last executing test programs: 745.663388ms ago: executing program 3 (id=4): r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x1}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x1, 0x5}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000240)={0x42, 0x1}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4010}, 0x8820) 705.65347ms ago: executing program 3 (id=6): signalfd(0xffffffffffffffff, &(0x7f00000006c0)={[0xffffffffffffff37]}, 0x8) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) unshare(0x28000600) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x3ff}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xfffffffffffff30a, 0x3ff}, &(0x7f0000000000)={0x1f, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffffffe, 0x9}, 0x0, 0x0, 0x0) 660.458132ms ago: executing program 3 (id=7): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x200, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4ac2d78a}}, 0x0, 0x0, 0x3f, 0x0, "ee8b0e650926a96ecc136e7fb980e989db9e8bf9b93129488f651a8de213eb94cd46e19d9c65a018444a131f4da58ae36556dd38ea6c029607462029add09240005c6776267517308a3d40aa1c788df6"}, 0xd8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000009c0)=@gcm_256={{0x303}, "0100", "acba84f0a6731f234db1dc7f39000080d00600000003a9f4f600000000400080", "129c9707", "ec3fff9afd96e6c0"}, 0x38) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000140)=0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)="ec", 0xfdef}], 0x1) 516.135461ms ago: executing program 2 (id=3): r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="400000001000390400"/20, @ANYRES32=r1, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r1], 0x40}, 0x1, 0x0, 0x0, 0x4014}, 0x0) r3 = socket(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x44, 0x24, 0x5820a61ca228659, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x9}, {0xffff, 0xffff}, {0x0, 0x7}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_USC={0x10, 0x3, {0x3, 0x2}}}}]}, 0x44}}, 0x800) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=@newtfilter={0x54, 0x28, 0xd27, 0x1003ffd, 0x0, {0x0, 0x0, 0x0, r4, {0xffe0, 0x9}, {0x0, 0x9}, {0x2, 0xb}}, [@filter_kind_options=@f_fw={{0x7}, {0x28, 0x2, [@TCA_FW_INDEV={0x14, 0x3, 'pimreg\x00'}, @TCA_FW_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc}]}]}}]}, 0x54}, 0x1, 0x0, 0x0, 0x810}, 0x200008c4) 447.310855ms ago: executing program 4 (id=5): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000001400)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}]}, @NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "d103"}]}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0xa4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c0000000d0a010300000000000000000a0000010900020073797a31000000000900010073797a31"], 0x2c}, 0x1, 0x0, 0x0, 0x24000801}, 0x8000) close(r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) recvmsg(r1, &(0x7f0000002240)={0x0, 0x0, 0x0}, 0x0) 437.952115ms ago: executing program 1 (id=2): r0 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x1954, 0x300, 0x4}, &(0x7f0000000300)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x49, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) r3 = eventfd(0x6) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000200)=r3, 0x1) io_uring_enter(r0, 0x6e2, 0x3900, 0x3, 0x0, 0x0) r4 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r4, &(0x7f0000000600)={&(0x7f00000001c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000640)="80", 0x26892}], 0x1}, 0xfc) sendmsg$inet(r4, &(0x7f0000000680)={&(0x7f0000000000)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000240)="f9", 0x1}], 0x1}, 0x4000080) 398.767827ms ago: executing program 2 (id=8): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x9}, 0x94) r2 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r3, 0x3, 0x0, @val=@iter={0x0}}, 0x20) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "560400", 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x4}}}}}}}, 0x0) 382.023348ms ago: executing program 3 (id=9): r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x20) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x12, r1, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, r0}, 0x68) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4003, &(0x7f0000000000)=0x2, 0x44, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) 368.461679ms ago: executing program 4 (id=10): r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000440), 0x10) listen(r0, 0x5) r1 = socket$vsock_stream(0x28, 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, @local}, 0x10) r2 = accept4$unix(r0, 0x0, 0x0, 0x0) sendto$packet(r1, &(0x7f0000000600)="5f0efc3e1792a50972d2eb21bdff9ca4ac804c2847fe7bf05ddc63ff512d4074687760a5fbd1fc97772c6f5027dcea15b6658de3b024a6ea22baafb445bf8427c8055d00", 0xffffff3d, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)=""/74, 0x4a}], 0x2d}, 0x10000) 320.650042ms ago: executing program 0 (id=1): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000880)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x50, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x1}]}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x78}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc08b64d400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x400c090) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x8004) 278.983294ms ago: executing program 2 (id=11): r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x24}}, 0x0) r1 = socket(0x2a, 0x2, 0x0) getsockname$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x45) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0xfffa, 0x2}, {}, {0x1c, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ETH_TYPE={0x6, 