last executing test programs: 15m19.248409637s ago: executing program 1 (id=1425): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000050000004943000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdff030018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 15m19.248115887s ago: executing program 1 (id=1426): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000280)=@proc={0x10, 0x0, 0x1}, 0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x149a82, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0xfe9e, 0x12) 15m18.930073925s ago: executing program 1 (id=1434): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x34e, &(0x7f0000000780)={@local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0000fa", 0x318, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x3, [{0x3, 0xa, "a78c000005dc8080a2030003004003493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34060600000000000000dac15084dbaf736b41e5af1802"}, {0x0, 0x1, "000000000000000d8a000000"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf3915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x2, 0x1d, "06aa85616177c61bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0dea07c9a1f643c822a18b79f7c5eba31fb68b2d734a6671e27182aee4df24a4a5cf390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5ac010000000000000090aa235a670670ffc5dc49dfb58d00000000000000"}, {0x19, 0xb, "17dcea468000000000054740a5d4901b0aeff04c0300f3c75dc2d227a83b6e483b108474bce9ac946a3f0e2bc4000091394c02bcfbbb7d71138537d68e2d2c6393a9f3cc271a9ff09a48b5b303f4f00000000000000000"}, {0xe, 0x7, "b8a3e10000a3e1100000006f00ffc0ffff00000000600000ff0bc0fe000000000000000000000000d9a0274400"/55}, {0x18, 0xc, "5e14ccb44d2d42cfb3f27fafb60845f90b6dfc2e37bc87c6905bbc94d33e1ea71a28105f543e868a8a53b360a9d33e2b1e26eb1d180600aa89c8f267d76ece1c9f6ae2e1eb3d8bf9c6ab2642c4808298e62afbf03269f1f98aea6ab3beb5fdc5fdaabc2c"}]}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x6c, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x3c, 0x2, {{0x9, 0x3, 0x0, 0x6, 0xfffffffa, 0x22}, [@TCA_NETEM_RATE={0x14, 0x6, {0xe1, 0x79d, 0x0, 0x3}}, @TCA_NETEM_RATE64={0xb, 0x8, 0xe61c6a5c983a3b82}]}}}]}, 0x6c}}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r7}, 0x10) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r8, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x1, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="6110b9000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000010000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000006c0)=ANY=[@ANYBLOB="140100002900010000000000fcdbdf250401f2800c0018000bac0f0000000000140001"], 0x114}], 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000840)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16, @ANYBLOB="010027bd7000fcdbdf250100000008000100", @ANYRES32=r10, @ANYBLOB="3c00020500000000240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400f9fffbff"], 0x58}, 0x1, 0x1000000, 0x0, 0x24004000}, 0x2004c8c0) 15m15.082705617s ago: executing program 1 (id=1505): r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xd3, 0x1, 0x0, 0x0, 0x0, 0xf, 0x9211, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0, 0xc}, 0x14ce3, 0x100004, 0x0, 0x2, 0x6, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000006c0)='./file2\x00', 0x0, &(0x7f0000000700)={[{@max_batch_time={'max_batch_time', 0x3d, 0x4}}, {@max_batch_time={'max_batch_time', 0x3d, 0xac7}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@errors_remount}, {@mblk_io_submit}]}, 0x1, 0x44a, &(0x7f0000000880)="$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") mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x11, r0, 0x0) (async) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x11, r0, 0x0) io_setup(0x400e, &(0x7f0000000600)=0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x400e, &(0x7f0000000240)={[{@i_version}, {@nodiscard}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@jqfmt_vfsold}, {@quota}]}, 0x2, 0x447, &(0x7f0000000500)="$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") (async) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x400e, &(0x7f0000000240)={[{@i_version}, {@nodiscard}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@jqfmt_vfsold}, {@quota}]}, 0x2, 0x447, &(0x7f0000000500)="$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") openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x40000, 0x120) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x40000, 0x120) getdents64(r2, &(0x7f0000000d00)=""/217, 0xd9) (async) getdents64(r2, &(0x7f0000000d00)=""/217, 0xd9) syz_clone3(&(0x7f0000000080)={0x21800000, &(0x7f0000000040)=0xffffffffffffffff, 0x0, 0x0, {0x27}, 0x0, 0x0, 0x0, 0x0}, 0x58) io_submit(r1, 0x1, &(0x7f0000001300)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x6, r3, 0x0}]) r4 = add_key$keyring(&(0x7f0000000340), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) fstat(r2, &(0x7f0000000100)) (async) fstat(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, r5) setxattr$system_posix_acl(&(0x7f0000000300)='./bus\x00', &(0x7f0000000400)='system.posix_acl_default\x00', &(0x7f0000000e00)=ANY=[@ANYBLOB="02000000010005000000000002000400", @ANYRES32=0x0, @ANYBLOB="020001005f1e16584f455475a95fc162d9f630f5b54b5ca9ab251b3d188e5de5efba1a786c187b2d30fa586d044d2ddc8379b770d516f609000000eaee445e20fcbb43413593fb04c7129f71527608f73b66cc529bb389df99e6b3c9070f3fcb867c9500346c8c2ceff430dc719fd3d4b7b1", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="0400fbb70000000008000200", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=r5, @ANYBLOB="10000700000000002000000000000000"], 0x64, 0x2) (async) setxattr$system_posix_acl(&(0x7f0000000300)='./bus\x00', &(0x7f0000000400)='system.posix_acl_default\x00', &(0x7f0000000e00)=ANY=[@ANYBLOB="02000000010005000000000002000400", @ANYRES32=0x0, @ANYBLOB="020001005f1e16584f455475a95fc162d9f630f5b54b5ca9ab251b3d188e5de5efba1a786c187b2d30fa586d044d2ddc8379b770d516f609000000eaee445e20fcbb43413593fb04c7129f71527608f73b66cc529bb389df99e6b3c9070f3fcb867c9500346c8c2ceff430dc719fd3d4b7b1", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="0400fbb70000000008000200", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=r5, @ANYBLOB="10000700000000002000000000000000"], 0x64, 0x2) r6 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) (async) r7 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x2014, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x400000000000d07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) statfs(&(0x7f0000000000)='./file1\x00', 0x0) sendmsg$nl_route(r11, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000001e00010000000000000000020700000058a667326e1babead207bff4c31931213a314c5106e6e95ee26f969000e1b0e9fabdccdff56915a0b8", @ANYRES32=0x0, @ANYBLOB="00000400f9fd0200aaaaaaaaaa0c0000"], 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$TCSETS(r10, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffff, 0x0, 0x9, 0x0, "0006000000df0066952e0d16c708db720800"}) (async) ioctl$TCSETS(r10, 0x40045431, &(0x7f00000000c0)={0x0, 0xffffffff, 0x0, 0x9, 0x0, "0006000000df0066952e0d16c708db720800"}) r12 = syz_open_pts(r10, 0x42) ioctl$TCSBRKP(r12, 0x5425, 0x1000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r9}, 0x10) keyctl$KEYCTL_MOVE(0x1e, r4, r6, r7, 0x1) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8088e3ad132bc192, 0x4002011, r0, 0x0) 15m14.82595002s ago: executing program 1 (id=1513): socket$inet6_mptcp(0xa, 0x1, 0x106) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x200000}, 0x1c) listen(r0, 0x9) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) sendmmsg(r1, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20044000) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYRES16=r3, @ANYBLOB="01002cbd7000ffdbdf2504"], 0x14}, 0x1, 0x1000000, 0x0, 0x20000800}, 0x800) 15m11.176011925s ago: executing program 1 (id=1579): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x18) io_cancel(0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sysvipc/sem\x00', 0x0, 0x0) pread64(r1, &(0x7f00000001c0)=""/223, 0xdf, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = gettid() r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x148100, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67152944, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) dup(r3) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$TIOCMIWAIT(r3, 0x545c, 0x200000003000000) timer_create(0x0, &(0x7f0000000580)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 15m11.160581246s ago: executing program 32 (id=1579): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x18) io_cancel(0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sysvipc/sem\x00', 0x0, 0x0) pread64(r1, &(0x7f00000001c0)=""/223, 0xdf, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = gettid() r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x148100, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67152944, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) dup(r3) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$TIOCMIWAIT(r3, 0x545c, 0x200000003000000) timer_create(0x0, &(0x7f0000000580)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 6.884775267s ago: executing program 4 (id=14939): bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xd, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="180000000008002b00000000", @ANYRES64, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x18, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x68040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0xfffff000) openat$ptmx(0xffffffffffffff9c, 0x0, 0x1022002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) utime(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = fsopen(0x0, 0x1) fsconfig$FSCONFIG_SET_BINARY(r0, 0x6, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0xfffffffffffffffc, 0x3b) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b0000000700000008000000a6ad6a1a05"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) lsetxattr$security_selinux(&(0x7f0000000900)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000940), &(0x7f00000003c0)='system_u:object_r:netutils_exec_t:s0\x00', 0x25, 0x0) 6.394411021s ago: executing program 4 (id=14946): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454da, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file2\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0xfb, 0x11ff, &(0x7f0000002480)="$eJzs3E+LHEUYB+B315iNG/ePGqMJiIVe9NJk9+BFL4tsQDKgJFkhEYSO26vDtDPD9LAwIkZPXv0cIojgTRBvetmL30DwthePEcSWndEko5PDSEiH5Xku80LVb6jqphuq6erD1774sLNXZXv5MBYXFmKxH5FupUixGP/4NF5+9cefnrty7fqlrVZr+3JKF7eubrySUlp9/vt3Pv7qhR+Gp9/+dvW7pThYf/fwt81fD84enDv88+oH7Sq1q9TtDVOebvR6w/xGWaTddtXJUnqrLPKqSO1uVQym2vfKXr8/Snl3d2W5PyiqKuXdUeoUozTspeFglPL383Y3ZVmWVpaD+Z24Xe18eauu64i6fjRORl3X9WOxHKfj8ViJ1ViL9Xginoyn4kw8HWfjmXg2vvnl69FRAgAAAAAAAAAAAAAAAAAAALh/5t3/f27cq+lRAwAAAAAAAAAAAAAAAAAAwPFy5dr1S1ut1vbllE5FlJ/v7+zvTH4n7Vt70Y4yirgQa/FHjHf/T0zqi2+0ti+ksfX4rLz5d/7m/s4j0/mN8ecEZuY3Jvk0nV+K5bvzm7EWZ2bnN2fmT8VLL96Vz2Itfn4velHGbhxl7+Q/2Ujp9Tdb/8qfH/cDAACA4yBLt81cv2fZvdon+TmeD0ytr4+y5080OnUiohp91MnLshgoHvriZLPD+L2u6+YPQkPFva+UpYj43/+8EBEPxwT/UzR9Z+JBuHPSmx4JAAAAAAAAAAAA83gQrxM2PUcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD+YgeOBQAAAACE+Vun0bEBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHwVAAD//+pd0x0=") creat(&(0x7f00000004c0)='./bus\x00', 0x20) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r2 = open(&(0x7f0000000540)='./bus\x00', 0x40040, 0x11d) preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4083, 0xffffffdf}], 0x1, 0x0, 0x0, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYRES32=r1, @ANYBLOB="9af028f8013100937a886e3a6633c8879ffaf1145622564a6ff97b380acb570d212e94fb2d2b58424ba3c0fcab00cd633fb6dba975f8d9ffa92989c134fcad73c37149673e2d401fab731029a01cdb6074dce10153e230af9fe248012f4e5340733b72fa374d50a87d2e6fbb870bad775e3e82d888cb61b4351e562604435323517b985f2f9776639136703ff8b2585f9f88272cc5c4ab213ad752ed2fbefd0199d530898bb4a0114470f510421604c1b725cf44fd22b8767091e8a4e7225e88b433698bc4a7ca367caf3ec77e"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000740)=ANY=[@ANYRES64=r3, @ANYRES32=r3, @ANYBLOB="0000000000000000d40800000000e7057b4f30ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000160000009574c394052d8e05167e52ce37e9acd9b52e1964b317860d8a6cf86f5fcbfce141a05e4fa0f6a655df6407924b32c2128fcac4bf23c3956ebac3765b86e0bd7124eceaee33d01570f67e061e513a7802c64e94"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x0, 0x4, &(0x7f0000000940)=ANY=[@ANYRES8=r0], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x4d}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="33c6c7525a5aaf6eb8569b33bb4509bcfd6fbf0b", @ANYRES8=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) ioctl$USBDEVFS_SUBMITURB(r6, 0x8038550a, &(0x7f0000000800)=@urb_type_control={0x2, {}, 0x2000000b, 0xe0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x101, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0x100000001}, 0x18) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) r7 = socket$netlink(0x10, 0x3, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r8}, 0x18) r9 = socket$inet(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x44, 0x6, 0x410, 0x238, 0x238, 0x238, 0x98, 0x98, 0x378, 0x378, 0x378, 0x378, 0x378, 0x6, 0x0, {[{{@ip={@loopback, @multicast1=0xe0007600, 0x0, 0x0, 'gre0\x00', 'ip6gre0\x00', {}, {}, 0x0, 0x0, 0x11}, 0x7a00, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'wg1\x00', 'nicvf0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb8, 0x100, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x28, 0x0, 0x0, 0x0, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev={0xfe, 0x80, '\x00', 0x18}, 'veth0_virt_wifi\x00', {0x7}}}}, {{@ip={@rand_addr, @private, 0xffffffff, 0xff, 'syzkaller0\x00', 'veth1_to_team\x00', {}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@empty, @empty, 0xff000000, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x4, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={0x0, 0x34}, 0x1, 0x0, 0x0, 0x40800d4}, 0x800) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', 0x0, &(0x7f0000000080)=ANY=[], 0xfe37, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 5.754633638s ago: executing program 4 (id=14953): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000540)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES16=0x0], 0x1, 0x538, &(0x7f0000003480)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000050000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) waitid(0x2, 0x0, 0x0, 0x2100000a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x20040040) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0xbf) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setresuid(0xee01, 0x0, 0x0) timer_create(0x3, 0x0, &(0x7f00000003c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r2}, 0x10) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno']) 5.215052706s ago: executing program 2 (id=14965): r0 = socket$inet_icmp(0x2, 0x2, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x1, 0x0, 0xe0, 0x0, 0xe000, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x11, 0x0, @empty=0xac1414aa, @multicast1}, "341517c1b7df60c7"}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd00, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r4}, 0x18) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x1a00404, &(0x7f0000000080)={[{@grpquota}, {@nomblk_io_submit}]}, 0x1, 0xbac, &(0x7f00000017c0)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) pwrite64(r7, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) lseek(r7, 0x5, 0x4) socket$nl_generic(0x10, 0x3, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB="010000000b0000001f3200"/20, @ANYRES32=r5, @ANYRES8=r6, @ANYRES32, @ANYRES32, @ANYBLOB="00000000020000000000000000000000000000000000000000000000c09ee86ba9f4021c318fbe65f61add14b8eed6434ea2981c632b0a25940691781f66eaf3b73f961166cfab8ced390dd9fabf593cfe94466cc263b880b5581322ed92553a3627d7fa143d58ac880a503860c154af9accaa0cbcd91f083d9d85268c12dc621af227e4b77b5a327526adcde1d19524f18fe524f877dce72daa70876550e76a8c68de8b82a4943035d511a63c8a9d7c4db0eb2a0d25cb2c6a7e801fc92d9d52ec82342819a71e5547a6b414e9f517", @ANYRESOCT], 0x48) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x204000, &(0x7f0000001600)={[{@debug}, {@min_batch_time={'min_batch_time', 0x3d, 0x4ab}}, {@data_err_ignore}, {@nobarrier}, {@inlinecrypt}, {@orlov}, {@nogrpid}, {@discard}, {@stripe={'stripe', 0x3d, 0x2}}]}, 0x3, 0x572, &(0x7f0000000c40)="$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") openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0xce342, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r3, 0x40049421, 0x3) pwrite64(r10, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1c, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffe9b703000000000000b70400000000000085000000c30000009549d8015cd7eb971558e403fe3f8662570b1e08e6a8555e9fc5d58691b42e77cf7f1945dc5b01cedad73736d47ffd129d29571f2e20c88e792fefaf2046bac410a9c339b840052f9f0144330bd497c3856fe45e48f40f98ca8f4faf22f4e12f8c1825eace349d2d13d737afa4f51c323e5dfda0f4eabbebb3f8e65f241ead3bd7baf597deb4f5faf5ecd96ab3886e4fd912414db53e8e6d803172071744391e657b27", @ANYRESDEC=r9], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_open_dev$evdev(&(0x7f00000001c0), 0x1bbc, 0x801) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)={0x14, 0x38, 0x1, 0xfffffffc, 0x8000, {0x0, 0x3, 0x2}}, 0x14}}, 0x0) sendmmsg$inet(r0, &(0x7f0000000340)=[{{&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000400)='\b\x00\x00\x00(\x00\x00\x00', 0x8}], 0x1}}, {{&(0x7f0000000480)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f00000000c0)="c685e3edc50741e5", 0x8}], 0x1}}], 0x2, 0x4000) 4.084981136s ago: executing program 2 (id=14973): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) r0 = getpid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) statfs(&(0x7f0000000080)='./file0\x00', 0x0) r2 = syz_io_uring_setup(0x121d, &(0x7f0000000500)={0x0, 0x7d10, 0x80, 0x3, 0x1000034e}, &(0x7f0000000040)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r5 = socket(0x2a, 0x2, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x50, 0x0, 0x0, 0x0, 0x23457}) io_uring_enter(r2, 0x498d, 0x3, 0x20, 0x0, 0x0) r6 = syz_pidfd_open(r0, 0x0) r7 = pidfd_getfd(r6, r6, 0x0) setns(r7, 0x66020000) r8 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2141, 0x59) ioctl$SNDRV_TIMER_IOCTL_INFO(r8, 0x80e85411, &(0x7f0000000380)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000001a40)=@newtaction={0x488, 0x30, 0x12f, 0x0, 0x0, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x3, {0x7, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x7, 0x0, 0x2, 0x0, 0x5f0, 0x7}}}, @TCA_POLICE_RATE={0x404, 0x2, [0x7, 0x2, 0x3, 0xfffffffd, 0xffffba09, 0x8, 0xffffffff, 0x2, 0x6, 0x0, 0x4, 0x5, 0x34, 0x2, 0x4, 0xfffffe00, 0x9, 0xffff8000, 0xfffffff8, 0xe5, 0x53aee169, 0xcdb, 0x7, 0xfffffffb, 0x6b5, 0x4, 0x7, 0x3, 0x9, 0x7, 0x3, 0x0, 0x7, 0x3ff, 0x5, 0x1, 0x2, 0x2, 0x3, 0x8, 0xd, 0x1, 0x7, 0x40, 0x7f, 0x8001, 0x4, 0x3, 0xd, 0x5, 0x1, 0x1, 0x400, 0x7, 0x1ff, 0x9, 0x3, 0x0, 0x100, 0x1, 0x9, 0x1b2, 0x6, 0x8, 0x1000, 0xc, 0x8, 0x6, 0x10, 0x6, 0x3, 0x8, 0x0, 0x5, 0x4, 0x9, 0x5f64, 0x80000000, 0x1, 0x7, 0x19b, 0x1e5e, 0x0, 0xfa, 0x3, 0x2, 0x28, 0x32, 0x9, 0x3, 0x6e3a, 0xfed4, 0xfffffba4, 0x4, 0xdb, 0x4, 0x8, 0x7, 0x4, 0x2, 0x8, 0xfffffff8, 0x7fff, 0x7fff, 0x8, 0x6, 0x7, 0x535b046b, 0x80000001, 0x2, 0x81, 0x80, 0x0, 0x8000, 0x1, 0x2, 0xff, 0x7ff, 0xbc7e, 0x37, 0x1, 0x10000, 0x2, 0x5724, 0x3, 0x4, 0x2, 0x8, 0x6a, 0xb1, 0x2, 0x9, 0x100, 0xff, 0x8, 0x40, 0x8001, 0x4, 0x9, 0xfffff0a0, 0xfffffffb, 0x705, 0x9, 0x7, 0x800, 0xb2, 0x9, 0x6, 0x5, 0x3, 0x1, 0x7, 0x2, 0x7, 0xcc96, 0xb, 0x5, 0x800, 0x1, 0xce, 0x8, 0x9, 0x0, 0x6, 0xe6a8, 0x9, 0x1fa00, 0x61, 0x9, 0x25b, 0x8, 0x6667, 0x20c, 0x6, 0x6, 0x8, 0x7, 0x4, 0x8, 0x3ff, 0x80, 0x2, 0x9, 0xffffffff, 0x4, 0x76ac, 0x8, 0x5, 0x59a, 0xc35, 0x7, 0x4, 0x4, 0x3, 0x2, 0x2, 0x7fff, 0x8, 0x6, 0x2, 0xff, 0xf3c1, 0x2, 0x2, 0xd, 0x65, 0xf7d0, 0x34, 0x5, 0x4, 0x3095, 0x76, 0x10000, 0x797d991, 0xff, 0xffff, 0x200, 0x6, 0x9, 0x7, 0x80000, 0xf, 0xd, 0x79, 0x8bdd, 0x9, 0x8, 0x0, 0x101, 0x0, 0x4, 0x40000, 0x8000, 0x5, 0x5, 0x3, 0xa, 0x200, 0x9, 0xfffffff9, 0x9a2, 0x8, 0xe1, 0x8, 0x5, 0x10000, 0x7, 0x264, 0x3, 0x4, 0xfffffffd, 0x6, 0x7, 0x3, 0x6, 0xfffffff8]}], []]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x3}}}}]}]}, 0x488}, 0x1, 0x0, 0x0, 0x50}, 0x240040c0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x30000004) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0x220600, 0x0) 3.979022476s ago: executing program 0 (id=14976): bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000c800000000004b64ffec850000007d000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) faccessat2(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x1, 0x1300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) setresuid(0x0, 0x0, 0x0) 3.885593754s ago: executing program 0 (id=14977): r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000400), 0x121201, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000600)=0x14) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000d0000000000000000006ab2e1efef9addb2d0506162f9e99c283879934b4efab48cb8e39318bba916c4c3e25cc7984efc442b1f195a56ea399d234cd12020375456fc00651e23ac57b96a35a9a5cfbd6dafced5e2049a77a8d206d6eaacf1d4e44bfec56edf75cee2991d427b4608c7c4c959c5554ac7b351bfde80e3f2eb343e94b21e6882de71b5dcfe1219d64d3b33d76299c8fec076bffe6aeab004f750007ecfeabd7b89a8eafd7dde78be004544a5d22abef493b8c5c5336d53cc09c9f8fee0101d7504cec5"], 0x48) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r1, 0x4018f50b, &(0x7f0000000040)={0x0, 0x3, 0x6}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000004000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r4, 0x0, 0xfffffffffffffffd}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000006000000040000000000000e0400000000000000000000000000000d00000000000000000000001303000000000000005f00"], 0x0, 0x52}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) unshare(0x62040200) close(r0) 3.851834407s ago: executing program 4 (id=14978): r0 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1e000000000000001975400209"], 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="1400000031000701fcffffff00010001007c0000"], 0x14}, 0x1, 0x0, 0x0, 0x48815}, 0x20044005) sendmsg$inet(r1, &(0x7f0000000380)={&(0x7f0000000040)={0xa, 0xa, @local}, 0x1b, &(0x7f0000000180)=[{&(0x7f0000000080)="a2", 0xff0e}], 0x4, 0x0, 0x0, 0xa6820000}, 0x0) 3.81608838s ago: executing program 5 (id=14980): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x1, 0x0, 0x0, 0x7fff0000}]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') r2 = getpid() r3 = syz_pidfd_open(r2, 0x0) setns(r3, 0x24020000) umount2(&(0x7f0000000040)='.