last executing test programs: 4.43926719s ago: executing program 4 (id=84): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000e40)=@newtfilter={0x84, 0x2c, 0xd27, 0x70bd2d, 0x25dfdc00, {0x0, 0x0, 0x0, r3, {0x0, 0x3}, {}, {0xfff3, 0xffe0}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0xd, 0xd0ea, 0x20000001, 0x3, 0x4}, 0x1}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x3, 0x3}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x50}, 0x0) r4 = socket(0x400000000010, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001300)=@delchain={0x24, 0x66, 0x221, 0x70bd2c, 0x25dfdc00, {0x0, 0x0, 0x0, r6, {0x0, 0xfff3}, {}, {0xb, 0xfff3}}}, 0x24}, 0x1, 0x0, 0x0, 0x8848}, 0x20004800) 4.373683643s ago: executing program 4 (id=87): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r2, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) getsockname$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r5, {}, {0xfff2, 0xffff}, {0xffff, 0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x4008854}, 0x4010) 4.295361667s ago: executing program 4 (id=89): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r2, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) getsockname$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x34, 0x2c, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r5, {}, {0xfff2, 0xffff}, {0xffff, 0x5}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008854}, 0x4010) 4.23675949s ago: executing program 4 (id=91): r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000440), 0x10) listen(r0, 0x5) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @local}, 0x10) r2 = accept4$unix(r0, 0x0, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000600)="5f0efc3e1792a50972d2eb21bdff9ca4ac804c2847fe7bf05ddc63ff512d4074687760a5fbd1fc97772c6f5027dcea15b6658de3b024a6ea22baafb445bf8427c8055d00", 0xffffff3d, 0x0, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0xac1414bb}, 0x3804, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}, 0x20000000}, {{&(0x7f0000000180)={0x2, 0x0, @remote}, 0x69, &(0x7f0000000400)=[{&(0x7f0000000240)="b9", 0x26892}], 0xbb}}], 0x2, 0x0) recvmsg(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)=""/74, 0x4a}], 0x2d}, 0x10000) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x2, 0x7fff7ffc}]}) close_range(r3, 0xffffffffffffffff, 0x200000000000000) 4.210928051s ago: executing program 4 (id=93): r0 = open(&(0x7f0000000300)='.\x00', 0x100000, 0x0) flock(r0, 0x1) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x800) flock(r1, 0x2) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) flock(r2, 0x2) timer_create(0x0, &(0x7f0000000180)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000540)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x2}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r3, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) 2.546097854s ago: executing program 2 (id=117): r0 = socket(0x400000000010, 0x3, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xc, 0xf}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8001}, 0x20008850) sendmsg$nl_route_sched(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)=@newtfilter={0x34, 0x2c, 0xd27, 0x70bd28, 0xfffff000, {0x0, 0x0, 0x0, r4, {0xf000, 0xffff}, {}, {0x7, 0xa}}, [@filter_kind_options=@f_route={{0xa}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20000800) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newtfilter={0x44, 0x2c, 0xd27, 0x70bd28, 0xfffff000, {0x0, 0x0, 0x0, r6, {0xf000, 0xffff}, {}, {0x7, 0xa}}, [@filter_kind_options=@f_route={{0xa}, {0x14, 0x2, [@TCA_ROUTE4_FROM={0x8, 0x3, 0xa0}, @TCA_ROUTE4_CLASSID={0x8, 0x1, {0x7, 0x2}}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000800) 2.392525942s ago: executing program 2 (id=120): r0 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'veth0_to_hsr\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r1, {0x0, 0xffe1}, {0xffff, 0xffff}, {0xffe0}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x4, 0x9}}]}}]}, 0x48}}, 0xc840) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=@newtfilter={0x60, 0x2c, 0xd2b, 0x70bd2b, 0x25dfdbf8, {0x0, 0x0, 0x0, r1, {0x6}, {}, {0x7, 0xfff1}}, [@filter_kind_options=@f_matchall={{0xd}, {0x2c, 0x2, [@TCA_MATCHALL_CLASSID={0x8, 0x1, {0xd, 0xffe0}}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0x9, 0xc}}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x1}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0xfff3, 0xffff}}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0xfff1, 0x6}}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4084}, 0x24040084) recvmmsg$unix(r0, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/219, 0xdb}], 0x1}}], 0x1, 0x60, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) io_submit(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[], 0xc3}, 0x1, 0x100000000000000, 0x0, 0x2000}, 0x40400c0) r2 = socket(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) 2.364726463s ago: executing program 2 (id=121): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360"], 0xffdd) 2.002477721s ago: executing program 2 (id=128): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) rseq(&(0x7f0000001080)={0x0, 0x0, 0x0, 0x1}, 0x20, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0xff, 0x7, 0x7fc00002}]}) membarrier(0x10, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0x541b, &(0x7f0000000000)={0xffffffffffffffff, 0x8e59, 0x0, 0x3}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x6a855000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) close_range(r3, r1, 0x0) 1.835805709s ago: executing program 0 (id=135): r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="e0000001ac1414aa"], 0x1c) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000380)={0x8, {{0x2, 0x4e21, @multicast1}}}, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x25, &(0x7f0000000080)={@multicast1, @local}, 0xc) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="780000001000830404000000fedbdf2500007400", @ANYRES32=r2, @ANYBLOB="0108000007500500580012800b0001006272696467650000480002800500190002000000050017"], 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x0, 0x0, 0x0, 0xccd21cca, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='h'], 0x68}, 0x9}, 0x0) 1.756468113s ago: executing program 0 (id=137): r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f00000002c0)="cc", 0x1, 0x4000, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000580)={0x2, 0x0, 0x6, 0xffffffff}, 0x10) sendto$inet6(r1, &(0x7f0000000200)='x', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x5, 0x8}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x0, 0xb1}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000005c0)={0x0, 