orphan inode 15 (err -117) [ 41.475387][ T3732] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.505537][ T3732] netlink: 'syz.0.41': attribute type 4 has an invalid length. [ 41.533326][ T3739] syz_tun: entered allmulticast mode [ 41.541140][ T3739] syz_tun (unregistering): left allmulticast mode [ 41.549216][ T3325] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.566562][ T3735] infiniband syz2: set active [ 41.571308][ T3735] infiniband syz2: added bond_slave_1 [ 41.582788][ T3735] RDS/IB: syz2: added [ 41.586812][ T3735] smc: adding ib device syz2 with port count 1 [ 41.616241][ T3735] smc: ib device syz2 port 1 has no pnetid [ 41.624038][ T3745] capability: warning: `syz.3.45' uses 32-bit capabilities (legacy support in use) [ 41.645080][ T3744] xt_CT: No such helper "pptp" [ 41.739682][ T3750] netlink: 'syz.4.47': attribute type 2 has an invalid length. [ 41.748686][ T3752] loop0: detected capacity change from 0 to 512 [ 41.763533][ T3752] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 41.776709][ T3752] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 41.820994][ T3752] EXT4-fs (loop0): 1 truncate cleaned up [ 41.831818][ T3752] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.954184][ T3325] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.004566][ T3768] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 42.090260][ T3744] loop1: detected capacity change from 0 to 32768 [ 42.281760][ T3735] syz.2.42 (3735) used greatest stack depth: 10416 bytes left [ 42.310802][ T3786] siw: device registration error -23 [ 42.316500][ T3786] syz.2.60 uses obsolete (PF_INET,SOCK_PACKET) [ 42.395297][ T3789] loop0: detected capacity change from 0 to 512 [ 42.406259][ T3789] EXT4-fs: Ignoring removed bh option [ 42.422610][ T3791] 8021q: VLANs not supported on nlmon0 [ 42.450441][ T3789] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 42.479585][ T3789] ext4 filesystem being mounted at /10/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 42.522114][ T3796] bond_slave_0: entered promiscuous mode [ 42.527917][ T3796] bond_slave_1: entered promiscuous mode [ 42.554685][ T3796] macvlan2: entered promiscuous mode [ 42.560119][ T3796] bond0: entered promiscuous mode [ 42.591569][ T3796] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 42.672706][ T3799] lo speed is unknown, defaulting to 1000 [ 42.832121][ T3325] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.885673][ T3818] ip6t_srh: unknown srh match flags 4000 [ 42.914907][ T3818] loop3: detected capacity change from 0 to 1024 [ 42.959666][ T3818] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 42.989987][ T3817] syz_tun: entered allmulticast mode [ 42.999771][ T3817] dvmrp8: entered allmulticast mode [ 43.008052][ T3816] syz_tun: left allmulticast mode [ 43.124566][ T3831] xt_hashlimit: size too large, truncated to 1048576 [ 43.297967][ T3318] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.327584][ T3834] –: renamed from vxcan1 [ 43.473191][ T3827] Set syz1 is full, maxelem 65536 reached [ 43.512574][ T3842] loop2: detected capacity change from 0 to 1024 [ 43.519276][ T3842] EXT4-fs: Ignoring removed orlov option [ 43.525024][ T3842] EXT4-fs: inline encryption not supported [ 43.538480][ T3842] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (52289!=20869) [ 43.582025][ T3842] EXT4-fs (loop2): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 43.602245][ T3842] EXT4-fs (loop2): invalid journal inode [ 43.635661][ T3842] EXT4-fs (loop2): can't get journal size [ 43.643364][ T3842] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 43.662895][ T3845] 8021q: adding VLAN 0 to HW filter on device bond1 [ 43.721171][ T3845] 8021q: adding VLAN 0 to HW filter on device bond0 [ 43.728674][ T3323] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.732775][ T3845] bond1: (slave bond0): Enslaving as an active interface with a down link [ 43.751129][ T3845] netlink: 'syz.0.75': attribute type 10 has an invalid length. [ 43.761283][ T3845] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 43.773686][ T3845] bridge0: port 1(syz_tun) entered blocking state [ 43.780230][ T3845] bridge0: port 1(syz_tun) entered disabled state [ 43.823768][ T3857] loop2: detected capacity change from 0 to 1024 [ 43.835590][ T3860] rdma_rxe: rxe_newlink: failed to add syz_tun [ 43.842679][ T3857] EXT4-fs: Ignoring removed bh option [ 43.852390][ T3845] syz_tun: entered allmulticast mode [ 43.859449][ T3845] syz_tun: entered promiscuous mode [ 43.884299][ T3855] ======================================================= [ 