\x00', 0x2) close_range(r0, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r1, 0x8982, &(0x7f0000000300)) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x1c, r5, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4044804) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, r6, 0x30f, 0x70bd2d, 0x25dfdbfe, {{}, {}, {0x20, 0x17, {0x1, 0x5, @l2={'eth', 0x3a, 'bond_slave_0\x00'}}}}, ["", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) 3.775757624s ago: executing program 2 (id=14981): r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xae, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) syz_emit_ethernet(0x32, &(0x7f0000000040)={@random="e90c610faca2", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0xe000, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2, 0x1, 0x2, 0xc, 0x100}}}}}}}, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000140)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x3ff, 0x2, 0x5}, 0x1c) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = socket(0x400000000010, 0x3, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=@gettaction={0x44, 0x32, 0x200, 0x70bd2c, 0x81, {}, [@action_gd=@TCA_ACT_TAB={0x24, 0x1, [{0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0x10, 0x1e, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)=@newtfilter={0x44, 0x2c, 0xd27, 0x70bd28, 0x8000, {0x0, 0x0, 0x0, r8, {0x0, 0x7}, {}, {0xa, 0x1}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ETH_TYPE={0x6, 0x8, 0x8035}, @TCA_FLOWER_KEY_ARP_SIP={0x8, 0x39, @broadcast}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) sendto$packet(r1, &(0x7f0000000240)="c8afa9ae61", 0x5, 0x0, &(0x7f0000000200)={0x11, 0x8100, r2, 0x1, 0xe0}, 0x14) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800, &(0x7f0000000480)={[{@errors_remount}, {@discard}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5e}}, {@data_ordered}, {@bsdgroups}, {@barrier_val={'barrier', 0x3d, 0x4}}, {@max_dir_size_kb}, {@data_err_ignore}]}, 0x1, 0x47e, &(0x7f00000009c0)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = open(&(0x7f0000000000)='./bus\x00', 0x40, 0x171) fgetxattr(r9, &(0x7f00000003c0)=@known='security.selinux\x00', 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000000), r0) r10 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) prctl$PR_GET_FP_MODE(0x3d) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000240)='4', 0x1}], 0x1) 3.763202275s ago: executing program 4 (id=14982): unshare(0x2a020400) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x800802, &(0x7f0000001c80)={[{@barrier_val}, {@resuid}, {@errors_remount}, {@usrjquota}]}, 0x3, 0x7b8, &(0x7f0000000980)="$eJzs3c1rXFUbAPDnTj6b9m3zwgtv66bBhRZKJ22NrYJgxIUIFgq6tg2TaYiZZEpmUpqQhUUEQQQtLgTduPaj7tyKrv0b3IhIS9W0WHEhI3c+kkkmH5M2H23z+8FNzpl775zz3DNz7rlzDzMB7FkD6Z9MxJGI+DCJOFR/PImIrmqqM2K4tt29hflcuiRRqbz+e1Ld5u7CfC6a9kntr2cOR8T370Ycz7SWW5qdmxgpFLoa+cHy5OXB0uzcifHJkbH8WH7qzKmhodNnnz17Zuti/fPHuQO3Pnrl6a+H/37n/zc++CGJ4ThQX9ccx1YZiIH6MelKD+EyL291Ybss2WB95w7Vg81J35od9fY5EoeiQ0sBwGMvPf9XAIA9JnH+B4A9pvE5wN2F+Vxjaf58YN+ufCqxc26/FBG9tfgb9zdrazrr9+x6q/dB++4m0RmLtys3vN/VroGI+OzbN79Ml9im+5AAq3n7WkRc7B9o7f+TljkLm3WyjW0GVuT1f7BzvkvHP8+tNv7LLI5/YnH8k3YLtfkhPau8d+/HQER3c771/Z+5ueqOL25B4fXx3wu1uW1poE3jv8VJa/0d9dx/0szRiBgv5NO+7WBEHIuunkvjhfypdco4duefO2utax7//XH9rS/S8tP/S1tkbnb2LN9ndKQ88iAxN7t9LeKJzqW5ffda+v/e6lh3sf2jsTbifPMT3VrxxEeXkq8+/96na5Wfxp/G21ha499elc8jnorV429I1p2fOJg2/8na39XL+ObnT/rWKr+5/dMlLb9xLbCG7vuPtlXa/n3rx9+fLM3XzE+XtrL0duJf/fXfnbxRTTcOxtWRcnn6VER38lrr46eX9m3kG9un8dciXRl/Zt3Xf3oleLHNGDtv/fZVxJMH7y/+RVt1yblMGv/optp/84kb9yY61iq/vfYfqqaO1R9pp/9rt4IPcuwAAAAAAAAAAAAAAAAAAAAAAAAAoF2ZiDgQSSa7mM5kstnab3j/L/oyhWKpfPxScWZqNKq/ld0fXZnGV10equWTxvef9jflT6/IPxMR/42Ij3v2VfPZXLEwutvBAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDd/jV+/z/1a89u1w4A2Da9G25xJ78sW6lUKttYHwBg+218/gcAHjfrnP/37WQ9AICd4/ofAPYe538A2Huc/wEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANhm58+dS5fKXwvzuTQ/emV2ZqJ45cRovjSRnZzJZXPF6cvZsWJxrJDP5oqTGz1foVi8PBRTM1cHy/lSebA0O3dhsjgzVb4wPjkylr+Q79qRqAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgc0qzcxMjhUJ++rFIvB8RD0E1tiORxENRjV1J/HLip8PrbXN9g5fx8EMRxSOW2O2eCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAODR8G8AAAD//21CJgc=") bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001d40)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) r2 = syz_io_uring_setup(0x49a, &(0x7f00000000c0)={0x0, 0x79af, 0x3180, 0x8000, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_STATX={0x15, 0x6, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x40, 0x0, 0x1}) io_uring_enter(r2, 0x627, 0x4c1, 0x43, 0x0, 0x30) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3a, 0x0, 0x0, 0x0, 0x100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x10) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a310000000014000780050015000c00000008001240000000000500050002000000050004000000000010000300686173683a69702c6d6163"], 0x5c}, 0x1, 0x0, 0x0, 0x20000090}, 0x8084) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r8, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0040001e1d113c812e5d6000"}) r9 = syz_open_pts(r8, 0x0) r10 = dup3(r9, r8, 0x0) read$watch_queue(r10, &(0x7f0000000240)=""/173, 0xad) ppoll(&(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) ioctl$TCSETSF(r9, 0x5404, &(0x7f0000000180)={0x80000001, 0x2, 0x81e6b76d, 0x10002, 0x9, "aa32b73986bbee6b9231334cbfa0b748261a13"}) 3.695051521s ago: executing program 3 (id=14983): bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000840)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x4, &(0x7f0000000f00)=ANY=[@ANYRES16=0x0, @ANYBLOB="9bec98af9beee2c13a71024c5564d0afb4aa53822b1205c51163db9ceb6b490cefe5c4b8d529d2ffde80a9b34adb3bd00340e5d0304aa80167698b74f8fb2b0b4a0628b22b04f91b910386", @ANYRESDEC=r1, @ANYRES32=r0], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x18) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000002080)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) socket$kcm(0x10, 0x2, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x35, 0x1, 0x4, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket(0x11, 0xa, 0xd1) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x21}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0xffffffffffffff2f}}], 0x4000000000003b4, 0x2040000, &(0x7f0000003700)={0x77359400}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000180)=0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r5 = getpid() sched_setscheduler(r5, 0x2, &(0x7f00000001c0)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) 3.690510682s ago: executing program 5 (id=14984): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x256581, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) unshare(0x64000680) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) r6 = msgget$private(0x0, 0x8) msgrcv(r6, &(0x7f0000001080)={0x0, ""/1}, 0x9, 0x2, 0x3000) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_ARP_VALIDATE={0x8, 0x9, 0x3}]}}}]}, 0x44}}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000004c0)={{0x0, 0xee00, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x1000000000000b, 0x6f76, 0x3, 0x0, 0x1, 0x8, 0x7b, 0x3}) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080), 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c000000000801040000000000000000000000000900010073797a310000000006000240000000003c000480080004400000000708000840000000040800054052db08880800084000000000080002400000000608000a40ff7be40000000140000008350500020084000000"], 0x6c}, 0x1, 0x0, 0x0, 0x24000010}, 0x0) 2.431924633s ago: executing program 0 (id=14985): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) sendmsg$nl_route_sched(r3, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001300)=@newqdisc={0x58, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r5, {0x10}, {}, {0x2, 0x3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x2c, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x3, 0x0, 0x8, 0xbac8, 0x31e4, 0x7}, {0x48, 0x1, 0xfcbf, 0xfff7, 0x1ff, 0x5}, 0x4eef, 0x2, 0x19b0}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4009c}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r7 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r7, &(0x7f00000005c0)="24785466124cebc6c88735f544a9", 0xe, 0x440040c4, &(0x7f00000001c0)={0x11, 0xf8, r6, 0x1, 0xd8, 0x6, @remote}, 0x14) 2.346741021s ago: executing program 2 (id=14986): flock(0xffffffffffffffff, 0x5) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0x4d, 0xfffffffb, 0x7fffffff}}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) sendmsg$nl_route_sched(r3, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001300)=@newqdisc={0x45c, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r5, {0x10}, {}, {0x2, 0x3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x3, 0x0, 0x8, 0xbac8, 0x31e4, 0x7}, {0x48, 0x1, 0xfcbf, 0xfff7, 0x1ff, 0x5}, 0x4eef, 0x2, 0x19b0}}, @TCA_TBF_RTAB={0x404, 0x2, [0x1, 0xffffffff, 0x3, 0x9, 0x1, 0x800, 0x9c3, 0x4, 0x0, 0x8, 0xffffffff, 0x3, 0x8, 0x8, 0xfffffffd, 0x8, 0x8001, 0x100, 0x3, 0x0, 0x588e, 0x1, 0x1e00, 0x101, 0x7, 0x80000000, 0xf8f1, 0x0, 0x401, 0x10, 0x1, 0xc00000, 0xfffffff7, 0x400, 0x7f, 0x80000000, 0x3, 0x6ade, 0x0, 0x4, 0x77c8, 0x1, 0x5, 0x8, 0x1, 0x7, 0x3, 0x80, 0x7fffffff, 0x2, 0x9, 0x3, 0x80, 0x8, 0xe, 0x6, 0x0, 0x2, 0x4, 0xfffffffa, 0x4, 0x1, 0x4, 0x3, 0x1, 0x8, 0x2, 0xe757, 0xfffffff7, 0x8001, 0x45f, 0x1ff, 0xe, 0xd, 0x7d3, 0x4, 0xb, 0x58c4637b, 0x5, 0x0, 0x1, 0x2, 0x6, 0xb90, 0x203, 0x6, 0x842f, 0x7, 0x10000, 0x4, 0xffffff25, 0xa04, 0x78da, 0x0, 0x0, 0xffffffff, 0x80000001, 0x0, 0x5, 0x465, 0x1000006, 0xcd17, 0x9, 0x6, 0x2, 0xfffffffc, 0xfffffff7, 0x7f, 0x2, 0x6, 0x1, 0x40000, 0x6, 0x6, 0x0, 0x40, 0x8, 0x3, 0x23, 0x0, 0x6, 0x1, 0x2fe, 0x96, 0x0, 0x2, 0x5, 0x2, 0x9, 0x8, 0x0, 0x0, 0x7, 0x6, 0x80, 0x1, 0x7, 0x7f, 0x2, 0x200, 0x8, 0xe330fdc7, 0x9, 0x5, 0x7e, 0x2, 0x0, 0x5, 0xffff0000, 0x2, 0x1, 0x401, 0x7, 0x8, 0xffff669d, 0xffffff94, 0x7, 0x5, 0x10001, 0x7, 0x7, 0x4, 0x5, 0xb2fb, 0x1, 0x7ff, 0x85, 0xffffffff, 0x4ac, 0xfc9, 0x80000000, 0x1, 0xfb, 0x6, 0xb, 0x3, 0x40, 0x5, 0x2, 0x83, 0x6, 0x56a, 0x0, 0x9, 0x9, 0x1, 0x7, 0x9, 0x4, 0xe, 0x6, 0x6, 0x8, 0x0, 0xfffffffe, 0x5, 0x44, 0x4, 0x2, 0x3, 0xfffffff1, 0x6, 0x80000000, 0x4, 0x100, 0xfffffff7, 0x2a8, 0x2, 0x9, 0x7f, 0x4, 0x8, 0xffffffff, 0x6ed916d9, 0xfffffff8, 0x38, 0x3, 0x2, 0xd0, 0x36a0, 0xc, 0x3, 0x2, 0x1, 0x7df0, 0x9, 0x2009, 0x5, 0xfff, 0xc, 0x87, 0x8, 0x8, 0x80000000, 0x5, 0x3, 0x800, 0x1c43, 0x7, 0xa66, 0x6, 0x18000, 0x6, 0x4, 0x86f9, 0x6, 0x80, 0x200, 0x28000, 0x401, 0xffff, 0x4d, 0x2, 0xfc, 0x7, 0x2]}]}}]}, 0x45c}, 0x1, 0x0, 0x0, 0x4009c}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r7 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r7, &(0x7f00000005c0)="24785466124cebc6c88735", 0xb, 0x440040c4, &(0x7f00000001c0)={0x11, 0xf8, r6, 0x1, 0xd8, 0x6, @remote}, 0x14) 2.282300257s ago: executing program 5 (id=14987): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454da, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file2\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0xfb, 0x11ff, &(0x7f0000002480)="$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") creat(&(0x7f00000004c0)='./bus\x00', 0x20) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r2 = open(&(0x7f0000000540)='./bus\x00', 0x40040, 0x11d) preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4083, 0xffffffdf}], 0x1, 0x0, 0x0, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYRES32=r1, @ANYBLOB="9af028f8013100937a886e3a6633c8879ffaf1145622564a6ff97b380acb570d212e94fb2d2b58424ba3c0fcab00cd633fb6dba975f8d9ffa92989c134fcad73c37149673e2d401fab731029a01cdb6074dce10153e230af9fe248012f4e5340733b72fa374d50a87d2e6fbb870bad775e3e82d888cb61b4351e562604435323517b985f2f9776639136703ff8b2585f9f88272cc5c4ab213ad752ed2fbefd0199d530898bb4a0114470f510421604c1b725cf44fd22b8767091e8a4e7225e88b433698bc4a7ca367caf3ec77e"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000740)=ANY=[@ANYRES64=r3, @ANYRES32=r3, @ANYBLOB="0000000000000000d40800000000e7057b4f30ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000160000009574c394052d8e05167e52ce37e9acd9b52e1964b317860d8a6cf86f5fcbfce141a05e4fa0f6a655df6407924b32c2128fcac4bf23c3956ebac3765b86e0bd7124eceaee33d01570f67e061e513a7802c64e94"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x0, 0x4, &(0x7f0000000940)=ANY=[@ANYRES8=r0], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x4d}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="33c6c7525a5aaf6eb8569b33bb4509bcfd6fbf0b", @ANYRES8=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) ioctl$USBDEVFS_SUBMITURB(r6, 0x8038550a, &(0x7f0000000800)=@urb_type_control={0x2, {}, 0x2000000b, 0xe0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x101, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0x100000001}, 0x18) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) r7 = socket$netlink(0x10, 0x3, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r8}, 0x18) r9 = socket$inet(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x44, 0x6, 0x410, 0x238, 0x238, 0x238, 0x98, 0x98, 0x378, 0x378, 0x378, 0x378, 0x378, 0x6, 0x0, {[{{@ip={@loopback, @multicast1=0xe0007600, 0x0, 0x0, 'gre0\x00', 'ip6gre0\x00', {}, {}, 0x0, 0x0, 0x11}, 0x7a00, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'wg1\x00', 'nicvf0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb8, 0x100, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x28, 0x0, 0x0, 0x0, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev={0xfe, 0x80, '\x00', 0x18}, 'veth0_virt_wifi\x00', {0x7}}}}, {{@ip={@rand_addr, @private, 0xffffffff, 0xff, 'syzkaller0\x00', 'veth1_to_team\x00', {}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@empty, @empty, 0xff000000, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x4, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={0x0, 0x34}, 0x1, 0x0, 0x0, 0x40800d4}, 0x800) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', 0x0, &(0x7f0000000080)=ANY=[], 0xfe37, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.265461758s ago: executing program 3 (id=14988): bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000c800000000004b64ffec850000007d000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) faccessat2(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x1, 0x1300) setresuid(0x0, 0x0, 0x0) 2.095203373s ago: executing program 3 (id=14989): bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xd, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="180000000008002b00000000", @ANYRES64, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x18, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x68040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0xfffff000) openat$ptmx(0xffffffffffffff9c, 0x0, 0x1022002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) utime(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = fsopen(0x0, 0x1) fsconfig$FSCONFIG_SET_BINARY(r0, 0x6, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0xfffffffffffffffc, 0x3b) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b0000000700000008000000a6ad6a1a05"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x18) lsetxattr$security_selinux(0x0, &(0x7f0000000940), &(0x7f00000003c0)='system_u:object_r:netutils_exec_t:s0\x00', 0x25, 0x0) 2.039100069s ago: executing program 5 (id=14990): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x256581, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unshare(0x64000680) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) r5 = msgget$private(0x0, 0x8) msgrcv(r5, &(0x7f0000001080)={0x0, ""/1}, 0x9, 0x2, 0x3000) socket$nl_route(0x10, 0x3, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000004c0)={{0x0, 0xee00, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x1000000000000b, 0x6f76, 0x3, 0x0, 0x1, 0x8, 0x7b, 0x3}) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080), 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c000000000801040000000000000000000000000900010073797a310000000006000240000000003c000480080004400000000708000840000000040800054052db08880800084000000000080002400000000608000a40ff7be40000000140000008350500020084000000"], 0x6c}, 0x1, 0x0, 0x0, 0x24000010}, 0x0) 2.01850948s ago: executing program 0 (id=14991): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x34e, &(0x7f0000000780)={@local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0000fa", 0x318, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x3, [{0x3, 0xa, "a78c000005dc8080a2030003004003493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34060600000000000000dac15084dbaf736b41e5af1802"}, {0x0, 0x1, "000000000000000d8a000000"}, {0x0, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf3915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x2, 0x1d, "06aa85616177c61bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0dea07c9a1f643c822a18b79f7c5eba31fb68b2d734a6671e27182aee4df24a4a5cf390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5ac010000000000000090aa235a670670ffc5dc49dfb58d00000000000000"}, {0x19, 0xb, "17dcea468000000000054740a5d4901b0aeff04c0300f3c75dc2d227a83b6e483b108474bce9ac946a3f0e2bc4000091394c02bcfbbb7d71138537d68e2d2c6393a9f3cc271a9ff09a48b5b303f4f00000000000000000"}, {0xe, 0x7, "b8a3e10000a3e1100000006f00ffc0ffff00000000600000ff0bc0fe000000000000000000000000d9a0274400"/55}, {0x18, 0xc, "5e14ccb44d2d42cfb3f27fafb60845f90b6dfc2e37bc87c6905bbc94d33e1ea71a28105f543e868a8a53b360a9d33e2b1e26eb1d180600aa89c8f267d76ece1c9f6ae2e1eb3d8bf9c6ab2642c4808298e62afbf03269f1f98aea6ab3beb5fdc5fdaabc2c"}]}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x6c, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x3c, 0x2, {{0x9, 0x3, 0x0, 0x6, 0xfffffffa, 0x22}, [@TCA_NETEM_RATE={0x14, 0x6, {0xe1, 0x79d, 0x0, 0x3}}, @TCA_NETEM_RATE64={0xb, 0x8, 0xe61c6a5c983a3b82}]}}}]}, 0x6c}}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r7}, 0x10) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r8, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x1, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="6110b9000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000010000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000006c0)=ANY=[@ANYBLOB="140100002900010000000000fcdbdf250401f2800c0018000bac0f0000000000140001"], 0x114}], 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000840)=ANY=[@ANYBLOB='X\x00\x00', @ANYRES16, @ANYBLOB="010027bd7000fcdbdf250100000008000100", @ANYRES32=r10, @ANYBLOB="3c00020500000000240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400f9fffbff"], 0x58}, 0x1, 0x1000000, 0x0, 0x24004000}, 0x2004c8c0) 1.356731709s ago: executing program 4 (id=14992): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) r0 = getpid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) statfs(&(0x7f0000000080)='./file0\x00', 0x0) r2 = syz_io_uring_setup(0x121d, &(0x7f0000000500)={0x0, 0x7d10, 0x80, 0x3, 0x1000034e}, &(0x7f0000000040)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r5 = socket(0x2a, 0x2, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x50, 0x0, 0x0, 0x0, 0x23457}) io_uring_enter(r2, 0x498d, 0x3, 0x20, 0x0, 0x0) r6 = syz_pidfd_open(r0, 0x0) r7 = pidfd_getfd(r6, r6, 