0x2, 0xb1}, 0x39) 1.711749625s ago: executing program 0 (id=138): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x7, 0x34328, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={0x0, 0x2}, 0x10026, 0x10003, 0xfffffff8, 0x3, 0x100008, 0x20005, 0x9, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'veth0_to_hsr\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, r1, {0x0, 0xffe1}, {0xffff, 0xffff}, {0xffe0}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x4, 0x9}}]}}]}, 0x48}}, 0xc840) sendmsg$nl_route_sched(r0, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newtfilter={0x54, 0x2c, 0xd2b, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r1, {0x6}, {}, {0x7, 0xfff1}}, [@filter_kind_options=@f_u32={{0x8}, {0x28, 0x2, [@TCA_U32_SEL={0x24, 0x5, {0xd, 0x7, 0x1, 0x3d3f, 0x0, 0xfff, 0xb709, 0x58f, [{0x0, 0x20008000, 0x4, 0x1}]}}]}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4084}, 0x24040084) recvmmsg$unix(r0, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/219, 0xdb}], 0x1}}], 0x1, 0x60, 0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x28, 0x0, 0x1, 0x3, 0x0, {}, [@GTPA_LINK={0x8}, @GTPA_TID={0xc}]}, 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[], 0xc3}, 0x1, 0x100000000000000, 0x0, 0x2000}, 0x40400c0) r2 = socket(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) 1.092496916s ago: executing program 1 (id=142): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_clone(0x44063400, 0x0, 0x3, 0x0, 0x0, 0x0) 1.080786696s ago: executing program 0 (id=143): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0xc71, 0x2}) fallocate(0xffffffffffffffff, 0x3, 0x8dc, 0xfffffffb) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000140)={0x28, 0x0, 0x2710, @host}, 0x10) listen(r2, 0x0) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0x0) request_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\x10rust\xe3cusg\x91\xdeeH\xe5+\xf0', r3) 1.013052269s ago: executing program 2 (id=145): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'caif0\x00', {0x2, 0x4e24, @empty}}) socket$inet6_sctp(0xa, 0x1, 0x84) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x18215, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffe, 0x0, 0x2, 0x80000011, 0x6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x4, 0x4) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r1, &(0x7f0000004d00)=[{{0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x30000}}], 0x300, 0xf00) 972.090681ms ago: executing program 0 (id=147): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000580)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x57, 0x7fc00100}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000740)={0x0}) r3 = syz_io_uring_setup(0xbdc, &(0x7f0000000640)={0x0, 0xec25, 0x400, 0x1, 0x40000333}, &(0x7f00000006c0)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r3, 0x847ba, 0x0, 0xe, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f00000000c0)={r2}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000003c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000080)={r6, 0x3, r0, 0x5}) 814.79813ms ago: executing program 1 (id=148): socket(0x840000000002, 0x3, 0x100) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)=@random={'user.', '([\x00'}, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @empty}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f5, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'erspan0\x00', r2, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14, 0x14, 0xd}, @multicast2}}}}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x11, &(0x7f0000000100)={[{@noblock_validity}, {@stripe={'stripe', 0x3d, 0x2}}, {@norecovery}, {@min_batch_time={'min_batch_time', 0x3d, 0x71d}}, {@abort}]}, 0x1, 0x610, &(0x7f0000000a40)="$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") mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f4, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000180)={'ip_vti0\x00', 0x0, 0x7, 0x80, 0x9, 0x200000, {{0x5, 0x4, 0x0, 0x3d, 0x14, 0x0, 0x0, 0x0, 0x29, 0x0, @local, @private=0xa010101}}}}) 734.433573ms ago: executing program 2 (id=149): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) bpf$MAP_CREATE(0x0, 0x0, 0x48) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) setpriority(0x0, 0x1, 0xa7a8) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x5c4a19f17da70bee) r1 = gettid() openat$dir(0xffffffffffffff9c, 0x0, 0x60000, 0x3) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)=0x0) timer_settime(r2, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x86, 0xfffffffe, 0x0, 0x0, 0xfffffffc) 724.395544ms ago: executing program 1 (id=150): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x804, &(0x7f0000000300)={[{@barrier_val={'barrier', 0x3d, 0xeb}}, {@noblock_validity}]}, 0x1, 0x511, &(0x7f0000000a80)="$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") getpid() add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000240)="000000000000003499b8f276dc75584a8d87d907005858367d61f49e1639a48f614a54a8192c2876b7", 0x29, 0xffffffffffffffff) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffe, 0x2}, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setresuid(0xee00, 0xee00, 0x0) r0 = syz_io_uring_setup(0x4dc, &(0x7f00000000c0)={0x0, 0x79af, 0x3180, 0x8000, 0x400252}, &(0x7f0000000640)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000500)=@IORING_OP_MKDIRAT={0x25, 0x17, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1f, 0x0, 0xf9b7a26b18f77d51}) io_uring_enter(r0, 0x627, 0x4c1, 0x43, 0x0, 0x0) 668.427376ms ago: executing program 1 (id=151): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r2, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffff}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) getsockname$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=@delchain={0x34, 0x2c, 0xf31, 0x80, 0x2000, {0x0, 0x0, 0x0, r5, {}, {0xb, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_flower={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008844}, 0x4010) 616.863269ms ago: executing program 1 (id=152): r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmsg$unix(r0, &(0x7f00000000c0)={&(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4040801}, 0x20008840) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000080)=0x7, 0x4) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0xfffffffffffffe84}, 0x68) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[], 0x128, 0x80}}], 0x1, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x1000c) r1 = io_uring_setup(0x56ab, &(0x7f0000000040)={0x0, 0x36d, 0xc000, 0xc, 0x8b}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0x9f69a7a086f70ae8, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x24, &(0x7f0000000000)=0xa, 