43.884299][ T3855] WARNING: The mand mount option has been deprecated and [ 43.884299][ T3855] and is ignored by this kernel. Remove the mand [ 43.884299][ T3855] option from the mount to silence this warning. [ 43.884299][ T3855] ======================================================= [ 43.919407][ T1602] bond1: (slave bond0): failed to get link speed/duplex [ 43.928976][ T3857] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-001000000000 r/w without journal. Quota mode: writeback. [ 43.942480][ T3855] EXT4-fs: Ignoring removed oldalloc option [ 43.948556][ T3855] EXT4-fs: Ignoring removed bh option [ 43.967019][ T3855] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 43.990937][ T3855] SELinux: Context @ is not valid (left unmapped). [ 43.999219][ T29] kauditd_printk_skb: 612 callbacks suppressed [ 43.999234][ T29] audit: type=1400 audit(1769102683.558:730): avc: denied { relabelto } for pid=3854 comm="syz.1.78" name="cgroup.stat" dev="loop1" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="@" [ 44.032020][ T418] bond1: (slave bond0): failed to get link speed/duplex [ 44.069860][ T3869] __nla_validate_parse: 12 callbacks suppressed [ 44.069874][ T3869] netlink: 8 bytes leftover after parsing attributes in process `syz.0.81'. [ 44.070948][ T29] audit: type=1400 audit(1769102683.628:731): avc: denied { create } for pid=3868 comm="syz.0.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 44.079470][ T3869] rdma_rxe: rxe_newlink: failed to add ip6_vti0 [ 44.084892][ T29] audit: type=1400 audit(1769102683.628:732): avc: denied { write } for pid=3868 comm="syz.0.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 44.142005][ T169] bond1: (slave bond0): failed to get link speed/duplex [ 44.164432][ T3319] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.219524][ T3871] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 44.227678][ T3871] EXT4-fs (loop0): orphan cleanup on readonly fs [ 44.251967][ T169] bond1: (slave bond0): failed to get link speed/duplex [ 44.261769][ T3871] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #16: comm syz.0.83: corrupted inode contents [ 44.280159][ T3876] netlink: 'syz.1.82': attribute type 1 has an invalid length. [ 44.292530][ T3871] EXT4-fs (loop0): Remounting filesystem read-only [ 44.299287][ T3871] EXT4-fs (loop0): 1 truncate cleaned up [ 44.330590][ T418] EXT4-fs (loop0): Quota write (off=5120, len=1024) cancelled because transaction is not started [ 44.341402][ T418] Quota error (device loop0): write_blk: dquota write failed [ 44.349040][ T418] Quota error (device loop0): remove_free_dqentry: Can't write block (5) with free entries [ 44.359082][ T418] EXT4-fs (loop0): Quota write (off=5120, len=1024) cancelled because transaction is not started [ 44.369608][ T418] Quota error (device loop0): write_blk: dquota write failed [ 44.377017][ T418] Quota error (device loop0): free_dqentry: Can't move quota data block (5) to free list [ 44.391465][ T3879] netlink: 8 bytes leftover after parsing attributes in process `syz.1.82'. [ 44.401984][ T29] audit: type=1326 audit(1769102683.948:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3874 comm="syz.1.82" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f086233acb9 code=0x7ffc0000 [ 44.425223][ T29] audit: type=1326 audit(1769102683.948:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3874 comm="syz.1.82" exe="/root/syz-executor" sig=0 arch=c000003e syscall=141 compat=0 ip=0x7f086233acb9 code=0x7ffc0000 [ 44.448459][ T29] audit: type=1326 audit(1769102683.948:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3874 comm="syz.1.82" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f086233acb9 code=0x7ffc0000 [ 44.471824][ T169] bond1: (slave bond0): failed to get link speed/duplex [ 44.483011][ T418] EXT4-fs (loop0): Quota write (off=8, len=24) cancelled because transaction is not started [ 44.496988][ T3871] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-0000002a0000 ro without journal. Quota mode: writeback. [ 44.582035][ T52] bond1: (slave bond0): failed to get link speed/duplex [ 44.633373][ T3891] netlink: 8 bytes leftover after parsing attributes in process `syz.3.84'. [ 44.711931][ T31] bond1: (slave bond0): failed to get link speed/duplex [ 44.735139][ T3323] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-001000000000. [ 44.780977][ T3325] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-0000002a0000. [ 44.821944][ T31] bond1: (slave bond0): failed to get link speed/duplex [ 44.845366][ T3903] set_capacity_and_notify: 2 