0x0) setns(r7, 0x66020000) r8 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2141, 0x59) ioctl$SNDRV_TIMER_IOCTL_INFO(r8, 0x80e85411, &(0x7f0000000380)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000001a40)=@newtaction={0x488, 0x30, 0x12f, 0x0, 0x0, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x3, {0x7, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x7, 0x0, 0x2, 0x0, 0x5f0, 0x7}}}, @TCA_POLICE_RATE={0x404, 0x2, [0x7, 0x2, 0x3, 0xfffffffd, 0xffffba09, 0x8, 0xffffffff, 0x2, 0x6, 0x0, 0x4, 0x5, 0x34, 0x2, 0x4, 0xfffffe00, 0x9, 0xffff8000, 0xfffffff8, 0xe5, 0x53aee169, 0xcdb, 0x7, 0xfffffffb, 0x6b5, 0x4, 0x7, 0x3, 0x9, 0x7, 0x3, 0x0, 0x7, 0x3ff, 0x5, 0x1, 0x2, 0x2, 0x3, 0x8, 0xd, 0x1, 0x7, 0x40, 0x7f, 0x8001, 0x4, 0x3, 0xd, 0x5, 0x1, 0x1, 0x400, 0x7, 0x1ff, 0x9, 0x3, 0x0, 0x100, 0x1, 0x9, 0x1b2, 0x6, 0x8, 0x1000, 0xc, 0x8, 0x6, 0x10, 0x6, 0x3, 0x8, 0x0, 0x5, 0x4, 0x9, 0x5f64, 0x80000000, 0x1, 0x7, 0x19b, 0x1e5e, 0x0, 0xfa, 0x3, 0x2, 0x28, 0x32, 0x9, 0x3, 0x6e3a, 0xfed4, 0xfffffba4, 0x4, 0xdb, 0x4, 0x8, 0x7, 0x4, 0x2, 0x8, 0xfffffff8, 0x7fff, 0x7fff, 0x8, 0x6, 0x7, 0x535b046b, 0x80000001, 0x2, 0x81, 0x80, 0x0, 0x8000, 0x1, 0x2, 0xff, 0x7ff, 0xbc7e, 0x37, 0x1, 0x10000, 0x2, 0x5724, 0x3, 0x4, 0x2, 0x8, 0x6a, 0xb1, 0x2, 0x9, 0x100, 0xff, 0x8, 0x40, 0x8001, 0x4, 0x9, 0xfffff0a0, 0xfffffffb, 0x705, 0x9, 0x7, 0x800, 0xb2, 0x9, 0x6, 0x5, 0x3, 0x1, 0x7, 0x2, 0x7, 0xcc96, 0xb, 0x5, 0x800, 0x1, 0xce, 0x8, 0x9, 0x0, 0x6, 0xe6a8, 0x9, 0x1fa00, 0x61, 0x9, 0x25b, 0x8, 0x6667, 0x20c, 0x6, 0x6, 0x8, 0x7, 0x4, 0x8, 0x3ff, 0x80, 0x2, 0x9, 0xffffffff, 0x4, 0x76ac, 0x8, 0x5, 0x59a, 0xc35, 0x7, 0x4, 0x4, 0x3, 0x2, 0x2, 0x7fff, 0x8, 0x6, 0x2, 0xff, 0xf3c1, 0x2, 0x2, 0xd, 0x65, 0xf7d0, 0x34, 0x5, 0x4, 0x3095, 0x76, 0x10000, 0x797d991, 0xff, 0xffff, 0x200, 0x6, 0x9, 0x7, 0x80000, 0xf, 0xd, 0x79, 0x8bdd, 0x9, 0x8, 0x0, 0x101, 0x0, 0x4, 0x40000, 0x8000, 0x5, 0x5, 0x3, 0xa, 0x200, 0x9, 0xfffffff9, 0x9a2, 0x8, 0xe1, 0x8, 0x5, 0x10000, 0x7, 0x264, 0x3, 0x4, 0xfffffffd, 0x6, 0x7, 0x3, 0x6, 0xfffffff8]}], []]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x3}}}}]}]}, 0x488}, 0x1, 0x0, 0x0, 0x50}, 0x240040c0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x30000004) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0x220600, 0x0) 1.306486414s ago: executing program 3 (id=14993): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) sendmmsg$inet(r0, &(0x7f00000017c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @multicast1}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_retopts={{0x10}}], 0x48, 0x3f}}], 0x1, 0xc0) 1.2327083s ago: executing program 3 (id=14994): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0x4, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x0, @perf_config_ext={0x3, 0x8001}, 0x0, 0x2e, 0x5, 0x3, 0x2, 0x0, 0xe61b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000240), 0xff, 0x55c, &(0x7f0000000440)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x100) syz_io_uring_setup(0x497, &(0x7f0000000200)={0x0, 0x7278, 0x0, 0x4, 0x18e}, &(0x7f00000000c0), 0x0) r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x5) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000040)="aa1d484ea0c00000f7fc08fcd111fbdf23ea32db0e8f21d5bc27bd49eb067a0689fff2a41cfbf0e9d85e44", 0x2b}], 0x1) 1.215358202s ago: executing program 0 (id=14995): r0 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1e000000000000001975400209"], 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="8000000000010104110000000000000002000000240001801400018008000100e000000108000200e00037010c000280"], 0x80}}, 0x0) sendmsg$inet(r1, &(0x7f0000000380)={&(0x7f0000000040)={0xa, 0xa, @local}, 0x1b, &(0x7f0000000180)=[{&(0x7f0000000080)="a2", 0xff0e}], 0x4, 0x0, 0x0, 0xa6820000}, 0x0) 1.186067344s ago: executing program 2 (id=14996): socket$inet(0x2, 0x4000000000000001, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x256581, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) unshare(0x64000680) 1.169110366s ago: executing program 3 (id=14997): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00'}) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x8401) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRES32=r0, @ANYBLOB="cf6dac48326ae63f07b8add12ed1e6b55febdf69ba1a5d73b876bcde8be89d034dd2968a0c6f820497b4d94e8160ac3541639fac1b3ca342f53ac8a3d1c9293f74436ea382a32119079bcbd8788bc4da3665d9385fcb683134147e85dab48beffc97299f27354c914c0230ceb297b0b2baa545f77a3ad8734d18579a5369e6f46fd96745e38cc1f2d8554e126a7c153fbde2b5f6e49f8104b798f784bbdc8894ef65bbe6de85fbb8fad00447b7e0374fbb12689d458b4b5020c4fef3846faf465dad7c4615d67e217c5fde2c9ae6e84b"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r3, 0x0, 0x9}, 0x18) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x8001}, 0x4) syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c200000ee43f6642531e0800450000200000e00000119078004e20000c907861100000"], 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x20000000000000ba, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfd71}, 0x94) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x5, 0xb68, 0x2000, &(0x7f0000000000)='%', 0x0, 0xd01, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8003}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='kmem_cache_free\x00', r8, 0x0, 0x100000000}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a030000000000000000f0070000000900010073797a300000000080000000090a010400000000000000000700000008000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d3c00128014000180090001006c617374000000000400028010000180090001006c61737400000000140001800c000100636f756e746572000400028008000340000001"], 0xc8}, 0x1, 0x0, 0x0, 0x40000}, 0x20050800) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) link(0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b70300000000ecff850000000400000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r10}, 0x18) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000b40)={'\x00', 0x800, 0x5, 0xc, 0xfffffffffffffffd, 0x59c, 0xffffffffffffffff}) ioctl$SG_BLKTRACETEARDOWN(r1, 0x1276, 0x0) 1.106072431s ago: executing program 0 (id=14998): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x256581, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) unshare(0x64000680) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) r6 = msgget$private(0x0, 0x8) msgrcv(r6, &(0x7f0000001080)={0x0, ""/1}, 0x9, 0x2, 0x3000) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_ARP_VALIDATE={0x8, 0x9, 0x3}]}}}]}, 0x44}}, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000004c0)={{0x0, 0xee00, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x1000000000000b, 0x6f76, 0x3, 0x0, 0x1, 0x8, 0x7b, 0x3}) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080), 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c000000000801040000000000000000000000000900010073797a310000000006000240000000003c000480080004400000000708000840000000040800054052db08880800084000000000080002400000000608000a40ff7be40000000140000008350500020084000000"], 0x6c}, 0x1, 0x0, 0x0, 0x24000010}, 0x0) 1.104864731s ago: executing program 5 (id=14999): bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000c800000000004b64ffec850000007d000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) setresuid(0x0, 0x0, 0x0) 100.632541ms ago: executing program 2 (id=15000): syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000540)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES16=0x0], 0x1, 0x538, &(0x7f0000003480)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000050000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0xbf) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r1}, 0x10) chown(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) 0s ago: executing program 5 (id=15001): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xfe, 0x0, 0x7ffc9ffe}]}) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454da, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file2\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0xfb, 0x11ff, &(0x7f0000002480)="$eJzs3E+LHEUYB+B315iNG/ePGqMJiIVe9NJk9+BFL4tsQDKgJFkhEYSO26vDtDPD9LAwIkZPXv0cIojgTRBvetmL30DwthePEcSWndEko5PDSEiH5Xku80LVb6jqphuq6erD1774sLNXZXv5MBYXFmKxH5FupUixGP/4NF5+9cefnrty7fqlrVZr+3JKF7eubrySUlp9/vt3Pv7qhR+Gp9/+dvW7pThYf/fwt81fD84enDv88+oH7Sq1q9TtDVOebvR6w/xGWaTddtXJUnqrLPKqSO1uVQym2vfKXr8/Snl3d2W5PyiqKuXdUeoUozTspeFglPL383Y3ZVmWVpaD+Z24Xe18eauu64i6fjRORl3X9WOxHKfj8ViJ1ViL9Xginoyn4kw8HWfjmXg2vvnl69FRAgAAAAAAAAAAAAAAAAAAALh/5t3/f27cq+lRAwAAAAAAAAAAAAAAAAAAwPFy5dr1S1ut1vbllE5FlJ/v7+zvTH4n7Vt70Y4yirgQa/FHjHf/T0zqi2+0ti+ksfX4rLz5d/7m/s4j0/mN8ecEZuY3Jvk0nV+K5bvzm7EWZ2bnN2fmT8VLL96Vz2Itfn4velHGbhxl7+Q/2Ujp9Tdb/8qfH/cDAACA4yBLt81cv2fZvdon+TmeD0ytr4+y5080OnUiohp91MnLshgoHvriZLPD+L2u6+YPQkPFva+UpYj43/+8EBEPxwT/UzR9Z+JBuHPSmx4JAAAAAAAAAAAA83gQrxM2PUcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD+YgeOBQAAAACE+Vun0bEBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHwVAAD//+pd0x0=") creat(&(0x7f00000004c0)='./bus\x00', 0x20) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r2 = open(&(0x7f0000000540)='./bus\x00', 0x40040, 0x11d) preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4083, 0xffffffdf}], 0x1, 0x0, 0x0, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYRES32=r1, @ANYBLOB="9af028f8013100937a886e3a6633c8879ffaf1145622564a6ff97b380acb570d212e94fb2d2b58424ba3c0fcab00cd633fb6dba975f8d9ffa92989c134fcad73c37149673e2d401fab731029a01cdb6074dce10153e230af9fe248012f4e5340733b72fa374d50a87d2e6fbb870bad775e3e82d888cb61b4351e562604435323517b985f2f9776639136703ff8b2585f9f88272cc5c4ab213ad752ed2fbefd0199d530898bb4a0114470f510421604c1b725cf44fd22b8767091e8a4e7225e88b433698bc4a7ca367caf3ec77e"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000740)=ANY=[@ANYRES64=r3, @ANYRES32=r3, @ANYBLOB="0000000000000000d40800000000e7057b4f30ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000160000009574c394052d8e05167e52ce37e9acd9b52e1964b317860d8a6cf86f5fcbfce141a05e4fa0f6a655df6407924b32c2128fcac4bf23c3956ebac3765b86e0bd7124eceaee33d01570f67e061e513a7802c64e94"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x0, 0x4, &(0x7f0000000940)=ANY=[@ANYRES8=r0], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x4d}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="33c6c7525a5aaf6eb8569b33bb4509bcfd6fbf0b", @ANYRES8=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) ioctl$USBDEVFS_SUBMITURB(r6, 0x8038550a, &(0x7f0000000800)=@urb_type_control={0x2, {}, 0x2000000b, 0xe0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x101, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0x100000001}, 0x18) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) r7 = socket$netlink(0x10, 0x3, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r8}, 0x18) r9 = socket$inet(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x44, 0x6, 0x410, 0x238, 0x238, 0x238, 0x98, 0x98, 0x378, 0x378, 0x378, 0x378, 0x378, 0x6, 0x0, {[{{@ip={@loopback, @multicast1=0xe0007600, 0x0, 0x0, 'gre0\x00', 'ip6gre0\x00', {}, {}, 0x0, 0x0, 0x11}, 0x7a00, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'wg1\x00', 'nicvf0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb8, 0x100, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x28, 0x0, 0x0, 0x0, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev={0xfe, 0x80, '\x00', 0x18}, 'veth0_virt_wifi\x00', {0x7}}}}, {{@ip={@rand_addr, @private, 0xffffffff, 0xff, 'syzkaller0\x00', 'veth1_to_team\x00', {}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@empty, @empty, 0xff000000, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x4, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={0x0, 0x34}, 0x1, 0x0, 0x0, 0x40800d4}, 0x800) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', 0x0, &(0x7f0000000080)=ANY=[], 0xfe37, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): x40/0x50 [ 969.158387][T25768] x64_sys_call+0x2889/0x3000 [ 969.158444][T25768] do_syscall_64+0xca/0x2b0 [ 969.158483][T25768] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 969.158589][T25768] RIP: 0033:0x7f12c5b5e15c [ 969.158610][T25768] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 969.158633][T25768] RSP: 002b:00007f12c45bf030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 969.158655][T25768] RAX: ffffffffffffffda RBX: 00007f12c5db5fa0 RCX: 00007f12c5b5e15c [ 969.158668][T25768] RDX: 000000000000000f RSI: 00007f12c45bf0a0 RDI: 0000000000000007 [ 969.158680][T25768] RBP: 00007f12c45bf090 R08: 0000000000000000 R09: 0000000000000000 [ 969.158748][T25768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 969.158763][T25768] R13: 00007f12c5db6038 R14: 00007f12c5db5fa0 R15: 00007ffcfa2d3718 [ 969.158786][T25768] [ 969.406721][T25772] sd 0:0:1:0: device reset [ 969.855346][T25844] sd 0:0:1:0: device reset [ 969.958467][T25845] bond1 (unregistering): Released all slaves [ 970.036167][ T29] kauditd_printk_skb: 197 callbacks suppressed [ 970.036246][ T29] audit: type=1400 audit(6090.065:96210): avc: denied { bind } for pid=25912 comm="syz.5.14274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 970.061808][ T29] audit: type=1400 audit(6090.065:96211): avc: denied { name_bind } for pid=25912 comm="syz.5.14274" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 970.083443][ T29] audit: type=1400 audit(6090.065:96212): avc: denied { node_bind } for pid=25912 comm="syz.5.14274" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 970.244422][ T29] audit: type=1400 audit(6090.145:96213): avc: denied { write } for pid=25912 comm="syz.5.14274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 970.263889][ T29] audit: type=1400 audit(6090.145:96214): avc: denied { name_connect } for pid=25912 comm="syz.5.14274" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 970.509321][ T29] audit: type=1400 audit(6090.545:96215): avc: denied { create } for pid=25936 comm="syz.3.14284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 970.658048][ T29] audit: type=1326 audit(6090.585:96216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25934 comm="syz.4.14282" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9f368af749 code=0x7ffc0000 [ 970.681354][ T29] audit: type=1326 audit(6090.585:96217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25934 comm="syz.4.14282" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9f368af749 code=0x7ffc0000 [ 970.704610][ T29] audit: type=1326 audit(6090.585:96218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25934 comm="syz.4.14282" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9f368af749 code=0x7ffc0000 [ 970.728014][ T29] audit: type=1326 audit(6090.585:96219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25934 comm="syz.4.14282" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9f368af749 code=0x7ffc0000 [ 971.837094][T26013] netlink: 20 bytes leftover after parsing attributes in process `syz.4.14295'. [ 971.900350][T26036] netlink: 28 bytes leftover after parsing attributes in process `syz.5.14296'. [ 971.909562][T26036] netlink: 28 bytes leftover after parsing attributes in process `syz.5.14296'. [ 971.981570][T26042] bond1 (unregistering): Released all slaves [ 972.006822][T26109] loop5: detected capacity change from 0 to 512 [ 972.017085][T26109] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 972.028989][T26109] EXT4-fs (loop5): 1 truncate cleaned up [ 972.035187][T26109] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 972.065950][T23933] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 972.635727][T26184] netlink: 28 bytes leftover after parsing attributes in process `syz.2.14308'. [ 972.644885][T26184] netlink: 28 bytes leftover after parsing attributes in process `syz.2.14308'. [ 972.661529][T26187] loop0: detected capacity change from 0 to 512 [ 972.669487][T26187] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 972.683262][T26187] EXT4-fs (loop0): 1 truncate cleaned up [ 972.690195][T26187] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 972.721665][ T9226] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 972.771916][T26201] 9p: Bad value for 'wfdno' [ 972.876368][T26197] netlink: 16 bytes leftover after parsing attributes in process `syz.2.14312'. [ 972.901169][T26197] netlink: 8 bytes leftover after parsing attributes in process `syz.2.14312'. [ 974.011713][T26237] netlink: 12 bytes leftover after parsing attributes in process `syz.5.14316'. [ 974.028491][T26237] netlink: 'syz.5.14316': attribute type 1 has an invalid length. [ 974.036464][T26237] netlink: 'syz.5.14316': attribute type 1 has an invalid length. [ 974.044331][T26237] netlink: 'syz.5.14316': attribute type 1 has an invalid length. [ 974.086379][T26237] netlink: 4 bytes leftover after parsing attributes in process `syz.5.14316'. [ 974.161394][T26231] netlink: 'syz.3.14315': attribute type 2 has an invalid length. [ 974.177829][T26269] loop0: detected capacity change from 0 to 512 [ 974.185326][T26269] EXT4-fs (loop0): can't mount with data=, fs mounted w/o journal [ 974.206244][T26268] netlink: 28 bytes leftover after parsing attributes in process `syz.2.14320'. [ 974.404977][T26307] sd 0:0:1:0: device reset [ 974.441178][T26312] SELinux: failed to load policy [ 974.512185][T26317] 9p: Bad value for 'rfdno' [ 974.564731][T26321] loop5: detected capacity change from 0 to 512 [ 974.573467][T26321] EXT4-fs (loop5): can't mount with data=, fs mounted w/o journal [ 975.140707][ T29] kauditd_printk_skb: 203 callbacks suppressed [ 975.140729][ T29] audit: type=1400 audit(6094.836:96423): avc: denied { sys_module } for pid=26332 comm="syz.5.14333" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 975.209760][T26359] netlink: 'syz.2.14334': attribute type 1 has an invalid length. [ 975.215069][ T29] audit: type=1400 audit(6095.247:96424): avc: denied { read } for pid=26364 comm="syz.5.14336" dev="nsfs" ino=4026533334 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 975.217807][T26359] netlink: 'syz.2.14334': attribute type 1 has an invalid length. [ 975.238697][ T29] audit: type=1400 audit(6095.247:96425): avc: denied { open } for pid=26364 comm="syz.5.14336" path="net:[4026533334]" dev="nsfs" ino=4026533334 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 975.246693][T26359] netlink: 'syz.2.14334': attribute type 1 has an invalid length. [ 975.277654][ T29] audit: type=1400 audit(6095.247:96426): avc: denied { create } for pid=26364 comm="syz.5.14336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 975.297931][ T29] audit: type=1400 audit(6095.247:96427): avc: denied { write } for pid=26364 comm="syz.5.14336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 975.318811][ T29] audit: type=1400 audit(6095.247:96428): avc: denied { read } for pid=26364 comm="syz.5.14336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 975.339742][T26336] netlink: 'syz.0.14332': attribute type 2 has an invalid length. [ 975.357420][ T29] audit: type=1400 audit(6095.397:96429): avc: denied { create } for pid=26367 comm="syz.3.14337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 975.367850][T26369] sd 0:0:1:0: device reset [ 975.376997][ T29] audit: type=1400 audit(6095.397:96430): avc: denied { ioctl } for pid=26367 comm="syz.3.14337" path="socket:[187791]" dev="sockfs" ino=187791 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 975.406288][ T29] audit: type=1400 audit(6095.397:96431): avc: denied { setopt } for pid=26367 comm="syz.3.14337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 975.430876][ T29] audit: type=1400 audit(6095.407:96432): avc: denied { read } for pid=26366 comm="syz.4.14338" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 975.571954][T26385] 9p: Bad value for 'rfdno' [ 975.592897][T26389] SELinux: failed to load policy [ 975.724086][T26396] netlink: 'syz.5.14346': attribute type 1 has an invalid length. [ 975.732203][T26396] netlink: 'syz.5.14346': attribute type 1 has an invalid length. [ 976.121222][T26436] IPv6: addrconf: prefix option has invalid lifetime [ 976.132071][T26436] netem: change failed [ 976.142150][T26436] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 976.198366][T26436] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 976.306329][T26447] IPv6: addrconf: prefix option has invalid lifetime [ 976.316150][T26436] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 976.328066][T26447] netem: change failed [ 976.339784][T26447] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 976.470501][T26447] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 976.485475][T26460] 9p: Bad value for 'rfdno' [ 976.518350][T26436] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 976.683177][T26447] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 976.705394][T24634] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 976.717296][T24634] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 977.663098][T26447] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 977.681038][T24636] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 