0x4) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) 584.646871ms ago: executing program 1 (id=155): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) timer_gettime(r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0xca02}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="800002010800000008001b000000000008000d"], 0x38}}, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000000)=""/30, 0x1e}], 0x1, 0x8, 0x2) 567.163222ms ago: executing program 3 (id=156): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x169f, 0x0, 0x81, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x9) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) socket$kcm(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0xd000000, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000380)={@empty}, 0x14) write(r0, &(0x7f0000000340)="0a000300", 0x4) recvmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}, 0x5}], 0x40001af, 0x12122, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x9}, 0x90) 544.493763ms ago: executing program 3 (id=157): socket$inet6(0xa, 0x2, 0x0) close(0x3) socket$l2tp6(0xa, 0x2, 0x73) socket(0x2, 0x80805, 0x0) r0 = syz_io_uring_setup(0x6440, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, 0x0, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x40, 0x0, 0x3, 0x1, 0x0, 0x7ff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB='.'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_LINKAT={0x27, 0x20, 0x0, r3, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00', r3, 0x1000}) io_uring_enter(r0, 0x2d3c, 0x0, 0x0, 0x0, 0x0) 528.412013ms ago: executing program 3 (id=158): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0xffff, 0x4) write(r0, &(0x7f0000000000)="240000001a005f0314f9f407000904000200000001000000000000000800040001000000", 0x24) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="34000000100081eee80000040000000010000000", @ANYRES32, @ANYBLOB="ddfffffdff000000140012000c00010062"], 0x34}}, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)=@security={'security\x00', 0xe, 0x4, 0x2d0, 0xffffffff, 0xd0, 0x1d8, 0xd0, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, 0x0, {[{{@ip={@remote, @empty, 0xff000000, 0xffffff00, 'veth0_vlan\x00', 'ip6erspan0\x00', {0xff}, {}, 0x21, 0x2}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @broadcast, 0x0, 0xa, [0x15, 0x1d, 0x3, 0x3b, 0x5, 0x16, 0x26, 0xa, 0x2b, 0x20, 0x29, 0x3, 0x25, 0x15, 0x32, 0x24], 0x0, 0x100, 0x10001}}}, {{@ip={@broadcast, @multicast1, 0x0, 0xffffff00, 'veth1\x00', 'batadv0\x00', {0xff}, {0xff}, 0x16, 0x1}, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x4, [0x4, 0x0, 0x0, 0x5, 0x2], 0x3, 0x1}, {0xffffffffffffffff, [0x3, 0x5, 0x7, 0x2, 0x1], 0x2, 0x6}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x330) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x56ab, &(0x7f0000000040)={0x0, 0x36d, 0xc000, 0xc, 0xa0002f5}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0xfffffffffffffda2, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x24, &(0x7f0000000000)=0xa, 0x4) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) 508.692584ms ago: executing program 3 (id=159): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002180)='blkio.bfq.io_merged\x00', 0x275a, 0x0) r1 = socket(0x840000000002, 0x3, 0x100) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) sendmmsg$inet(r1, &(0x7f0000005240), 0x4000095, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x12, r0, 0x0) syz_clone(0x800011, 0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f000064c000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) mbind(&(0x7f00005f7000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) mremap(&(0x7f000008f000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000486000/0x1000)=nil) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x0) 486.237396ms ago: executing program 3 (id=160): r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x7800, 0x0, 0x0, 0xfffffffd, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @dev={0xac, 0x14, 0x14, 0x2a}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f3, &(0x7f0000000940)={'syztnl0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x10, 0x0, 0x1, 0x10000000, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x4, 0x4, 0x0, @loopback, @local}}}}) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f00000000c0)=@ethtool_regs={0x4, 0x0, 0x4, "f42a97b9"}}) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1_macvtap\x00', 0x0}) r6 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000b80)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@ipv6_newnexthop={0x28, 0x68, 0x1, 0x70bd25, 0x0, {0x2, 0x0, 0x3, 0x0, 0x4}, [@NHA_ID={0x8, 0x6, 0x1}, @NHA_OIF={0x8, 0x5, r7}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004011}, 0x40000) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x140, r4, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x40}, 0x84) 365.213172ms ago: executing program 4 (id=161): timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0, 0x26}, 0x28) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000180), 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x200000000000000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 86.405736ms ago: executing program 0 (id=162): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c0000001000850600000000ff6122314a000800", @ANYRES32=r3, @ANYBLOB="00001000252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x40000) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="3c0000001000030500000000fcffffff00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100626f6e64000000000400028008000a00", @ANYRES32=r3], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x23, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x90646, 0x800}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ALL_SLAVES_ACTIVE={0x5, 0x11, 0x1}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40e95}, 0x20048040) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="5c00000010001ffffcffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000340012800b0001006772657461700000240002800800070064010100060003001008000008001500700f0d0008000700ac1414bb08000a00", @ANYRES32=r3], 0x5c}}, 0x40) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r3], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 0s ago: executing program 3 (id=163): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r1, 0x0, 0xc8, &(0x7f0000003d40), 0x4) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x6000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = open(&(0x7f00000001c0)='./file2\x00', 0x4083, 0x0) setuid(0xee00) ioctl$BLKRASET(r2, 0x1262, 