callbacks suppressed [ 44.845381][ T3903] loop0: detected capacity change from 0 to 2048 [ 44.846126][ T3900] lo speed is unknown, defaulting to 1000 [ 45.038366][ T3906] netlink: 'syz.3.91': attribute type 1 has an invalid length. [ 45.145444][ T3915] loop2: detected capacity change from 0 to 128 [ 45.164696][ T3915] syz.2.94: attempt to access beyond end of device [ 45.164696][ T3915] loop2: rw=2049, sector=145, nr_sectors = 8 limit=128 [ 45.180067][ T3915] syz.2.94: attempt to access beyond end of device [ 45.180067][ T3915] loop2: rw=2049, sector=161, nr_sectors = 8 limit=128 [ 45.205161][ T3915] syz.2.94: attempt to access beyond end of device [ 45.205161][ T3915] loop2: rw=2049, sector=177, nr_sectors = 24 limit=128 [ 45.219838][ T3915] syz.2.94: attempt to access beyond end of device [ 45.219838][ T3915] loop2: rw=2049, sector=209, nr_sectors = 8 limit=128 [ 45.247519][ T3915] syz.2.94: attempt to access beyond end of device [ 45.247519][ T3915] loop2: rw=2049, sector=225, nr_sectors = 8 limit=128 [ 45.276964][ T3915] syz.2.94: attempt to access beyond end of device [ 45.276964][ T3915] loop2: rw=2049, sector=241, nr_sectors = 8 limit=128 [ 45.302531][ T3918] syz.2.94: attempt to access beyond end of device [ 45.302531][ T3918] loop2: rw=2049, sector=305, nr_sectors = 80 limit=128 [ 45.316022][ T3915] syz.2.94: attempt to access beyond end of device [ 45.316022][ T3915] loop2: rw=2049, sector=257, nr_sectors = 8 limit=128 [ 45.329570][ T3918] syz.2.94: attempt to access beyond end of device [ 45.329570][ T3918] loop2: rw=2049, sector=393, nr_sectors = 8 limit=128 [ 45.342876][ T3915] syz.2.94: attempt to access beyond end of device [ 45.342876][ T3915] loop2: rw=2049, sector=273, nr_sectors = 8 limit=128 [ 45.402029][ T3921] netlink: 'syz.0.95': attribute type 10 has an invalid length. [ 45.409931][ T3921] syz_tun: left allmulticast mode [ 45.415042][ T3921] syz_tun: left promiscuous mode [ 45.420274][ T3921] bridge0: port 1(syz_tun) entered disabled state [ 45.427453][ T418] Buffer I/O error on dev loop2, logical block 305, lost async page write [ 45.441183][ T3921] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 45.458648][ T3921] bond1: option mode: unable to set because the bond device has slaves [ 45.490711][ T3925] pimreg: entered allmulticast mode [ 45.504242][ T3927] loop1: detected capacity change from 0 to 512 [ 45.541799][ T3925] pimreg: left allmulticast mode [ 45.571825][ T3931] loop2: detected capacity change from 0 to 1024 [ 45.578671][ T3931] EXT4-fs: Ignoring removed orlov option [ 45.584448][ T3931] EXT4-fs: inline encryption not supported [ 45.591398][ T3931] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (52289!=20869) [ 45.601106][ T3931] EXT4-fs (loop2): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 45.614121][ T3931] EXT4-fs (loop2): invalid journal inode [ 45.619907][ T3931] EXT4-fs (loop2): can't get journal size [ 45.628202][ T3931] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 45.669621][ T3930] netlink: 4 bytes leftover after parsing attributes in process `syz.4.99'. [ 45.748811][ T3934] loop0: detected capacity change from 0 to 512 [ 45.758322][ T3927] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 46.074639][ T3927] loop1: detected capacity change from 0 to 512 [ 46.086769][ T3927] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 46.099601][ T3930] bridge_slave_1: left allmulticast mode [ 46.105331][ T3930] bridge_slave_1: left promiscuous mode [ 46.111043][ T3930] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.120218][ T3927] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 46.133011][ T3927] ext4 filesystem being mounted at /12/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 46.149426][ T3930] bridge_slave_0: left allmulticast mode [ 46.155149][ T3930] bridge_slave_0: left promiscuous mode [ 46.160806][ T3930] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.172266][ T3942] usb usb7: usbfs: process 3942 (syz.3.100) did not claim interface 0 before use [ 46.183323][ T3942] loop3: detected capacity change from 0 to 128 [ 46.192684][ T3927] EXT4-fs (loop1): shut down requested (1) [ 46.199227][ T3927] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop1 ino=16 [ 46.208189][ T3927] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop1 ino=16 [ 46.218263][ T3942] FAT-fs (loop3): Invalid FSINFO signature: 0x41615200, 0x61417272 (sector = 1) [ 46.226387][ T3927] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop1 ino=16 [ 46.258414][ T3942] FAT-fs (loop3): error, invalid FAT chain (i_pos 548, last_block 8) [ 46.266695][ T3942] FAT-fs (loop3): Filesystem has been set read-only [ 46.272914][ T31] bond1: (slave bond0): link status definitely up, 10000 Mbps full duplex [ 46.281892][ T31] bond1: (slave bond0): making interface the new active one [ 46.300389][ T3319] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 46.313962][ T31] bond1: active interface up! [ 46.338088][ T3323] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.414928][ T3954] netlink: 24 bytes leftover after parsing attributes in process `syz.3.104'. [ 46.426585][ T3950] netlink: 4 bytes leftover after parsing attributes in process `syz.2.103'. [ 46.529585][ T3956] Cannot find set identified by id 0 to match [ 46.558653][ T3958] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3958 comm=syz.3.104 [ 46.818226][ T3950] syz.2.103 (3950) used greatest stack depth: 10368 bytes left [ 46.971392][ T3978] syzkaller0: entered promiscuous mode [ 46.976968][ T3978] syzkaller0: entered allmulticast mode [ 47.161464][ T3982] lo speed is unknown, defaulting to 1000 [ 47.192141][ T3986] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 47.251686][ T3986] SET target dimension over the limit! [ 47.277279][ T3987] lo speed is unknown, defaulting to 1000 [ 47.408438][ T3996] netlink: 'syz.1.119': attribute type 1 has an invalid length. [ 47.560985][ T3996] macvlan2: entered promiscuous mode [ 47.561002][ T3996] macvlan2: entered allmulticast mode [ 47.946596][ T4009] xt_hashlimit: overflow, rate too high: 0 [ 48.039021][ T4013] serio: Serial port ttyS3 [ 48.156343][ T4020] lo speed is unknown, defaulting to 1000 [ 48.270322][ T4032] lo speed is unknown, defaulting to 1000 [ 48.814308][ T4047] netlink: 24 bytes leftover after parsing attributes in process `syz.1.135'. [ 48.901283][ T4049] futex_wake_op: syz.1.136 tries to shift op by 32; fix this program [ 49.081166][ T29] kauditd_printk_skb: 516 callbacks suppressed [ 49.081181][ T29] audit: type=1400 audit(1769102688.638:1250): avc: denied { read write } for pid=3325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 49.132055][ T29] audit: type=1400 audit(1769102688.678:1251): avc: denied { open } for pid=4050 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 49.151293][ T29] audit: type=1400 audit(1769102688.678:1252): avc: denied { read write } for pid=4050 comm="syz.0.137" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 49.174486][ T29] audit: type=1400 audit(1769102688.678:1253): avc: denied { read } for pid=4050 comm="syz.0.137" dev="nsfs" ino=4026532441 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 49.195553][ T29] audit: type=1400 audit(1769102688.678:1254): avc: denied { create } for pid=4050 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 49.216028][ T29] audit: type=1400 audit(1769102688.678:1255): avc: denied { map_create } for pid=4050 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 49.235191][ T29] audit: type=1400 audit(1769102688.678:1256): avc: denied { map_create } for pid=4050 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 49.254303][ T29] audit: type=1400 audit(1769102688.678:1257): avc: denied { allowed } for pid=4050 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 49.273561][ T29] audit: type=1400 audit(1769102688.678:1258): avc: denied { prog_load } for pid=4050 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 49.292546][ T29] audit: type=1400 audit(1769102688.678:1259): avc: denied { create } for pid=4050 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 50.180792][ T4088] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 50.222273][ T4090] xt_connbytes: Forcing CT accounting to be enabled [ 50.663230][ T4116] Ÿë: port 1(gretap0) entered blocking state [ 50.669453][ T4116] Ÿë: port 1(gretap0) entered disabled state [ 50.676138][ T4116] gretap0: entered allmulticast mode [ 50.682097][ T4116] gretap0: entered promiscuous mode [ 50.690811][ T4116] Ÿë: port 2(veth0_to_team) entered blocking state [ 50.697711][ T4116] Ÿë: port 2(veth0_to_team) entered disabled state [ 50.704659][ T4116] veth0_to_team: entered allmulticast mode [ 50.711088][ T4116] veth0_to_team: entered promiscuous mode [ 50.762537][ T4120] lo speed is unknown, defaulting to 1000 [ 50.809248][ T4122] netlink: 'syz.1.167': attribute type 21 has an invalid length. [ 50.831773][ T4122] netlink: 'syz.1.167': attribute type 1 has an invalid length. [ 50.839457][ T4122] netlink: 132 bytes leftover after parsing attributes in process `syz.1.167'. [ 51.707119][ T4154] lo speed is unknown, defaulting to 1000 [ 