977.699248][T24636] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 977.727981][T24636] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 977.820029][T26552] __nla_validate_parse: 11 callbacks suppressed [ 977.820050][T26552] netlink: 28 bytes leftover after parsing attributes in process `syz.4.14362'. [ 977.835636][T26552] netlink: 28 bytes leftover after parsing attributes in process `syz.4.14362'. [ 977.844696][T24636] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 977.877665][T26559] sd 0:0:1:0: device reset [ 977.924352][T24636] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 977.932987][T26556] lo speed is unknown, defaulting to 1000 [ 977.943116][T26556] lo speed is unknown, defaulting to 1000 [ 977.949193][T26567] FAULT_INJECTION: forcing a failure. [ 977.949193][T26567] name failslab, interval 1, probability 0, space 0, times 0 [ 977.954989][T24636] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 977.961934][T26567] CPU: 1 UID: 0 PID: 26567 Comm: syz.5.14367 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 977.962053][T26567] Tainted: [W]=WARN [ 977.962077][T26567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 977.962159][T26567] Call Trace: [ 977.962188][T26567] [ 977.962212][T26567] __dump_stack+0x1d/0x30 [ 977.962301][T26567] dump_stack_lvl+0x95/0xd0 [ 977.962375][T26567] dump_stack+0x15/0x1b [ 977.962447][T26567] should_fail_ex+0x265/0x280 [ 977.962541][T26567] should_failslab+0x8c/0xb0 [ 977.962683][T26567] __kvmalloc_node_noprof+0x149/0x6b0 [ 977.962776][T26567] ? vmemdup_user+0x2b/0xd0 [ 977.962839][T26567] ? should_fail_usercopy+0x1a/0x20 [ 977.962968][T26567] vmemdup_user+0x2b/0xd0 [ 977.963029][T26567] path_setxattrat+0x1b6/0x310 [ 977.963188][T26567] __x64_sys_setxattr+0x6e/0x90 [ 977.963362][T26567] x64_sys_call+0xf1e/0x3000 [ 977.963468][T26567] do_syscall_64+0xca/0x2b0 [ 977.963592][T26567] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 977.963703][T26567] RIP: 0033:0x7fa564b8f749 [ 977.963755][T26567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 977.963818][T26567] RSP: 002b:00007fa5635f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 977.963946][T26567] RAX: ffffffffffffffda RBX: 00007fa564de5fa0 RCX: 00007fa564b8f749 [ 977.963987][T26567] RDX: 0000200000000280 RSI: 0000200000000240 RDI: 0000200000000040 [ 977.964029][T26567] RBP: 00007fa5635f7090 R08: 0000000000000002 R09: 0000000000000000 [ 977.964073][T26567] R10: 000000000000006f R11: 0000000000000246 R12: 0000000000000001 [ 977.964122][T26567] R13: 00007fa564de6038 R14: 00007fa564de5fa0 R15: 00007ffd493eefd8 [ 977.964186][T26567] [ 978.144654][T26556] lo speed is unknown, defaulting to 1000 [ 978.188701][T26556] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 978.207203][T26575] 9p: Bad value for 'rfdno' [ 978.258587][T26556] lo speed is unknown, defaulting to 1000 [ 978.277959][T26580] netlink: 12 bytes leftover after parsing attributes in process `syz.5.14370'. [ 978.291185][T26556] lo speed is unknown, defaulting to 1000 [ 978.313634][T26588] syzkaller0: entered promiscuous mode [ 978.319264][T26588] syzkaller0: entered allmulticast mode [ 978.364668][T26591] netlink: 4 bytes leftover after parsing attributes in process `syz.5.14370'. [ 978.508360][T26556] lo speed is unknown, defaulting to 1000 [ 978.514843][T26556] lo speed is unknown, defaulting to 1000 [ 978.554040][T26599] lo speed is unknown, defaulting to 1000 [ 978.663072][T26556] lo speed is unknown, defaulting to 1000 [ 978.723646][T26556] lo speed is unknown, defaulting to 1000 [ 978.751332][T26556] lo speed is unknown, defaulting to 1000 [ 978.793486][T26556] lo speed is unknown, defaulting to 1000 [ 978.842649][T26556] lo speed is unknown, defaulting to 1000 [ 978.861301][T26632] loop5: detected capacity change from 0 to 128 [ 978.931247][T26632] EXT4-fs: Ignoring removed nobh option [ 978.994953][T26632] EXT4-fs (loop5): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 979.318134][T26658] 9p: Bad value for 'rfdno' [ 979.406536][T26661] lo speed is unknown, defaulting to 1000 [ 979.719832][T26694] IPv6: addrconf: prefix option has invalid lifetime [ 979.741282][T26698] IPv6: addrconf: prefix option has invalid lifetime [ 979.760956][T23933] EXT4-fs (loop5): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 979.774670][T26694] validate_nla: 11 callbacks suppressed [ 979.774687][T26694] netlink: 'syz.3.14386': attribute type 8 has an invalid length. [ 979.788217][T26694] netem: change failed [ 979.809772][T26698] netlink: 'syz.2.14387': attribute type 8 has an invalid length. [ 979.817709][T26698] netem: change failed [ 979.852067][T26694] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 979.900117][T26702] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 979.952790][T26694] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 979.979674][T26715] loop0: detected capacity change from 0 to 2048 [ 979.989204][T26702] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 980.078810][T26715] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 980.079704][T26694] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 980.248305][T26702] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 980.278972][T26694] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 980.291541][ T29] kauditd_printk_skb: 155 callbacks suppressed [ 980.291561][ T29] audit: type=1400 audit(6100.328:96588): avc: denied { read write } for pid=26732 comm="syz.5.14393" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 980.322329][ T29] audit: type=1400 audit(6100.328:96589): avc: denied { open } for pid=26732 comm="syz.5.14393" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 980.365040][T26702] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 980.413499][T26741] lo speed is unknown, defaulting to 1000 [ 980.539537][T24611] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 980.577396][T24611] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 980.643984][T24611] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 980.689162][T24611] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 980.718946][T24611] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 980.748174][T24611] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 980.756569][T24611] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 980.765005][T24611] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 980.804149][T26715] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 980.860588][ T29] audit: type=1326 audit(6100.898:96590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26780 comm="syz.2.14395" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12c5b5f749 code=0x7ffc0000 [ 980.908619][ T29] audit: type=1326 audit(6100.928:96591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26780 comm="syz.2.14395" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12c5b5f749 code=0x7ffc0000 [ 980.932507][ T29] audit: type=1326 audit(6100.928:96592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26780 comm="syz.2.14395" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f12c5b5f749 code=0x7ffc0000 [ 980.955786][ T29] audit: type=1326 audit(6100.928:96593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26780 comm="syz.2.14395" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12c5b5f749 code=0x7ffc0000 [ 980.978975][ T29] audit: type=1326 audit(6100.928:96594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26780 comm="syz.2.14395" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12c5b5f749 code=0x7ffc0000 [ 981.002169][ T29] audit: type=1326 audit(6100.928:96595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26780 comm="syz.2.14395" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f12c5b5f749 code=0x7ffc0000 [ 981.025635][ T29] audit: type=1326 audit(6100.928:96596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26780 comm="syz.2.14395" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12c5b5f749 code=0x7ffc0000 [ 981.048819][ T29] audit: type=1326 audit(6100.928:96597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26780 comm="syz.2.14395" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12c5b5f749 code=0x7ffc0000 [ 981.141447][T26790] lo speed is unknown, defaulting to 1000 [ 981.189433][T26789] loop0: detected capacity change from 0 to 512 [ 981.196771][T26789] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 981.214889][T26814] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 981.224237][T26814] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 981.239195][T26818] bond1 (unregistering): Released all slaves [ 981.250601][T26789] EXT4-fs (loop0): 1 truncate cleaned up [ 981.257640][T26789] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 981.281249][T26854] sd 0:0:1:0: device reset [ 981.289193][ T9226] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 981.320647][T26781] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 981.348799][T26893] loop0: detected capacity change from 0 to 512 [ 981.356020][T26893] EXT4-fs (loop0): can't mount with data=, fs mounted w/o journal [ 981.398120][T26901] loop5: detected capacity change from 0 to 512 [ 981.405496][T26901] EXT4-fs (loop5): can't mount with data=, fs mounted w/o journal [ 981.512102][T26924] netlink: 28 bytes leftover after parsing attributes in process `syz.0.14407'. [ 981.521330][T26924] netlink: 28 bytes leftover after parsing attributes in process `syz.0.14407'. [ 981.601910][T26930] netlink: 12 bytes leftover after parsing attributes in process `syz.0.14409'. [ 981.635279][T26932] FAULT_INJECTION: forcing a failure. [ 981.635279][T26932] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 981.648499][T26932] CPU: 0 UID: 0 PID: 26932 Comm: syz.0.14410 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 981.648596][T26932] Tainted: [W]=WARN [ 981.648605][T26932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 981.648622][T26932] Call Trace: [ 981.648632][T26932] [ 981.648643][T26932] __dump_stack+0x1d/0x30 [ 981.648704][T26932] dump_stack_lvl+0x95/0xd0 [ 981.648734][T26932] dump_stack+0x15/0x1b [ 981.648770][T26932] should_fail_ex+0x265/0x280 [ 981.648800][T26932] should_fail+0xb/0x20 [ 981.648820][T26932] should_fail_usercopy+0x1a/0x20 [ 981.648863][T26932] _copy_from_user+0x1c/0xb0 [ 981.648899][T26932] ___sys_sendmsg+0xc1/0x1d0 [ 981.648987][T26932] __x64_sys_sendmsg+0xd4/0x160 [ 981.649024][T26932] x64_sys_call+0x17ba/0x3000 [ 981.649050][T26932] do_syscall_64+0xca/0x2b0 [ 981.649163][T26932] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 981.649186][T26932] RIP: 0033:0x7fd9b262f749 [ 981.649232][T26932] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 981.649256][T26932] RSP: 002b:00007fd9b1097038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 981.649343][T26932] RAX: ffffffffffffffda RBX: 00007fd9b2885fa0 RCX: 00007fd9b262f749 [ 981.649357][T26932] RDX: 0000000020000010 RSI: 0000200000000080 RDI: 0000000000000005 [ 981.649374][T26932] RBP: 00007fd9b1097090 R08: 0000000000000000 R09: 0000000000000000 [ 981.649392][T26932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 981.649461][T26932] R13: 00007fd9b2886038 R14: 00007fd9b2885fa0 R15: 00007ffd8ca09658 [ 981.649513][T26932] [ 982.332504][T26935] lo speed is unknown, defaulting to 1000 [ 982.350092][T26941] sd 0:0:1:0: device reset [ 982.424119][T26971] netlink: 'syz.0.14412': attribute type 5 has an invalid length. [ 982.432825][T26971] netlink: 988 bytes leftover after parsing attributes in process `syz.0.14412'. [ 982.477137][T26971] loop0: detected capacity change from 0 to 1024 [ 982.494275][T26971] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 982.544168][T26971] netlink: 20 bytes leftover after parsing attributes in process `syz.0.14412'. [ 982.795556][T26988] lo speed is unknown, defaulting to 1000 [ 983.028084][T27020] serio: Serial port ptm0 [ 983.132716][T27024] loop5: detected capacity change from 0 to 512 [ 983.162171][T27024] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 983.176958][T27024] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 983.601197][T27039] lo speed is unknown, defaulting to 1000 [ 984.011788][T27064] sd 0:0:1:0: device reset [ 984.355348][T27078] lo speed is unknown, defaulting to 1000 [ 984.526333][T27102] bond1 (unregistering): Released all slaves [ 985.015285][T27197] sd 0:0:1:0: device reset [ 985.181331][T27204] netlink: 'syz.0.14436': attribute type 2 has an invalid length. [ 985.413399][T27207] netlink: 4 bytes leftover after parsing attributes in process `syz.5.14441'. [ 985.429969][T27207] netlink: 4 bytes leftover after parsing attributes in process `syz.5.14441'. [ 985.469218][T27199] lo speed is unknown, defaulting to 1000 [ 985.599320][T27183] lo speed is unknown, defaulting to 1000 [ 985.932387][T27244] 9pnet_fd: Insufficient options for proto=fd [ 986.174530][ T29] kauditd_printk_skb: 233 callbacks suppressed [ 986.174550][ T29] audit: type=1326 audit(6106.209:96831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27251 comm="syz.3.14446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4b427f749 code=0x7ffc0000 [ 986.376460][T27238] lo speed is unknown, defaulting to 1000 [ 986.388452][ T29] audit: type=1326 audit(6106.249:96832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27251 comm="syz.3.14446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe4b427f749 code=0x7ffc0000 [ 986.411763][ T29] audit: type=1326 audit(6106.249:96833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27251 comm="syz.3.14446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4b427f749 code=0x7ffc0000 [ 986.434982][ T29] audit: type=1326 audit(6106.249:96834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27251 comm="syz.3.14446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4b427f749 code=0x7ffc0000 [ 986.458220][ T29] audit: type=1326 audit(6106.249:96835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27251 comm="syz.3.14446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe4b427f749 code=0x7ffc0000 [ 986.481382][ T29] audit: type=1326 audit(6106.249:96836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27251 comm="syz.3.14446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4b427f749 code=0x7ffc0000 [ 986.504726][ T29] audit: type=1326 audit(6106.249:96837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27251 comm="syz.3.14446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4b427f749 code=0x7ffc0000 [ 986.527901][ T29] audit: type=1326 audit(6106.249:96838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27251 comm="syz.3.14446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe4b427f749 code=0x7ffc0000 [ 986.551319][ T29] audit: type=1326 audit(6106.249:96839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27251 comm="syz.3.14446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4b427f749 code=0x7ffc0000 [ 986.574531][ T29] audit: type=1326 audit(6106.249:96840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27251 comm="syz.3.14446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe4b427f749 code=0x7ffc0000 [ 986.660945][T27255] lo speed is unknown, defaulting to 1000 [ 986.874557][T27342] netlink: 8 bytes leftover after parsing attributes in process `syz.3.14454'. [ 986.957387][T27351] lo speed is unknown, defaulting to 1000 [ 987.256107][T27392] lo speed is unknown, defaulting to 1000 [ 988.162865][T27416] lo speed is unknown, defaulting to 1000 [ 988.290136][T27445] wireguard0: entered promiscuous mode [ 988.295828][T27445] wireguard0: entered allmulticast mode [ 988.365556][T27460] netlink: 8 bytes leftover after parsing attributes in process `syz.2.14470'. [ 988.449697][T27457] lo speed is unknown, defaulting to 1000 [ 988.550211][T27489] lo speed is unknown, defaulting to 1000 [ 988.674485][T27513] bond1 (unregistering): Released all slaves [ 988.974234][T27587] netlink: 12 bytes leftover after parsing attributes in process `syz.3.14474'. [ 989.007891][T27587] netlink: 'syz.3.14474': attribute type 1 has an invalid length. [ 989.015975][T27587] netlink: 'syz.3.14474': attribute type 1 has an invalid length. [ 989.023972][T27587] netlink: 'syz.3.14474': attribute type 1 has an invalid length. [ 989.035032][T27587] netlink: 4 bytes leftover after parsing attributes in process `syz.3.14474'. [ 989.082022][T27596] netlink: 28 bytes leftover after parsing attributes in process `syz.5.14476'. [ 989.091160][T27596] netlink: 24 bytes leftover after parsing attributes in process `syz.5.14476'. [ 989.136322][T27605] lo speed is unknown, defaulting to 1000 [ 989.138289][T27610] SELinux: failed to load policy [ 989.534374][T27656] lo speed is unknown, defaulting to 1000 [ 989.701249][T27678] netlink: 'syz.0.14482': attribute type 2 has an invalid length. [ 990.078851][T27654] loop5: detected capacity change from 0 to 8192 [ 990.119743][T16013] syz_tun (unregistering): left promiscuous mode [ 990.169249][T27682] lo speed is unknown, defaulting to 1000 [ 990.187990][T27654] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 990.226594][T27699] SELinux: failed to load policy [ 990.238391][T23933] FAT-fs (loop5): error, invalid access to FAT (entry 0x0000e1b1) [ 990.246383][T23933] FAT-fs (loop5): Filesystem has been set read-only [ 990.306780][T27703] loop0: detected capacity change from 0 to 512 [ 990.319618][T27703] EXT4-fs (loop0): can't mount with data=, fs mounted w/o journal [ 990.416562][T27687] lo speed is unknown, defaulting to 1000 [ 990.502751][T24621] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 990.513270][T27844] IPv6: NLM_F_CREATE should be specified when creating new route [ 990.529836][T27687] chnl_net:caif_netlink_parms(): no params data found [ 990.535727][T27777] tmpfs: Bad value for 'nr_inodes' [ 990.553917][T24621] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 990.621030][T24621] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 990.651430][T27687] bridge0: port 1(bridge_slave_0) entered blocking state [ 990.658625][T27687] bridge0: port 1(bridge_slave_0) entered disabled state [ 990.666259][T27687] bridge_slave_0: entered allmulticast mode [ 990.672984][T27687] bridge_slave_0: entered promiscuous mode [ 990.679936][T27886] C: renamed from team_slave_0 (while UP) [ 990.693379][T27908] netlink: 'syz.5.14494': attribute type 13 has an invalid length. [ 990.705066][T27886] netlink: 152 bytes leftover after parsing attributes in process `syz.5.14494'. [ 990.727719][T27747] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 990.744145][T27687] bridge0: port 2(bridge_slave_1) entered blocking state [ 990.751278][T27687] bridge0: port 2(bridge_slave_1) entered disabled state [ 990.770052][T27687] bridge_slave_1: entered allmulticast mode [ 990.783705][T27687] bridge_slave_1: entered promiscuous mode [ 990.816272][T24621] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 990.830071][T27866] lo speed is unknown, defaulting to 1000 [ 990.847026][T27777] infiniband !yz!: set active [ 990.851832][T27777] infiniband !yz!: added C [ 990.867158][T27687] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 990.903517][T27777] RDS/IB: !yz!: added [ 990.909631][T27777] smc: adding ib device !yz! with port count 1 [ 990.922582][T27687] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 990.933593][T27777] smc: ib device !yz! port 1 has no pnetid [ 990.999937][T27687] team0: Port device team_slave_0 added [ 991.020958][T27687] team0: Port device team_slave_1 added [ 991.054108][T27949] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 991.089480][T28016] SELinux: failed to load policy [ 991.196818][T24621] ip6gretap0 (unregistering): left promiscuous mode [ 991.216879][T24621] erspan0 (unregistering): left promiscuous mode [ 991.237834][ T29] kauditd_printk_skb: 337 callbacks suppressed [ 991.237850][ T29] audit: type=1400 audit(6111.271:97178): avc: denied { ioctl } for pid=28023 comm="syz.4.14504" path="socket:[190301]" dev="sockfs" ino=190301 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 991.271615][T24621] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 991.285152][T24621] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 991.296406][T24621] bond0 (unregistering): Released all slaves [ 991.362158][T28029] lo speed is unknown, defaulting to 1000 [ 991.431260][T24621] tipc: Disabling bearer [ 991.436529][T24621] tipc: Left network mode [ 991.455400][T28038] netlink: 'syz.0.14501': attribute type 2 has an invalid length. [ 991.474167][ T29] audit: type=1400 audit(6111.491:97179): avc: denied { create } for pid=28017 comm="syz.0.14501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 991.494811][ T29] audit: type=1400 audit(6111.491:97180): avc: denied { write } for pid=28017 comm="syz.0.14501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 991.605227][T27687] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 991.612253][T27687] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 