0x8, 0x800}, @TCA_FLOWER_KEY_IP_TOS={0x5, 0x49, 0x2}]}}]}, 0x44}}, 0x24000000) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) 222.109277ms ago: executing program 0 (id=12): syz_open_dev$evdev(&(0x7f0000001900), 0x0, 0x0) unshare(0x20000400) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'veth1\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xf, [0x1, 0x1, 0x108003, 0x10, 0x4, 0x9, 0xa4, 0xbfb, 0x7, 0xb6b, 0x800c1, 0x4, 0x1, 0x7, 0x9, 0xff, 0x1000, 0xc, 0x3, 0x2, 0x80000001, 0xfffffffa, 0x0, 0x1, 0x9, 0x4, 0x7, 0x5, 0x100000, 0x762, 0x3, 0x63c, 0x10, 0x6, 0x100, 0x6, 0x1bf6, 0xb, 0x40, 0x40bed4, 0x8, 0x8000100, 0x0, 0x0, 0x11000, 0x8, 0x5, 0x79b, 0x5, 0x1, 0x7f, 0x7, 0xa, 0x7, 0xf, 0x101, 0xa, 0x1fa0860a, 0x7, 0xa9, 0x81, 0x2, 0x180000, 0x4003, 0x8b, 0x5, 0x2af, 0x3, 0x5, 0x2, 0x300000, 0x9, 0xbbce, 0x7, 0x4009, 0x0, 0x4, 0x100002, 0x8, 0x752, 0x0, 0x7, 0x0, 0x10000, 0x3f6, 0xffffffff, 0x6, 0x6, 0x80000000, 0x80000000, 0xfdffffff, 0x2, 0xfffffffe, 0x84, 0x100, 0x5, 0x252, 0x81, 0xb, 0x4, 0xa0006, 0xc50, 0x2, 0xb, 0x2, 0xd9a, 0xc8, 0x2a2, 0xfffffffd, 0x3, 0x2, 0x5, 0x8, 0x0, 0x4, 0x2, 0x40, 0x8, 0x4, 0x4, 0x401, 0x66cd, 0x10000008, 0x8, 0x5, 0x1fc, 0x1ff, 0x3]}}) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000d80), 0x36f, 0x20102, 0x0) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) 221.770617ms ago: executing program 2 (id=13): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) setns(r1, 0x24020000) capget(0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) umount2(&(0x7f0000000540)='.\x00', 0xb) 129.940252ms ago: executing program 0 (id=14): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, @perf_bp={0x0, 0x4}, 0x600, 0x0, 0x8, 0x5, 0x3, 0x20005, 0x7, 0x0, 0x0, 0x0, 0x20004006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r1, 0x84, 0x81, &(0x7f0000000280)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x401, @loopback}], 0x1c) sendto$inet6(r1, &(0x7f0000000100)="b8", 0xffe0, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000002c0)={0x0, 0x0, 0x1, 'M'}, 0x9) 127.215222ms ago: executing program 2 (id=15): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) readv(r2, &(0x7f0000000740)=[{&(0x7f0000000480)=""/215, 0xd7}], 0x1) close(r2) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000100)="19", 0x3a4e1e905c56cdb7}], 0x1) 47.555977ms ago: executing program 3 (id=16): syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x108, 0x0, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x4a6, 0xcf2a, 0x200000000000003c, 0x0, 0x0) setsockopt$MRT6_DEL_MIF(0xffffffffffffffff, 0x29, 0xcb, 0x0, 0x2f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000001, 0x8031, 0xffffffffffffffff, 0xa8af1000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 0s ago: executing program 0 (id=17): setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x0, 0x0, [0x200000000140, 0x0, 0x0, 0x20000000016b, 0x2000000001a0, 0xfffffffffffffffd], 0x0, 0x0, 0x0}, 0x138) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, 0x0, &(0x7f00000001c0)}, 0x20) r0 = syz_io_uring_setup(0xa49, &(0x7f0000000480)={0x0, 0x28ad, 0x80, 0x9, 0x200}, &(0x7f0000000680)=0x0, &(0x7f0000000440)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x2c, 0x0, 0x0, 0x4}]}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x42718, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0x9, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x23456}) io_uring_enter(r0, 0x47bc, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): =process permissive=1 [ 14.986440][ T29] audit: type=1400 audit(1769511707.335:61): avc: denied { siginh } for pid=3186 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 19.374469][ T29] audit: type=1400 audit(1769511711.735:62): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.396426][ T29] audit: type=1400 audit(1769511711.735:63): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=477 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.419071][ T29] audit: type=1400 audit(1769511711.735:64): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=481 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.441973][ T29] audit: type=1400 audit(1769511711.735:65): avc: denied { search } for pid=3192 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.464946][ T29] audit: type=1400 audit(1769511711.735:66): avc: denied { read open } for pid=3193 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.0.165' (ED25519) to the list of known hosts. [ 22.398878][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 22.398894][ T29] audit: type=1400 audit(1769511714.755:70): avc: denied { mounton } for pid=3293 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.427801][ T29] audit: type=1400 audit(1769511714.785:71): avc: denied { mount } for pid=3293 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.428529][ T3293] cgroup: Unknown subsys name 'net' [ 22.455435][ T29] audit: type=1400 audit(1769511714.815:72): avc: denied { unmount } for pid=3293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.579981][ T3293] cgroup: Unknown subsys name 'cpuset' [ 22.586034][ T3293] cgroup: Unknown subsys name 'rlimit' [ 22.675941][ T29] audit: type=1400 audit(1769511715.035:73): avc: denied { setattr } for pid=3293 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.705082][ T29] audit: type=1400 audit(1769511715.035:74): avc: denied { create } for pid=3293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.725519][ T29] audit: type=1400 audit(1769511715.035:75): avc: denied { write } for pid=3293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.745839][ T29] audit: type=1400 audit(1769511715.035:76): avc: denied { read } for pid=3293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 