0x0) setsockopt$MRT_ADD_VIF(r1, 0x0, 0xca, &(0x7f0000003d80)={0x1, 0x0, 0x0, 0x0, @vifc_lcl_addr=@local, @dev}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close_range(r0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): [ 20.716257][ T28] audit: type=1400 audit(1774391603.016:62): avc: denied { search } for pid=3195 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.739226][ T28] audit: type=1400 audit(1774391603.016:63): avc: denied { search } for pid=3195 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.762940][ T28] audit: type=1400 audit(1774391603.016:64): avc: denied { search } for pid=3195 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.786678][ T28] audit: type=1400 audit(1774391603.016:65): avc: denied { search } for pid=3195 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.811263][ T28] audit: type=1400 audit(1774391603.016:66): avc: denied { read open } for pid=3196 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.0.135' (ED25519) to the list of known hosts. [ 24.836340][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 24.836358][ T28] audit: type=1400 audit(1774391607.136:70): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.870060][ T28] audit: type=1400 audit(1774391607.166:71): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.870838][ T3299] cgroup: Unknown subsys name 'net' [ 24.901255][ T28] audit: type=1400 audit(1774391607.196:72): avc: denied { unmount } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.083491][ T3299] cgroup: Unknown subsys name 'cpuset' [ 25.089970][ T3299] cgroup: Unknown subsys name 'rlimit' [ 25.170622][ T28] audit: type=1400 audit(1774391607.466:73): avc: denied { setattr } for pid=3299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.197664][ T28] audit: type=1400 audit(1774391607.466:74): avc: denied { create } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.229230][ T28] audit: type=1400 audit(1774391607.466:75): avc: denied { write } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.235777][ T3303] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 25.252905][ T28] audit: type=1400 audit(1774391607.466:76): avc: denied { read } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.283408][ T28] audit: type=1400 audit(1774391607.466:77): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.300075][ T3299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.311010][ T28] audit: type=1400 audit(1774391607.466:78): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.311041][ T28] audit: type=1400 audit(1774391607.526:79): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 27.165163][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 27.223253][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 27.251035][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.258625][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.266229][ T3320] bridge_slave_0: entered allmulticast mode [ 27.273521][ T3320] bridge_slave_0: entered promiscuous mode [ 27.288541][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 27.307390][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.315196][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.323040][ T3320] bridge_slave_1: entered allmulticast mode [ 27.329878][ T3320] bridge_slave_1: entered promiscuous mode [ 27.346882][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 27.396096][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.411432][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 27.425340][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.450386][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.458509][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.466042][ T3312] bridge_slave_0: entered allmulticast mode [ 27.473112][ T3312] bridge_slave_0: entered promiscuous mode [ 27.497784][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.505404][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.512764][ T3313] bridge_slave_0: entered allmulticast mode [ 27.519354][ T3313] bridge_slave_0: entered promiscuous mode [ 27.526699][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.534248][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.541609][ T3312] bridge_slave_1: entered allmulticast mode [ 27.548332][ T3312] bridge_slave_1: entered promiscuous mode [ 27.570723][ T3320] team0: Port device team_slave_0 added [ 27.576970][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.584514][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.591867][ T3313] bridge_slave_1: entered allmulticast mode [ 27.599033][ T3313] bridge_slave_1: entered promiscuous mode [ 27.620660][ T3320] team0: Port device team_slave_1 added [ 27.626641][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.634275][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.642351][ T3317] bridge_slave_0: entered allmulticast mode [ 27.649463][ T3317] bridge_slave_0: entered promiscuous mode [ 27.661207][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.668836][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.676612][ T3317] bridge_slave_1: entered allmulticast mode [ 27.683429][ T3317] bridge_slave_1: entered promiscuous mode [ 27.690585][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.703542][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.718863][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.754899][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.775272][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.785010][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.792402][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.819456][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.831821][ T3312] team0: Port device team_slave_0 added [ 27.837803][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.845539][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.853093][ T3319] bridge_slave_0: entered allmulticast mode [ 27.860029][ T3319] bridge_slave_0: entered promiscuous mode [ 27.871505][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.879036][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.886388][ T3319] bridge_slave_1: entered allmulticast mode [ 27.893274][ T3319] bridge_slave_1: entered promiscuous mode [ 27.901141][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.911025][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.918537][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.945396][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.957087][ T3312] team0: Port device team_slave_1 added [ 27.968724][ T3313] team0: Port device team_slave_0 added [ 27.979433][ T3313] team0: Port device team_slave_1 added [ 