54.430520][ T29] kauditd_printk_skb: 467 callbacks suppressed [ 54.430535][ T29] audit: type=1400 audit(1769102694.985:1727): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.555969][ T29] audit: type=1400 audit(1769102695.085:1728): avc: denied { create } for pid=4174 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 54.575502][ T29] audit: type=1400 audit(1769102695.085:1729): avc: denied { allowed } for pid=4174 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 54.594815][ T29] audit: type=1400 audit(1769102695.085:1730): avc: denied { allowed } for pid=4174 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 54.614057][ T29] audit: type=1400 audit(1769102695.105:1731): avc: denied { read write } for pid=3325 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.638375][ T29] audit: type=1400 audit(1769102695.115:1732): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.724810][ T4181] capability: warning: `syz.0.183' uses deprecated v2 capabilities in a way that may be insecure [ 54.763430][ T4181] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=4181 comm=syz.0.183 [ 54.790539][ T4182] lo speed is unknown, defaulting to 1000 [ 54.849239][ T29] audit: type=1400 audit(1769102695.135:1733): avc: denied { open } for pid=4176 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 54.868447][ T29] audit: type=1400 audit(1769102695.175:1734): avc: denied { prog_load } for pid=4176 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 54.887482][ T29] audit: type=1400 audit(1769102695.175:1735): avc: denied { map_create } for pid=4176 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 54.906666][ T29] audit: type=1400 audit(1769102695.175:1736): avc: denied { map_create } for pid=4176 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 55.042746][ T4199] netlink: 4 bytes leftover after parsing attributes in process `syz.2.193'. [ 56.045038][ T4240] netlink: 4 bytes leftover after parsing attributes in process `syz.4.210'. [ 56.144878][ T4245] netlink: 'syz.4.213': attribute type 10 has an invalid length. [ 56.156290][ T4245] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.163483][ T4245] team0: Device bond0 failed to register rx_handler [ 56.189426][ T4245] netlink: 4 bytes leftover after parsing attributes in process `syz.4.213'. [ 56.243278][ T10] lo speed is unknown, defaulting to 1000 [ 56.336579][ T4259] bridge0: entered promiscuous mode [ 56.341911][ T4259] bridge0: entered allmulticast mode [ 56.349322][ T4259] team0: Port device bridge0 added [ 57.723329][ T4315] netlink: 'syz.2.242': attribute type 10 has an invalid length. [ 57.731196][ T4315] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.738377][ T4315] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.788586][ T4315] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.795708][ T4315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.803165][ T4315] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.810300][ T4315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.831026][ T4315] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 57.839976][ T4324] netlink: 20 bytes leftover after parsing attributes in process `syz.4.246'. [ 57.917083][ T4342] netlink: 'syz.4.251': attribute type 1 has an invalid length. [ 57.932834][ T4342] 8021q: adding VLAN 0 to HW filter on device bond1 [ 57.950692][ T4342] netlink: 28 bytes leftover after parsing attributes in process `syz.4.251'. [ 58.082606][ T4341] netlink: 28 bytes leftover after parsing attributes in process `syz.0.253'. [ 58.136383][ T4361] lo speed is unknown, defaulting to 1000 [ 58.452591][ T4381] veth3: entered promiscuous mode [ 58.534839][ T4384] netlink: 4 bytes leftover after parsing attributes in process `syz.0.269'. [ 58.584821][ T4386] netlink: 'syz.0.270': attribute type 1 has an invalid length. [ 58.653351][ T4386] bond2: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 58.734759][ T4392] netlink: 4 bytes leftover after parsing attributes in process `syz.1.272'. [ 58.763472][ T4394] netlink: 4 bytes leftover after parsing attributes in process `syz.0.273'. [ 59.282579][ T4410] netlink: 4 bytes leftover after parsing attributes in process `syz.3.278'. [ 59.360145][ T4414] SET target dimension over the limit! [ 59.459151][ T29] kauditd_printk_skb: 628 callbacks suppressed [ 59.459166][ T29] audit: type=1400 audit(1769102700.015:2365): avc: denied { create } for pid=4418 comm="syz.3.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 59.593715][ T29] audit: type=1400 audit(1769102700.045:2366): avc: denied { create } for pid=4418 comm="syz.3.