22.752707][ T3302] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.766116][ T29] audit: type=1400 audit(1769511715.055:77): avc: denied { mounton } for pid=3293 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.799412][ T29] audit: type=1400 audit(1769511715.055:78): avc: denied { mount } for pid=3293 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.822590][ T29] audit: type=1400 audit(1769511715.055:79): avc: denied { read } for pid=3038 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 22.835496][ T3293] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.943096][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 23.952312][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 23.966017][ T3308] chnl_net:caif_netlink_parms(): no params data found [ 24.014073][ T3309] chnl_net:caif_netlink_parms(): no params data found [ 24.046372][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 24.093167][ T3308] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.100333][ T3308] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.107479][ T3308] bridge_slave_0: entered allmulticast mode [ 24.113833][ T3308] bridge_slave_0: entered promiscuous mode [ 24.124224][ T3308] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.131365][ T3308] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.138497][ T3308] bridge_slave_1: entered allmulticast mode [ 24.144953][ T3308] bridge_slave_1: entered promiscuous mode [ 24.158250][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.165321][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.172501][ T3316] bridge_slave_0: entered allmulticast mode [ 24.178809][ T3316] bridge_slave_0: entered promiscuous mode [ 24.185402][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.192597][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.199780][ T3311] bridge_slave_0: entered allmulticast mode [ 24.205971][ T3311] bridge_slave_0: entered promiscuous mode [ 24.216648][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.223757][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.230875][ T3311] bridge_slave_1: entered allmulticast mode [ 24.237220][ T3311] bridge_slave_1: entered promiscuous mode [ 24.249873][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.256920][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.264044][ T3316] bridge_slave_1: entered allmulticast mode [ 24.270587][ T3316] bridge_slave_1: entered promiscuous mode [ 24.300679][ T3309] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.307745][ T3309] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.314981][ T3309] bridge_slave_0: entered allmulticast mode [ 24.321330][ T3309] bridge_slave_0: entered promiscuous mode [ 24.328686][ T3308] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.337781][ T3309] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.344883][ T3309] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.352148][ T3309] bridge_slave_1: entered allmulticast mode [ 24.358435][ T3309] bridge_slave_1: entered promiscuous mode [ 24.365560][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.386182][ T3308] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.399989][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.410117][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.432545][ T3309] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.447400][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.457213][ T3309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.470235][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.477325][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.484483][ T3313] bridge_slave_0: entered allmulticast mode [ 24.491029][ T3313] bridge_slave_0: entered promiscuous mode [ 24.510396][ T3308] team0: Port device team_slave_0 added [ 24.520726][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.527826][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.535122][ T3313] bridge_slave_1: entered allmulticast mode [ 24.541622][ T3313] bridge_slave_1: entered promiscuous mode [ 24.548473][ T3316] team0: Port device team_slave_0 added [ 24.558769][ T3308] team0: Port device team_slave_1 added [ 24.565081][ T3316] team0: Port device team_slave_1 added [ 24.571460][ T3309] team0: Port device team_slave_0 added [ 24.581983][ T3311] team0: Port device team_slave_0 added [ 24.600731][ T3309] team0: Port device team_slave_1 added [ 24.611035][ T3311] team0: Port device team_slave_1 added [ 24.617472][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.627668][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.644386][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.651418][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.677303][ T3308] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.700795][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.707749][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.733660][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.745123][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.752082][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.778032][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.792916][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.800001][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.825960][ T3308] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.841266][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.848211][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.874177][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.888279][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.895267][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.921159][ T3309] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.935124][ T3313] team0: Port device team_slave_0 added [ 24.941419][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.948367][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.974298][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.989500][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.996443][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.022401][ T3309] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.040997][ T3313] team0: Port device team_slave_1 added [ 25.055049][ T3316] hsr_slave_0: entered promiscuous mode [ 25.061168][ T3316] hsr_slave_1: entered promiscuous mode [ 25.084246][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.091237][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.117171][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.143413][ T3309] hsr_slave_0: entered promiscuous mode [ 25.149266][ T3309] hsr_slave_1: entered promiscuous mode [ 25.155082][ T3309] debugfs: 'hsr0' already exists in 'hsr' [ 25.160811][ T3309] Cannot create hsr debugfs directory [ 25.166389][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.173365][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.199284][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.217838][ T3308] hsr_slave_0: entered promiscuous mode [ 25.223826][ T3308] hsr_slave_1: entered promiscuous mode [ 25.229781][ T3308] debugfs: 'hsr0' already exists in 'hsr' [ 25.235482][ T3308] Cannot create hsr debugfs directory [ 25.265459][ T3311] hsr_slave_0: entered promiscuous mode [ 25.271499][ T3311] hsr_slave_1: entered promiscuous mode [ 25.277272][ T3311] debugfs: 'hsr0' already exists in 'hsr' [ 25.283000][ T3311] Cannot create hsr debugfs directory [ 25.359519][ T3313] hsr_slave_0: entered promiscuous mode [ 25.365410][ T3313] hsr_slave_1: entered promiscuous mode [ 25.371236][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 25.376944][ T3313] Cannot create hsr debugfs directory [ 25.491163][ T3316] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 25.513036][ T3316] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 25.527320][ T3316] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 25.538017][ T3316] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 25.554794][ T3308] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 25.563363][ T3308] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 25.577611][ T3308] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 25.585926][ T3308] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 25.605387][ T3309] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 25.619770][ T3309] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 25.631989][ T3309] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 25.647688][ T3309] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 25.674827][ T3313] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 25.685289][ T3313] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 25.694037][ T3313] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 25.704652][ T3313] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 25.727081][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 25.746874][ T3311] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 25.756465][ T3311] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 25.765308][ T3311] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 25.778040][ T3311] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 25.796484][ T3309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 25.817865][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 25.835534][ T3309] 8021q: adding VLAN 0 to HW filter on device team0 [ 25.845481][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.852567][ T3320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.861662][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.868745][ T3320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.882544][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.889602][ T3320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.904859][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.911904][ T3320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.928727][ T3308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 25.954840][ T3308] 8021q: adding VLAN 0 to HW filter on device team0 [ 25.973796][ T3336] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.980891][ T3336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.995898][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.017304][ T3336] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.024433][ T3336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.039776][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.059262][ T3336] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.066376][ T3336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.091796][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.098862][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.132778][ T3309] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.143148][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.161036][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.191997][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.210651][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.217736][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.228729][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.235910][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.281698][ T3308] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.304922][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.336545][ T3309] veth0_vlan: entered promiscuous mode [ 26.369916][ T3309] veth1_vlan: entered promiscuous mode [ 26.396648][ T3309] veth0_macvtap: entered promiscuous mode [ 26.405161][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.416435][ T3309] veth1_macvtap: entered promiscuous mode [ 26.466613][ T3308] veth0_vlan: entered promiscuous mode [ 26.485016][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.496233][ T3308] veth1_vlan: entered promiscuous mode [ 26.506368][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 26.516215][ T3313] veth0_vlan: entered promiscuous mode [ 26.531411][ T3316] veth0_vlan: entered promiscuous mode [ 26.542162][ T3313] veth1_vlan: entered promiscuous mode [ 26.552795][ T3336] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.561846][ T3336] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.571042][ T3336] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.580143][ T3336] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.613141][ T3308] veth0_macvtap: entered promiscuous mode [ 26.620208][ T3316] veth1_vlan: entered promiscuous mode [ 26.631742][ T3309] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 26.641178][ T3316] veth0_macvtap: entered promiscuous mode [ 26.655060][ T3316] veth1_macvtap: entered promiscuous mode [ 26.664933][ T3311] veth0_vlan: entered promiscuous mode [ 26.678194][ T3308] veth1_macvtap: entered promiscuous mode [ 26.685180][ T3313] veth0_macvtap: entered promiscuous mode [ 26.704352][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.713015][ T3313] veth1_macvtap: entered promiscuous mode [ 26.721654][ T3311] veth1_vlan: entered promiscuous mode [ 26.728862][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 26.746419][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.759160][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.772781][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 26.782154][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 26.800181][ T3320] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.819617][ T3320] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.845808][ T3320] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.867480][ T3311] veth0_macvtap: entered promiscuous mode [ 26.883904][ T3320] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.908710][ T3311] veth1_macvtap: entered promiscuous mode [ 26.927016][ T3320] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.935612][ T3497] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3'. [ 26.941774][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.959920][ T3320] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.976815][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.003453][ T3320] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.021233][ T3320] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.036067][ T3320] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.065182][ T3320] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.078621][ T3320] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.098261][ T3320] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.119237][ T3510] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1'. [ 27.128947][ T3320] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.151713][ T3510] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1'. [ 27.167457][ T3320] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.182283][ T3320] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.217364][ T3320] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.453184][ T3535] ================================================================== [ 27.461293][ T3535] BUG: KCSAN: data-race in __d_drop / fast_dput [ 27.467557][ T3535] [ 27.469874][ T3535] write to 0xffff888107ada0d0 of 8 bytes by task 3537 on cpu 1: [ 27.477501][ T3535] __d_drop+0x14d/0x240 [ 27.481668][ T3535] __dentry_kill+0x122/0x460 [ 27.486278][ T3535] finish_dput+0x2b/0x200 [ 27.490612][ T3535] dput+0x52/0x60 [ 27.494254][ T3535] step_into_slowpath+0x38c/0x4c0 [ 27.499281][ T3535] path_lookupat+0x330/0x500 [ 27.503910][ T3535] filename_lookup+0x190/0x390 [ 27.508688][ T3535] filename_getxattr+0x54/0x1a0 [ 27.513537][ T3535] io_getxattr+0x50/0xe0 [ 27.517781][ T3535] __io_issue_sqe+0xfd/0x2d0 [ 27.522380][ T3535] io_issue_sqe+0x20b/0xc20 [ 27.526881][ T3535] io_wq_submit_work+0x574/0x770 [ 27.531812][ T3535] io_worker_handle_work+0x41e/0x950 [ 27.537092][ T3535] io_wq_worker+0x233/0x910 [ 27.541587][ T3535] ret_from_fork+0x148/0x280 [ 27.546169][ T3535] ret_from_fork_asm+0x1a/0x30 [ 27.550926][ T3535] [ 27.553237][ T3535] read to 0xffff888107ada0d0 of 8 bytes by task 3535 on cpu 0: [ 27.560764][ T3535] fast_dput+0x5f/0x2c0 [ 27.564917][ T3535] dput+0x24/0x60 [ 27.568539][ T3535] step_into_slowpath+0x38c/0x4c0 [ 27.573555][ T3535] path_lookupat+0x330/0x500 [ 27.578142][ T3535] filename_lookup+0x190/0x390 [ 27.582899][ T3535] filename_getxattr+0x54/0x1a0 [ 27.587747][ T3535] io_getxattr+0x50/0xe0 [ 27.591985][ T3535] __io_issue_sqe+0xfd/0x2d0 [ 27.596568][ T3535] io_issue_sqe+0x20b/0xc20 [ 27.601065][ T3535] io_wq_submit_work+0x574/0x770 [ 27.605993][ T3535] io_worker_handle_work+0x41e/0x950 [ 27.611277][ T3535] io_wq_worker+0x233/0x910 [ 27.615774][ T3535] ret_from_fork+0x148/0x280 [ 27.620354][ T3535] ret_from_fork_asm+0x1a/0x30 [ 27.625110][ T3535] [ 27.627416][ T3535] value changed: 0xffff8882376a34a8 -> 0x0000000000000000 [ 27.634502][ T3535] [ 27.636811][ T3535] Reported by Kernel Concurrency Sanitizer on: [ 27.642963][ T3535] CPU: 0 UID: 0 PID: 3535 Comm: iou-wrk-3534 Not tainted syzkaller #0 PREEMPT(voluntary) [ 27.652843][ T3535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 27.662885][ T3535] ==================================================================