28.009588][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.024303][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.031700][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.058722][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.070109][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.077438][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.104415][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.116281][ T3317] team0: Port device team_slave_0 added [ 28.122419][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.129750][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.157066][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.168988][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.183342][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.190481][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.217718][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.229975][ T3317] team0: Port device team_slave_1 added [ 28.268367][ T3320] hsr_slave_0: entered promiscuous mode [ 28.274746][ T3320] hsr_slave_1: entered promiscuous mode [ 28.282445][ T3319] team0: Port device team_slave_0 added [ 28.289688][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.297867][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.326335][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.339934][ T3319] team0: Port device team_slave_1 added [ 28.350674][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.358534][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.386818][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.424201][ T3313] hsr_slave_0: entered promiscuous mode [ 28.430592][ T3313] hsr_slave_1: entered promiscuous mode [ 28.437129][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 28.443255][ T3313] Cannot create hsr debugfs directory [ 28.464505][ T3312] hsr_slave_0: entered promiscuous mode [ 28.471221][ T3312] hsr_slave_1: entered promiscuous mode [ 28.477482][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 28.483529][ T3312] Cannot create hsr debugfs directory [ 28.489498][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.497025][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.524240][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.537232][ T3317] hsr_slave_0: entered promiscuous mode [ 28.543589][ T3317] hsr_slave_1: entered promiscuous mode [ 28.549708][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 28.555545][ T3317] Cannot create hsr debugfs directory [ 28.561962][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.569334][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.596035][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.691574][ T3319] hsr_slave_0: entered promiscuous mode [ 28.698353][ T3319] hsr_slave_1: entered promiscuous mode [ 28.704785][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 28.710704][ T3319] Cannot create hsr debugfs directory [ 28.828770][ T3320] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 28.846149][ T3320] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 28.860293][ T3320] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 28.874562][ T3320] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 28.905381][ T3312] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 28.915889][ T3312] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 28.925027][ T3312] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 28.934192][ T3312] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 28.976043][ T3313] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 28.985324][ T3313] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 28.994687][ T3313] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 29.004056][ T3313] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 29.018686][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.054791][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.074416][ T3317] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.085277][ T3317] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.095235][ T3317] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.104678][ T3317] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.122162][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.129569][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.148520][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.166875][ T113] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.174244][ T113] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.192281][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.200616][ T3319] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 29.212416][ T3319] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 29.221494][ T3319] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.230983][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.247487][ T113] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.255053][ T113] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.264082][ T113] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.271221][ T113] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.282188][ T3319] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.297169][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.314097][ T3320] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.336757][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.343978][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.366718][ T113] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.374191][ T113] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.400459][ T3313] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.414024][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.460928][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.477031][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.499929][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.527045][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.534366][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.545184][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.552667][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.570469][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.581946][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.595096][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.627409][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.660510][ T1935] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.667946][ T1935] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.693076][ T1935] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.700455][ T1935] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.757490][ T3319] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.792449][ T3320] veth0_vlan: entered promiscuous mode [ 29.817159][ T3312] veth0_vlan: entered promiscuous mode [ 29.825654][ T3312] veth1_vlan: entered promiscuous mode [ 29.838724][ T3320] veth1_vlan: entered promiscuous mode [ 29.851138][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.862187][ T3313] veth0_vlan: entered promiscuous mode [ 29.879165][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.901050][ T3313] veth1_vlan: entered promiscuous mode [ 29.909024][ T3312] veth0_macvtap: entered promiscuous mode [ 29.916140][ T3320] veth0_macvtap: entered promiscuous mode [ 29.943631][ T3312] veth1_macvtap: entered promiscuous mode [ 29.965632][ T3320] veth1_macvtap: entered promiscuous mode [ 29.978931][ T3313] veth0_macvtap: entered promiscuous mode [ 29.998040][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.010469][ T3313] veth1_macvtap: entered promiscuous mode [ 30.024628][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.036568][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.048704][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.060943][ T1935] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.081863][ T1935] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.096052][ T3317] veth0_vlan: entered promiscuous mode [ 30.110307][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.118801][ T1935] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.133834][ T1935] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.143798][ T1935] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.158146][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 30.158161][ T28] audit: type=1400 audit(1774391612.456:90): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/root/syzkaller.QqeIYt/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 30.163397][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.176292][ T28] audit: type=1400 audit(1774391612.456:91): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 30.223687][ T3319] veth0_vlan: entered promiscuous mode [ 30.229475][ T1935] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.234319][ T28] audit: type=1400 audit(1774391612.476:92): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/root/syzkaller.QqeIYt/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 30.247920][ T1935] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.274855][ T28] audit: type=1400 audit(1774391612.476:93): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 30.298559][ T3317] veth1_vlan: entered promiscuous mode [ 30.307034][ T3320] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 30.311134][ T3317] veth0_macvtap: entered promiscuous mode [ 30.333130][ T28] audit: type=1400 audit(1774391612.476:94): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/root/syzkaller.QqeIYt/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 30.333720][ T1935] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.364331][ T28] audit: type=1400 audit(1774391612.476:95): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/root/syzkaller.QqeIYt/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 30.400698][ T1935] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.410395][ T28] audit: type=1400 audit(1774391612.476:96): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 30.433161][ T3319] veth1_vlan: entered promiscuous mode [ 30.448488][ T3319] veth0_macvtap: entered promiscuous mode [ 30.457881][ T1935] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.463009][ T28] audit: type=1400 audit(1774391612.536:97): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 30.491155][ T28] audit: type=1400 audit(1774391612.536:98): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="gadgetfs" ino=3722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 30.493272][ T3317] veth1_macvtap: entered promiscuous mode [ 30.521668][ T28] audit: type=1400 audit(1774391612.736:99): avc: denied { read write } for pid=3320 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 30.543766][ T3319] veth1_macvtap: entered promiscuous mode [ 30.565419][ T1935] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.574634][ T1935] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.584372][ T3483] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5'. [ 30.595065][ T3483] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5'. [ 30.617320][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.655107][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.665748][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.672239][ T3487] netlink: 'syz.4.6': attribute type 1 has an invalid length. [ 30.675515][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.682443][ T3487] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6'. [ 30.705344][ T113] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.714576][ T113] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.742145][ T113] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.765661][ T113] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.785711][ T113] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.805244][ T113] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.813568][ T3496] tipc: Failed to remove unknown binding: 66,0,0/0:2184183079/2184183081 [ 30.824052][ T113] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.824640][ T3496] tipc: Failed to remove unknown binding: 66,0,0/0:2184183079/2184183080 [ 30.874053][ T50] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.891544][ T3496] tipc: Failed to remove unknown binding: 66,0,0/0:2184183079/2184183081 [ 30.970130][ T3496] tipc: Failed to remove unknown binding: 66,0,0/0:2184183079/2184183080 [ 31.115788][ C1] hrtimer: interrupt took 56395 ns [ 31.196297][ T3514] netlink: 4 bytes leftover after parsing attributes in process `syz.4.12'. [ 31.205807][ T3514] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 31.375666][ T3514] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 32.091514][ T3544] netlink: 24 bytes leftover after parsing attributes in process `syz.4.22'. [ 32.140375][ T3544] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3544 comm=syz.4.22 [ 32.216134][ T3551] loop4: detected capacity change from 0 to 1024 [ 32.226604][ T3551] ======================================================= [ 32.226604][ T3551] WARNING: The mand mount option has been deprecated and [ 32.226604][ T3551] and is ignored by this kernel. Remove the mand [ 32.226604][ T3551] option from the mount to silence this warning. [ 32.226604][ T3551] ======================================================= [ 32.269733][ T3551] EXT4-fs: Ignoring removed orlov option [ 32.295218][ T3551] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 