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 59.614820][ T29] audit: type=1400 audit(1769102700.095:2367): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 59.639076][ T29] audit: type=1400 audit(1769102700.115:2368): avc: denied { prog_load } for pid=4420 comm="syz.1.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 59.658065][ T29] audit: type=1400 audit(1769102700.115:2369): avc: denied { open } for pid=4420 comm="syz.1.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 59.674408][ T4426] netlink: 'syz.2.285': attribute type 1 has an invalid length. [ 59.677318][ T29] audit: type=1400 audit(1769102700.115:2370): avc: denied { create } for pid=4420 comm="syz.1.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 59.704277][ T29] audit: type=1400 audit(1769102700.115:2371): avc: denied { create } for pid=4411 comm="syz.2.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 59.723826][ T29] audit: type=1400 audit(1769102700.115:2372): avc: denied { create } for pid=4411 comm="syz.2.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 59.743197][ T29] audit: type=1400 audit(1769102700.115:2373): avc: denied { prog_load } for pid=4411 comm="syz.2.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 59.762183][ T29] audit: type=1400 audit(1769102700.115:2374): avc: denied { prog_load } for pid=4411 comm="syz.2.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 59.772267][ T4429] netlink: 4 bytes leftover after parsing attributes in process `syz.1.286'. [ 59.809698][ T4430] bond1: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 59.981691][ T4426] veth3: entered promiscuous mode [ 60.134435][ T4452] ip6t_srh: unknown srh match flags 4000 [ 60.187224][ T4455] syzkaller0: entered promiscuous mode [ 60.192784][ T4455] syzkaller0: entered allmulticast mode [ 60.594473][ T4481] netlink: 'syz.2.303': attribute type 1 has an invalid length. [ 60.609821][ T4483] syzkaller0: entered promiscuous mode [ 60.615392][ T4483] syzkaller0: entered allmulticast mode [ 60.661934][ T4481] veth5: entered promiscuous mode [ 60.814565][ T4518] syzkaller0: entered promiscuous mode [ 60.820346][ T4518] syzkaller0: entered allmulticast mode [ 60.885751][ T4530] netlink: 'syz.0.330': attribute type 1 has an invalid length. [ 60.922117][ T4530] veth5: entered promiscuous mode [ 61.035608][ T4551] syzkaller0: entered promiscuous mode [ 61.041199][ T4551] syzkaller0: entered allmulticast mode [ 61.100088][ T4563] netlink: 'syz.4.346': attribute type 1 has an invalid length. [ 61.148291][ T4563] bond2: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 61.186458][ T4575] __nla_validate_parse: 10 callbacks suppressed [ 61.186475][ T4575] netlink: 4 bytes leftover after parsing attributes in process `syz.0.350'. [ 61.194195][ T4577] netlink: 4 bytes leftover after parsing attributes in process `syz.2.353'. [ 61.211396][ T4563] veth3: entered promiscuous mode [ 61.243987][ T4582] netlink: 4 bytes leftover after parsing attributes in process `syz.1.356'. [ 61.278292][ T4586] netlink: 'syz.3.354': attribute type 1 has an invalid length. [ 61.300277][ T4586] bond1: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 61.321263][ T4591] netlink: 4 bytes leftover after parsing attributes in process `syz.4.355'. [ 61.393326][ T4599] netlink: 80 bytes leftover after parsing attributes in process `syz.1.362'. [ 61.470226][ T4613] netlink: 4 bytes leftover after parsing attributes in process `syz.1.368'. [ 61.492225][ T4613] macvlan2: entered promiscuous mode [ 61.497552][ T4613] bond0: entered promiscuous mode [ 61.501684][ T4610] netlink: 'syz.0.367': attribute type 1 has an invalid length. [ 61.502788][ T4613] bond_slave_0: entered promiscuous mode [ 61.516089][ T4613] bond_slave_1: entered promiscuous mode [ 61.530750][ T4613] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 61.535280][ T4616] netlink: 'syz.3.370': attribute type 1 has an invalid length. [ 61.542892][ T4608] 8021q: VLANs not supported on gre0 [ 61.564789][ T4610] veth7: entered promiscuous mode [ 61.697532][ T4633] netlink: 80 bytes leftover after parsing attributes in process `syz.0.377'. [ 61.707000][ T4616] veth3: entered promiscuous mode [ 61.786243][ T4646] netlink: 4 bytes leftover after parsing attributes in process `syz.2.383'. [ 61.806647][ T4648] 8021q: VLANs not supported on gre0 [ 61.832248][ T4646] bond_slave_0: entered promiscuous mode [ 61.838030][ T4646] bond_slave_1: entered promiscuous mode [ 61.843719][ T4646] bridge0: entered promiscuous mode [ 61.858543][ T4646] macvlan0: entered promiscuous mode [ 61.864007][ T4646] bond0: entered promiscuous mode [ 61.873911][ T4646] 8021q: adding VLAN 0 to HW filter on device macvlan0 [ 61.888450][ T4654] netlink: 4 bytes leftover after parsing attributes in process `syz.1.387'. [ 61.957347][ T4663] netlink: 4 bytes leftover after parsing attributes in process `syz.2.391'. [ 62.070207][ T4675] netlink: 'syz.0.394': attribute type 1 has an invalid length. [ 62.119761][ T4675] veth9: entered promiscuous mode [ 62.405671][ T4700] syzkaller0: entered promiscuous mode [ 62.411301][ T4700] syzkaller0: entered allmulticast mode [ 62.472082][ T4707] netlink: 'syz.0.407': attribute type 1 has an invalid length. [ 62.496152][ T4707] veth11: entered promiscuous mode [ 62.503526][ T4707] bond6: (slave veth11): Enslaving as a backup interface with a down link [ 62.783413][ T4755] netlink: 'syz.2.431': attribute type 10 has an invalid length. [ 62.796917][ T4755] syz_tun: entered promiscuous mode [ 62.801647][ T4755] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 62.873709][ T4757] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.877755][ T4757] net_ratelimit: 5 callbacks suppressed [ 62.877766][ T4757] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 62.923845][ T4755] 8021q: adding VLAN 0 to HW filter on device bond3 [ 62.953211][ T4766] 8021q: adding VLAN 0 to HW filter on device macvlan1 [ 62.954501][ T4766] bond3: (slave macvlan1): unknown ethtool speed (30000) for port 1 (set it to 0) [ 62.954529][ T4766] bond3: (slave macvlan1): speed changed to 0 on port 1 [ 62.955574][ T418] __ib_cache_gid_add: unable to add gid fe80:0000:0000:0000:8013:fcff:feab:bf18 error=-28 [ 62.957015][ T4766] bond3: (slave macvlan1): Enslaving as a backup interface with an up link [ 63.047900][ T4757] syz.1.433 (4757) used greatest stack depth: 10304 bytes left [ 63.161821][ T4796] netlink: 'syz.0.449': attribute type 1 has an invalid length. [ 63.212469][ T4796] veth13: entered promiscuous mode [ 63.311532][ T4813] 8021q: adding VLAN 0 to HW filter on device bond3 [ 63.371608][ T4813] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.380759][ T4813] bond3: (slave bond0): making interface the new active one [ 63.397547][ T4813] bond3: (slave bond0): Enslaving as an active interface with an up link [ 63.415858][ T4813] netlink: 'syz.3.455': attribute type 10 has an invalid length. [ 63.423842][ T4813] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.431107][ T4813] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.449457][ T4813] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.456622][ T4813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.464024][ T4813] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.471087][ T4813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.496746][ T4813] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 63.523810][ T4822] bridge0: port 3(syz_tun) entered blocking state [ 63.530354][ T4822] bridge0: port 3(syz_tun) entered disabled state [ 63.551762][ T4822] syz_tun: entered allmulticast mode [ 63.557631][ T4822] syz_tun: entered promiscuous mode [ 63.563200][ T4822] bridge0: port 3(syz_tun) entered blocking state [ 63.569665][ T4822] bridge0: port 3(syz_tun) entered forwarding state [ 63.587315][ T4829] syzkaller0: entered promiscuous mode [ 63.592854][ T4829] syzkaller0: entered allmulticast mode [ 63.625952][ T4813] syz.3.455 (4813) used greatest stack depth: 10288 bytes left [ 63.672788][ T4835] netlink: 'syz.3.463': attribute type 1 has an invalid length. [ 63.686901][ T4838] netlink: 'syz.0.464': attribute type 1 has an invalid length. [ 63.747567][ T4835] veth5: entered promiscuous mode [ 63.770178][ T4835] bond4: (slave veth5): Enslaving as a backup interface with a down link [ 63.793258][ T4838] veth15: entered promiscuous mode [ 63.984710][ T4862] bond9: (slave bridge3): making interface the new active one [ 63.994549][ T4862] bond9: (slave bridge3): Enslaving as an active interface with an up link [ 64.057134][ T4862] macvlan3: entered promiscuous mode [ 64.062531][ T4862] macvlan3: entered allmulticast mode [ 64.068856][ T4862] bond9: entered promiscuous mode [ 64.074091][ T4862] bridge3: entered promiscuous mode [ 64.081334][ T4862] 8021q: adding VLAN 0 to HW filter on device macvlan3 [ 64.090185][ T4862] bond9: (slave macvlan3): the slave hw address is in use by the bond; couldn't find a slave with a free hw address to give it (this should not have happened) [ 64.106847][ T4862] bond9: left promiscuous mode [ 64.111667][ T4862] bridge3: left promiscuous mode [ 64.397000][ T4912] veth7: entered promiscuous mode [ 64.404015][ T4912] bond5: (slave veth7): Enslaving as a backup interface with a down link [ 64.462353][ T29] kauditd_printk_skb: 1089 callbacks suppressed [ 64.462367][ T29] audit: type=1400 audit(1769102705.026:3464): avc: denied { prog_load } for pid=4919 comm="syz.4.501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 64.487892][ T29] audit: type=1400 audit(1769102705.046:3465): avc: denied { create } for pid=4919 comm="syz.4.501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 64.529018][ T29] audit: type=1326 audit(1769102705.086:3466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4923 comm="syz.4.503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6600a7acb9 code=0x7ffc0000 [ 64.552932][ T29] audit: type=1326 audit(1769102705.096:3467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4923 comm="syz.4.503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6600a7acb9 code=0x7ffc0000 [ 64.579147][ T29] audit: type=1400 audit(1769102705.126:3468): avc: denied { create } for pid=4922 comm="syz.3.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 64.599734][ T29] audit: type=1326 audit(1769102705.126:3469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4923 comm="syz.4.503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f6600a7acb9 code=0x7ffc0000 [ 64.623152][ T29] audit: type=1400 audit(1769102705.126:3470): avc: denied { open } for pid=4923 comm="syz.4.503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 64.642307][ T29] audit: type=1326 audit(1769102705.126:3471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4923 comm="syz.4.503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6600a7acb9 code=0x7ffc0000 [ 64.665683][ T29] audit: type=1326 audit(1769102705.126:3472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4923 comm="syz.4.503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6600a7acb9 code=0x7ffc0000 [ 64.689163][ T29] audit: type=1326 audit(1769102705.126:3473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4923 comm="syz.4.503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7f6600a7acb9 code=0x7ffc0000 [ 64.920446][ T4950] veth7: entered promiscuous mode [ 64.928356][ T4950] bond3: (slave veth7): Enslaving as a backup interface with a down link [ 65.034991][ T4965] xt_connbytes: Forcing CT accounting to be enabled [ 65.197018][ T4986] veth9: entered promiscuous mode [ 65.204329][ T4986] bond6: (slave veth9): Enslaving as a backup interface with a down link [ 65.213694][ T4990] syzkaller0: entered promiscuous mode [ 65.219194][ T4990] syzkaller0: entered allmulticast mode [ 65.694886][ T5017] ================================================================== [ 65.703047][ T5017] BUG: KCSAN: data-race in __lru_add_drain_all / folio_add_lru [ 65.710626][ T5017] [ 65.712974][ T5017] read-write to 0xffff888237c26468 of 1 bytes by task 4991 on cpu 0: [ 65.721062][ T5017] folio_add_lru+0xa4/0x1e0 [ 65.725589][ T5017] folio_add_lru_vma+0x49/0x70 [ 65.730398][ T5017] do_wp_page+0x15be/0x2560 [ 65.734980][ T5017] handle_mm_fault+0x8c7/0x3030 [ 65.739858][ T5017] do_user_addr_fault+0x3fd/0x1050 [ 65.744995][ T5017] exc_page_fault+0x62/0xa0 [ 65.749525][ T5017] asm_exc_page_fault+0x26/0x30 [ 65.754401][ T5017] __put_user_nocheck_4+0x3/0x10 [ 65.759368][ T5017] ____sys_recvmsg+0x1a1/0x280 [ 65.764155][ T5017] ___sys_recvmsg+0x11f/0x3b0 [ 65.768861][ T5017] do_recvmmsg+0x1ef/0x560 [ 65.773318][ T5017] __x64_sys_recvmmsg+0xe5/0x170 [ 65.778288][ T5017] x64_sys_call+0x2b75/0x3000 [ 65.783011][ T5017] do_syscall_64+0xc0/0x2a0 [ 65.787537][ T5017] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 65.793449][ T5017] [ 65.795787][ T5017] read to 0xffff888237c26468 of 1 bytes by task 5017 on cpu 1: [ 65.803350][ T5017] __lru_add_drain_all+0x17e/0x450 [ 65.808486][ T5017] lru_cache_disable+0x1f/0x30 [ 65.813280][ T5017] __se_sys_mbind+0x491/0xb30 [ 65.817992][ T5017] __x64_sys_mbind+0x78/0x90 [ 65.822613][ T5017] x64_sys_call+0x2a2b/0x3000 [ 65.827319][ T5017] do_syscall_64+0xc0/0x2a0 [ 65.831852][ T5017] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 65.837761][ T5017] [ 65.840121][ T5017] value changed: 0x0e -> 0x00 [ 65.844802][ T5017] [ 65.847142][ T5017] Reported by Kernel Concurrency Sanitizer on: [ 65.853326][ T5017] CPU: 1 UID: 0 PID: 5017 Comm: syz.4.544 Not tainted syzkaller #0 PREEMPT(voluntary) [ 65.863073][ T5017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 65.873149][ T5017] ==================================================================