991.638302][T27687] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 991.805276][T27687] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 991.812400][T27687] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 991.838510][T27687] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 991.866033][ T29] audit: type=1400 audit(6111.901:97181): avc: denied { create } for pid=28072 comm="syz.3.14505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 991.885424][ T29] audit: type=1400 audit(6111.901:97182): avc: denied { connect } for pid=28072 comm="syz.3.14505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 991.901680][T28077] sd 0:0:1:0: device reset [ 991.904801][ T29] audit: type=1400 audit(6111.901:97183): avc: denied { name_connect } for pid=28072 comm="syz.3.14505" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 991.929810][ T29] audit: type=1400 audit(6111.901:97184): avc: denied { accept } for pid=28072 comm="syz.3.14505" lport=37371 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 991.991730][ T29] audit: type=1400 audit(6111.901:97185): avc: denied { listen } for pid=28072 comm="syz.3.14505" lport=37371 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 992.014514][ T29] audit: type=1400 audit(6111.931:97186): avc: denied { read } for pid=28076 comm="syz.4.14506" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 992.037907][ T29] audit: type=1400 audit(6111.931:97187): avc: denied { open } for pid=28076 comm="syz.4.14506" path="/dev/sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 992.087722][T27687] hsr_slave_0: entered promiscuous mode [ 992.094300][T27687] hsr_slave_1: entered promiscuous mode [ 992.102730][T27687] debugfs: 'hsr0' already exists in 'hsr' [ 992.108539][T27687] Cannot create hsr debugfs directory [ 992.352870][T28153] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 992.409228][T28192] netlink: 12 bytes leftover after parsing attributes in process `syz.3.14512'. [ 992.426473][T28192] netlink: 'syz.3.14512': attribute type 1 has an invalid length. [ 992.434632][T28192] netlink: 'syz.3.14512': attribute type 1 has an invalid length. [ 992.442626][T28192] netlink: 'syz.3.14512': attribute type 1 has an invalid length. [ 992.451169][T28192] netlink: 4 bytes leftover after parsing attributes in process `syz.3.14512'. [ 992.567007][T27687] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 992.576831][T27687] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 992.587383][T27687] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 992.600568][T27687] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 992.689720][T27687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 992.705780][T27687] 8021q: adding VLAN 0 to HW filter on device team0 [ 992.717683][T24640] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.724825][T24640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.752870][T24640] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.760048][T24640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 992.805809][T28135] lo speed is unknown, defaulting to 1000 [ 992.883397][T28247] loop5: detected capacity change from 0 to 1024 [ 992.926968][T27687] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 992.971267][T24621] hsr_slave_0: left promiscuous mode [ 992.980096][T24621] hsr_slave_1: left promiscuous mode [ 992.986168][T24621] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 992.993646][T24621] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 993.002230][T24621] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 993.009682][T24621] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 993.022687][T24621] veth1_macvtap: left promiscuous mode [ 993.028222][T24621] veth0_macvtap: left promiscuous mode [ 993.034195][T24621] veth1_vlan: left promiscuous mode [ 993.039490][T24621] veth0_vlan: left promiscuous mode [ 993.142833][T24621] team0 (unregistering): Port device team_slave_1 removed [ 993.165865][T24621] team0 (unregistering): Port device team_slave_0 removed [ 993.198314][T28277] netlink: 4 bytes leftover after parsing attributes in process `syz.3.14517'. [ 993.229137][T28269] dvmrp3: entered allmulticast mode [ 993.235496][T15900] infiniband syz1: ib_query_port failed (-19) [ 993.241689][ T6750] lo speed is unknown, defaulting to 1000 [ 993.247491][ T6750] infiniband syz2: ib_query_port failed (-19) [ 993.559299][T28273] netlink: 28 bytes leftover after parsing attributes in process `syz.4.14520'. [ 993.568473][T28273] netlink: 28 bytes leftover after parsing attributes in process `syz.4.14520'. [ 993.674675][T28277] syz_tun (unregistering): left promiscuous mode [ 993.832103][T28265] dvmrp3: left allmulticast mode [ 993.850198][T28342] netlink: 12 bytes leftover after parsing attributes in process `syz.4.14523'. [ 993.873308][T28342] netlink: 'syz.4.14523': attribute type 1 has an invalid length. [ 993.881412][T28342] netlink: 'syz.4.14523': attribute type 1 has an invalid length. [ 993.889300][T28342] netlink: 'syz.4.14523': attribute type 1 has an invalid length. [ 993.952798][T28342] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14523'. [ 994.003492][T28360] loop5: detected capacity change from 0 to 164 [ 994.064676][T27687] veth0_vlan: entered promiscuous mode [ 994.073057][T27687] veth1_vlan: entered promiscuous mode [ 994.098065][T27687] veth0_macvtap: entered promiscuous mode [ 994.131449][T27687] veth1_macvtap: entered promiscuous mode [ 994.150239][T28379] IPv6: addrconf: prefix option has invalid lifetime [ 994.225177][T28379] netlink: 'syz.4.14530': attribute type 8 has an invalid length. [ 994.233117][T28379] netem: change failed [ 994.252159][T28381] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 994.267078][T27687] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 994.296218][T27687] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 994.326433][T28381] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 994.351402][T28385] loop0: detected capacity change from 0 to 8192 [ 994.358944][T24632] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 994.373503][T24632] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 994.386257][T28381] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 994.408385][T28385] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 994.433980][T24632] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 994.459505][T24632] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 994.473559][T28381] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 994.501295][ T9226] FAT-fs (loop0): error, invalid access to FAT (entry 0x0000e1b1) [ 994.509367][ T9226] FAT-fs (loop0): Filesystem has been set read-only [ 994.549014][T24619] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 994.559988][T28420] netlink: 28 bytes leftover after parsing attributes in process `syz.2.14488'. [ 994.569175][T28420] netlink: 24 bytes leftover after parsing attributes in process `syz.2.14488'. [ 994.593146][T24619] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 994.613336][T24619] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 994.648314][T28429] 9p: Bad value for 'rfdno' [ 994.659318][T24619] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 994.740632][T28435] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=28435 comm=syz.3.14536 [ 994.763910][T28444] FAULT_INJECTION: forcing a failure. [ 994.763910][T28444] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 994.777456][T28444] CPU: 1 UID: 0 PID: 28444 Comm: syz.2.14537 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 994.777586][T28444] Tainted: [W]=WARN [ 994.777596][T28444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 994.777670][T28444] Call Trace: [ 994.777676][T28444] [ 994.777685][T28444] __dump_stack+0x1d/0x30 [ 994.777714][T28444] dump_stack_lvl+0x95/0xd0 [ 994.777802][T28444] dump_stack+0x15/0x1b [ 994.777830][T28444] should_fail_ex+0x265/0x280 [ 994.777862][T28444] should_fail+0xb/0x20 [ 994.777931][T28444] should_fail_usercopy+0x1a/0x20 [ 994.777966][T28444] _copy_from_user+0x1c/0xb0 [ 994.778005][T28444] ___sys_sendmsg+0xc1/0x1d0 [ 994.778086][T28444] __x64_sys_sendmsg+0xd4/0x160 [ 994.778272][T28444] x64_sys_call+0x17ba/0x3000 [ 994.778307][T28444] do_syscall_64+0xca/0x2b0 [ 994.778354][T28444] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 994.778384][T28444] RIP: 0033:0x7f8e1b8ff749 [ 994.778405][T28444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 994.778481][T28444] RSP: 002b:00007f8e1a367038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 994.778500][T28444] RAX: ffffffffffffffda RBX: 00007f8e1bb55fa0 RCX: 00007f8e1b8ff749 [ 994.778518][T28444] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000005 [ 994.778535][T28444] RBP: 00007f8e1a367090 R08: 0000000000000000 R09: 0000000000000000 [ 994.778552][T28444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 994.778568][T28444] R13: 00007f8e1bb56038 R14: 00007f8e1bb55fa0 R15: 00007ffc05fb9028 [ 994.778671][T28444] [ 994.993434][T28460] loop5: detected capacity change from 0 to 512 [ 995.017939][T28460] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 995.093702][T23933] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 995.130778][T28463] loop0: detected capacity change from 0 to 8192 [ 995.148968][T28482] netlink: 'syz.5.14547': attribute type 1 has an invalid length. [ 995.184334][T28463] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 995.256027][T28493] IPv6: addrconf: prefix option has invalid lifetime [ 995.264696][T28493] netem: change failed [ 995.272534][T28493] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 995.288209][T28495] syzkaller0: entered promiscuous mode [ 995.293824][T28495] syzkaller0: entered allmulticast mode [ 995.323058][T28503] loop5: detected capacity change from 0 to 1024 [ 995.332199][T28493] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 995.379546][T28513] sd 0:0:1:0: device reset [ 995.402347][T28493] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 995.442206][T28493] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 995.649137][T28561] loop5: detected capacity change from 0 to 8192 [ 995.675876][T28570] loop0: detected capacity change from 0 to 1024 [ 995.695000][T28561] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 995.746088][T28577] loop5: detected capacity change from 0 to 512 [ 995.753918][T28577] EXT4-fs (loop5): can't mount with data=, fs mounted w/o journal [ 995.854216][T28596] FAULT_INJECTION: forcing a failure. [ 995.854216][T28596] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 995.867440][T28596] CPU: 0 UID: 0 PID: 28596 Comm: syz.5.14568 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 995.867506][T28596] Tainted: [W]=WARN [ 995.867516][T28596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 995.867533][T28596] Call Trace: [ 995.867542][T28596] [ 995.867554][T28596] __dump_stack+0x1d/0x30 [ 995.867590][T28596] dump_stack_lvl+0x95/0xd0 [ 995.867622][T28596] dump_stack+0x15/0x1b [ 995.867687][T28596] should_fail_ex+0x265/0x280 [ 995.867783][T28596] should_fail+0xb/0x20 [ 995.867807][T28596] should_fail_usercopy+0x1a/0x20 [ 995.867889][T28596] _copy_from_user+0x1c/0xb0 [ 995.867929][T28596] ___sys_sendmsg+0xc1/0x1d0 [ 995.867996][T28596] __x64_sys_sendmsg+0xd4/0x160 [ 995.868040][T28596] x64_sys_call+0x17ba/0x3000 [ 995.868089][T28596] do_syscall_64+0xca/0x2b0 [ 995.868138][T28596] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 995.868169][T28596] RIP: 0033:0x7fa564b8f749 [ 995.868218][T28596] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 995.868253][T28596] RSP: 002b:00007fa5635f7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 995.868281][T28596] RAX: ffffffffffffffda RBX: 00007fa564de5fa0 RCX: 00007fa564b8f749 [ 995.868300][T28596] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000004 [ 995.868317][T28596] RBP: 00007fa5635f7090 R08: 0000000000000000 R09: 0000000000000000 [ 995.868336][T28596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 995.868359][T28596] R13: 00007fa564de6038 R14: 00007fa564de5fa0 R15: 00007ffd493eefd8 [ 995.868387][T28596] [ 996.348755][ T29] kauditd_printk_skb: 448 callbacks suppressed [ 996.348775][ T29] audit: type=1326 audit(6116.382:97636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28618 comm="syz.2.14574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8e1b8ff749 code=0x7ffc0000 [ 996.378644][ T29] audit: type=1326 audit(6116.382:97637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28618 comm="syz.2.14574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8e1b8ff749 code=0x7ffc0000 [ 996.402676][ T29] audit: type=1326 audit(6116.382:97638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28618 comm="syz.2.14574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8e1b8ff749 code=0x7ffc0000 [ 996.426050][ T29] audit: type=1326 audit(6116.382:97639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28618 comm="syz.2.14574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f8e1b8ff749 code=0x7ffc0000 [ 996.449285][ T29] audit: type=1326 audit(6116.382:97640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28618 comm="syz.2.14574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8e1b8ff749 code=0x7ffc0000 [ 996.472669][ T29] audit: type=1326 audit(6116.382:97641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28618 comm="syz.2.14574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8e1b8ff749 code=0x7ffc0000 [ 996.484739][T28620] loop2: detected capacity change from 0 to 8192 [ 996.496182][ T29] audit: type=1326 audit(6116.382:97642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28618 comm="syz.2.14574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8e1b8ff749 code=0x7ffc0000 [ 996.525670][ T29] audit: type=1326 audit(6116.382:97643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28618 comm="syz.2.14574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8e1b8ff749 code=0x7ffc0000 [ 996.549158][ T29] audit: type=1326 audit(6116.382:97644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28618 comm="syz.2.14574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8e1b8ff749 code=0x7ffc0000 [ 996.572472][T28620] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 996.572427][ T29] audit: type=1326 audit(6116.382:97645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28618 comm="syz.2.14574" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f8e1b8ff749 code=0x7ffc0000 [ 996.657768][T28628] loop2: detected capacity change from 0 to 1024 [ 996.670580][T28630] loop0: detected capacity change from 0 to 1024 [ 996.771845][T28644] loop2: detected capacity change from 0 to 1024 [ 996.846858][T28655] loop0: detected capacity change from 0 to 512 [ 996.855037][T28655] EXT4-fs (loop0): can't mount with data=, fs mounted w/o journal [ 996.963350][T28669] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 997.069061][T28698] FAULT_INJECTION: forcing a failure. [ 997.069061][T28698] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 997.082383][T28698] CPU: 1 UID: 0 PID: 28698 Comm: syz.5.14583 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 997.082425][T28698] Tainted: [W]=WARN [ 997.082433][T28698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 997.082449][T28698] Call Trace: [ 997.082457][T28698] [ 997.082466][T28698] __dump_stack+0x1d/0x30 [ 997.082575][T28698] dump_stack_lvl+0x95/0xd0 [ 997.082656][T28698] dump_stack+0x15/0x1b [ 997.082680][T28698] should_fail_ex+0x265/0x280 [ 997.082707][T28698] should_fail+0xb/0x20 [ 997.082790][T28698] should_fail_usercopy+0x1a/0x20 [ 997.082819][T28698] _copy_from_user+0x1c/0xb0 [ 997.082884][T28698] __sys_bpf+0x183/0x7c0 [ 997.082925][T28698] __x64_sys_bpf+0x41/0x50 [ 997.082965][T28698] x64_sys_call+0x28e1/0x3000 [ 997.082994][T28698] do_syscall_64+0xca/0x2b0 [ 997.083154][T28698] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 997.083215][T28698] RIP: 0033:0x7fa564b8f749 [ 997.083234][T28698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 997.083256][T28698] RSP: 002b:00007fa5635f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 997.083279][T28698] RAX: ffffffffffffffda RBX: 00007fa564de5fa0 RCX: 00007fa564b8f749 [ 997.083294][T28698] RDX: 0000000000000020 RSI: 0000200000000300 RDI: 0000000000000004 [ 997.083309][T28698] RBP: 00007fa5635f7090 R08: 0000000000000000 R09: 0000000000000000 [ 997.083323][T28698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 997.083363][T28698] R13: 00007fa564de6038 R14: 00007fa564de5fa0 R15: 00007ffd493eefd8 [ 997.083385][T28698] [ 997.559740][T28722] validate_nla: 3 callbacks suppressed [ 997.559759][T28722] netlink: 'syz.3.14580': attribute type 2 has an invalid length. [ 997.823004][T28730] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 997.854523][T28734] syzkaller0: entered promiscuous mode [ 997.860211][T28734] syzkaller0: entered allmulticast mode [ 998.686069][T28793] __nla_validate_parse: 7 callbacks suppressed [ 998.686084][T28793] netlink: 4 bytes leftover after parsing attributes in process `syz.5.14598'. [ 998.738009][T28803] sd 0:0:1:0: device reset [ 998.794124][T28805] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 998.932741][T28822] netlink: 12 bytes leftover after parsing attributes in process `syz.5.14605'. [ 998.954650][T28822] netlink: 'syz.5.14605': attribute type 1 has an invalid length. [ 998.962674][T28822] netlink: 'syz.5.14605': attribute type 1 has an invalid length. [ 998.970675][T28822] netlink: 'syz.5.14605': attribute type 1 has an invalid length. [ 998.982253][T28822] netlink: 4 bytes leftover after parsing attributes in process `syz.5.14605'. [ 999.119243][T28835] EXT4-fs (loop5): can't mount with data=, fs mounted w/o journal [ 999.265182][T28853] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 999.355153][T28874] netlink: 4 bytes leftover after parsing attributes in process `syz.5.14615'. [ 999.391613][T24632] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 999.427809][T24632] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 999.452247][T24632] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 999.471781][T24632] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 999.611781][T28908] 9p: Bad value for 'rfdno' [ 999.726132][T28931] netlink: 12 bytes leftover after parsing attributes in process `syz.3.14623'. [ 999.773699][T28938] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 999.775229][T28931] netlink: 'syz.3.14623': attribute type 1 has an invalid length. [ 999.790366][T28931] netlink: 'syz.3.14623': attribute type 1 has an invalid length. [ 999.798229][T28931] netlink: 'syz.3.14623': attribute type 1 has an invalid length. [ 999.798770][T28938] netlink: 20 bytes leftover after parsing attributes in process `syz.2.14624'. [ 999.868849][T28953] netlink: 4 bytes leftover after parsing attributes in process `syz.3.14625'. [ 999.953640][T28958] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=56 sclass=netlink_route_socket pid=28958 comm=syz.4.14618 [ 1000.062294][T28964] SELinux: failed to load policy [ 1000.093460][T28967] sd 0:0:1:0: device reset [ 1000.840603][T29020] SELinux: failed to load policy [ 1000.869545][T29028] set_capacity_and_notify: 5 callbacks suppressed [ 1000.869566][T29028] loop5: detected capacity change from 0 to 164 [ 1001.023044][T29035] loop0: detected capacity change from 0 to 1024 [ 1001.038239][T29039] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14640'. [ 1001.049435][T29039] bridge_slave_1: left allmulticast mode [ 1001.055161][T29039] bridge_slave_1: left promiscuous mode [ 1001.061002][T29039] bridge0: port 2(bridge_slave_1) entered disabled state [ 1001.200552][T29039] bridge_slave_0: left allmulticast mode [ 1001.206324][T29039] bridge_slave_0: left promiscuous mode [ 1001.212220][T29039] bridge0: port 1(bridge_slave_0) entered disabled state [ 1001.416781][T29056] netlink: 'syz.4.14638': attribute type 2 has an invalid length. [ 1002.180039][ T29] kauditd_printk_skb: 481 callbacks suppressed [ 1002.180134][ T29] audit: type=1400 audit(6122.224:98127): avc: denied { bind } for pid=29074 comm="syz.3.14645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1002.213788][T29076] netlink: 'syz.3.14645': attribute type 8 has an invalid length. [ 1002.221850][T29076] netem: change failed [ 1002.241078][T29076] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1002.246095][ T29] audit: type=1400 audit(6122.274:98128): avc: denied { setopt } for pid=29074 comm="syz.3.14645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1002.271242][ T29] audit: type=1400 audit(6122.284:98129): avc: denied { create } for pid=29075 comm="syz.5.14647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1002.290868][ T29] audit: type=1400 audit(6122.284:98130): avc: denied { setopt } for pid=29075 comm="syz.5.14647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1002.314969][T29103] SELinux: failed to load policy [ 1002.368251][ T29] audit: type=1400 audit(6122.394:98131): avc: denied { map } for pid=29075 comm="syz.5.14647" path="/dev/bus/usb/006/001" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1002.392598][ T29] audit: type=1400 audit(6122.394:98132): avc: denied { execute } for pid=29075 comm="syz.5.14647" path="/dev/bus/usb/006/001" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1002.405273][T29076] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1002.470521][ T29] audit: type=1400 audit(6122.514:98133): avc: denied { allowed } for pid=29108 comm="syz.4.14650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1002.489703][ T29] audit: type=1400 audit(6122.514:98134): avc: denied { create } for pid=29108 comm="syz.4.14650" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1002.511604][ T29] audit: type=1400 audit(6122.554:98135): avc: denied { map } for pid=29108 comm="syz.4.14650" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=192819 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1002.535790][ T29] audit: type=1400 audit(6122.554:98136): avc: denied { read write } for pid=29108 comm="syz.4.14650" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=192819 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1002.580817][T29076] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1002.667411][T29076] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1002.819591][T24632] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1002.886295][T24611] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1002.919202][T24611] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1002.965146][T24611] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1003.037904][T29172] loop5: detected capacity change from 0 to 512 [ 1003.046641][T29172] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 1003.080499][T29172] EXT4-fs (loop5): 1 truncate cleaned up [ 1003.087877][T29172] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1003.120011][T23933] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1003.182911][T29188] 9pnet_fd: Insufficient options for proto=fd [ 1003.370802][T29200] loop2: detected capacity change from 0 to 512 [ 1003.391998][T29203] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14666'. [ 1003.392573][T29200] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 1003.418851][T29203] syz_tun (unregistering): left promiscuous mode [ 1003.448648][T29209] loop0: detected capacity change from 0 to 512 [ 1003.626401][T29225] netlink: 16 bytes leftover after parsing attributes in process `syz.2.14670'. [ 1003.827321][T29230] 9pnet_fd: Insufficient options for proto=fd [ 1003.900850][T29240] lo speed is unknown, defaulting to 1000 [ 1003.906837][T29240] lo speed is unknown, defaulting to 1000 [ 1003.913063][T29240] lo speed is unknown, defaulting to 1000 [ 1003.919933][T29240] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 1003.931787][T29240] lo speed is unknown, defaulting to 1000 [ 1003.938651][T29240] lo speed is unknown, defaulting to 1000 [ 1003.945611][T29240] lo speed is unknown, defaulting to 1000 [ 1003.952082][T29240] lo speed is unknown, defaulting to 1000 [ 1003.959016][T29240] lo speed is unknown, defaulting to 1000 [ 1003.965227][T29240] lo speed is unknown, defaulting to 1000 [ 1003.971713][T29240] lo speed is unknown, defaulting to 1000 [ 1003.977973][T29240] lo speed is unknown, defaulting to 1000 [ 1003.984253][T29240] lo speed is unknown, defaulting to 1000 [ 1004.013719][T29240] loop2: detected capacity change from 0 to 1024 [ 1004.020759][T29240] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 1004.035776][T29240] hub 9-0:1.0: USB hub found [ 1004.040751][T29240] hub 9-0:1.0: 8 ports detected [ 1004.267875][T29256] lo speed is unknown, defaulting to 1000 [ 1005.388882][T29258] bond1 (unregistering): Released all slaves [ 1005.761610][T29259] lo speed is unknown, defaulting to 1000 [ 1005.936956][T29257] bond1 (unregistering): Released all slaves [ 1006.286162][T29469] loop5: detected capacity change from 0 to 4096 [ 1006.297104][T29469] EXT4-fs: Ignoring removed nomblk_io_submit option [ 1006.310524][T29469] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1006.581715][T29483] lo speed is unknown, defaulting to 1000 [ 1006.588150][T23933] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1006.852738][T29514] hub 9-0:1.0: USB hub found [ 1006.858049][T29514] hub 9-0:1.0: 8 ports detected [ 1006.980171][T29518] lo speed is unknown, defaulting to 1000 [ 1007.128443][T29517] loop0: detected capacity change from 0 to 1024 [ 1007.135483][T29517] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 1007.150879][T29517] netlink: 20 bytes leftover after parsing attributes in process `syz.0.14693'. [ 1007.163616][T29520] netlink: 'syz.5.14690': attribute type 2 has an invalid length. [ 1007.308250][T29549] dvmrp3: entered allmulticast mode [ 1007.391045][T29549] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14694'. [ 1007.410861][ T29] kauditd_printk_skb: 71 callbacks suppressed [ 1007.410882][ T29] audit: type=1400 audit(6127.455:98208): avc: denied { read write } for pid=29560 comm="syz.4.14697" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1007.411961][T29561] netlink: 32 bytes leftover after parsing attributes in process `syz.4.14697'. [ 1007.418038][ T29] audit: type=1400 audit(6127.455:98209): avc: denied { open } for pid=29560 comm="syz.4.14697" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1007.475270][T29549] loop0: detected capacity change from 0 to 512 [ 1007.510601][ T29] audit: type=1400 audit(6127.525:98210): avc: denied { create } for pid=29548 comm="syz.0.14694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1007.543884][ T29] audit: type=1400 audit(6127.585:98211): avc: denied { execute } for pid=29568 comm="syz.4.14699" path=2F6D656D66643AF365099F9138C07901631F6E7578202864656C6574656429 dev="tmpfs" ino=3983 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1007.591122][T29569] netlink: 'syz.4.14699': attribute type 39 has an invalid length. [ 1007.611122][T29571] hub 9-0:1.0: USB hub found [ 1007.615947][T29571] hub 9-0:1.0: 8 ports detected [ 1007.622545][T29569] syz_tun (unregistering): left promiscuous mode [ 1007.656893][ T29] audit: type=1400 audit(6127.635:98212): avc: denied { create } for pid=29568 comm="syz.4.14699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1007.676432][ T29] audit: type=1400 audit(6127.635:98213): avc: denied { connect } for pid=29568 comm="syz.4.14699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1007.695994][ T29] audit: type=1400 audit(6127.635:98214): avc: denied { ioctl } for pid=29568 comm="syz.4.14699" path="socket:[194067]" dev="sockfs" ino=194067 ioctlcmd=0x89ed scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1007.720925][ T29] audit: type=1326 audit(6127.695:98215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29578 comm="syz.2.14702" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8e1b8ff749 code=0x7ffc0000 [ 1007.744513][ T29] audit: type=1326 audit(6127.695:98216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29578 comm="syz.2.14702" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8e1b8ff749 code=0x7ffc0000 [ 1007.767855][ T29] audit: type=1326 audit(6127.695:98217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29578 comm="syz.2.14702" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8e1b8ff749 code=0x7ffc0000 [ 1007.808839][T29574] loop5: detected capacity change from 0 to 4096 [ 1007.826165][T29574] EXT4-fs: Ignoring removed nomblk_io_submit option [ 1007.843687][T29574] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1008.006104][T29591] netlink: 20 bytes leftover after parsing attributes in process `syz.3.14704'. [ 1008.035125][T29593] dvmrp3: entered allmulticast mode [ 1008.045266][T29597] siw: device registration error -23 [ 1008.052796][T29593] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14705'. [ 1008.112213][T29604] loop2: detected capacity change from 0 to 512 [ 1008.128933][T29548] dvmrp3: left allmulticast mode [ 1008.220817][T23933] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1008.315597][T29618] netlink: 32 bytes leftover after parsing attributes in process `syz.5.14710'. [ 1008.410468][T29622] SELinux: failed to load policy [ 1008.521035][T29635] loop0: detected capacity change from 0 to 1024 [ 1008.528020][T29635] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 1008.541489][T29635] netlink: 20 bytes leftover after parsing attributes in process `syz.0.14716'. [ 1008.569643][T29640] siw: device registration error -23 [ 1008.583044][T29640] loop0: detected capacity change from 0 to 1024 [ 1008.590068][T29640] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 1008.621121][T29645] siw: device registration error -23 [ 1008.635416][T29645] loop0: detected capacity change from 0 to 1024 [ 1008.642268][T29645] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 1008.660830][T29645] hub 9-0:1.0: USB hub found [ 1008.665524][T29645] hub 9-0:1.0: 8 ports detected [ 1008.722789][T29654] loop0: detected capacity change from 0 to 4096 [ 1008.729777][T29654] EXT4-fs: Ignoring removed nomblk_io_submit option [ 1008.743475][T29654] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1008.865704][T29592] dvmrp3: left allmulticast mode [ 1008.973714][T29660] lo speed is unknown, defaulting to 1000 [ 1009.183333][T29684] bond1 (unregistering): Released all slaves [ 1009.359772][T29754] netlink: 32 bytes leftover after parsing attributes in process `syz.3.14722'. [ 1009.377765][ T9226] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1009.568595][T29763] hub 9-0:1.0: USB hub found [ 1009.573427][T29763] hub 9-0:1.0: 8 ports detected [ 1009.728640][T29768] lo speed is unknown, defaulting to 1000 [ 1010.478235][T29797] FAULT_INJECTION: forcing a failure. [ 1010.478235][T29797] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1010.491494][T29797] CPU: 1 UID: 0 PID: 29797 Comm: syz.2.14727 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1010.491540][T29797] Tainted: [W]=WARN [ 1010.491547][T29797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1010.491561][T29797] Call Trace: [ 1010.491620][T29797] [ 1010.491629][T29797] __dump_stack+0x1d/0x30 [ 1010.491655][T29797] dump_stack_lvl+0x95/0xd0 [ 1010.491686][T29797] dump_stack+0x15/0x1b [ 1010.491719][T29797] should_fail_ex+0x265/0x280 [ 1010.491744][T29797] should_fail+0xb/0x20 [ 1010.491764][T29797] should_fail_usercopy+0x1a/0x20 [ 1010.491810][T29797] _copy_from_user+0x1c/0xb0 [ 1010.491845][T29797] ___sys_sendmsg+0xc1/0x1d0 [ 1010.491899][T29797] __x64_sys_sendmsg+0xd4/0x160 [ 1010.491946][T29797] x64_sys_call+0x17ba/0x3000 [ 1010.491971][T29797] do_syscall_64+0xca/0x2b0 [ 1010.492019][T29797] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1010.492125][T29797] RIP: 0033:0x7f8e1b8ff749 [ 1010.492146][T29797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1010.492167][T29797] RSP: 002b:00007f8e1a367038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1010.492187][T29797] RAX: ffffffffffffffda RBX: 00007f8e1bb55fa0 RCX: 00007f8e1b8ff749 [ 1010.492291][T29797] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 1010.492305][T29797] RBP: 00007f8e1a367090 R08: 0000000000000000 R09: 0000000000000000 [ 1010.492318][T29797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1010.492332][T29797] R13: 00007f8e1bb56038 R14: 00007f8e1bb55fa0 R15: 00007ffc05fb9028 [ 1010.492433][T29797] [ 1010.787527][T29770] lo speed is unknown, defaulting to 1000 [ 1011.181311][T29821] loop2: detected capacity change from 0 to 1024 [ 1011.190001][T29821] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 1011.203697][T29821] netlink: 20 bytes leftover after parsing attributes in process `syz.2.14728'. [ 1011.366412][T29834] lo speed is unknown, defaulting to 1000 [ 1011.562781][T29869] loop0: detected capacity change from 0 to 164 [ 1011.626987][T29874] loop5: detected capacity change from 0 to 2048 [ 1011.673844][T29874] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1011.947349][T29887] lo speed is unknown, defaulting to 1000 [ 1012.131783][T29888] netlink: 'syz.2.14738': attribute type 2 has an invalid length. [ 1012.837152][ T29] kauditd_printk_skb: 63 callbacks suppressed [ 1012.837171][ T29] audit: type=1326 audit(6132.887:98281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29873 comm="syz.5.14737" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa564b8f749 code=0x7ffc0000 [ 1012.994761][T29893] lo speed is unknown, defaulting to 1000 [ 1013.241043][T29915] bond1 (unregistering): Released all slaves [ 1013.256161][ T29] audit: type=1326 audit(6133.117:98282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29873 comm="syz.5.14737" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa564b8f749 code=0x7ffc0000 [ 1013.645933][T23933] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1014.157732][T30012] lo speed is unknown, defaulting to 1000 [ 1014.258018][T30016] syzkaller0: entered promiscuous mode [ 1014.263703][T30016] syzkaller0: entered allmulticast mode [ 1014.332543][T30019] lo speed is unknown, defaulting to 1000 [ 1014.372875][T30018] bond1 (unregistering): Released all slaves [ 1014.516095][T30151] netlink: 96 bytes leftover after parsing attributes in process `syz.2.14748'. [ 1014.585476][T30157] SELinux: failed to load policy [ 1014.614742][T30159] syzkaller0: entered promiscuous mode [ 1014.620340][T30159] syzkaller0: entered allmulticast mode [ 1014.642398][ T29] audit: type=1400 audit(6134.687:98283): avc: denied { write } for pid=30153 comm="syz.3.14749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1014.670891][ T29] audit: type=1400 audit(6134.707:98284): avc: denied { connect } for pid=30153 comm="syz.3.14749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1014.690342][ T29] audit: type=1400 audit(6134.707:98285): avc: denied { name_connect } for pid=30153 comm="syz.3.14749" dest=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1014.910425][ T29] audit: type=1326 audit(6134.887:98286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30174 comm="syz.5.14756" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa564b8f749 code=0x7ffc0000 [ 1014.933748][ T29] audit: type=1326 audit(6134.887:98287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30174 comm="syz.5.14756" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa564b8f749 code=0x7ffc0000 [ 1014.956983][ T29] audit: type=1326 audit(6134.887:98288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30174 comm="syz.5.14756" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa564b8f749 code=0x7ffc0000 [ 1014.980255][ T29] audit: type=1326 audit(6134.887:98289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30174 comm="syz.5.14756" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa564b8f749 code=0x7ffc0000 [ 1015.004008][ T29] audit: type=1326 audit(6134.887:98290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30174 comm="syz.5.14756" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa564b8f749 code=0x7ffc0000 [ 1015.320282][T30189] bond1 (unregistering): Released all slaves [ 1015.633658][T30262] SELinux: failed to load policy [ 1015.639658][T30184] lo speed is unknown, defaulting to 1000 [ 1015.761107][T30169] lo speed is unknown, defaulting to 1000 [ 1015.790610][T30284] vcan0: tx address claim with dlc 0 [ 1015.927441][T30298] lo speed is unknown, defaulting to 1000 [ 1016.041912][T30329] netlink: 'syz.5.14759': attribute type 2 has an invalid length. [ 1016.137845][T30348] syzkaller0: entered promiscuous mode [ 1016.143385][T30348] syzkaller0: entered allmulticast mode [ 1016.337830][T30356] netlink: 'syz.4.14761': attribute type 10 has an invalid length. [ 1016.350406][T30356] team0: Port device dummy0 added [ 1016.356574][T30356] netlink: 'syz.4.14761': attribute type 10 has an invalid length. [ 1016.371340][T30356] team0: Port device dummy0 removed [ 1016.402157][T30356] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 1016.597234][T30370] loop5: detected capacity change from 0 to 128 [ 1016.631323][T30370] EXT4-fs (loop5): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 ro without journal. Quota mode: none. [ 1016.688385][T30380] loop2: detected capacity change from 0 to 1024 [ 1016.708639][T30384] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 1016.721276][T30380] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 1016.760887][T24619] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1016.771468][T30380] netlink: 20 bytes leftover after parsing attributes in process `syz.2.14768'. [ 1016.783180][T30361] lo speed is unknown, defaulting to 1000 [ 1016.793542][T30389] dvmrp3: entered allmulticast mode [ 1016.799351][T23933] EXT4-fs (loop5): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 1016.816035][T24619] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1016.854296][T30414] loop2: detected capacity change from 0 to 164 [ 1016.860480][T30416] loop5: detected capacity change from 0 to 164 [ 1016.896574][T24619] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1016.919038][T30389] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14767'. [ 1016.938255][T24619] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1016.949134][T30361] chnl_net:caif_netlink_parms(): no params data found [ 1016.993464][T30361] bridge0: port 1(bridge_slave_0) entered blocking state [ 1017.000610][T30361] bridge0: port 1(bridge_slave_0) entered disabled state [ 1017.008063][T30361] bridge_slave_0: entered allmulticast mode [ 1017.014897][T30361] bridge_slave_0: entered promiscuous mode [ 1017.021955][T30361] bridge0: port 2(bridge_slave_1) entered blocking state [ 1017.029170][T30361] bridge0: port 2(bridge_slave_1) entered disabled state [ 1017.036652][T30361] bridge_slave_1: entered allmulticast mode [ 1017.043280][T30361] bridge_slave_1: entered promiscuous mode [ 1017.073071][T30361] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1017.106004][T30361] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1017.154114][T24619] ip6gretap0 (unregistering): left promiscuous mode [ 1017.172597][T24619] erspan0 (unregistering): left promiscuous mode [ 1017.191272][T24619] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1017.203717][T24619] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1017.213725][T24619] bond0 (unregistering): Released all slaves [ 1017.227593][T30593] usb usb6: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1017.235585][T30593] vhci_hcd vhci_hcd.2: invalid port number 96 [ 1017.241709][T30593] vhci_hcd vhci_hcd.2: default hub control req: 0300 vfffa i0060 l0 [ 1017.270863][T30361] team0: Port device team_slave_0 added [ 1017.278910][T30361] team0: Port device team_slave_1 added [ 1017.323155][T24619] hsr_slave_0: left promiscuous mode [ 1017.331934][T24619] hsr_slave_1: left promiscuous mode [ 1017.338736][T24619] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1017.346383][T24619] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1017.354983][T24619] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1017.362479][T24619] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1017.373792][T24619] veth1_macvtap: left promiscuous mode [ 1017.380044][T24619] veth0_macvtap: left promiscuous mode [ 1017.385664][T24619] veth1_vlan: left promiscuous mode [ 1017.390964][T24619] veth0_vlan: left promiscuous mode [ 1017.467089][T24619] team0 (unregistering): Port device team_slave_1 removed [ 1017.478803][T24619] team0 (unregistering): Port device team_slave_0 removed [ 1017.499667][T30652] 9p: Bad value for 'rfdno' [ 1017.505075][T30653] 9p: Bad value for 'rfdno' [ 1017.539857][T30361] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1017.546929][T30361] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1017.572936][T30361] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1017.586041][T30361] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1017.593088][T30361] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1017.619253][T30361] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1017.637484][T30388] dvmrp3: left allmulticast mode [ 1017.668930][T30361] hsr_slave_0: entered promiscuous mode [ 1017.675324][T30361] hsr_slave_1: entered promiscuous mode [ 1017.681282][T30361] debugfs: 'hsr0' already exists in 'hsr' [ 1017.687186][T30361] Cannot create hsr debugfs directory [ 1017.726938][T30690] loop2: detected capacity change from 0 to 1024 [ 1017.734040][T30690] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 1017.848091][ T29] kauditd_printk_skb: 248 callbacks suppressed [ 1017.848143][ T29] audit: type=1326 audit(6137.898:98539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30753 comm="syz.4.14776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9f368af749 code=0x7ffc0000 [ 1017.878992][ T29] audit: type=1326 audit(6137.928:98540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30591 comm="syz.3.14772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe4b42765e7 