32.341352][ T3320] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.364301][ T3556] netlink: 'syz.2.26': attribute type 21 has an invalid length. [ 32.452545][ T3562] netlink: 'syz.2.29': attribute type 1 has an invalid length. [ 32.478733][ T3562] netlink: 20 bytes leftover after parsing attributes in process `syz.2.29'. [ 32.489744][ T3562] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.497254][ T3562] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.505270][ T3562] bridge0: entered allmulticast mode [ 32.534217][ T3562] bridge0: port 3(ip6gretap1) entered blocking state [ 32.544123][ T3562] bridge0: port 3(ip6gretap1) entered disabled state [ 32.559648][ T3562] ip6gretap1: entered allmulticast mode [ 32.567005][ T3562] ip6gretap1: entered promiscuous mode [ 32.609644][ T3574] loop2: detected capacity change from 0 to 1024 [ 32.648014][ T3574] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 32.928993][ T3319] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 33.633415][ T3615] xfrm0: entered promiscuous mode [ 33.713167][ T3625] netlink: 'syz.0.50': attribute type 10 has an invalid length. [ 33.725275][ T3625] team0: Port device dummy0 added [ 33.735018][ T3625] netlink: 'syz.0.50': attribute type 10 has an invalid length. [ 33.745983][ T3625] team0: Port device dummy0 removed [ 33.764075][ T3625] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 33.825012][ T3625] capability: warning: `syz.0.50' uses deprecated v2 capabilities in a way that may be insecure [ 33.826847][ T3627] netlink: 763 bytes leftover after parsing attributes in process `syz.4.51'. [ 33.957926][ T3637] netlink: 24 bytes leftover after parsing attributes in process `syz.2.55'. [ 33.999573][ T3637] netlink: 4 bytes leftover after parsing attributes in process `syz.2.55'. [ 34.724689][ T3665] Zero length message leads to an empty skb [ 34.986124][ T3680] bridge_slave_0: invalid flags given to default FDB implementation [ 35.181213][ T28] kauditd_printk_skb: 208 callbacks suppressed [ 35.181288][ T28] audit: type=1400 audit(1774391617.476:308): avc: denied { allowed } for pid=3687 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 35.272661][ T28] audit: type=1400 audit(1774391617.516:309): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.342735][ T28] audit: type=1400 audit(1774391617.526:310): avc: denied { prog_load } for pid=3687 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 35.395641][ T28] audit: type=1400 audit(1774391617.526:311): avc: denied { prog_load } for pid=3687 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 35.446019][ T28] audit: type=1400 audit(1774391617.526:312): avc: denied { open } for pid=3687 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 35.481610][ T3698] netlink: 12 bytes leftover after parsing attributes in process `syz.1.78'. [ 35.502685][ T28] audit: type=1400 audit(1774391617.536:313): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.553171][ T28] audit: type=1400 audit(1774391617.556:314): avc: denied { name_bind } for pid=3690 comm="syz.1.76" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 35.594337][ T28] audit: type=1400 audit(1774391617.556:315): avc: denied { name_bind } for pid=3690 comm="syz.1.76" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 35.667511][ T28] audit: type=1400 audit(1774391617.556:316): avc: denied { name_bind } for pid=3690 comm="syz.1.76" src=28194 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 35.749564][ T28] audit: type=1400 audit(1774391617.606:317): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.242942][ T3719] netlink: 24 bytes leftover after parsing attributes in process `syz.4.87'. [ 36.258227][ T3719] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3719 comm=syz.4.87 [ 36.297728][ T3723] netlink: 24 bytes leftover after parsing attributes in process `syz.4.89'. [ 36.314757][ T3723] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3723 comm=syz.4.89 [ 36.404946][ T3732] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3732 comm=syz.0.94 [ 36.420142][ T3732] netlink: 'syz.0.94': attribute type 1 has an invalid length. [ 36.433150][ T3734] netlink: 12 bytes leftover after parsing attributes in process `syz.3.92'. [ 36.489236][ T3742] vlan2: entered allmulticast mode [ 36.498542][ T3742] vlan0: entered allmulticast mode [ 36.513567][ T3742] veth0_vlan: entered allmulticast mode [ 37.331074][ T3765] netlink: 24 bytes leftover after parsing attributes in process `syz.2.104'. [ 37.359014][ T3765] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3765 comm=syz.2.104 [ 37.612494][ T3783] netlink: 24 bytes leftover after parsing attributes in process `syz.2.111'. [ 37.623553][ T3783] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3783 comm=syz.2.111 [ 37.660577][ T3785] netlink: 'syz.2.112': attribute type 1 has an invalid length. [ 37.711293][ T3786] netlink: 8 bytes leftover after parsing attributes in process `syz.2.112'. [ 38.067940][ T3798] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 38.306579][ T3807] syzkaller0: entered promiscuous mode [ 38.312895][ T3807] syzkaller0: entered allmulticast mode [ 38.636111][ T3829] netlink: 8 bytes leftover after parsing attributes in process `syz.1.130'. [ 38.646344][ T3829] netlink: 8 bytes leftover after parsing attributes in process `syz.1.130'. [ 38.764023][ T3841] netlink: 52 bytes leftover after parsing attributes in process `syz.0.135'. [ 38.773799][ T3841] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3841 comm=syz.0.135 [ 38.987779][ T3850] netlink: 'syz.0.138': attribute type 3 has an invalid length. [ 39.022821][ T3850] netlink: 24 bytes leftover after parsing attributes in process `syz.0.138'. [ 39.062883][ T3850] ------------[ cut here ]------------ [ 39.068578][ T3850] memcpy: detected field-spanning write (size 32) of single field "&new->sel" at net/sched/cls_u32.c:855 (size 16) [ 39.081060][ T3850] WARNING: net/sched/cls_u32.c:855 at u32_change+0x144c/0x14d0, CPU#1: syz.0.138/3850 [ 39.091477][ T3850] Modules linked in: [ 39.095522][ T3850] CPU: 1 UID: 0 PID: 3850 Comm: syz.0.138 Not tainted syzkaller #0 PREEMPT(full) [ 39.105033][ T3850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 39.115939][ T3850] RIP: 0010:u32_change+0x1463/0x14d0 [ 39.121357][ T3850] Code: 31 ed e9 96 fe ff ff e8 1b 05 c2 fc 48 8d 3d 24 3a 89 02 b9 10 00 00 00 4d 89 f7 4c 8b 74 24 18 4c 89 f6 48 c7 c2 30 61 7e 86 <67> 48 0f b9 3a 4c 89 f2 4d 89 fe 4c 8b 7c 24 28 e9 36 f1 ff ff e8 [ 39.142042][ T3850] RSP: 0018:ffffc900030135e0 EFLAGS: 00010287 [ 39.148284][ T3850] RAX: ffffffff84975a05 RBX: ffffc900030137f0 RCX: 0000000000000010 [ 39.156512][ T3850] RDX: ffffffff867e6130 RSI: 0000000000000020 RDI: ffffffff87209430 [ 39.164717][ T3850] RBP: ffffc900030136e8 R08: 000188811bf6b487 R09: 0000000000000000 [ 39.173114][ T3850] R10: ffff88811bf6b400 R11: 0001c90003013357 R12: ffff88811bf6b800 [ 39.181792][ T3850] R13: 0000000000000001 R14: 0000000000000020 R15: ffff88811bf6b8c0 [ 39.190444][ T3850] FS: 00007f8c66b576c0(0000) GS:ffff8882ae9db000(0000) knlGS:0000000000000000 [ 39.200023][ T3850] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 39.206883][ T3850] CR2: 00007f8c68149e80 CR3: 000000011cf5a000 CR4: 00000000003506f0 [ 39.215343][ T3850] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 39.224092][ T3850] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 39.232952][ T3850] Call Trace: [ 39.236687][ T3850] [ 39.239774][ T3850] tc_new_tfilter+0xfc0/0x1200 [ 39.245060][ T3850] ? ns_capable+0x7c/0xb0 [ 39.250132][ T3850] ? __pfx_tc_new_tfilter+0x10/0x10 [ 39.255802][ T3850] rtnetlink_rcv_msg+0x64b/0x720 [ 39.261412][ T3850] netlink_rcv_skb+0x123/0x220 [ 39.266562][ T3850] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 39.272477][ T3850] rtnetlink_rcv+0x1c/0x30 [ 39.277091][ T3850] netlink_unicast+0x5c0/0x690 [ 39.282262][ T3850] netlink_sendmsg+0x5c8/0x6f0 [ 39.287276][ T3850] ? __pfx_netlink_sendmsg+0x10/0x10 [ 39.292756][ T3850] ____sys_sendmsg+0x563/0x5b0 [ 39.297722][ T3850] ___sys_sendmsg+0x195/0x1e0 [ 39.302711][ T3850] __sys_sendmmsg+0x185/0x320 [ 39.307971][ T3850] __x64_sys_sendmmsg+0x57/0x70 [ 39.313042][ T3850] x64_sys_call+0x27aa/0x3020 [ 39.317895][ T3850] do_syscall_64+0x12c/0x370 [ 39.322659][ T3850] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.328944][ T3850] RIP: 0033:0x7f8c680fc799 [ 39.333954][ T3850] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 39.354321][ T3850] RSP: 002b:00007f8c66b57028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 39.363486][ T3850] RAX: ffffffffffffffda RBX: 00007f8c68375fa0 RCX: 00007f8c680fc799 [ 39.371757][ T3850] RDX: 04000000000001f2 RSI: 0000200000000000 RDI: 0000000000000004 [ 39.380435][ T3850] RBP: 00007f8c68192c99 R08: 0000000000000000 R09: 0000000000000000 [ 39.388836][ T3850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 39.397481][ T3850] R13: 00007f8c68376038 R14: 00007f8c68375fa0 R15: 00007ffd356c7078 [ 39.405926][ T3850] [ 39.409315][ T3850] ---[ end trace 0000000000000000 ]--- [ 39.936530][ T3887] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3887 comm=syz.1.151 [ 40.187596][ T28] kauditd_printk_skb: 357 callbacks suppressed [ 40.187612][ T28] audit: type=1400 audit(1774391622.486:675): avc: denied { read write } for pid=3320 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.188652][ T3906] bridge0: port 3(gretap0) entered blocking state [ 40.247558][ T3906] bridge0: port 3(gretap0) entered disabled state [ 40.253076][ T28] audit: type=1400 audit(1774391622.556:676): avc: denied { bpf } for pid=3909 comm="syz.4.161" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 40.323917][ T28] audit: type=1400 audit(1774391622.626:677): avc: denied { prog_load } for pid=3909 comm="syz.4.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 40.355447][ T28] audit: type=1400 audit(1774391622.646:678): avc: denied { create } for pid=3905 comm="syz.3.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 40.381875][ T3906] gretap0: entered allmulticast mode [ 40.392241][ T3906] gretap0: entered promiscuous mode [ 40.398080][ T3906] bridge0: port 3(gretap0) entered blocking state [ 40.404857][ T3906] bridge0: port 3(gretap0) entered forwarding state [ 40.492806][ T28] audit: type=1400 audit(1774391622.796:679): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.530441][ T3913] netlink: 'syz.0.162': attribute type 1 has an invalid length. [ 40.552159][ T28] audit: type=1400 audit(1774391622.846:680): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.588667][ T3911] ================================================================== [ 40.597126][ T3911] BUG: KCSAN: data-race in fifo_open / wait_for_partner [ 40.604609][ T3911] [ 40.607195][ T3911] read-write to 0xffff88811bbf836c of 4 bytes by task 3910 on cpu 0: [ 40.615705][ T3911] fifo_open+0x86/0x5d0 [ 40.619863][ T3911] do_dentry_open+0x4ca/0xa90 [ 40.624819][ T3911] vfs_open+0x37/0x1e0 [ 40.628994][ T3911] path_openat+0x1b70/0x2050 [ 40.633895][ T3911] do_file_open_root+0x233/0x430 [ 40.639201][ T3911] file_open_root+0xfd/0x130 [ 40.643810][ T3911] do_handle_open+0x6b6/0x790 [ 40.648763][ T3911] __x64_sys_open_by_handle_at+0x44/0x50 [ 40.654577][ T3911] x64_sys_call+0x153d/0x3020 [ 40.659628][ T3911] do_syscall_64+0x12c/0x370 [ 40.665314][ T3911] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 40.671405][ T3911] [ 40.674205][ T3911] read to 0xffff88811bbf836c of 4 bytes by task 3911 on cpu 1: [ 40.682647][ T3911] wait_for_partner+0xd5/0x1e0 [ 40.687963][ T3911] fifo_open+0x462/0x5d0 [ 40.692296][ T3911] do_dentry_open+0x4ca/0xa90 [ 40.697158][ T3911] vfs_open+0x37/0x1e0 [ 40.701437][ T3911] path_openat+0x1b70/0x2050 [ 40.706513][ T3911] do_file_open+0x16c/0x290 [ 40.711424][ T3911] do_sys_openat2+0x94/0x130 [ 40.716399][ T3911] __x64_sys_openat+0xf2/0x120 [ 40.721534][ T3911] x64_sys_call+0x1e39/0x3020 [ 40.726517][ T3911] do_syscall_64+0x12c/0x370 [ 40.731379][ T3911] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 40.737723][ T3911] [ 40.740233][ T3911] value changed: 0x00000001 -> 0x00000002 [ 40.746062][ T3911] [ 40.748386][ T3911] Reported by Kernel Concurrency Sanitizer on: [ 40.754629][ T3911] CPU: 1 UID: 0 PID: 3911 Comm: syz.4.161 Tainted: G W syzkaller #0 PREEMPT(full) [ 40.765659][ T3911] Tainted: [W]=WARN [ 40.769471][ T3911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 40.780197][ T3911] ================================================================== [ 40.804973][ T28] audit: type=1400 audit(1774391622.886:681): avc: denied { create } for pid=3915 comm="syz.3.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 40.835308][ T3917] 8021q: adding VLAN 0 to HW filter on device bond2 [ 40.857551][ T3917] bond1: (slave bond2): making interface the new active one [ 40.865654][ T28] audit: type=1400 audit(1774391622.886:682): avc: denied { create } for pid=3915 comm="syz.3.163" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0 [ 40.887208][ T28] audit: type=1400 audit(1774391622.886:683): avc: denied { prog_load } for pid=3915 comm="syz.3.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 40.887593][ T3917] bond1: (slave bond2): Enslaving as an active interface with an up link [ 40.907513][ T28] audit: type=1400 audit(1774391623.106:684): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.954062][ T3913] bond1: (slave gretap1): Enslaving as a backup interface with an up link