code=0x7ffc0000 [ 1017.902337][ T29] audit: type=1326 audit(6137.928:98541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30591 comm="syz.3.14772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe4b421b829 code=0x7ffc0000 [ 1017.925554][ T29] audit: type=1326 audit(6137.928:98542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30591 comm="syz.3.14772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7fe4b427f749 code=0x7ffc0000 [ 1017.998428][ T29] audit: type=1326 audit(6137.998:98543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30591 comm="syz.3.14772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe4b42765e7 code=0x7ffc0000 [ 1018.021612][ T29] audit: type=1326 audit(6137.998:98544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30591 comm="syz.3.14772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe4b421b829 code=0x7ffc0000 [ 1018.044833][ T29] audit: type=1326 audit(6137.998:98545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30591 comm="syz.3.14772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7fe4b427f749 code=0x7ffc0000 [ 1018.068074][ T29] audit: type=1326 audit(6138.008:98546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30591 comm="syz.3.14772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe4b42765e7 code=0x7ffc0000 [ 1018.091299][ T29] audit: type=1326 audit(6138.008:98547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30591 comm="syz.3.14772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe4b421b829 code=0x7ffc0000 [ 1018.114480][ T29] audit: type=1326 audit(6138.008:98548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30591 comm="syz.3.14772" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7fe4b427f749 code=0x7ffc0000 [ 1018.238081][T30772] lo speed is unknown, defaulting to 1000 [ 1018.286919][T30792] loop2: detected capacity change from 0 to 512 [ 1018.310869][T30792] EXT4-fs (loop2): can't mount with data=, fs mounted w/o journal [ 1018.319281][T30816] FAULT_INJECTION: forcing a failure. [ 1018.319281][T30816] name failslab, interval 1, probability 0, space 0, times 0 [ 1018.332051][T30816] CPU: 0 UID: 0 PID: 30816 Comm: syz.3.14783 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1018.332085][T30816] Tainted: [W]=WARN [ 1018.332106][T30816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1018.332125][T30816] Call Trace: [ 1018.332138][T30816] [ 1018.332149][T30816] __dump_stack+0x1d/0x30 [ 1018.332183][T30816] dump_stack_lvl+0x95/0xd0 [ 1018.332213][T30816] dump_stack+0x15/0x1b [ 1018.332251][T30816] should_fail_ex+0x265/0x280 [ 1018.332285][T30816] should_failslab+0x8c/0xb0 [ 1018.332316][T30816] kmem_cache_alloc_node_noprof+0x6b/0x4c0 [ 1018.332343][T30816] ? __alloc_skb+0x2ff/0x4b0 [ 1018.332465][T30816] __alloc_skb+0x2ff/0x4b0 [ 1018.332489][T30816] ? __alloc_skb+0x228/0x4b0 [ 1018.332530][T30816] alloc_skb_with_frags+0x7d/0x470 [ 1018.332568][T30816] ? try_charge_memcg+0x215/0xa10 [ 1018.332677][T30816] tcp_send_rcvq+0xef/0x2b0 [ 1018.332712][T30816] tcp_sendmsg_locked+0x27d0/0x2c00 [ 1018.332746][T30816] ? obj_cgroup_charge_account+0xba/0x1a0 [ 1018.332783][T30816] ? should_fail_ex+0x30/0x280 [ 1018.332816][T30816] ? __rcu_read_unlock+0x4f/0x70 [ 1018.332842][T30816] ? avc_has_perm_noaudit+0xab/0x130 [ 1018.332868][T30816] ? avc_has_perm+0xf7/0x180 [ 1018.332898][T30816] tls_push_sg+0x155/0x590 [ 1018.332979][T30816] tls_push_partial_record+0x5a/0x70 [ 1018.333138][T30816] tls_tx_records+0xab/0x350 [ 1018.333178][T30816] tls_sw_release_resources_tx+0xa7/0x310 [ 1018.333224][T30816] tls_sk_proto_close+0x1aa/0x520 [ 1018.333254][T30816] inet_release+0xce/0xf0 [ 1018.333350][T30816] inet6_release+0x3e/0x60 [ 1018.333383][T30816] sock_close+0x6b/0x150 [ 1018.333434][T30816] ? __pfx_sock_close+0x10/0x10 [ 1018.333522][T30816] __fput+0x29b/0x650 [ 1018.333560][T30816] ____fput+0x1c/0x30 [ 1018.333587][T30816] task_work_run+0x131/0x1a0 [ 1018.333639][T30816] exit_to_user_mode_loop+0x1fe/0x740 [ 1018.333670][T30816] do_syscall_64+0x1e1/0x2b0 [ 1018.333735][T30816] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1018.333758][T30816] RIP: 0033:0x7fe4b427f749 [ 1018.333774][T30816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1018.333793][T30816] RSP: 002b:00007fe4b2cdf038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 1018.333815][T30816] RAX: 0000000000000000 RBX: 00007fe4b44d5fa0 RCX: 00007fe4b427f749 [ 1018.333888][T30816] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 1018.333905][T30816] RBP: 00007fe4b2cdf090 R08: 0000000000000000 R09: 0000000000000000 [ 1018.333921][T30816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1018.333933][T30816] R13: 00007fe4b44d6038 R14: 00007fe4b44d5fa0 R15: 00007ffea68282c8 [ 1018.333959][T30816] [ 1018.372324][T30361] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1018.506175][T30754] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 1018.577697][T30834] siw: device registration error -23 [ 1018.657690][T30361] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1018.690213][T30361] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1018.712070][T30842] netlink: 4 bytes leftover after parsing attributes in process `syz.3.14786'. [ 1018.722005][T30842] netlink: 4 bytes leftover after parsing attributes in process `syz.3.14786'. [ 1018.727329][T30361] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1018.739633][T30844] loop5: detected capacity change from 0 to 164 [ 1018.778940][T30849] netlink: 64 bytes leftover after parsing attributes in process `syz.3.14789'. [ 1018.807580][T30361] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1018.838874][T30847] loop2: detected capacity change from 0 to 8192 [ 1018.846159][T30361] 8021q: adding VLAN 0 to HW filter on device team0 [ 1018.857218][T24611] bridge0: port 1(bridge_slave_0) entered blocking state [ 1018.864383][T24611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1018.879220][T24641] bridge0: port 2(bridge_slave_1) entered blocking state [ 1018.886408][T24641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1018.996731][T30361] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1019.013649][T30847] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 1019.057688][T27687] FAT-fs (loop2): error, invalid access to FAT (entry 0x0000e1b1) [ 1019.065680][T27687] FAT-fs (loop2): Filesystem has been set read-only [ 1019.121245][T30361] veth0_vlan: entered promiscuous mode [ 1019.137926][T30361] veth1_vlan: entered promiscuous mode [ 1019.170144][T30361] veth0_macvtap: entered promiscuous mode [ 1019.186986][T30361] veth1_macvtap: entered promiscuous mode [ 1019.201703][T30361] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1019.214082][T30361] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1019.231834][T24619] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1019.276459][T24632] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1019.294769][T24632] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1019.313908][T24632] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1019.325575][T30887] 9p: Bad value for 'rfdno' [ 1019.358280][T30889] syzkaller0: entered promiscuous mode [ 1019.363848][T30889] syzkaller0: entered allmulticast mode [ 1019.397998][T30885] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 1019.515392][T30899] siw: device registration error -23 [ 1019.713281][T30908] lo speed is unknown, defaulting to 1000 [ 1019.824856][T30930] netlink: 'syz.0.14794': attribute type 2 has an invalid length. [ 1020.433468][T30958] lo speed is unknown, defaulting to 1000 [ 1020.562985][T30958] netlink: 'syz.2.14799': attribute type 2 has an invalid length. [ 1020.869079][T30988] IPv6: addrconf: prefix option has invalid lifetime [ 1020.881070][T30988] netlink: 'syz.0.14806': attribute type 8 has an invalid length. [ 1020.889075][T30988] netem: change failed [ 1020.904320][T30985] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 1020.998696][T30988] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1021.028831][T30993] SELinux: Context system_u:object_r:shadow_t:s0 is not valid (left unmapped). [ 1021.249589][T31003] lo speed is unknown, defaulting to 1000 [ 1021.457511][T31040] netlink: 12 bytes leftover after parsing attributes in process `syz.3.14816'. [ 1021.466912][T31040] netlink: 12 bytes leftover after parsing attributes in process `syz.3.14816'. [ 1021.500281][T31043] netlink: 8 bytes leftover after parsing attributes in process `syz.3.14817'. [ 1021.531435][T31045] syzkaller0: entered promiscuous mode [ 1021.537048][T31045] syzkaller0: entered allmulticast mode [ 1021.934992][T31066] netlink: 'syz.2.14823': attribute type 8 has an invalid length. [ 1021.942901][T31066] netem: change failed [ 1021.982730][T31066] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1022.045650][T31059] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=56 sclass=netlink_route_socket pid=31059 comm=syz.3.14820 [ 1022.107759][T31066] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1022.174284][T31066] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1022.256610][T31066] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1022.277031][T31100] syzkaller0: entered promiscuous mode [ 1022.282627][T31100] syzkaller0: entered allmulticast mode [ 1022.323880][T31108] syzkaller0: entered promiscuous mode [ 1022.329470][T31108] syzkaller0: entered allmulticast mode [ 1022.352344][T24625] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1022.365564][T24625] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1022.388472][T24625] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1022.397397][T24625] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1022.460538][T31124] loop2: detected capacity change from 0 to 2048 [ 1022.499798][T31124] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1022.500270][T31134] loop5: detected capacity change from 0 to 164 [ 1022.697787][T31141] lo speed is unknown, defaulting to 1000 [ 1023.508823][ T29] kauditd_printk_skb: 502 callbacks suppressed [ 1023.508849][ T29] audit: type=1400 audit(6143.549:99051): avc: denied { tracepoint } for pid=31166 comm="syz.5.14836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1023.540065][T31169] loop5: detected capacity change from 0 to 128 [ 1023.547414][T31169] FAT-fs (loop5): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 1023.882713][T31143] netlink: 'syz.3.14831': attribute type 2 has an invalid length. [ 1024.069990][T31144] lo speed is unknown, defaulting to 1000 [ 1024.220263][ T29] audit: type=1400 audit(6143.779:99052): avc: denied { create } for pid=31119 comm="syz.3.14831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1024.240710][ T29] audit: type=1400 audit(6143.930:99053): avc: denied { write } for pid=31119 comm="syz.3.14831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1024.264823][T31192] netlink: 'syz.4.14835': attribute type 2 has an invalid length. [ 1024.330055][T27687] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1024.409250][ T29] audit: type=1400 audit(6144.340:99054): avc: denied { mount } for pid=31166 comm="syz.5.14836" name="/" dev="loop5" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 1024.431103][ T29] audit: type=1400 audit(6144.370:99055): avc: denied { unmount } for pid=27687 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1024.562170][ T29] audit: type=1400 audit(6144.600:99056): avc: denied { append } for pid=31198 comm="syz.2.14837" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 1024.585973][ T29] audit: type=1400 audit(6144.600:99057): avc: denied { open } for pid=31198 comm="syz.2.14837" path="/dev/sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 1024.621777][ T29] audit: type=1400 audit(6144.660:99058): avc: denied { unmount } for pid=23933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 1024.641680][ T29] audit: type=1400 audit(6144.660:99059): avc: denied { setopt } for pid=31198 comm="syz.2.14837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1024.661893][T24619] FAT-fs (loop5): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 1024.684667][T31206] SELinux: failed to load policy [ 1024.707792][ T29] audit: type=1400 audit(6144.730:99060): avc: denied { load_policy } for pid=31204 comm="syz.3.14842" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1024.729852][T31207] netlink: 8 bytes leftover after parsing attributes in process `syz.2.14837'. [ 1024.823258][T31220] syzkaller0: entered promiscuous mode [ 1024.828789][T31220] syzkaller0: entered allmulticast mode [ 1024.853499][T31224] siw: device registration error -23 [ 1024.867877][T31224] hub 9-0:1.0: USB hub found [ 1024.872713][T31224] hub 9-0:1.0: 8 ports detected [ 1025.106347][T31250] usb usb6: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1025.115020][T31250] vhci_hcd vhci_hcd.2: invalid port number 96 [ 1025.121170][T31250] vhci_hcd vhci_hcd.2: default hub control req: 0300 vfffa i0060 l0 [ 1025.249283][T31254] lo speed is unknown, defaulting to 1000 [ 1025.329567][T30988] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1025.376304][T31286] bond1 (unregistering): Released all slaves [ 1025.426583][T30988] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1025.488752][T31359] SELinux: failed to load policy [ 1025.540712][T31361] loop5: detected capacity change from 0 to 164 [ 1025.559880][T30988] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1025.663559][T24613] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1025.699098][T24613] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1025.723487][T24613] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1025.732920][T24613] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1025.969905][T31385] hub 9-0:1.0: USB hub found [ 1025.974765][T31385] hub 9-0:1.0: 8 ports detected [ 1026.018073][T31389] loop2: detected capacity change from 0 to 512 [ 1026.044784][T31389] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1026.150489][T31398] 9p: Bad value for 'rfdno' [ 1026.212598][T27687] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1026.233817][T24636] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1026.295821][T24636] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1026.336306][T24636] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1026.401922][T24636] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1026.425928][T31418] netlink: 28 bytes leftover after parsing attributes in process `syz.2.14861'. [ 1026.435129][T31418] netlink: 28 bytes leftover after parsing attributes in process `syz.2.14861'. [ 1026.451164][T31400] lo speed is unknown, defaulting to 1000 [ 1026.465028][T31422] syzkaller0: entered promiscuous mode [ 1026.470571][T31422] syzkaller0: entered allmulticast mode [ 1026.488770][T31418] ªªªªªª: renamed from wg2 (while UP) [ 1026.608146][T24636] ip6gretap0 (unregistering): left promiscuous mode [ 1026.624402][T24636] erspan0 (unregistering): left promiscuous mode [ 1026.703293][T24636] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1026.714230][T24636] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1026.734270][T24636] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 1026.818910][T31458] loop5: detected capacity change from 0 to 512 [ 1026.826858][T31458] EXT4-fs (loop5): can't mount with data=, fs mounted w/o journal [ 1026.891195][T31465] netlink: 'syz.2.14864': attribute type 2 has an invalid length. [ 1027.213413][T24636] bond0 (unregistering): Released all slaves [ 1027.280847][T31457] lo speed is unknown, defaulting to 1000 [ 1027.365317][T24636] hsr_slave_0: left promiscuous mode [ 1027.376162][T24636] hsr_slave_1: left promiscuous mode [ 1027.382474][T24636] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1027.389949][T24636] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1027.404854][T24636] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1027.412499][T24636] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1027.431112][T24636] veth1_macvtap: left promiscuous mode [ 1027.443887][T24636] veth0_macvtap: left promiscuous mode [ 1027.456788][T24636] veth1_vlan: left promiscuous mode [ 1027.468010][T24636] veth0_vlan: left promiscuous mode [ 1027.514393][T31511] usb usb6: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1027.522722][T31511] vhci_hcd vhci_hcd.2: invalid port number 96 [ 1027.528878][T31511] vhci_hcd vhci_hcd.2: default hub control req: 0300 vfffa i0060 l0 [ 1027.571113][T24636] team0 (unregistering): Port device team_slave_1 removed [ 1027.583105][T24636] team0 (unregistering): Port device team_slave_0 removed [ 1027.628173][T31518] netlink: 4 bytes leftover after parsing attributes in process `syz.5.14869'. [ 1027.656430][T31514] dvmrp3: entered allmulticast mode [ 1027.669921][T31557] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 1027.694781][T31513] loop5: detected capacity change from 0 to 512 [ 1027.711120][T31400] chnl_net:caif_netlink_parms(): no params data found [ 1027.782619][T31651] loop2: detected capacity change from 0 to 164 [ 1027.791039][T31400] bridge0: port 1(bridge_slave_0) entered blocking state [ 1027.798333][T31400] bridge0: port 1(bridge_slave_0) entered disabled state [ 1027.807094][T31400] bridge_slave_0: entered allmulticast mode [ 1027.820123][T31400] bridge_slave_0: entered promiscuous mode [ 1027.828159][T31400] bridge0: port 2(bridge_slave_1) entered blocking state [ 1027.835381][T31400] bridge0: port 2(bridge_slave_1) entered disabled state [ 1027.844019][T31400] bridge_slave_1: entered allmulticast mode [ 1027.850700][T31400] bridge_slave_1: entered promiscuous mode [ 1027.888631][T31400] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1027.899814][T31400] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1027.932300][T31400] team0: Port device team_slave_0 added [ 1027.939260][T31400] team0: Port device team_slave_1 added [ 1027.960156][T31400] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1027.967261][T31400] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1027.993328][T31400] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1028.004957][T31400] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1028.011991][T31400] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1028.038121][T31400] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1028.071167][T31400] hsr_slave_0: entered promiscuous mode [ 1028.077511][T31400] hsr_slave_1: entered promiscuous mode [ 1028.083624][T31400] debugfs: 'hsr0' already exists in 'hsr' [ 1028.089376][T31400] Cannot create hsr debugfs directory [ 1028.152705][T31794] loop0: detected capacity change from 0 to 1024 [ 1028.159727][T31794] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 1028.176125][T31794] netlink: 20 bytes leftover after parsing attributes in process `syz.0.14873'. [ 1028.216017][T31826] netlink: 28 bytes leftover after parsing attributes in process `syz.0.14874'. [ 1028.225176][T31826] netlink: 28 bytes leftover after parsing attributes in process `syz.0.14874'. [ 1028.242808][T31826] ªªªªªª: renamed from wg2 (while UP) [ 1028.319468][T31512] dvmrp3: left allmulticast mode [ 1028.344532][T31833] lo speed is unknown, defaulting to 1000 [ 1028.370013][T31860] 9p: Bad value for 'rfdno' [ 1028.518492][ T29] kauditd_printk_skb: 674 callbacks suppressed [ 1028.518512][ T29] audit: type=1326 audit(6148.561:99735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31875 comm="syz.0.14881" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9d9b2d65e7 code=0x7ffc0000 [ 1028.527439][T31400] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1028.555043][ T29] audit: type=1326 audit(6148.601:99736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31875 comm="syz.0.14881" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9d9b27b829 code=0x7ffc0000 [ 1028.556100][ T29] audit: type=1326 audit(6148.601:99737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31875 comm="syz.0.14881" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9d9b2d65e7 code=0x7ffc0000 [ 1028.601846][ T29] audit: type=1326 audit(6148.601:99738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31875 comm="syz.0.14881" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9d9b27b829 code=0x7ffc0000 [ 1028.625697][ T29] audit: type=1326 audit(6148.601:99739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31875 comm="syz.0.14881" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7f9d9b2df749 code=0x7ffc0000 [ 1028.649799][ T29] audit: type=1400 audit(6148.631:99740): avc: denied { create } for pid=31876 comm="syz.5.14882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1028.669336][ T29] audit: type=1400 audit(6148.631:99741): avc: denied { setopt } for pid=31876 comm="syz.5.14882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1028.688671][ T29] audit: type=1400 audit(6148.631:99742): avc: denied { write } for pid=31876 comm="syz.5.14882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1028.708093][ T29] audit: type=1400 audit(6148.631:99743): avc: denied { connect } for pid=31876 comm="syz.5.14882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1028.727925][ T29] audit: type=1400 audit(6148.631:99744): avc: denied { name_connect } for pid=31876 comm="syz.5.14882" dest=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1028.757023][T31400] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1028.781661][T31400] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1028.797506][T31400] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1028.815285][T31899] loop5: detected capacity change from 0 to 512 [ 1028.821989][T31892] usb usb6: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1028.836301][T31892] vhci_hcd vhci_hcd.2: invalid port number 96 [ 1028.842554][T31892] vhci_hcd vhci_hcd.2: default hub control req: 0300 vfffa i0060 l0 [ 1028.852970][T31899] EXT4-fs (loop5): can't mount with data=, fs mounted w/o journal [ 1028.900754][T31400] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1028.916432][T31400] 8021q: adding VLAN 0 to HW filter on device team0 [ 1028.938668][T24638] bridge0: port 1(bridge_slave_0) entered blocking state [ 1028.945856][T24638] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1028.960906][T24638] bridge0: port 2(bridge_slave_1) entered blocking state [ 1028.968092][T24638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1029.085032][T31924] lo speed is unknown, defaulting to 1000 [ 1029.224703][T31925] bond1 (unregistering): Released all slaves [ 1029.449795][T32021] usb usb6: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1029.482996][T32021] vhci_hcd vhci_hcd.2: invalid port number 96 [ 1029.489239][T32021] vhci_hcd vhci_hcd.2: default hub control req: 0300 vfffa i0060 l0 [ 1029.544956][T31400] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1029.562984][T32025] loop0: detected capacity change from 0 to 1024 [ 1029.591575][T32025] EXT4-fs (loop0): can't mount with data=, fs mounted w/o journal [ 1029.728387][T31400] veth0_vlan: entered promiscuous mode [ 1029.742086][T31400] veth1_vlan: entered promiscuous mode [ 1029.762681][T31400] veth0_macvtap: entered promiscuous mode [ 1029.771419][T31400] veth1_macvtap: entered promiscuous mode [ 1029.785713][T31400] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1029.800135][T31400] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1029.815180][T24613] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1029.832428][T24613] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1029.862333][T24613] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1029.884269][T24613] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1029.985184][T32042] syzkaller0: entered promiscuous mode [ 1029.990730][T32042] syzkaller0: entered allmulticast mode [ 1030.268637][T32025] lo speed is unknown, defaulting to 1000 [ 1030.315380][T32054] netlink: 24 bytes leftover after parsing attributes in process `syz.0.14886'. [ 1030.340945][T32054] IPVS: Error connecting to the multicast addr [ 1030.352972][T32062] lo speed is unknown, defaulting to 1000 [ 1030.541120][T32107] netlink: 28 bytes leftover after parsing attributes in process `syz.0.14892'. [ 1030.684354][T32110] loop5: detected capacity change from 0 to 164 [ 1030.788630][T24619] Bluetooth: hci0: Frame reassembly failed (-84) [ 1030.965292][T32121] loop2: detected capacity change from 0 to 128 [ 1030.972438][T32121] FAT-fs (loop2): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 1031.020668][T24619] FAT-fs (loop2): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 1031.142506][T32130] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1031.153036][T32130] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1031.185438][T13033] lo speed is unknown, defaulting to 1000 [ 1031.191238][T13033] syz2: Port: 1 Link DOWN [ 1031.200926][T24625] netdevsim netdevsim2 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1031.209387][T24625] netdevsim netdevsim2 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1031.227258][T24625] netdevsim netdevsim2 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1031.235880][T24625] netdevsim netdevsim2 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1031.393694][T32138] lo speed is unknown, defaulting to 1000 [ 1031.503977][T32137] 9p: Bad value for 'rfdno' [ 1031.529875][T32160] bond1 (unregistering): Released all slaves [ 1031.690369][T32231] usb usb6: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1031.698916][T32231] vhci_hcd vhci_hcd.2: invalid port number 96 [ 1031.705138][T32231] vhci_hcd vhci_hcd.2: default hub control req: 0300 vfffa i0060 l0 [ 1031.987322][T32237] siw: device registration error -23 [ 1032.011319][T32237] hub 9-0:1.0: USB hub found [ 1032.016779][T32237] hub 9-0:1.0: 8 ports detected [ 1032.109972][T32249] netlink: 28 bytes leftover after parsing attributes in process `syz.2.14904'. [ 1032.293709][T32261] siw: device registration error -23 [ 1032.311642][T32261] hub 9-0:1.0: USB hub found [ 1032.316448][T32261] hub 9-0:1.0: 8 ports detected [ 1032.339373][T32266] syzkaller0: entered promiscuous mode [ 1032.345197][T32266] syzkaller0: entered allmulticast mode [ 1032.457796][T32279] siw: device registration error -23 [ 1032.469697][T32279] hub 9-0:1.0: USB hub found [ 1032.475082][T32279] hub 9-0:1.0: 8 ports detected [ 1032.840267][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 1032.897366][T32311] sg_write: data in/out 49276/1 bytes for SCSI command 0x1c-- guessing data in; [ 1032.897366][T32311] program syz.3.14923 not setting count and/or reply_len properly [ 1033.094657][T32319] usb usb6: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1033.102534][T32319] vhci_hcd vhci_hcd.2: invalid port number 96 [ 1033.108690][T32319] vhci_hcd vhci_hcd.2: default hub control req: 0300 vfffa i0060 l0 [ 1033.471409][T32331] dvmrp3: entered allmulticast mode [ 1033.497081][T32331] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14929'. [ 1033.525430][ T29] kauditd_printk_skb: 1105 callbacks suppressed [ 1033.525450][ T29] audit: type=1326 audit(6153.572:100850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32317 comm="syz.3.14926" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fabd1a065e7 code=0x7ffc0000 [ 1033.555661][ T29] audit: type=1326 audit(6153.582:100851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32317 comm="syz.3.14926" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fabd19ab829 code=0x7ffc0000 [ 1033.578956][ T29] audit: type=1326 audit(6153.582:100852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32317 comm="syz.3.14926" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7fabd1a0f749 code=0x7ffc0000 [ 1033.602281][ T29] audit: type=1326 audit(6153.602:100853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32317 comm="syz.3.14926" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fabd1a065e7 code=0x7ffc0000 [ 1033.625574][ T29] audit: type=1326 audit(6153.602:100854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32317 comm="syz.3.14926" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fabd19ab829 code=0x7ffc0000 [ 1033.648824][ T29] audit: type=1326 audit(6153.602:100855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32317 comm="syz.3.14926" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7fabd1a0f749 code=0x7ffc0000 [ 1033.673488][ T29] audit: type=1326 audit(6153.622:100856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32317 comm="syz.3.14926" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fabd1a065e7 code=0x7ffc0000 [ 1033.696849][ T29] audit: type=1326 audit(6153.622:100857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32317 comm="syz.3.14926" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fabd19ab829 code=0x7ffc0000 [ 1033.720229][ T29] audit: type=1326 audit(6153.622:100858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32317 comm="syz.3.14926" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7fabd1a0f749 code=0x7ffc0000 [ 1033.743902][ T29] audit: type=1326 audit(6153.632:100859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32317 comm="syz.3.14926" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fabd1a065e7 code=0x7ffc0000 [ 1033.789496][T32114] Bluetooth: hci0: Opcode 0x0c20 failed: -4 [ 1034.055762][T32354] bridge_slave_0: left allmulticast mode [ 1034.061605][T32354] bridge_slave_0: left promiscuous mode [ 1034.067395][T32354] bridge0: port 1(bridge_slave_0) entered disabled state [ 1034.077915][T32354] bridge_slave_1: left allmulticast mode [ 1034.083677][T32354] bridge_slave_1: left promiscuous mode [ 1034.089398][T32354] bridge0: port 2(bridge_slave_1) entered disabled state [ 1034.101106][T32354] bond0: (slave bond_slave_0): Releasing backup interface [ 1034.112818][T32354] bond0: (slave bond_slave_1): Releasing backup interface [ 1034.129146][T32354] team0: Port device team_slave_0 removed [ 1034.141006][T32354] team0: Port device team_slave_1 removed [ 1034.148746][T32354] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1034.156309][T32354] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1034.156683][T32356] loop2: detected capacity change from 0 to 2048 [ 1034.173315][T32354] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1034.180846][T32354] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1034.190694][T32356] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1034.192741][T32354] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 1034.280315][T32363] netlink: 28 bytes leftover after parsing attributes in process `syz.0.14936'. [ 1034.289445][T32363] netlink: 28 bytes leftover after parsing attributes in process `syz.0.14936'. [ 1034.331504][T32330] dvmrp3: left allmulticast mode [ 1034.344652][T32360] EXT4-fs error (device loop2): ext4_validate_block_bitmap:432: comm ext4lazyinit: bg 0: block 2: invalid block bitmap [ 1034.388311][T32369] loop5: detected capacity change from 0 to 128 [ 1034.397932][T32369] FAT-fs (loop5): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 1034.407157][T32360] EXT4-fs (loop2): Remounting filesystem read-only [ 1034.448930][T32372] kernel profiling enabled (shift: 16) [ 1034.464835][T24611] FAT-fs (loop5): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 1034.490799][T32380] loop5: detected capacity change from 0 to 164 [ 1034.519198][T32380] 9p: Bad value for 'rfdno' [ 1034.532040][T32375] lo speed is unknown, defaulting to 1000 [ 1034.612673][T32372] loop0: detected capacity change from 0 to 512 [ 1034.622252][T32407] loop5: detected capacity change from 0 to 4096 [ 1034.632758][T32407] EXT4-fs: Ignoring removed nomblk_io_submit option [ 1034.648247][T32372] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 1034.662304][T32407] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1034.695890][T32372] EXT4-fs (loop0): 1 truncate cleaned up [ 1034.721807][T32372] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1034.782138][T32372] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1034.944443][T32439] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=56 sclass=netlink_route_socket pid=32439 comm=syz.5.14941 [ 1034.970087][T32356] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1035.184823][T23933] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1035.202895][T32449] loop0: detected capacity change from 0 to 4096 [ 1035.220486][T32449] EXT4-fs: Ignoring removed nomblk_io_submit option [ 1035.246500][T32456] openvswitch: netlink: Missing key (keys=40, expected=200000) [ 1035.246593][T32449] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1035.307255][T32459] dvmrp3: entered allmulticast mode [ 1035.353342][T32459] netlink: 4 bytes leftover after parsing attributes in process `syz.5.14951'. [ 1035.379927][T32459] loop5: detected capacity change from 0 to 512 [ 1035.488397][T32438] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 1035.630793][T32449] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=56 sclass=netlink_route_socket pid=32449 comm=syz.0.14949 [ 1035.681043][T30361] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1035.699074][T32484] siw: device registration error -23 [ 1035.712843][T32486] siw: device registration error -23 [ 1035.718452][T32484] hub 9-0:1.0: USB hub found [ 1035.723815][T32484] hub 9-0:1.0: 8 ports detected [ 1035.733872][T32486] hub 9-0:1.0: USB hub found [ 1035.738751][T32486] hub 9-0:1.0: 8 ports detected [ 1035.771410][T32492] syzkaller0: entered promiscuous mode [ 1035.776996][T32492] syzkaller0: entered allmulticast mode [ 1035.893281][T32504] loop0: detected capacity change from 0 to 8192 [ 1035.906805][T32508] syzkaller0: entered promiscuous mode [ 1035.912445][T32508] syzkaller0: entered allmulticast mode [ 1035.967479][T32513] loop2: detected capacity change from 0 to 8192 [ 1036.003013][T32504] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 1036.037090][T30361] FAT-fs (loop0): error, invalid access to FAT (entry 0x0000e1b1) [ 1036.045223][T30361] FAT-fs (loop0): Filesystem has been set read-only [ 1036.060033][T32513] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 1036.089470][T32525] loop0: detected capacity change from 0 to 164 [ 1036.111818][T27687] FAT-fs (loop2): error, invalid access to FAT (entry 0x0000e1b1) [ 1036.119832][T27687] FAT-fs (loop2): Filesystem has been set read-only [ 1036.131163][T32458] dvmrp3: left allmulticast mode [ 1036.151450][T32520] lo speed is unknown, defaulting to 1000 [ 1036.252148][T32539] EXT4-fs: Ignoring removed nomblk_io_submit option [ 1036.304026][T32539] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1036.385388][T32565] netlink: 40 bytes leftover after parsing attributes in process `syz.5.14967'. [ 1036.483839][T32566] lo speed is unknown, defaulting to 1000 [ 1036.668487][T32567] netlink: 'syz.0.14966': attribute type 2 has an invalid length. [ 1036.875668][T32595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=56 sclass=netlink_route_socket pid=32595 comm=syz.2.14965 [ 1037.061791][T32599] lo speed is unknown, defaulting to 1000 [ 1037.190666][T32621] syzkaller0: entered promiscuous mode [ 1037.196207][T32621] syzkaller0: entered allmulticast mode [ 1037.271779][T27687] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1037.370265][T32640] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-001000000000 r/w without journal. Quota mode: none. [ 1037.403896][T32640] sg_write: data in/out 49276/1 bytes for SCSI command 0x1c-- guessing data in; [ 1037.403896][T32640] program syz.5.14975 not setting count and/or reply_len properly [ 1037.510058][T23933] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-001000000000. [ 1037.512000][T32655] netlink: 28 bytes leftover after parsing attributes in process `syz.3.14979'. [ 1037.528233][T32655] netlink: 28 bytes leftover after parsing attributes in process `syz.3.14979'. [ 1037.586095][T32660] EXT4-fs (loop2): can't mount with data=, fs mounted w/o journal [ 1037.595580][T32655] ªªªªªª: renamed from wg2 (while UP) [ 1037.653691][T32650] lo speed is unknown, defaulting to 1000 [ 1038.000404][T32700] lo speed is unknown, defaulting to 1000 [ 1038.418019][T32701] lo speed is unknown, defaulting to 1000 [ 1038.674140][ T29] kauditd_printk_skb: 350 callbacks suppressed [ 1038.674155][ T29] audit: type=1400 audit(6158.723:101210): avc: denied { read write } for pid=30361 comm="syz-executor" name="loop0" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1038.703477][ T29] audit: type=1400 audit(6158.723:101211): avc: denied { open } for pid=30361 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1038.816024][ T29] audit: type=1400 audit(6158.843:101212): avc: denied { ioctl } for pid=30361 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=661 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1038.876023][ T29] audit: type=1400 audit(6158.924:101213): avc: denied { create } for pid=32662 comm="syz.4.14982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1038.898812][T32702] bond1 (unregistering): Released all slaves [ 1038.931300][ T29] audit: type=1400 audit(6158.984:101214): avc: denied { create } for pid=350 comm="syz.0.14985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1038.952058][ T351] syzkaller0: entered promiscuous mode [ 1038.957555][ T351] syzkaller0: entered allmulticast mode [ 1039.070219][ T29] audit: type=1400 audit(6159.004:101215): avc: denied { ioctl } for pid=350 comm="syz.0.14985" path="socket:[198983]" dev="sockfs" ino=198983 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1039.095833][ T29] audit: type=1400 audit(6159.094:101216): avc: denied { write } for pid=350 comm="syz.0.14985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1039.115123][ T29] audit: type=1400 audit(6159.104:101217): avc: denied { write } for pid=32662 comm="syz.4.14982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1039.164213][ T29] audit: type=1326 audit(6159.214:101218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=359 comm="syz.3.14988" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fabd1a0f749 code=0x7ffc0000 [ 1039.221134][ T357] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 1039.231663][ T29] audit: type=1326 audit(6159.214:101219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=359 comm="syz.3.14988" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fabd1a0f749 code=0x7ffc0000 [ 1039.416259][ T380] IPv6: addrconf: prefix option has invalid lifetime [ 1039.425257][ T363] syzkaller0: entered promiscuous mode [ 1039.430830][ T363] syzkaller0: entered allmulticast mode [ 1039.451832][ T380] netlink: 'syz.0.14991': attribute type 8 has an invalid length. [ 1039.459864][ T380] netem: change failed [ 1039.547722][ T386] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1039.567130][ T370] lo speed is unknown, defaulting to 1000 [ 1039.654585][ T385] lo speed is unknown, defaulting to 1000 [ 1039.716523][ T385] netlink: 'syz.5.14990': attribute type 2 has an invalid length. [ 1039.756767][ T386] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1039.862825][ T386] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1039.951000][ T386] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1040.036858][T24613] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1040.054983][T24613] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1040.066884][ T452] sg_write: data in/out 49276/1 bytes for SCSI command 0x1c-- guessing data in; [ 1040.066884][ T452] program syz.3.14994 not setting count and/or reply_len properly [ 1040.078295][T24613] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1040.108339][T24613] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1040.487877][ T473] lo speed is unknown, defaulting to 1000 [ 1041.197840][ T474] lo speed is unknown, defaulting to 1000 [ 1041.265485][ T523] set_capacity_and_notify: 3 callbacks suppressed [ 1041.265507][ T523] loop2: detected capacity change from 0 to 164 [ 1041.305296][ T524] bond1 (unregistering): Released all slaves [ 1041.327712][T24629] ================================================================== [ 1041.335848][T24629] BUG: KCSAN: data-race in alloc_pid / copy_process [ 1041.342499][T24629] [ 1041.344851][T24629] read-write to 0xffffffff86860008 of 4 bytes by task 24621 on cpu 1: [ 1041.353023][T24629] alloc_pid+0x54c/0x760 [ 1041.357294][T24629] copy_process+0xdd1/0x1ef0 [ 1041.361929][T24629] kernel_clone+0x16c/0x5c0 [ 1041.366448][T24629] user_mode_thread+0x7d/0xb0 [ 1041.371150][T24629] call_usermodehelper_exec_work+0x41/0x160 [ 1041.377075][T24629] process_scheduled_works+0x4ce/0x9d0 [ 1041.382567][T24629] worker_thread+0x582/0x770 [ 1041.387181][T24629] kthread+0x489/0x510 [ 1041.391282][T24629] ret_from_fork+0x149/0x290 [ 1041.395904][T24629] ret_from_fork_asm+0x1a/0x30 [ 1041.400701][T24629] [ 1041.403036][T24629] read to 0xffffffff86860008 of 4 bytes by task 24629 on cpu 0: [ 1041.410683][T24629] copy_process+0x16d4/0x1ef0 [ 1041.415383][T24629] kernel_clone+0x16c/0x5c0 [ 1041.419910][T24629] user_mode_thread+0x7d/0xb0 [ 1041.424605][T24629] call_usermodehelper_exec_work+0x41/0x160 [ 1041.430525][T24629] process_scheduled_works+0x4ce/0x9d0 [ 1041.436007][T24629] worker_thread+0x582/0x770 [ 1041.440622][T24629] kthread+0x489/0x510 [ 1041.444721][T24629] ret_from_fork+0x149/0x290 [ 1041.449332][T24629] ret_from_fork_asm+0x1a/0x30 [ 1041.454121][T24629] [ 1041.456457][T24629] value changed: 0x800001e3 -> 0x800001e4 [ 1041.462184][T24629] [ 1041.464525][T24629] Reported by Kernel Concurrency Sanitizer on: [ 1041.470706][T24629] CPU: 0 UID: 0 PID: 24629 Comm: kworker/u8:47 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1041.482366][T24629] Tainted: [W]=WARN [ 1041.486182][T24629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1041.496271][T24629] Workqueue: events_unbound call_usermodehelper_exec_work [ 1041.503423][T24629] ================================================================== [ 1041.765708][ T584] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING