last executing test programs: 2m21.032552219s ago: executing program 3 (id=2130): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) close(0x4) 2m20.972505172s ago: executing program 3 (id=2132): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x44b, 0x0, 0x0, {0x7a, 0x0, 0x0, 0x0, 0x0, 0x1008}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_USE_IFADDR={0x4}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x34041043}, 0x4004000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0x1, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}, {0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x50}, 0x1, 0x0, 0x0, 0x13d33d22cca65c15}, 0x4008840) r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) 2m20.966254112s ago: executing program 3 (id=2133): socket$inet6(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000d40)={&(0x7f0000000000)=ANY=[], 0x48}, 0x1, 0x0, 0x0, 0x4040014}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r0) lchown(&(0x7f0000000040)='.\x00', 0xee00, 0x0) 2m20.932690924s ago: executing program 3 (id=2134): syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x208a022, 0x0, 0x1, 0x0, &(0x7f0000000000)) mount(0x0, &(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) syz_clone(0x25000000, 0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 2m20.855777489s ago: executing program 3 (id=2135): syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000000c0)='./file0\x00', 0x204888, &(0x7f0000000740)=ANY=[@ANYBLOB="756e695f786c6174653d312c696f636861727365743d757466382c0097b75cbdde02821d0f899c2377ee9577397fc18b433d0c59e692b381740ca495e1c145c5922679338b5ff21c0653a98440a5725268a242c0263564f988d3c178704feaf8a412df818275708882ea9a4048c6e458a1f05b83f2e69b965b1df203b21de2b0ee375647f886a5310889982079aa7b1fb4eefe7f768eec58b19cf50faaf129503175f4262df740183df51d3641ff78b86127c1db8ef165bfa3bd20797fde6ff91a0e45d3d7c1c6d1ce0a72be8c1fdb00000000", @ANYRES16, @ANYRESDEC, @ANYRES8, @ANYRES32], 0x1, 0x343, &(0x7f0000000bc0)="$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") creat(&(0x7f0000000080)='./bus\x00', 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002240)='blkio.bfq.io_serviced\x00', 0x275a, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x101000, 0x108) getdents64(r0, &(0x7f0000000f80)=""/4096, 0x1000) 2m20.776657974s ago: executing program 3 (id=2136): bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000009c0)="d80000001e0081064e81f782db44b9040002080006007c09e8fe11a10a0015c00200142603600e120800080024000000a80009001100014003001000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x24000000) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a210, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x9e}, @exit], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x80) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34429, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080)}, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2m20.776520794s ago: executing program 32 (id=2136): bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000009c0)="d80000001e0081064e81f782db44b9040002080006007c09e8fe11a10a0015c00200142603600e120800080024000000a80009001100014003001000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x24000000) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a210, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x9e}, @exit], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x80) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34429, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080)}, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2m20.258924173s ago: executing program 2 (id=2142): r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x8, 0x3, 0x4c8, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3f8, 0xffffffff, 0xffffffff, 0x3f8, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'bridge0\x00'}, 0x0, 0x148, 0x170, 0x0, {}, [@common=@unspec=@helper={{0x48}}, @common=@inet=@hashlimit1={{0x58}, {'bond_slave_1\x00', {0x41, 0x1ff, 0x6, 0xb0e2, 0x10001, 0x84e, 0xfffffffb, 0x18, 0x8}, {0x1}}}]}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'erspan0\x00', 'gre0\x00', {0xff}, {}, 0x0, 0x0, 0x0, 0x4b}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'vcan0\x00', {0x3, 0x0, 0x41, 0xfffffffe, 0x2, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x528) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x80065c9}, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0xf8}, 0x1, 0x0, 0x0, 0x2040441}, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000980)=ANY=[@ANYBLOB="ffffffffffff6c7621d7cc9486dd60fec00000103a00fe880000000000000000000000000001ff020000000000000000000000000001"], 0x0) 2m19.955407452s ago: executing program 2 (id=2145): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 2m19.393975024s ago: executing program 2 (id=2151): socket$nl_route(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x5, 0x7, 0x7ffc0001}]}) semget$private(0x0, 0x4000, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) 2m19.29100468s ago: executing program 2 (id=2152): mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x23e9c9e, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x80, 0x0) 2m19.092336682s ago: executing program 2 (id=2155): r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) fchdir(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) pwrite64(r2, 0x0, 0x0, 0x4fed3) 2m18.360599455s ago: executing program 2 (id=2169): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) ppoll(&(0x7f0000000300)=[{0xffffffffffffffff, 0xc226}], 0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000020c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000002100)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0xfffb, 0x5, @empty, 0xa098}, {0xa, 0x4ea5, 0x9, @mcast1, 0x8}, r1, 0x8001}}, 0x48) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) 2m18.360491285s ago: executing program 33 (id=2169): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) ppoll(&(0x7f0000000300)=[{0xffffffffffffffff, 0xc226}], 0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000020c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000002100)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0xfffb, 0x5, @empty, 0xa098}, {0xa, 0x4ea5, 0x9, @mcast1, 0x8}, r1, 0x8001}}, 0x48) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) 2m9.803571124s ago: executing program 4 (id=2315): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[], 0xff2e) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) poll(&(0x7f0000000140)=[{r0, 0x2000}], 0x1, 0xdf9b) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) 2m8.810827022s ago: executing program 4 (id=2328): mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x1, 0x0, 0x88000000000007, 0x3) getpid() syz_open_dev$usbfs(0x0, 0x1ff, 0xa401) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs$pagemap(0x0, &(0x7f0000000040)) ioctl$PAGEMAP_SCAN(r0, 0xc0606610, &(0x7f0000000140)={0x60, 0x0, &(0x7f0000001000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x4, 0x0, 0x0, 0xbff, 0x1e, 0x0, 0x38, 0x6a}) 2m8.492641971s ago: executing program 4 (id=2331): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x210000, &(0x7f0000000440)={[{@max_batch_time={'max_batch_time', 0x3d, 0x479}}, {@noinit_itable}, {@jqfmt_vfsold}, {@nolazytime}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@resgid}, {@auto_da_alloc}, {@grpid}, {@jqfmt_vfsv0}]}, 0xfc, 0x58f, &(0x7f0000002d00)="$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") socketpair$unix(0x1, 0x5, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) keyctl$chown(0x4, 0x0, 0xee01, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) lsetxattr$security_selinux(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000100), &(0x7f0000000240)='system_u:object_r:public_content_t:s0\x00', 0x26, 0x2) 2m8.416217735s ago: executing program 4 (id=2332): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x200000005c832, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x200000, &(0x7f0000000040)={[{@grpquota}]}, 0x1, 0xbac, &(0x7f00000017c0)="$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") sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x20004000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001740)=@newqdisc={0x434, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdf8, {0x0, 0x0, 0x0, 0x0, {0x10}, {}, {0xa, 0x3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x408, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x1, 0xffffffff, 0x9, 0x8000, 0x3, 0x5, 0x5, 0xb762, 0x4, 0x7, 0x8, 0xf, 0x2, 0x80000001, 0x400, 0x7fc, 0xffff8000, 0x6, 0x401, 0x9, 0xb89, 0xffffe4f5, 0xd6, 0x4, 0xffff, 0x7, 0x0, 0x2, 0x101, 0x1, 0xfffffffc, 0x4, 0x1, 0x1, 0x9, 0xc, 0x20001000, 0x4, 0x2, 0x40000007, 0x4, 0x99, 0x9, 0x5, 0x6, 0x7, 0xfffffff7, 0x1, 0x2, 0x9, 0x9, 0x44, 0x8, 0x8, 0x1, 0x4, 0x7ff, 0x8, 0x7, 0x7ffffffe, 0x400, 0x8, 0xfffffa72, 0xcd, 0xffffff80, 0x80000000, 0xc, 0x4, 0x65, 0x91, 0x659, 0x9, 0xf, 0x9, 0xc28, 0x9, 0x7, 0x3, 0x401, 0x3, 0x2, 0xfffffffa, 0x1, 0x10001, 0x3, 0x1, 0x4, 0x8, 0x8, 0x7, 0x1, 0x1, 0x1, 0x7, 0x40, 0x7, 0x12, 0x8000, 0x1, 0x4dc, 0x80, 0x3, 0x7fffffff, 0xff, 0x9, 0xa7, 0xf, 0x2, 0x0, 0x3, 0x1000, 0x4, 0x401, 0x7, 0x80000000, 0xffff, 0x6, 0x5, 0x4, 0xffffffff, 0x80000000, 0x1966f9ab, 0x200, 0x20200, 0xed5, 0xfffffc00, 0x6, 0x4, 0x8, 0x485e, 0xa85, 0x80000040, 0x2, 0x7, 0x7, 0x102, 0x2d5421e8, 0x7, 0x10000, 0xffffffff, 0x6, 0x3ff, 0xf04, 0x0, 0x2, 0x5, 0xfffffc00, 0x5, 0x8d, 0x4, 0x401, 0x4, 0x9, 0x3, 0xfffffffb, 0x1, 0x0, 0x3, 0x2, 0x5, 0x8, 0x3, 0x0, 0x800, 0x2, 0x8, 0x7ff, 0x1, 0x9, 0x6, 0x5, 0x5, 0x4d15, 0x1ff, 0xfffff060, 0x3, 0x469, 0x3, 0x0, 0x200, 0x10000005, 0x7, 0x1, 0x8, 0x42ba, 0x4, 0x9, 0x3, 0x8, 0x8, 0x53, 0x6, 0x4, 0x400, 0x8000, 0x0, 0x2c310b18, 0xfff, 0x0, 0x3, 0xcd34, 0x9, 0x81, 0xdf3, 0x2, 0x7, 0x8, 0xfff, 0x9, 0x8000, 0x3, 0x8, 0x3, 0x9, 0x9a6, 0xe4cb, 0x402, 0x1, 0x1ff, 0x3e, 0x10, 0x1, 0x8, 0x0, 0x8, 0x0, 0x9, 0x0, 0x4, 0x10, 0x901, 0x5, 0x2, 0x7b, 0xfffffeff, 0x6, 0x6, 0xc, 0x1000, 0x9, 0x9, 0xe6, 0xab, 0x400, 0x7fffffff, 0xed, 0x7ff, 0xd83, 0x68, 0x80000001, 0x4, 0x1, 0x6, 0x200, 0x2]}]}}]}, 0x434}, 0x1, 0x0, 0x0, 0x40098}, 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x64842, 0x86) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x140000}], 0x14, 0x7800, 0x0, 0x3) 2m8.220599167s ago: executing program 4 (id=2334): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1f0719, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x1, @perf_config_ext={0xffff, 0x8000000}, 0x6025, 0x4005, 0x6d5, 0x3, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x31, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x801) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 2m7.559922155s ago: executing program 4 (id=2336): socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000140)='./file0\x00', 0x81c04a, &(0x7f00000003c0)=ANY=[@ANYBLOB="73686f72746e616d653d6d697865642c696f636861727365743d69736f383835392d312c666d61736b3d30303030303030303030303030303030303030303036362c6e6f6e756d7461696c3d302c756e695f786c6174653d302c666d61736b3d30303030303030303030303030303030303030303030332c73686f72746e616d653d6c6f7765722c756e695f786c6174653d302c757466383d312c636865636b3d7374726963742c757466383d302c756e695f786c6174653d312c756e695f786c6174653d302c666c7573682c757466383d302c726f6469722c747a3d5554432c00e696e27e745267d0e7f7d60cf64c4d116172285e0a94b37c3f04b4e454913b1615b6c103a4be033c3f79c81a7a0dc9f3282eb2b984b8df829f11f7b15ceaa2ddb341548691e92d41d923144fa5f6aa8b37c7698e74a04d87cb16f3c338160646d1719f9aa1097cb78032fa4c9c60c14840662537510c0ac9f95a646f5231c0c9eb096b898803099b3050797137354ed2fb2a3dd97ad790f0758b4561eb7180b4b366c9ac840ca3d57727827ab961af0bb24ac6b14796d3bedfa4addb1c2f59217a563ca0a3729d45669905a6f0f3dbf3fd22ab36dfe7cf80913ecb4656ca"], 0x6, 0x2df, &(0x7f0000000880)="$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") r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x90) fsync(r0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x804810, &(0x7f0000000a40), 0x26, 0x75e, &(0x7f0000001280)="$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") perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x75, 0x1, 0x0, 0x0, 0x0, 0x7ff5, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_bp={0x0, 0x6}, 0x14d03, 0x7, 0xfffffbff, 0x7, 0x2, 0x1, 0x6, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(&(0x7f0000000240)='./bus\x00', 0x145142, 0x0) 2m6.376532154s ago: executing program 6 (id=2347): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffd, 0x1, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x4, 0x0, &(0x7f00000002c0)="0000ffff", 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f00000002c0)) 2m6.260584231s ago: executing program 6 (id=2349): r0 = socket$kcm(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x400, 0x4556, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x3}, 0x18, 0x0, 0xfffffffe, 0x1, 0x5, 0x2, 0x103, 0x0, 0x2, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1b) r1 = socket$kcm(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1e000000000000000700400008"], 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) sendmsg$inet(r0, &(0x7f0000000000)={&(0x7f0000001340)={0x2, 0x6, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000001580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x41}, @multicast1}}}], 0x20}, 0x8000) sendmsg$inet(r0, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x0) 2m6.180439756s ago: executing program 6 (id=2351): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x9001, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x401, 0x20005, 0x572, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)={0x0, 0xc, 0x0, 0x0, 0xe, "810000cc2b000000000000fa25ffff00ffffff"}) r1 = syz_open_pts(r0, 0x141601) fcntl$setstatus(r1, 0x4, 0x102800) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x19) 2m6.117186989s ago: executing program 6 (id=2355): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000800)={[{@fat=@time_offset={'time_offset', 0x3d, 0x3bf}}, {@shortname_winnt}, {@numtail}, {@fat=@nfs_nostale_ro}, {@uni_xlate}, {@uni_xlateno}, {@shortname_winnt}, {@fat=@discard}, {@fat=@debug}, {@shortname_mixed}, {@fat=@quiet}, {@utf8no}]}, 0x0, 0x2a5, &(0x7f0000000540)="$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") mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000500)='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1333404, 0x0) mount$bind(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x11080, 0x0) mount$bind(&(0x7f0000000240)='.\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1005848, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') pread64(r0, &(0x7f0000001900)=""/4079, 0xfef, 0x66) 2m6.023069775s ago: executing program 6 (id=2356): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xac}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 2m5.728412021s ago: executing program 6 (id=2357): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000300)='yeah', 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0xffffffffffffffef, 0x0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) 2m5.711408873s ago: executing program 34 (id=2357): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000300)='yeah', 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0xffffffffffffffef, 0x0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) 2m3.36140203s ago: executing program 0 (id=2393): syz_mount_image$vfat(&(0x7f0000000200), &(0x7f00000000c0)='./file0\x00', 0x204888, &(0x7f0000000740)=ANY=[@ANYBLOB="756e695f786c6174653d312c696f636861727365743d757466382c0097b75cbdde02821d0f899c2377ee9577397fc18b433d0c59e692b381740ca495e1c145c5922679338b5ff21c0653a98440a5725268a242c0263564f988d3c178704feaf8a412df818275708882ea9a4048c6e458a1f05b83f2e69b965b1df203b21de2b0ee375647f886a5310889982079aa7b1fb4eefe7f768eec58b19cf50faaf129503175f4262df740183df51d3641ff78b86127c1db8ef165bfa3bd20797fde6ff91a0e45d3d7c1c6d1ce0a72be8c1fdb00000000", @ANYRES16, @ANYRESDEC, @ANYRES8, @ANYRES32], 0x1, 0x343, &(0x7f0000000bc0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) openat2(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup\x00', &(0x7f00000005c0)={0x142, 0x4, 0x1}, 0x18) r0 = open(&(0x7f0000000140)='.\x00', 0x8000, 0x112) getdents(r0, &(0x7f0000001fc0)=""/184, 0xb8) getdents(r0, &(0x7f0000001fc0)=""/184, 0xb8) 2m3.293851614s ago: executing program 0 (id=2394): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x23}, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "7b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af", "584cbf2649a50f2dbc43efa8698d0a881c51852e4451b57d037ad3c045942824251d7d17b5191584bcd4fbe40a23424d", "bcfd56f1375461caaa2f19935e6996c7096ffeeb0300000000000064", {"9a3bfbc1f39cb307b3472eb9cdb042d2", "643fcbb2c5a57df67d544af6e8dafe09"}}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x41000}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x7}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmmsg(r0, &(0x7f0000002a80)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000017c0)=""/170, 0xaa}, {0x0}], 0x2}, 0xf}], 0x1, 0x40000000, 0x0) 2m2.420136685s ago: executing program 0 (id=2399): r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = syz_io_uring_setup(0x5ce, &(0x7f0000000480)={0x0, 0x9cd4, 0x80, 0x0, 0x34f, 0x0, r0}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x82e, 0x0, 0x0, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0xb2752a96f73d6e14, 0x0, 0x0, 0x0, 0x23456}) io_uring_enter(r1, 0x47bc, 0x3000000, 0x0, 0x0, 0x0) 2m2.299841332s ago: executing program 0 (id=2401): mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x22fb88e, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x28a5291, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x3000005, 0x0) 2m2.261588755s ago: executing program 0 (id=2402): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x1022002, 0x0) r1 = dup(r0) r2 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) 2m1.224656264s ago: executing program 0 (id=2416): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/current\x00') perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1f071f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x1, 0x9}, 0xa022, 0x4005, 0xb, 0x3, 0xfff, 0x20005, 0x8, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) writev(r0, &(0x7f00000003c0), 0x100000000000022d) 2m1.220056765s ago: executing program 35 (id=2416): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/current\x00') perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1f071f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x1, 0x9}, 0xa022, 0x4005, 0xb, 0x3, 0xfff, 0x20005, 0x8, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) writev(r0, &(0x7f00000003c0), 0x100000000000022d) 1m52.520512363s ago: executing program 36 (id=2336): socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000140)='./file0\x00', 0x81c04a, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x6, 0x2df, &(0x7f0000000880)="$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") r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x90) fsync(r0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x804810, &(0x7f0000000a40), 0x26, 0x75e, &(0x7f0000001280)="$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") perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x75, 0x1, 0x0, 0x0, 0x0, 0x7ff5, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_bp={0x0, 0x6}, 0x14d03, 0x7, 0xfffffbff, 0x7, 0x2, 0x1, 0x6, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(&(0x7f0000000240)='./bus\x00', 0x145142, 0x0) 7.800604685s ago: executing program 5 (id=3556): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x5, 0xa1551, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x1, @perf_bp={0x0, 0x4}, 0x101280, 0x26f, 0x6, 0x6, 0x4, 0x20005, 0xa5b, 0x0, 0x0, 0x0, 0x20000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_procfs$pagemap(0x0, &(0x7f0000000240)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x8, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x4, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x19, 0xa, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x100451, 0x0, 0x7fffffff, 0x7, 0x9, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='smaps\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000540)={0x0, 0x1f, &(0x7f0000000500)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001400000008000200fc00000018000180140002006e657464657673696d300000000000000800050000fcffff08000900fc000000080011000700000008000e00800000000800", @ANYRES32=r0], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 7.707548671s ago: executing program 5 (id=3559): r0 = socket(0xa, 0x5, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x4bd1bfda, 0x0, 0x6}, 0x1c) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000500000000000e1ff95000000000000002ba7e1d30cb599e83f040000f300000000bd01212fb56f040026fbfefc41056bd8174b79ed317142fa9ea4158123751c5c652fbc1626cca2a2ad75806150ae0209e62f51ee988e6e06c8206ac6939fc404004900c788b277be1cb79b0a4dcf23d410f6accd3641110bec4e90a634199e07f8f6eb968f200e011ea665c45a34b8580218ce740068720000074e8b1715807ea0ca469e468eea3fd2f73902ebcfcf49822775985bf313405b367e81c700000040000000000200000000005335000000143ea70c2ab40c7cb70cc8943a6d60d7c4900282e147d08e0af4b29df814f5691db43a5c00000004000000000089faff01210cce39bf405f1e846c12423a164a330100846f26ad03dd65873d9f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d6155102b1ced1e8019e63c850af895abba14f6fbd7fb5e2a431ab914040000000000010092c9f4609646b6c5c29647d2f950a959cf9938d6dfcb8ed2cbdc2ba9d580609e31c3fa90812a533ce206e7e57a79d6fce424c2204dd418c005479ecab19bdfb15a32a4fd67ce446adb431d07db79240acaf091231b986e77d05d988d6efdffdf48dca02113a38300cabf2b5543ffc166955709009e000000000061629d1822f720ec23812770d72c700a44e113d17088fdd00600000f7889b8c7044f56ff030000000000006cd4970400cac6f45a6922ded2e29514af463f747c08f4010586903500000000000000000000be34cf0f9d640dd782ac0cbc46903243d0d0f4bc7f253d0500000032daaf281c450e64c33aac8f23e7d1c94c4505a9839688b008c370494f6734b771546d9552d3bb2da0d000000000000000009125c97f0400f5e1671bc5eb7739daa7820a91cb0e732df2ae0000c747e00a4fbfe8942fa859cd28bdaa1509309926c77fbcb15ec58b42b400005a6b649dd5f13cd776e6c7c4b5c4b0de20e033b378553ead4c8cc530b62c36364e6505992209bdbc6203da7a3797246a6adef071102f0aa2c40095ddd05176f5cb8bd99e1ba0f9568f3e3876bba7bf973334e7919a080000000000000004fb996ad919f7e9672ce107000000ad882f2aead166c94500be902ee7dabc768eb9ec13f334aae90981ecaf5f744f22f2e45afe2c9e8632276cffe5f1fc215c0797d0244cf1ce269d10525745caaa3f77d1b80116cb9a38400242010000000100000091a0116f4693133138583da5e10b434697b0443b7b4ddfb3ace29e16e5a881336aad0974269a1025e2a9a135c0508af1aec2926627b43bba1229a7466bdca64f514b7911458da09fe8681916d408d753226a83ae2434ccd3fc508216aea86833030f569d61dc998620fcf4eeb92e7bc511df63c53b82514493b8f3c74f44ba184d40e87612024da1a1ebe316923865f037c01d71b5de81121046d84b18acb5cbea7eecad9b6dd46ed83515cd9f140e5f00019be25b5910a3193e90be231a05fd82e6003969c31082ff1d0eb50a04d14644234828cbb5aaa0ece702abdd425fa25ae04a2315c89064df633700000000d9e5953ea67310993d01000000000000003ac753358791b1490273ca535e05b11d815237743a5b79ad45de2a3c91257f02c2f30f5513662809073710937ed0055b238f466e1442f8ec7a5b394228035039ceeb452dca75f9ff5332b4c4777a3d19c158a0aa9a821667c68549e9da89ad4274ce2d3d7619936768a84a1465fff4eedba55955434f132ab7b884057aeb68f3d675a79907a72ace70902459f6950a06a03507838231a335ae759ed25534f2e90a7def4b3d4af7fd47ab1a701e4b7a7dfc1d12775ed0a31bc7b5855880aa767e68196c7aa5ac115724b6cb8fcebb67719eccd87b06b38566cf61ad2f307a79d2ce9801837bf0bd3af0271de700eef2795d28cb0017000000000000000000e052d93194121b774d21a0317d0346078400004652c769fd3d3e661a2fb511164f1502ab2ac4eb3f19c042163e0bdb88b82de384a8055e8b1e24294b0546cce481ff5618b7b9585dbb64d66debf219fa479abf22f3d64fe82e466ea6f27859946e72f80bb1c9cfcde57b79625e2979fe689a5a246cbbd488f43f46b2536f175f46dfb27d5229467270246ab53616c46edf34c559d3de0c59ca3305e66825715e5e4cd5b54c1b05c09f04337a76a30373baac3ecec91fd546eb7c32dbecb18a308a0004be94dfab28c2a51dc816df0000000000c12254f041804f7f7074356789b1d4dd55f3e045a48241a4ce04d06acb2cf11eab759ba78da5da0f26126d4cf2c73e5f94030000040000000000000000c301985d603403592486204054be3fdda91f9e315886941928e5a8bc1a00e69a98c0a8f7192f6ee93cc4124cf4e7610915efc08c834a44e1d685d6835a40b5bc615949cbcd98d044fa492aa38717481455e86dcd7816ad8940bd1995369d89ae6eadeb9117e8b94ab422c8d62f858875dccdbc89572231ef5d6df6a9c55f8df763c7c64da7cc017e1e3f5cd4cb9fe6d19b11d4d38239d318016e622b9683b7e46be64dc097982e23462392a0cd05afb2e060fd42ef00dfbd057311aab94f307d10c7a1af0d8e5a0fcb547475d13c0000000000000000f1cc97103d714d1abb901f866d9d629b4fb185f45790517c4a0f5c6a5024e3359e8d83e3f6edf9e2afb5ab59c7b2b45cfb0a3c1303a98e4ed531ac11cca1cd744b431de74c7cd6533adaa8ec749061b2959d53da626aa189781dc1be4d5c81aebc0cada819895b377d6cf0a7878ba99864ae84464744c605646caf2e06b13eba7ba10acf77d91b2297e9573abb0a4da534d735a223626402b308daf7835780fa6f4e410000000000fb00000000000000000000b14952139bd4bdbccc5e334c49584655c4fce8c5bb7c54664aef6d780100358aa54b4b49926c4be9ee4659153d9fa95d07cc4efdab2c5f4503148d0255d0b748366dafe042d78479c21d832e1431ed6d646d13e8e7230300920a5642bbed1dee9b46b6f02e572024ccf3c8edd82660e5d74c52be71d780c300000000000000000000000000000000000044ff72f96f084f4b6cdcb1b4a9d8e9f99f1b85497d0c3df704c8a0034c09caeeb0e34799b755649883539258a7b33dcef15d8fd1953ebaaa3cff81a0de7a05a440f20f6b273ceb8678f10378b670be7504dabd1471355d853292775d0366891f0bcf0a6087ed4f1f25ef52394db3e9d8318bbb9baff3db95bfd68a08ded502cc08a485c804e4fd107a7ca2a64ca081c6b2f7b895cdf98b763ebab9451c65eced6f5f97a541210806d885762ac3150225036c7eccd7a05593abd963f9a02df58085115e54f675e6a08d25b5722cabf989b4bbc562e073b81bae61f05c5e1f90e021340b60cc5fb8fdb09b6d20b0d87a6ed800000000000000000000000000000000006cc6f64f583a26a78f7f417f66c0af32f5194ddfce51e5aff28f621bb2fd2a5ab719823488d6e869b08d3d4ac7950c60144cf77437e29895a23282e3c65e015d1c334832a90ee77d93596e3f12e9ca8c67c7f3c9b66c9cb03edec184ad1d9544c7a3be250e471dca00000078544d79c0efe4094e561eeb26ee4c81106d03c004bc1589ef6e13648999c8735e2634e89aaa90c571fa3c07238697b1db783c52715055445e96995fe3273b0346b03fc742c06aa3947e0d9cf0c99b5e245ede85893112deea8bd3355a32ec15e1242f170a51f28cea4105541e96a52da4984d26bd29cb0623f00c6b0a4c00ad406d729babc9d1550a683c349017a340444000000000000000000000920ca49f7cc8194aaebdcae5a62bb7587b57f41f1c2034911f23e6bd0291b3319f03a0a15dea685a8ab75b3c60391afa5483231305402b52a8f9863800f127d6b4518f73a847ca583e855d70c6a4a53f61ad753d5e740db44afd32b019d9e8b41361c2c104fe52837a19dd6952fe2724c0105ab158a54a6a73000000000000000000"], &(0x7f0000000140)='GPL\x00'}, 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000002c0)=0x4, 0x4) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r4) r6 = socket$unix(0x1, 0x1, 0x0) r7 = socket$kcm(0x11, 0x3, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r8) socket$unix(0x1, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000380)=@xdp={0x2c, 0x0, r9, 0x19}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000440)="83", 0x1}], 0x1}, 0x5) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x28, 0x8, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x19dda569704b7d96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x80000000, 0xfffffffffffffff0}, 0x0, 0x10000, 0x8, 0x7, 0x8, 0x0, 0xb, 0x0, 0x0, 0x0, 0x20000006}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) close(0x3) sendmsg$inet_sctp(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@authinfo={0x12, 0x84, 0x6, {0x3}}], 0x28, 0x4000000}, 0x8010) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000140)={'ip6gre0\x00', 0x0, 0x29, 0x2, 0xe, 0x9f, 0x20, @empty, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7, 0x7860, 0x3, 0x2df4}}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @local, @rand_addr=' \x01\x00', 0x1, 0xf71b, 0x6, 0x0, 0x3, 0x240, r10}) 7.484632854s ago: executing program 5 (id=3560): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x24020000) mount_setattr(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x8000, &(0x7f0000001dc0)={0xb, 0x0, 0x100000}, 0x20) r2 = syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_pidfd_open(r2, 0x0) setns(r3, 0x24020000) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) socket(0xa, 0x5, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) fgetxattr(r4, &(0x7f0000000080)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000280)=""/157, 0x9d) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000006a000105fefdfffffedbdf25000000000000000008000500297837798cc37b8351ed344dc01bb4bfb695bc111ded38c5e7f0258c9c01e86bde790ac3131f0f000000000000000000", @ANYRES32=0x0, @ANYBLOB], 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 7.465077464s ago: executing program 5 (id=3561): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) syz_io_uring_setup(0x263f, &(0x7f0000000840)={0x0, 0xb8da, 0x186a}, 0x0, 0x0) 7.225061239s ago: executing program 5 (id=3565): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket(0x400000000010, 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r4) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000a00)=@newtfilter={0x3c, 0x2c, 0xd27, 0x70bd28, 0x25dfdc00, {0x0, 0x0, 0x0, 0x0, {0x0, 0x4}, {}, {0x8, 0xfff2}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0xb, 0xf}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) setsockopt$sock_attach_bpf(r3, 0x107, 0xf, &(0x7f0000000600), 0x56) sendmsg$kcm(r3, &(0x7f0000000280)={&(0x7f0000000380)=@xdp={0x2c, 0x0, r5, 0x3e}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000180)="27030200000214000e00002fb96dffff1144ee163cddcb000000800000827600000000000000", 0x26}, {&(0x7f00000004c0)="f058050000007f8f", 0x8}], 0x2}, 0x5) 6.699109619s ago: executing program 9 (id=3573): r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@ipv6_newrule={0x88, 0x20, 0x100, 0x70bd29, 0x25dfdbfb, {0xa, 0x14, 0x14, 0x33, 0x3c, 0x0, 0x0, 0x7, 0xa}, [@FRA_SRC={0x14, 0x2, @loopback}, @FRA_SRC={0x14, 0x2, @mcast1}, @FRA_SRC={0x14, 0x2, @empty}, @FRA_DST={0x14, 0x1, @private1}, @FIB_RULE_POLICY=@FRA_SPORT_RANGE={0x8, 0x17, {0x4e21, 0x4e23}}, @FRA_DST={0x14, 0x1, @remote}]}, 0x88}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000040)="b64b6779e728a585fc6d831c9c111ee3bf867c7fa20663508d961b5b0bc1d4eded804b84c8ee0b5e7b55af44aa", 0x0, 0x0, 0x0}, 0x38) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a20000000000a01080000000000000000010000090900010073797a3100000000d0000000030a030000060000000000000100000a0900010073797a31000000000900030073797a3000000000a4000300"], 0x118}, 0x1, 0x0, 0x0, 0x240401d4}, 0x240408d0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) r2 = syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x9, 0xa1, 0x3, 0x8001, 0x1, 0x54efeee069b9917f, 0x8, 'syz1\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="14000000000a4c000000060a09040000000000000000024f2088b93d9a1c920001800b00010072656a6500010900010073797a30000000000900020073797a3200000000140000001100010000000000000000000000000a00"/116], 0x74}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000193c0)=ANY=[@ANYBLOB="5c010000130077b30afacb7cd95e6c0000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="050027000000000008008500", @ANYRES32=0x0, @ANYBLOB="140003006d6163766c616e31000000000000000008000a00", @ANYRES32=r3, @ANYBLOB="e8001a8048000a8014000700ff02000000000000000000000000000114000700fe8000000000000000000000000000aa050008000000000014000700fe8000000000000000000000000000bb9c00028010010180bafc0000000000000400070040ff0700100002800c000180080000000000000018000a80140007000000000000000000000000000000000144000a80050008000000000014000700fc020000000000000000000000000000140007000000000000000000000000000000000100000700fe80000000000000000000000000000005000800000000000400070004000700100002800c0001"], 0x15c}}, 0x0) 6.560670837s ago: executing program 9 (id=3574): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="380000002000010027bd7000fcdbdf250a002040000000070000000014000200fe880000200000000000000000000401080018004e"], 0x38}, 0x1, 0x0, 0x0, 0x24048844}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[], 0x5c}}, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x11) 5.505316309s ago: executing program 7 (id=3577): fchdir(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x61, 0x8e}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x31, &(0x7f0000000100)=0xffff, 0x4) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2042, 0x0) ioctl$AUTOFS_IOC_FAIL(r3, 0x4c80, 0x7000000) socketpair$unix(0x1, 0x3, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x1e, 0x8, 0x0, 0x0, @dev, @dev={0xfe, 0x80, '\x00', 0x37}, 0x10, 0x0, 0x0, 0x5}}) syz_usb_connect$hid(0x0, 0x36, 0x0, 0x0) syz_io_uring_setup(0x8d2, 0x0, &(0x7f0000000040), 0x0) 3.212221303s ago: executing program 1 (id=3591): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="50000000020605"], 0x50}}, 0x0) (fail_nth: 4) 2.936368359s ago: executing program 1 (id=3592): r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1f0519, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x3, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4008, 0x2) 2.814971376s ago: executing program 1 (id=3594): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) socket(0x27, 0x6, 0x2) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) close(0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x2c, &(0x7f0000000080)=[@in={0x2, 0x4e22, @rand_addr=0x64010100}, @in6={0xa, 0x4e22, 0x9c, @private1={0xfc, 0x1, '\x00', 0x1}, 0x6}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7a, &(0x7f0000000340)={r2, @in6={{0xa, 0x3, 0x4, @mcast1}}}, &(0x7f0000000040)=0x84) r3 = dup(r0) r4 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e23, @empty}}, 0x8003, 0xbffc, 0xe652, 0x2, 0x4, 0x8, 0xff}, 0x9c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0xce20, 0xfffffffc, @empty, 0x2d}}, 0x7, 0x1, 0xf06, 0x3, 0xb4, 0x7f, 0x9}, 0x9c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e60, 0xeffffff2, @empty, 0x5}}, 0x10001fc, 0x806, 0xffff1896, 0x3, 0x26, 0xffffffb9, 0x1a}, 0x9c) 2.766013788s ago: executing program 1 (id=3595): r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1f0519, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x18000}, 0x102004, 0x4005, 0xb, 0x3, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefffffd, 0x1, @perf_bp={0x0, 0x8}, 0x120, 0x10000, 0x3, 0x0, 0x8, 0x20009, 0xb, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r0, 0x2) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x12, 0x2, 0x6, 0x9, 0x40, 0x8000}, 0x0, &(0x7f0000000240)={0x1f, 0x112, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000004}, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000000)={0x1f}, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="300000001000010025bd7000fddbdf2500000000", @ANYRES32, @ANYBLOB="10085fde03040000050041"], 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) r4 = syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000680)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f0000000000)=ANY=[], 0x1, 0x1280, &(0x7f0000000780)="$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") sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x5, 0x4, 0x8001, 0x0, 0x80000000b49, 0x8, 0x4, 0xa, 0x3}, 0x0) r5 = open(&(0x7f0000000240)='./file1\x00', 0x105342, 0x20) ioprio_set$uid(0x3, 0x0, 0x0) sendfile(r5, r5, 0x0, 0x800000009) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r7}, 0xc) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) file_getattr(r4, &(0x7f0000001a00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000100), 0x18, 0x1000) r8 = semget(0x0, 0x3, 0x40) semtimedop(r8, &(0x7f0000000080)=[{0x0, 0x6}, {0x4, 0x8000, 0x1800}, {0x0, 0x5, 0x1000}, {0x0, 0x1, 0x1800}, {0x3, 0xfff9, 0x800}], 0x5, &(0x7f00000000c0)={0x0, 0x989680}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x20000000ec071, 0xffffffffffffffff, 0x0) r9 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r11 = epoll_create(0x1) kcmp$KCMP_EPOLL_TFD(r9, r9, 0x7, r10, &(0x7f0000000040)={r11, 0xffffffffffffffff, 0x4000ac}) 2.337736614s ago: executing program 7 (id=3596): pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x20) splice(0xffffffffffffffff, &(0x7f0000000040), r0, 0x0, 0x807, 0x0) 2.268343978s ago: executing program 7 (id=3597): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) mount$bind(0x0, 0x0, 0x0, 0x2125099, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 2) 2.082594589s ago: executing program 7 (id=3598): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="440000001300290a000000000000000007000000", @ANYRES32=r4, @ANYBLOB="00000000000000001c001a800800028008000200080000003e120000080002001040e5"], 0x44}}, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmmsg(r5, 0x0, 0x0, 0x0) 1.973865185s ago: executing program 8 (id=3599): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8e}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, 0x0, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000100)={0x0, 'erspan0\x00', {0x1}, 0x26}) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000c40)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0}, 0x50) write$cgroup_int(r6, &(0x7f0000000340)=0x1, 0x12) 1.631293115s ago: executing program 8 (id=3600): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=ANY=[@ANYBLOB="09000000040000000400000007"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={0x0, r2}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000380)={'#! ', '', [], 0xa, "e2f0791fd1af18d7b66e734f6e0f9728c6fe7548726f3c644df29c78cf1f25b228b67c9d65fb9e32213a3e6ec341cbc915a7176798a12ca65751d97a27814bf7abbc3718df6f7ad531dc0a"}, 0x4f) semop(0x0, &(0x7f0000000080)=[{0x1, 0x7, 0x1c00}, {0x1, 0x0, 0x1000}], 0x2) semop(0x0, &(0x7f0000000040)=[{0x2, 0xbbdd, 0x1000}], 0x1) semctl$GETZCNT(0x0, 0x1, 0xf, 0x0) 1.159066662s ago: executing program 7 (id=3601): sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="fd0000100000000000ec5fb8caa6"], 0x14}}, 0x0) r0 = epoll_create1(0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x20000014}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0xa0000001}) ppoll(&(0x7f0000000200)=[{r1, 0x109}], 0x1, 0x0, 0x0, 0x0) epoll_wait(r1, &(0x7f0000000140)=[{}], 0x1, 0xffffffff) socket(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a14000000000a0104002000000000000001000000000000000000000009140000001100010000000000f70000000a08000a00"/80], 0x50}, 0x1, 0x0, 0x0, 0x8045}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) unshare(0x22020600) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000940)=@newtfilter={0x38, 0x2c, 0xd27, 0x70bd25, 0xa000, {0x0, 0x0, 0x0, 0x0, {0xe, 0x7}, {}, {0x7, 0x2}}, [@filter_kind_options=@f_flower={{0xb}, {0x8, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS_MASK={0x4}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000900)=ANY=[@ANYBLOB="8c0000001000370400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000006c0012800e00010069703665727370616e000000580002801400060020010000000000000000000000000002050016000100000014000700fc0200000000000000000000000000000400120005000800", @ANYRES32=0x0, @ANYBLOB="080004"], 0x8c}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r6 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=ANY=[@ANYBLOB="4400000013002901800000000000000007000000", @ANYRES32=r5, @ANYBLOB="00000000000000001c001a800800028004000500080000003e"], 0x44}}, 0x0) 1.03303717s ago: executing program 1 (id=3602): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="440000001300290a000000000000000007000000", @ANYRES32=r3, @ANYBLOB="00000000000000001c001a800800028008000200080000003e120000080002001040e5"], 0x44}}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmmsg(r4, &(0x7f0000000000), 0x4000000000001f2, 0x0) 806.569363ms ago: executing program 5 (id=3565): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket(0x400000000010, 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r4) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000a00)=@newtfilter={0x3c, 0x2c, 0xd27, 0x70bd28, 0x25dfdc00, {0x0, 0x0, 0x0, 0x0, {0x0, 0x4}, {}, {0x8, 0xfff2}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0xb, 0xf}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) setsockopt$sock_attach_bpf(r3, 0x107, 0xf, &(0x7f0000000600), 0x56) sendmsg$kcm(r3, &(0x7f0000000280)={&(0x7f0000000380)=@xdp={0x2c, 0x0, r5, 0x3e}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000180)="27030200000214000e00002fb96dffff1144ee163cddcb000000800000827600000000000000", 0x26}, {&(0x7f00000004c0)="f058050000007f8f", 0x8}], 0x2}, 0x5) 760.760556ms ago: executing program 1 (id=3603): sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="fd0000100000000000ec5fb8caa6"], 0x14}}, 0x0) r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)={0x20000014}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)={0xa0000001}) ppoll(&(0x7f0000000200)=[{r2, 0x109}], 0x1, 0x0, 0x0, 0x0) epoll_wait(r2, &(0x7f0000000140)=[{}], 0x1, 0xffffffff) socket(0x10, 0x3, 0x0) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x5, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a14000000000a0104002000000000000001000000000000000000000009140000001100010000000000f70000000a08000a00"/80], 0x50}, 0x1, 0x0, 0x0, 0x8045}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) unshare(0x22020600) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000940)=@newtfilter={0x38, 0x2c, 0xd27, 0x70bd25, 0xa000, {0x0, 0x0, 0x0, 0x0, {0xe, 0x7}, {}, {0x7, 0x2}}, [@filter_kind_options=@f_flower={{0xb}, {0x8, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS_MASK={0x4}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000900)=ANY=[@ANYBLOB="8c0000001000370400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000006c0012800e00010069703665727370616e000000580002801400060020010000000000000000000000000002050016000100000014000700fc0200000000000000000000000000000400120005000800", @ANYRES32=0x0, @ANYBLOB="080004"], 0x8c}}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r7 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=ANY=[@ANYBLOB="4400000013002901800000000000000007000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c001a800800028004000500080000003e"], 0x44}}, 0x0) 754.239706ms ago: executing program 8 (id=3604): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="440000001300290a000000000000000007000000", @ANYRES32=r2, @ANYBLOB="00000000000000001c001a800800028008000200080000003e120000080002001040e5"], 0x44}}, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f0000000000), 0x4000000000001f2, 0x0) 493.388752ms ago: executing program 8 (id=3605): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xf0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="50000000020605"], 0x50}}, 0x0) 467.473963ms ago: executing program 9 (id=3574): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="380000002000010027bd7000fcdbdf250a002040000000070000000014000200fe880000200000000000000000000401080018004e"], 0x38}, 0x1, 0x0, 0x0, 0x24048844}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[], 0x5c}}, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x11) 420.451756ms ago: executing program 9 (id=3606): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x15, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d80000000001010400000000000000000a0000003c0001802c00018014000300000000f8f1000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002802c00018014000300fe8000000000000000000000000000aa14000400fe8000000000000000000000000000000c0002800500010000000000080007400000000044000e802c0001801400030000000000000000000000000000000000140004000000000000000040000400000c000280050001"], 0xd8}}, 0x0) 413.971206ms ago: executing program 8 (id=3607): pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x20) splice(0xffffffffffffffff, &(0x7f0000000040), r0, 0x0, 0x807, 0x0) 376.598388ms ago: executing program 9 (id=3608): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x2404c8c0) r1 = socket(0x10, 0x80003, 0x0) write(r1, &(0x7f0000000000)="240000001a005f0214f9f407000904000a000000fe0000000000000008000f00fd000000", 0x85) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0x1, 0x70bd25, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x6293a, 0xb}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x40845}, 0x4000000) socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400), r1) 324.570991ms ago: executing program 8 (id=3609): r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x4002, 0xd) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x34, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_COALESCE_PKT_RATE_HIGH={0x8, 0x12, 0x9}, @ETHTOOL_A_COALESCE_RX_USECS={0x8, 0x2, 0x7}, @ETHTOOL_A_COALESCE_USE_ADAPTIVE_TX={0x5, 0xc, 0x1}, @ETHTOOL_A_COALESCE_TX_USECS={0x8, 0x6, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x2d, 'freezer'}, {0x2b, 'cpuset'}, {0x2b, 'rlimit'}, {0x2d, 'freezer'}, {0x2d, 'net'}, {0x2b, 'pids'}, {0x2d, 'blkio'}, {0x2b, 'net'}]}, 0x39) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd07, 0x81}, 0x100b28, 0xa, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x8000, 0x0, 0xff, 0x2) mbind(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4003, &(0x7f0000000c00)=0xc, 0x6, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) 285.703994ms ago: executing program 7 (id=3610): syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x8d8, &(0x7f0000000080), 0x3, 0x42f, &(0x7f0000000940)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f0000000140)='2', 0x1, 0x8080c61) socket(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000540)=[@in={0x2, 0x4e20, @multicast1}]}, &(0x7f00000007c0)=0x10) r1 = open(&(0x7f0000000000)='./file1\x00', 0x143142, 0x80) sendfile(r1, r1, 0x0, 0x1000000201005) r2 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x50) sendfile(r2, r2, 0x0, 0x800000009) keyctl$chown(0x4, 0x0, 0xee01, 0xee00) r3 = creat(&(0x7f0000000200)='./file1\x00', 0x12e) mount$9p_fd(0x0, 0x0, &(0x7f0000000040), 0x200000, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66642c0500646e6f3d704f8cc6e98ce8d3102c1228201c532e4c1daba94c6825ea0e56f0bc246623587c79b0a44c11b2", @ANYRESHEX=r3, @ANYBLOB=',wfdno', @ANYRESHEX=r3]) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000400)={0x0, 0xa}, &(0x7f0000000440)=0x8) 0s ago: executing program 9 (id=3611): r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) io_uring_setup(0x4e60, &(0x7f00000003c0)={0x0, 0xcba9, 0x40, 0x1, 0x2c2, 0x0, r0}) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000180)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, 0x0) setresuid(r1, 0x0, r2) r3 = socket$tipc(0x1e, 0x5, 0x0) r4 = syz_mount_image$ext4(&(0x7f00000005c0)='ext4\x00', &(0x7f0000000600)='./file1\x00', 0x0, &(0x7f00000000c0)={[{@nojournal_checksum}]}, 0x1, 0x5bc, &(0x7f0000001440)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000000), 0x208e24b) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, 0x0, 0x8, 0x0) mbind(&(0x7f0000673000/0x1000)=nil, 0x1000, 0x3, &(0x7f00000009c0)=0x7, 0x3, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r6, &(0x7f0000000140)='2', 0x1, 0x8000c61) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r6, 0xc018937e, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r4}, './file1\x00'}) open_tree(r7, &(0x7f0000000240)='./file0\x00', 0x1801) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x41}, 0x10) bind$tipc(r3, 0x0, 0x0) r8 = socket$tipc(0x1e, 0x2, 0x0) sendmsg$tipc(r8, &(0x7f0000000340)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x3, {{0x41, 0x1}}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xaffa9c0077a76a7d) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1018e58, &(0x7f00000006c0)={[{@noblock_validity}, {@min_batch_time={'min_batch_time', 0x3d, 0x8}}, {@data_err_ignore}, {@max_batch_time={'max_batch_time', 0x3d, 0x8c9}}, {@nodiscard}, {@inlinecrypt}, {@errors_remount}], [{@appraise}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@uid_eq={'uid', 0x3d, r2}}]}, 0x6, 0x5fc, &(0x7f0000001000)="$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") kernel console output (not intermixed with test programs): dm_r:sysadm_t pid=12276 comm="syz.9.3003" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdfd82baeb9 code=0x7ffc0000 [ 241.557273][ T29] audit: type=1326 audit(2000000051.420:3033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12276 comm="syz.9.3003" exe="/root/syz-executor" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7fdfd82baeb9 code=0x7ffc0000 [ 241.580841][ T29] audit: type=1326 audit(2000000051.420:3034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12276 comm="syz.9.3003" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdfd82baeb9 code=0x7ffc0000 [ 241.667380][ T9953] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 241.784899][T12283] 8021q: adding VLAN 0 to HW filter on device bond8 [ 241.797753][T12283] macvlan8: entered promiscuous mode [ 241.803125][T12283] macvlan8: entered allmulticast mode [ 241.852937][T12283] bond8: entered allmulticast mode [ 241.858134][T12283] bond8: entered promiscuous mode [ 241.867758][T12283] 8021q: adding VLAN 0 to HW filter on device macvlan8 [ 241.876351][T12283] team0: Port device macvlan8 added [ 241.908828][T12293] loop9: detected capacity change from 0 to 256 [ 242.253113][T12321] netlink: 'syz.5.3018': attribute type 1 has an invalid length. [ 242.279430][T12321] 8021q: adding VLAN 0 to HW filter on device bond4 [ 242.300864][T12321] macvlan4: entered promiscuous mode [ 242.300902][ T80] I/O error, dev loop8, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 2 [ 242.306369][T12321] macvlan4: entered allmulticast mode [ 242.322834][T12324] loop9: detected capacity change from 0 to 128 [ 242.339665][T12324] vfat: Unknown parameter '@' [ 242.359974][T12321] bond4: entered allmulticast mode [ 242.365181][T12321] bond4: entered promiscuous mode [ 242.373392][T12321] 8021q: adding VLAN 0 to HW filter on device macvlan4 [ 242.381768][T12321] team0: Port device macvlan4 added [ 242.493547][T12337] __nla_validate_parse: 1 callbacks suppressed [ 242.493563][T12337] netlink: 12 bytes leftover after parsing attributes in process `syz.7.3025'. [ 242.628799][T12345] loop8: detected capacity change from 0 to 512 [ 242.639663][T12345] EXT4-fs (loop8): encrypted files will use data=ordered instead of data journaling mode [ 242.709673][T12347] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3023'. [ 242.809221][T12345] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a002c119, mo2=0002] [ 242.859224][T12345] System zones: 1-12 [ 242.881245][T12345] EXT4-fs (loop8): 1 truncate cleaned up [ 242.921740][T12345] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 243.247406][T12358] netlink: 'syz.7.3031': attribute type 1 has an invalid length. [ 243.422392][T12358] 8021q: adding VLAN 0 to HW filter on device bond3 [ 243.436691][T12362] macvlan3: entered promiscuous mode [ 243.442075][T12362] macvlan3: entered allmulticast mode [ 243.461000][T12362] bond3: entered allmulticast mode [ 243.466290][T12362] bond3: entered promiscuous mode [ 243.508786][T12362] 8021q: adding VLAN 0 to HW filter on device macvlan3 [ 243.529111][T12362] team0: Port device macvlan3 added [ 243.555914][T12371] netlink: 'syz.9.3036': attribute type 1 has an invalid length. [ 243.572994][T10245] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 243.601248][T12371] macvlan9: entered promiscuous mode [ 243.606752][T12371] macvlan9: entered allmulticast mode [ 243.638603][T12376] loop8: detected capacity change from 0 to 128 [ 243.703939][T12378] netlink: 14 bytes leftover after parsing attributes in process `syz.7.3039'. [ 243.753788][T12382] bio_check_eod: 101 callbacks suppressed [ 243.753809][T12382] syz.8.3037: attempt to access beyond end of device [ 243.753809][T12382] loop8: rw=2049, sector=145, nr_sectors = 16 limit=128 [ 243.774110][T12382] syz.8.3037: attempt to access beyond end of device [ 243.774110][T12382] loop8: rw=2049, sector=169, nr_sectors = 8 limit=128 [ 243.803049][T12382] syz.8.3037: attempt to access beyond end of device [ 243.803049][T12382] loop8: rw=2049, sector=185, nr_sectors = 8 limit=128 [ 243.824607][T12382] syz.8.3037: attempt to access beyond end of device [ 243.824607][T12382] loop8: rw=2049, sector=201, nr_sectors = 8 limit=128 [ 243.872346][T12382] syz.8.3037: attempt to access beyond end of device [ 243.872346][T12382] loop8: rw=2049, sector=217, nr_sectors = 8 limit=128 [ 243.881081][T12378] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 243.886407][T12382] syz.8.3037: attempt to access beyond end of device [ 243.886407][T12382] loop8: rw=2049, sector=233, nr_sectors = 8 limit=128 [ 243.886519][T12382] syz.8.3037: attempt to access beyond end of device [ 243.886519][T12382] loop8: rw=2049, sector=249, nr_sectors = 8 limit=128 [ 243.886575][T12382] syz.8.3037: attempt to access beyond end of device [ 243.886575][T12382] loop8: rw=2049, sector=265, nr_sectors = 8 limit=128 [ 243.886628][T12382] syz.8.3037: attempt to access beyond end of device [ 243.886628][T12382] loop8: rw=2049, sector=281, nr_sectors = 8 limit=128 [ 243.886697][T12382] syz.8.3037: attempt to access beyond end of device [ 243.886697][T12382] loop8: rw=2049, sector=297, nr_sectors = 8 limit=128 [ 244.024163][T12378] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 244.067813][T12395] loop8: detected capacity change from 0 to 512 [ 244.102577][T12395] EXT4-fs (loop8): encrypted files will use data=ordered instead of data journaling mode [ 244.136087][T12378] bond0 (unregistering): Released all slaves [ 244.153059][T12395] EXT4-fs (loop8): 1 truncate cleaned up [ 244.159408][T12395] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 244.253964][T12398] loop9: detected capacity change from 0 to 512 [ 244.318113][T12398] EXT4-fs (loop9): feature flags set on rev 0 fs, running e2fsck is recommended [ 244.350462][T12405] loop7: detected capacity change from 0 to 512 [ 244.361089][T12398] EXT4-fs (loop9): orphan cleanup on readonly fs [ 244.368008][T12405] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 244.390793][T12398] EXT4-fs error (device loop9): ext4_mb_mark_diskspace_used:4215: comm syz.9.3045: Allocating blocks 41-42 which overlap fs metadata [ 244.419001][T12408] netlink: 14 bytes leftover after parsing attributes in process `syz.1.3049'. [ 244.430559][T10245] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 244.430884][T12398] EXT4-fs error (device loop9): ext4_mb_mark_diskspace_used:4215: comm syz.9.3045: Allocating blocks 41-42 which overlap fs metadata [ 244.455834][T12405] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a002c119, mo2=0002] [ 244.478877][T12405] System zones: 1-12 [ 244.494418][T12405] EXT4-fs (loop7): 1 truncate cleaned up [ 244.512032][T12398] EXT4-fs error (device loop9): ext4_acquire_dquot:6986: comm syz.9.3045: Failed to acquire dquot type 1 [ 244.533171][T12416] netlink: 'syz.8.3051': attribute type 1 has an invalid length. [ 244.543080][T12405] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 244.569407][T12408] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 244.582510][T12398] EXT4-fs error (device loop9): mb_free_blocks:2037: group 0, inode 12: block 14:freeing already freed block (bit 14); block bitmap corrupt. [ 244.612756][T12398] EXT4-fs error (device loop9): ext4_do_update_inode:5617: inode #12: comm syz.9.3045: corrupted inode contents [ 244.626745][T12398] EXT4-fs error (device loop9): ext4_dirty_inode:6502: inode #12: comm syz.9.3045: mark_inode_dirty error [ 244.641327][T12408] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 244.642816][T12398] EXT4-fs error (device loop9): ext4_do_update_inode:5617: inode #12: comm syz.9.3045: corrupted inode contents [ 244.668521][T12398] EXT4-fs error (device loop9): __ext4_ext_dirty:206: inode #12: comm syz.9.3045: mark_inode_dirty error [ 244.682944][T12398] EXT4-fs error (device loop9): ext4_do_update_inode:5617: inode #12: comm syz.9.3045: corrupted inode contents [ 244.690668][T12408] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 244.707142][T12398] EXT4-fs error (device loop9) in ext4_orphan_del:303: Corrupt filesystem [ 244.722475][T12408] bond0 (unregistering): Released all slaves [ 244.723138][T12398] EXT4-fs error (device loop9): ext4_do_update_inode:5617: inode #12: comm syz.9.3045: corrupted inode contents [ 244.748479][T12398] EXT4-fs error (device loop9): ext4_truncate:4635: inode #12: comm syz.9.3045: mark_inode_dirty error [ 244.766534][T12398] EXT4-fs error (device loop9) in ext4_process_orphan:345: Corrupt filesystem [ 244.784655][T12398] EXT4-fs (loop9): 1 truncate cleaned up [ 244.797686][T12416] 8021q: adding VLAN 0 to HW filter on device bond2 [ 244.803649][T12398] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 244.822138][T12417] macvlan4: entered promiscuous mode [ 244.827504][T12417] macvlan4: entered allmulticast mode [ 244.891679][T10678] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 244.956696][T12427] loop9: detected capacity change from 0 to 128 [ 245.014067][T12429] team0: Device macvlan2 failed to change mtu [ 245.294763][ T9953] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 245.608828][T12455] netlink: 14 bytes leftover after parsing attributes in process `syz.8.3065'. [ 245.832219][T12455] žÿ (unregistering): (slave bond_slave_0): Releasing backup interface [ 245.921913][T12466] netlink: 83992 bytes leftover after parsing attributes in process `syz.1.3069'. [ 245.931247][T12466] netlink: zone id is out of range [ 245.936414][T12466] netlink: zone id is out of range [ 245.959438][T12466] netlink: set zone limit has 8 unknown bytes [ 246.299316][T12455] žÿ (unregistering): (slave bond_slave_1): Releasing backup interface [ 246.377831][T12455] žÿ (unregistering): Released all slaves [ 246.443300][T12471] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12471 comm=syz.9.3070 [ 246.594238][ T80] I/O error, dev loop8, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 2 [ 246.656531][T12474] loop8: detected capacity change from 0 to 128 [ 246.693946][T12476] netlink: 14 bytes leftover after parsing attributes in process `syz.1.3072'. [ 246.712856][T12474] vfat: Unknown parameter '@' [ 246.751883][T12479] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12479 comm=syz.9.3073 [ 246.804642][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 246.804659][ T29] audit: type=1326 audit(2000000056.870:3042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12482 comm="syz.8.3076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 246.835786][ T80] I/O error, dev loop8, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 2 [ 246.856342][T12485] loop7: detected capacity change from 0 to 128 [ 246.873448][T12485] vfat: Unknown parameter '@' [ 246.882615][ T29] audit: type=1326 audit(2000000056.870:3043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12482 comm="syz.8.3076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 246.906172][ T29] audit: type=1326 audit(2000000056.870:3044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12482 comm="syz.8.3076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 246.929861][ T29] audit: type=1326 audit(2000000056.880:3045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12482 comm="syz.8.3076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 246.953439][ T29] audit: type=1326 audit(2000000056.880:3046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12482 comm="syz.8.3076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 246.977095][ T29] audit: type=1326 audit(2000000056.880:3047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12482 comm="syz.8.3076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 247.000540][ T29] audit: type=1326 audit(2000000056.880:3048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12482 comm="syz.8.3076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 247.024068][ T29] audit: type=1326 audit(2000000056.880:3049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12482 comm="syz.8.3076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 247.047657][ T29] audit: type=1326 audit(2000000056.880:3050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12482 comm="syz.8.3076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 247.071164][ T29] audit: type=1326 audit(2000000056.880:3051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12482 comm="syz.8.3076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=428 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 247.236356][T12488] netlink: 83992 bytes leftover after parsing attributes in process `syz.5.3077'. [ 247.245640][T12488] netlink: zone id is out of range [ 247.250773][T12488] netlink: zone id is out of range [ 247.256199][T12488] netlink: zone id is out of range [ 247.271013][T12488] netlink: set zone limit has 8 unknown bytes [ 247.456787][T12502] netlink: 24 bytes leftover after parsing attributes in process `syz.9.3082'. [ 248.017803][T12508] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3084'. [ 248.747144][T12521] netlink: 24 bytes leftover after parsing attributes in process `syz.7.3090'. [ 248.808579][T12524] netlink: 14 bytes leftover after parsing attributes in process `syz.5.3091'. [ 248.882600][ T3645] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 249.102285][T12524] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 249.233524][T12524] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 249.324607][T12524] bond0 (unregistering): Released all slaves [ 249.418683][T12536] lo speed is unknown, defaulting to 1000 [ 249.770166][T12555] netlink: 14 bytes leftover after parsing attributes in process `syz.7.3102'. [ 250.319804][T12563] netlink: 14 bytes leftover after parsing attributes in process `syz.7.3105'. [ 250.325306][T12568] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12568 comm=syz.1.3107 [ 250.503938][T12570] netlink: 14 bytes leftover after parsing attributes in process `syz.8.3108'. [ 250.576545][T12579] netlink: 40 bytes leftover after parsing attributes in process `syz.7.3112'. [ 250.602042][T12577] lo speed is unknown, defaulting to 1000 [ 250.613051][ T24] I/O error, dev loop8, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 2 [ 250.618339][T12583] netlink: 'syz.5.3114': attribute type 1 has an invalid length. [ 250.637806][T12579] loop7: detected capacity change from 0 to 128 [ 250.645621][T12579] vfat: Unknown parameter '@' [ 250.782920][T12589] netlink: 24 bytes leftover after parsing attributes in process `syz.7.3116'. [ 250.820196][ T80] I/O error, dev loop8, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 2 [ 251.494452][T12591] loop8: detected capacity change from 0 to 128 [ 251.703056][T12591] vfat: Unknown parameter '@' [ 252.453790][ T29] kauditd_printk_skb: 131 callbacks suppressed [ 252.453809][ T29] audit: type=1326 audit(2000000062.520:3183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12587 comm="syz.7.3116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 252.514696][ T29] audit: type=1326 audit(2000000062.550:3184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12587 comm="syz.7.3116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 252.538257][ T29] audit: type=1326 audit(2000000062.550:3185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12587 comm="syz.7.3116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 252.561761][ T29] audit: type=1326 audit(2000000062.550:3186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12587 comm="syz.7.3116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 252.671181][ T80] I/O error, dev loop8, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 2 [ 252.696998][T12608] loop7: detected capacity change from 0 to 128 [ 252.703825][ T29] audit: type=1326 audit(2000000062.650:3187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12587 comm="syz.7.3116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=231 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 252.708407][T12608] vfat: Unknown parameter '@' [ 252.818666][T12618] netlink: 'syz.8.3125': attribute type 1 has an invalid length. [ 252.857707][T12620] netlink: 14 bytes leftover after parsing attributes in process `syz.1.3127'. [ 252.881286][ T80] I/O error, dev loop8, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 2 [ 252.902205][T12623] loop7: detected capacity change from 0 to 128 [ 252.913029][T12623] vfat: Unknown parameter '@' [ 252.927664][T12629] netlink: 14 bytes leftover after parsing attributes in process `syz.1.3131'. [ 253.024328][T12637] loop5: detected capacity change from 0 to 128 [ 253.080929][T12637] EXT4-fs (loop5): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 253.097666][T12637] ext4 filesystem being mounted at /190/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 253.195037][ T29] audit: type=1326 audit(2000000063.260:3188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12641 comm="syz.8.3134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 253.218859][ T29] audit: type=1326 audit(2000000063.260:3189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12641 comm="syz.8.3134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 253.242478][ T29] audit: type=1326 audit(2000000063.260:3190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12641 comm="syz.8.3134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 253.266229][ T29] audit: type=1326 audit(2000000063.260:3191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12641 comm="syz.8.3134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 253.289930][ T29] audit: type=1326 audit(2000000063.260:3192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12641 comm="syz.8.3134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 253.315487][ T9107] EXT4-fs (loop5): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 253.385496][T12652] netlink: 8 bytes leftover after parsing attributes in process `syz.8.3138'. [ 253.395635][T12653] netlink: 83992 bytes leftover after parsing attributes in process `syz.7.3132'. [ 253.412571][T12653] netlink: zone id is out of range [ 253.417716][T12653] netlink: zone id is out of range [ 253.423284][T12653] netlink: zone id is out of range [ 253.438003][T12653] netlink: set zone limit has 8 unknown bytes [ 253.548674][ T24] I/O error, dev loop8, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 2 [ 253.570951][T12657] loop8: detected capacity change from 0 to 128 [ 253.579654][T12657] vfat: Unknown parameter '@' [ 253.617047][T12659] netlink: 'syz.8.3141': attribute type 1 has an invalid length. [ 253.892060][T12667] loop9: detected capacity change from 0 to 512 [ 253.925610][T12667] EXT4-fs (loop9): encrypted files will use data=ordered instead of data journaling mode [ 253.949479][T12667] EXT4-fs (loop9): 1 truncate cleaned up [ 253.956145][T12667] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 253.969697][T12669] netlink: 83992 bytes leftover after parsing attributes in process `syz.5.3144'. [ 253.978985][T12669] netlink: zone id is out of range [ 253.984176][T12669] netlink: zone id is out of range [ 254.005312][T12669] netlink: set zone limit has 8 unknown bytes [ 254.351103][T10678] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 254.546648][T12679] loop9: detected capacity change from 0 to 128 [ 254.658040][T12681] lo speed is unknown, defaulting to 1000 [ 254.658970][T12679] EXT4-fs (loop9): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 254.687483][T12679] ext4 filesystem being mounted at /112/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 254.978400][T10678] EXT4-fs (loop9): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 255.331726][T12703] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3157'. [ 255.342849][T12703] netlink: 25 bytes leftover after parsing attributes in process `syz.5.3157'. [ 255.354388][T12703] gretap0: entered promiscuous mode [ 255.992260][T12711] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3160'. [ 256.002834][T12711] netlink: 25 bytes leftover after parsing attributes in process `syz.5.3160'. [ 256.289144][T12718] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3161'. [ 256.300070][T12718] netlink: 25 bytes leftover after parsing attributes in process `syz.5.3161'. [ 256.438466][T12717] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3162'. [ 256.448496][T12717] gretap0: entered promiscuous mode [ 256.658626][T12722] gretap0: entered promiscuous mode [ 257.882298][T12756] loop8: detected capacity change from 0 to 512 [ 257.891337][T12756] EXT4-fs (loop8): mounting ext2 file system using the ext4 subsystem [ 257.914009][T12756] EXT4-fs error (device loop8): ext4_orphan_get:1391: inode #15: comm syz.8.3178: casefold flag without casefold feature [ 257.929172][T12756] EXT4-fs error (device loop8): ext4_orphan_get:1396: comm syz.8.3178: couldn't read orphan inode 15 (err -117) [ 257.943054][T12756] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 257.999479][T12767] loop5: detected capacity change from 0 to 128 [ 258.236811][T12772] gretap0: entered promiscuous mode [ 259.138237][T10245] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 259.154938][T12779] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 259.237171][T12779] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 259.742582][T12784] __nla_validate_parse: 12 callbacks suppressed [ 259.742635][T12784] netlink: 12 bytes leftover after parsing attributes in process `syz.9.3185'. [ 259.965553][T12784] netlink: 25 bytes leftover after parsing attributes in process `syz.9.3185'. [ 260.162758][ C1] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 260.992595][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 260.992617][ T29] audit: type=1326 audit(2000000071.020:3220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12797 comm="syz.7.3190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 261.022346][ T29] audit: type=1326 audit(2000000071.020:3221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12797 comm="syz.7.3190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 261.046016][ T29] audit: type=1326 audit(2000000071.020:3222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12797 comm="syz.7.3190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 261.069603][ T29] audit: type=1326 audit(2000000071.020:3223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12797 comm="syz.7.3190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 261.093161][ T29] audit: type=1326 audit(2000000071.020:3224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12797 comm="syz.7.3190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 261.116725][ T29] audit: type=1326 audit(2000000071.020:3225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12797 comm="syz.7.3190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=166 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 261.140266][ T29] audit: type=1326 audit(2000000071.020:3226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12797 comm="syz.7.3190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 261.163817][ T29] audit: type=1326 audit(2000000071.020:3227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12797 comm="syz.7.3190" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 261.372098][T12808] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.635048][T12816] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3197'. [ 261.645064][T12816] netlink: 25 bytes leftover after parsing attributes in process `syz.5.3197'. [ 261.953442][T12820] netlink: 83992 bytes leftover after parsing attributes in process `syz.9.3198'. [ 261.962809][T12820] netlink: zone id is out of range [ 261.968099][T12820] netlink: zone id is out of range [ 261.992295][T12820] netlink: set zone limit has 8 unknown bytes [ 262.380991][T12822] netlink: 24 bytes leftover after parsing attributes in process `syz.7.3199'. [ 262.721640][T12831] loop7: detected capacity change from 0 to 1024 [ 262.731017][T12831] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 262.740870][T12831] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (42152!=20869) [ 262.752657][T12831] EXT4-fs (loop7): stripe (2) is not aligned with cluster size (16), stripe is disabled [ 262.774530][T12831] EXT4-fs error (device loop7): ext4_get_journal_inode:5849: inode #32: comm syz.7.3202: iget: special inode unallocated [ 262.787887][T12834] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3200'. [ 262.798188][T12834] netlink: 25 bytes leftover after parsing attributes in process `syz.5.3200'. [ 262.807973][T12831] EXT4-fs (loop7): no journal found [ 262.813368][T12831] EXT4-fs (loop7): can't get journal size [ 262.820497][T12831] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 262.895435][ T9953] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 263.128147][T12838] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3203'. [ 263.138344][T12838] netlink: 25 bytes leftover after parsing attributes in process `syz.7.3203'. [ 263.457727][ T29] audit: type=1326 audit(2000000073.510:3228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12851 comm="syz.8.3210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 263.481427][ T29] audit: type=1326 audit(2000000073.510:3229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12851 comm="syz.8.3210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 264.001674][T12860] lo speed is unknown, defaulting to 1000 [ 265.589748][T12864] __nla_validate_parse: 2 callbacks suppressed [ 265.589802][T12864] netlink: 25 bytes leftover after parsing attributes in process `syz.8.3212'. [ 265.620368][T12869] loop9: detected capacity change from 0 to 1024 [ 265.649062][T12869] EXT4-fs (loop9): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 265.658875][T12869] EXT4-fs (loop9): ext4_check_descriptors: Checksum for group 0 failed (42152!=20869) [ 265.698362][T12864] gretap0: entered promiscuous mode [ 265.748882][T12869] EXT4-fs (loop9): stripe (2) is not aligned with cluster size (16), stripe is disabled [ 265.783546][T12869] EXT4-fs error (device loop9): ext4_get_journal_inode:5849: inode #32: comm syz.9.3215: iget: special inode unallocated [ 265.797944][T12869] EXT4-fs (loop9): no journal found [ 265.803275][T12869] EXT4-fs (loop9): can't get journal size [ 265.918616][T12869] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 266.163116][T10678] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 267.470007][T12922] 8021q: adding VLAN 0 to HW filter on device bond0 [ 268.135394][T12935] lo speed is unknown, defaulting to 1000 [ 268.248281][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 268.248300][ T29] audit: type=1326 audit(2000000078.310:3234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12937 comm="syz.8.3240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 268.303671][T12942] loop7: detected capacity change from 0 to 1024 [ 268.463304][T12942] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 268.473246][T12942] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (42152!=20869) [ 268.507210][ T29] audit: type=1326 audit(2000000078.340:3235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12937 comm="syz.8.3240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 268.530880][ T29] audit: type=1326 audit(2000000078.340:3236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12937 comm="syz.8.3240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 268.554442][ T29] audit: type=1326 audit(2000000078.340:3237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12937 comm="syz.8.3240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 268.578054][ T29] audit: type=1326 audit(2000000078.340:3238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12937 comm="syz.8.3240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 268.601613][ T29] audit: type=1326 audit(2000000078.340:3239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12937 comm="syz.8.3240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=166 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 268.613432][T12942] EXT4-fs (loop7): stripe (2) is not aligned with cluster size (16), stripe is disabled [ 268.625789][ T29] audit: type=1326 audit(2000000078.520:3240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12937 comm="syz.8.3240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 268.658473][ T29] audit: type=1326 audit(2000000078.520:3241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12937 comm="syz.8.3240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 268.689126][T12942] EXT4-fs error (device loop7): ext4_get_journal_inode:5849: inode #32: comm syz.7.3242: iget: special inode unallocated [ 268.745157][T12942] EXT4-fs (loop7): no journal found [ 268.750560][T12942] EXT4-fs (loop7): can't get journal size [ 268.916679][T12952] lo speed is unknown, defaulting to 1000 [ 268.934501][T12942] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 269.028563][ T9953] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 269.151245][T12968] loop8: detected capacity change from 0 to 512 [ 269.177316][T12968] EXT4-fs (loop8): encrypted files will use data=ordered instead of data journaling mode [ 269.343721][T12968] EXT4-fs (loop8): 1 truncate cleaned up [ 269.362883][T12970] lo speed is unknown, defaulting to 1000 [ 269.422890][T12968] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 269.510681][T12982] loop9: detected capacity change from 0 to 1024 [ 269.584155][T12960] lo speed is unknown, defaulting to 1000 [ 269.602624][T12982] EXT4-fs (loop9): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 269.612450][T12982] EXT4-fs (loop9): ext4_check_descriptors: Checksum for group 0 failed (42152!=20869) [ 269.626815][ T29] audit: type=1326 audit(2000000079.660:3242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12985 comm="syz.7.3256" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 269.650460][ T29] audit: type=1326 audit(2000000079.660:3243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12985 comm="syz.7.3256" exe="/root/syz-executor" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 269.693288][T12982] EXT4-fs (loop9): stripe (2) is not aligned with cluster size (16), stripe is disabled [ 269.822110][T12982] EXT4-fs error (device loop9): ext4_get_journal_inode:5849: inode #32: comm syz.9.3253: iget: special inode unallocated [ 269.897250][T10245] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 269.951454][T12982] EXT4-fs (loop9): no journal found [ 269.956939][T12982] EXT4-fs (loop9): can't get journal size [ 270.181153][T12982] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 270.222516][T12992] lo speed is unknown, defaulting to 1000 [ 270.544797][T10678] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 270.940811][T13010] lo speed is unknown, defaulting to 1000 [ 271.152538][T13022] loop9: detected capacity change from 0 to 512 [ 271.181436][T13022] EXT4-fs (loop9): encrypted files will use data=ordered instead of data journaling mode [ 271.253341][T13022] EXT4-fs (loop9): 1 truncate cleaned up [ 271.289521][T13022] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 271.594918][T10678] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 272.056626][T13048] netlink: 4 bytes leftover after parsing attributes in process `syz.8.3273'. [ 274.019120][T13063] lo speed is unknown, defaulting to 1000 [ 275.472058][T13092] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3285'. [ 275.760086][T13100] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3288'. [ 276.396786][T13106] macvlan5: entered promiscuous mode [ 276.402127][T13106] macvlan5: entered allmulticast mode [ 276.612607][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 276.612627][ T29] audit: type=1326 audit(2000000086.670:3267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13107 comm="syz.8.3291" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 276.642272][ T29] audit: type=1326 audit(2000000086.670:3268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13107 comm="syz.8.3291" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 276.665848][ T29] audit: type=1326 audit(2000000086.670:3269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13107 comm="syz.8.3291" exe="/root/syz-executor" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 276.689553][ T29] audit: type=1326 audit(2000000086.670:3270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13107 comm="syz.8.3291" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 276.713166][ T29] audit: type=1326 audit(2000000086.670:3271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13107 comm="syz.8.3291" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 276.736690][ T29] audit: type=1326 audit(2000000086.670:3272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13107 comm="syz.8.3291" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 276.760409][ T29] audit: type=1326 audit(2000000086.670:3273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13107 comm="syz.8.3291" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 276.783943][ T29] audit: type=1326 audit(2000000086.670:3274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13107 comm="syz.8.3291" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 276.807499][ T29] audit: type=1326 audit(2000000086.670:3275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13107 comm="syz.8.3291" exe="/root/syz-executor" sig=0 arch=c000003e syscall=166 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 276.944797][T13116] syzkaller0: entered promiscuous mode [ 276.950395][T13116] syzkaller0: entered allmulticast mode [ 277.072214][ T29] audit: type=1326 audit(2000000086.900:3276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13107 comm="syz.8.3291" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 277.368183][T13132] syzkaller0: entered promiscuous mode [ 277.373767][T13132] syzkaller0: entered allmulticast mode [ 278.142871][T13143] FAULT_INJECTION: forcing a failure. [ 278.142871][T13143] name failslab, interval 1, probability 0, space 0, times 1 [ 278.155573][T13143] CPU: 0 UID: 0 PID: 13143 Comm: syz.8.3305 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 278.155618][T13143] Tainted: [W]=WARN [ 278.155625][T13143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 278.155646][T13143] Call Trace: [ 278.155657][T13143] [ 278.155668][T13143] __dump_stack+0x1d/0x30 [ 278.155712][T13143] dump_stack_lvl+0x95/0xd0 [ 278.155740][T13143] dump_stack+0x15/0x1b [ 278.155783][T13143] should_fail_ex+0x263/0x280 [ 278.155821][T13143] should_failslab+0x8c/0xb0 [ 278.155852][T13143] kmem_cache_alloc_noprof+0x68/0x490 [ 278.155884][T13143] ? vm_area_dup+0x33/0x2c0 [ 278.155919][T13143] vm_area_dup+0x33/0x2c0 [ 278.155948][T13143] __split_vma+0xe9/0x660 [ 278.155969][T13143] ? ___slab_alloc+0xb8/0xb00 [ 278.156002][T13143] ? obj_cgroup_charge_account+0x122/0x1a0 [ 278.156044][T13143] vms_gather_munmap_vmas+0x17a/0x7b0 [ 278.156091][T13143] ? avc_has_perm_noaudit+0xab/0x130 [ 278.156132][T13143] ? avc_has_perm+0x101/0x190 [ 278.156166][T13143] do_vmi_align_munmap+0x1e1/0x400 [ 278.156214][T13143] do_vmi_munmap+0x1da/0x220 [ 278.156240][T13143] do_munmap+0x8d/0xc0 [ 278.156283][T13143] mremap_to+0x1a3/0x440 [ 278.156313][T13143] ? check_prep_vma+0x49b/0x660 [ 278.156346][T13143] __se_sys_mremap+0x7dd/0xb50 [ 278.156378][T13143] ? ksys_write+0x194/0x1a0 [ 278.156402][T13143] __x64_sys_mremap+0x67/0x80 [ 278.156426][T13143] x64_sys_call+0x2944/0x3000 [ 278.156457][T13143] do_syscall_64+0xc0/0x2a0 [ 278.156498][T13143] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 278.156526][T13143] RIP: 0033:0x7fe1c2ebaeb9 [ 278.156547][T13143] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 278.156570][T13143] RSP: 002b:00007fe1c1917028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 278.156602][T13143] RAX: ffffffffffffffda RBX: 00007fe1c3135fa0 RCX: 00007fe1c2ebaeb9 [ 278.156621][T13143] RDX: 0000000000004000 RSI: 0000000000004000 RDI: 0000200000580000 [ 278.156638][T13143] RBP: 00007fe1c1917090 R08: 00002000007ff000 R09: 0000000000000000 [ 278.156656][T13143] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 278.156671][T13143] R13: 00007fe1c3136038 R14: 00007fe1c3135fa0 R15: 00007ffc915e64a8 [ 278.156691][T13143] [ 278.721751][T13151] loop8: detected capacity change from 0 to 512 [ 278.777328][T13151] EXT4-fs (loop8): encrypted files will use data=ordered instead of data journaling mode [ 278.958080][T13153] lo speed is unknown, defaulting to 1000 [ 279.017770][T13151] EXT4-fs (loop8): 1 truncate cleaned up [ 279.067917][T13151] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 279.114699][T13161] netlink: 28 bytes leftover after parsing attributes in process `syz.9.3311'. [ 279.123790][T13161] netlink: 28 bytes leftover after parsing attributes in process `syz.9.3311'. [ 279.186140][T13161] bridge0: entered promiscuous mode [ 279.192366][T13161] ip6gretap0: entered promiscuous mode [ 279.205392][T13164] netlink: 44 bytes leftover after parsing attributes in process `syz.9.3311'. [ 279.304682][T13161] hsr1: Slave A (bridge0) is not up; please bring it up to get a fully working HSR network [ 279.314852][T13161] hsr1: Slave B (ip6gretap0) is not up; please bring it up to get a fully working HSR network [ 279.344395][T10245] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 279.408655][T13167] FAULT_INJECTION: forcing a failure. [ 279.408655][T13167] name failslab, interval 1, probability 0, space 0, times 0 [ 279.421497][T13167] CPU: 1 UID: 0 PID: 13167 Comm: syz.8.3313 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 279.421531][T13167] Tainted: [W]=WARN [ 279.421539][T13167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 279.421595][T13167] Call Trace: [ 279.421604][T13167] [ 279.421613][T13167] __dump_stack+0x1d/0x30 [ 279.421639][T13167] dump_stack_lvl+0x95/0xd0 [ 279.421722][T13167] dump_stack+0x15/0x1b [ 279.421747][T13167] should_fail_ex+0x263/0x280 [ 279.421815][T13167] should_failslab+0x8c/0xb0 [ 279.421843][T13167] __kmalloc_cache_noprof+0x64/0x4a0 [ 279.421878][T13167] ? __se_sys_memfd_create+0x1df/0x3b0 [ 279.421921][T13167] ? fput+0x8f/0xc0 [ 279.421985][T13167] __se_sys_memfd_create+0x1df/0x3b0 [ 279.422093][T13167] __x64_sys_memfd_create+0x31/0x40 [ 279.422151][T13167] x64_sys_call+0x28cb/0x3000 [ 279.422209][T13167] do_syscall_64+0xc0/0x2a0 [ 279.422261][T13167] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 279.422291][T13167] RIP: 0033:0x7fe1c2ebaeb9 [ 279.422312][T13167] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 279.422336][T13167] RSP: 002b:00007fe1c1916e08 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 279.422402][T13167] RAX: ffffffffffffffda RBX: 00000000000007d8 RCX: 00007fe1c2ebaeb9 [ 279.422421][T13167] RDX: 00007fe1c1916ee0 RSI: 0000000000000000 RDI: 00007fe1c2f27333 [ 279.422440][T13167] RBP: 00002000000008c0 R08: 00000000ffffffff R09: 0000000000000000 [ 279.422458][T13167] R10: 0000000000000001 R11: 0000000000000202 R12: 0000200000000840 [ 279.422541][T13167] R13: 00007fe1c1916ee0 R14: 00007fe1c1916ea0 R15: 0000200000000880 [ 279.422561][T13167] [ 279.804282][T13175] syzkaller0: entered promiscuous mode [ 279.809910][T13175] syzkaller0: entered allmulticast mode [ 280.205278][T13171] lo speed is unknown, defaulting to 1000 [ 283.437210][T13207] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3325'. [ 283.475651][T13209] FAULT_INJECTION: forcing a failure. [ 283.475651][T13209] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 283.488814][T13209] CPU: 1 UID: 0 PID: 13209 Comm: syz.5.3327 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 283.488855][T13209] Tainted: [W]=WARN [ 283.488864][T13209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 283.488923][T13209] Call Trace: [ 283.488933][T13209] [ 283.488943][T13209] __dump_stack+0x1d/0x30 [ 283.489022][T13209] dump_stack_lvl+0x95/0xd0 [ 283.489052][T13209] dump_stack+0x15/0x1b [ 283.489079][T13209] should_fail_ex+0x263/0x280 [ 283.489127][T13209] should_fail+0xb/0x20 [ 283.489175][T13209] should_fail_usercopy+0x1a/0x20 [ 283.489280][T13209] _copy_to_iter+0xd2/0xea0 [ 283.489325][T13209] ? single_next+0x1d/0x30 [ 283.489422][T13209] ? single_stop+0x9/0x10 [ 283.489461][T13209] ? traverse+0x379/0x3a0 [ 283.489499][T13209] seq_read_iter+0x1d5/0x940 [ 283.489606][T13209] ? avc_policy_seqno+0x15/0x30 [ 283.489639][T13209] ? proc_fail_nth_write+0x13b/0x160 [ 283.489728][T13209] proc_reg_read_iter+0xe6/0x180 [ 283.489766][T13209] vfs_read+0x6c0/0x7f0 [ 283.489788][T13209] ? __pfx_proc_reg_read_iter+0x10/0x10 [ 283.489858][T13209] __x64_sys_pread64+0xfd/0x150 [ 283.489887][T13209] x64_sys_call+0x281b/0x3000 [ 283.490023][T13209] do_syscall_64+0xc0/0x2a0 [ 283.490133][T13209] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.490189][T13209] RIP: 0033:0x7fa3acfbaeb9 [ 283.490211][T13209] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 283.490259][T13209] RSP: 002b:00007fa3aba17028 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 283.490280][T13209] RAX: ffffffffffffffda RBX: 00007fa3ad235fa0 RCX: 00007fa3acfbaeb9 [ 283.490295][T13209] RDX: 000000000000000b RSI: 0000200000001440 RDI: 0000000000000003 [ 283.490308][T13209] RBP: 00007fa3aba17090 R08: 0000000000000000 R09: 0000000000000000 [ 283.490369][T13209] R10: 0000000000000035 R11: 0000000000000246 R12: 0000000000000001 [ 283.490384][T13209] R13: 00007fa3ad236038 R14: 00007fa3ad235fa0 R15: 00007ffc3e18eb88 [ 283.490404][T13209] [ 284.383244][T13227] netlink: 20 bytes leftover after parsing attributes in process `syz.5.3331'. [ 284.412559][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 284.412576][ T29] audit: type=1400 audit(2000000094.440:3278): avc: denied { lock } for pid=13224 comm="syz.5.3331" path="socket:[40396]" dev="sockfs" ino=40396 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 285.433937][ T29] audit: type=1326 audit(2000000095.490:3279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13233 comm="syz.8.3333" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 285.457504][ T29] audit: type=1326 audit(2000000095.490:3280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13233 comm="syz.8.3333" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 285.481056][ T29] audit: type=1326 audit(2000000095.490:3281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13233 comm="syz.8.3333" exe="/root/syz-executor" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 285.504636][ T29] audit: type=1326 audit(2000000095.490:3282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13233 comm="syz.8.3333" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 285.528228][ T29] audit: type=1326 audit(2000000095.490:3283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13233 comm="syz.8.3333" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 285.551725][ T29] audit: type=1326 audit(2000000095.490:3284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13233 comm="syz.8.3333" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 285.575225][ T29] audit: type=1326 audit(2000000095.490:3285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13233 comm="syz.8.3333" exe="/root/syz-executor" sig=0 arch=c000003e syscall=166 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 285.722872][T13235] loop5: detected capacity change from 0 to 512 [ 286.058162][T13235] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 286.131568][T13235] ext4 filesystem being mounted at /223/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 286.434565][ T29] audit: type=1326 audit(2000000095.670:3286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13233 comm="syz.8.3333" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 286.458242][ T29] audit: type=1326 audit(2000000095.670:3287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13233 comm="syz.8.3333" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe1c2ebaeb9 code=0x7ffc0000 [ 286.684266][T13248] netlink: 36 bytes leftover after parsing attributes in process `syz.8.3337'. [ 287.246684][ T9107] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 287.388831][T13252] netlink: 'syz.1.3340': attribute type 21 has an invalid length. [ 287.396849][T13252] netlink: 'syz.1.3340': attribute type 4 has an invalid length. [ 287.419638][T13254] loop7: detected capacity change from 0 to 512 [ 287.605302][T13254] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 287.843364][T13254] FAULT_INJECTION: forcing a failure. [ 287.843364][T13254] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 287.856508][T13254] CPU: 0 UID: 0 PID: 13254 Comm: syz.7.3341 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 287.856549][T13254] Tainted: [W]=WARN [ 287.856589][T13254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 287.856602][T13254] Call Trace: [ 287.856608][T13254] [ 287.856618][T13254] __dump_stack+0x1d/0x30 [ 287.856650][T13254] dump_stack_lvl+0x95/0xd0 [ 287.856715][T13254] dump_stack+0x15/0x1b [ 287.856742][T13254] should_fail_ex+0x263/0x280 [ 287.856782][T13254] should_fail+0xb/0x20 [ 287.856862][T13254] should_fail_usercopy+0x1a/0x20 [ 287.856905][T13254] _copy_from_user+0x1c/0xb0 [ 287.856930][T13254] ___sys_sendmsg+0xc1/0x1e0 [ 287.856996][T13254] __x64_sys_sendmsg+0xd4/0x160 [ 287.857020][T13254] x64_sys_call+0x17ba/0x3000 [ 287.857045][T13254] do_syscall_64+0xc0/0x2a0 [ 287.857121][T13254] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 287.857143][T13254] RIP: 0033:0x7f768837aeb9 [ 287.857207][T13254] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 287.857230][T13254] RSP: 002b:00007f7686dd7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 287.857307][T13254] RAX: ffffffffffffffda RBX: 00007f76885f5fa0 RCX: 00007f768837aeb9 [ 287.857326][T13254] RDX: affa9c0077a76a7d RSI: 0000200000000340 RDI: 0000000000000009 [ 287.857418][T13254] RBP: 00007f7686dd7090 R08: 0000000000000000 R09: 0000000000000000 [ 287.857432][T13254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 287.857445][T13254] R13: 00007f76885f6038 R14: 00007f76885f5fa0 R15: 00007ffc386401a8 [ 287.857464][T13254] [ 288.278403][ T9953] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 288.309834][T13276] netlink: 32 bytes leftover after parsing attributes in process `syz.1.3348'. [ 288.318924][T13278] loop8: detected capacity change from 0 to 1024 [ 288.360503][T13278] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 288.373139][T13276] netlink: 20 bytes leftover after parsing attributes in process `syz.1.3348'. [ 288.382122][T13276] netlink: 152 bytes leftover after parsing attributes in process `syz.1.3348'. [ 288.392128][T13278] EXT4-fs error (device loop8): ext4_validate_block_bitmap:441: comm syz.8.3349: bg 0: block 392: padding at end of block bitmap is not set [ 288.418101][T13278] EXT4-fs (loop8): Remounting filesystem read-only [ 289.060981][T13295] lo speed is unknown, defaulting to 1000 [ 289.159791][T10245] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 289.263671][T13302] netlink: 20 bytes leftover after parsing attributes in process `syz.9.3355'. [ 289.332592][T13302] netlink: 152 bytes leftover after parsing attributes in process `syz.9.3355'. [ 289.616641][T13316] netlink: 36 bytes leftover after parsing attributes in process `syz.8.3359'. [ 290.091764][T13295] netlink: 8 bytes leftover after parsing attributes in process `syz.7.3352'. [ 290.532518][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 290.532539][ T29] audit: type=1400 audit(2000000100.570:3316): avc: denied { checkpoint_restore } for pid=13325 comm="syz.1.3365" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 290.634004][T13331] netlink: 8 bytes leftover after parsing attributes in process `syz.9.3367'. [ 290.735462][ T29] audit: type=1400 audit(2000000100.800:3317): avc: denied { watch watch_reads } for pid=13334 comm="syz.1.3368" path="/686/file0" dev="tmpfs" ino=3588 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 290.848905][ T29] audit: type=1326 audit(2000000100.820:3318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13334 comm="syz.1.3368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 290.872487][ T29] audit: type=1326 audit(2000000100.830:3319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13334 comm="syz.1.3368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 290.896109][ T29] audit: type=1326 audit(2000000100.830:3320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13334 comm="syz.1.3368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 290.919671][ T29] audit: type=1326 audit(2000000100.830:3321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13334 comm="syz.1.3368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 290.943332][ T29] audit: type=1326 audit(2000000100.830:3322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13334 comm="syz.1.3368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 290.966874][ T29] audit: type=1326 audit(2000000100.830:3323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13334 comm="syz.1.3368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 290.990370][ T29] audit: type=1326 audit(2000000100.830:3324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13334 comm="syz.1.3368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 291.013873][ T29] audit: type=1326 audit(2000000100.830:3325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13334 comm="syz.1.3368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 291.215444][T13343] loop7: detected capacity change from 0 to 512 [ 291.243773][T13343] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 291.318648][T13343] EXT4-fs (loop7): 1 truncate cleaned up [ 291.345452][T13343] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 291.368907][T13353] loop9: detected capacity change from 0 to 512 [ 291.400903][T13353] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 291.501564][T13359] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3377'. [ 291.510697][T13359] netlink: 20 bytes leftover after parsing attributes in process `syz.5.3377'. [ 291.525055][T13364] netlink: 20 bytes leftover after parsing attributes in process `syz.8.3376'. [ 291.588524][T13364] netlink: 152 bytes leftover after parsing attributes in process `syz.8.3376'. [ 291.602463][T13359] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3377'. [ 291.611469][T13359] netlink: 20 bytes leftover after parsing attributes in process `syz.5.3377'. [ 291.620602][ T1472] netdevsim netdevsim5 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 291.633246][ T1472] netdevsim netdevsim5 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 291.660863][ T1472] netdevsim netdevsim5 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 291.675991][ T1472] netdevsim netdevsim5 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 291.744419][T13370] netlink: 8 bytes leftover after parsing attributes in process `syz.8.3379'. [ 291.745470][T13372] FAULT_INJECTION: forcing a failure. [ 291.745470][T13372] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 291.766583][T13372] CPU: 0 UID: 0 PID: 13372 Comm: syz.5.3380 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 291.766654][T13372] Tainted: [W]=WARN [ 291.766707][T13372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 291.766722][T13372] Call Trace: [ 291.766730][T13372] [ 291.766767][T13372] __dump_stack+0x1d/0x30 [ 291.766797][T13372] dump_stack_lvl+0x95/0xd0 [ 291.766823][T13372] dump_stack+0x15/0x1b [ 291.766856][T13372] should_fail_ex+0x263/0x280 [ 291.766893][T13372] should_fail+0xb/0x20 [ 291.766925][T13372] should_fail_usercopy+0x1a/0x20 [ 291.767033][T13372] _copy_to_iter+0xd2/0xea0 [ 291.767125][T13372] ? __pfx_hugetlb_cgroup_read_u64+0x10/0x10 [ 291.767162][T13372] ? mutex_unlock+0x4e/0x90 [ 291.767209][T13372] seq_read_iter+0x776/0x940 [ 291.767247][T13372] kernfs_fop_read_iter+0xc1/0x330 [ 291.767284][T13372] vfs_read+0x6c0/0x7f0 [ 291.767305][T13372] ? __pfx_kernfs_fop_read_iter+0x10/0x10 [ 291.767369][T13372] __x64_sys_pread64+0xfd/0x150 [ 291.767394][T13372] x64_sys_call+0x281b/0x3000 [ 291.767424][T13372] do_syscall_64+0xc0/0x2a0 [ 291.767473][T13372] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 291.767526][T13372] RIP: 0033:0x7fa3acfbaeb9 [ 291.767599][T13372] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 291.767621][T13372] RSP: 002b:00007fa3aba17028 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 291.767644][T13372] RAX: ffffffffffffffda RBX: 00007fa3ad235fa0 RCX: 00007fa3acfbaeb9 [ 291.767660][T13372] RDX: 00000000000000f4 RSI: 00002000000000c0 RDI: 0000000000000004 [ 291.767675][T13372] RBP: 00007fa3aba17090 R08: 0000000000000000 R09: 0000000000000000 [ 291.767698][T13372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 291.767712][T13372] R13: 00007fa3ad236038 R14: 00007fa3ad235fa0 R15: 00007ffc3e18eb88 [ 291.767732][T13372] [ 291.965989][ T9953] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 292.070566][T10678] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 292.898343][T13406] syz.9.3390 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 293.096872][T13411] macvlan5: entered promiscuous mode [ 293.102243][T13411] macvlan5: entered allmulticast mode [ 293.158007][T13413] FAULT_INJECTION: forcing a failure. [ 293.158007][T13413] name failslab, interval 1, probability 0, space 0, times 0 [ 293.170748][T13413] CPU: 1 UID: 0 PID: 13413 Comm: syz.1.3393 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 293.170786][T13413] Tainted: [W]=WARN [ 293.170792][T13413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 293.170808][T13413] Call Trace: [ 293.170816][T13413] [ 293.170826][T13413] __dump_stack+0x1d/0x30 [ 293.170856][T13413] dump_stack_lvl+0x95/0xd0 [ 293.170933][T13413] dump_stack+0x15/0x1b [ 293.170960][T13413] should_fail_ex+0x263/0x280 [ 293.171000][T13413] should_failslab+0x8c/0xb0 [ 293.171031][T13413] __kmalloc_noprof+0xb8/0x580 [ 293.171060][T13413] ? bpf_test_init+0x86/0x130 [ 293.171170][T13413] bpf_test_init+0x86/0x130 [ 293.171203][T13413] bpf_prog_test_run_xdp+0x306/0xa10 [ 293.171243][T13413] ? __rcu_read_unlock+0x4e/0x70 [ 293.171332][T13413] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 293.171370][T13413] bpf_prog_test_run+0x204/0x340 [ 293.171465][T13413] __sys_bpf+0x4c0/0x7b0 [ 293.171508][T13413] __x64_sys_bpf+0x41/0x50 [ 293.171535][T13413] x64_sys_call+0x28e1/0x3000 [ 293.171563][T13413] do_syscall_64+0xc0/0x2a0 [ 293.171658][T13413] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 293.171758][T13413] RIP: 0033:0x7f7e92afaeb9 [ 293.171775][T13413] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 293.171794][T13413] RSP: 002b:00007f7e91557028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 293.171814][T13413] RAX: ffffffffffffffda RBX: 00007f7e92d75fa0 RCX: 00007f7e92afaeb9 [ 293.171904][T13413] RDX: 0000000000000050 RSI: 0000200000000280 RDI: 000000000000000a [ 293.171939][T13413] RBP: 00007f7e91557090 R08: 0000000000000000 R09: 0000000000000000 [ 293.171952][T13413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 293.171965][T13413] R13: 00007f7e92d76038 R14: 00007f7e92d75fa0 R15: 00007fff30d5d3a8 [ 293.172002][T13413] [ 294.453897][T13433] loop5: detected capacity change from 0 to 512 [ 294.466258][T13433] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 294.500331][T13433] EXT4-fs (loop5): 1 truncate cleaned up [ 294.508774][T13433] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 294.573575][ T9107] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 294.672071][T13441] __nla_validate_parse: 4 callbacks suppressed [ 294.672090][T13441] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3402'. [ 294.748048][T13449] loop5: detected capacity change from 0 to 1024 [ 294.755011][T13449] EXT4-fs: inline encryption not supported [ 294.789742][T13449] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 294.805911][T13449] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 294.850541][T13449] netlink: 'syz.5.3404': attribute type 4 has an invalid length. [ 294.881689][T13456] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3406'. [ 295.024136][T13456] delete_channel: no stack [ 295.329889][T13464] lo speed is unknown, defaulting to 1000 [ 295.835984][T13476] loop8: detected capacity change from 0 to 512 [ 295.897704][T13476] EXT4-fs (loop8): encrypted files will use data=ordered instead of data journaling mode [ 295.928890][T13478] syzkaller0: entered promiscuous mode [ 295.934549][T13478] syzkaller0: entered allmulticast mode [ 295.970939][T13476] EXT4-fs (loop8): 1 truncate cleaned up [ 295.987207][T13476] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 296.024546][T13478] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 296.158002][T13483] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3416'. [ 296.235248][T10245] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 296.335833][T13492] netlink: 60 bytes leftover after parsing attributes in process `syz.8.3419'. [ 296.391166][ T29] kauditd_printk_skb: 52 callbacks suppressed [ 296.391181][ T29] audit: type=1326 audit(2000000106.450:3378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13495 comm="syz.7.3422" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 296.472789][ T29] audit: type=1326 audit(2000000106.490:3379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13495 comm="syz.7.3422" exe="/root/syz-executor" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 296.496530][ T29] audit: type=1326 audit(2000000106.490:3380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13495 comm="syz.7.3422" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 296.520052][ T29] audit: type=1326 audit(2000000106.490:3381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13495 comm="syz.7.3422" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 296.543642][ T29] audit: type=1326 audit(2000000106.490:3382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13495 comm="syz.7.3422" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 296.567193][ T29] audit: type=1326 audit(2000000106.490:3383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13495 comm="syz.7.3422" exe="/root/syz-executor" sig=0 arch=c000003e syscall=166 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 296.590774][ T29] audit: type=1326 audit(2000000106.490:3384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13495 comm="syz.7.3422" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 296.614391][ T29] audit: type=1326 audit(2000000106.490:3385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13495 comm="syz.7.3422" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 296.696435][T13508] FAULT_INJECTION: forcing a failure. [ 296.696435][T13508] name failslab, interval 1, probability 0, space 0, times 0 [ 296.709339][T13508] CPU: 1 UID: 0 PID: 13508 Comm: syz.5.3429 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 296.709372][T13508] Tainted: [W]=WARN [ 296.709443][T13508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 296.709461][T13508] Call Trace: [ 296.709468][T13508] [ 296.709476][T13508] __dump_stack+0x1d/0x30 [ 296.709502][T13508] dump_stack_lvl+0x95/0xd0 [ 296.709556][T13508] dump_stack+0x15/0x1b [ 296.709595][T13508] should_fail_ex+0x263/0x280 [ 296.709628][T13508] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 296.709680][T13508] should_failslab+0x8c/0xb0 [ 296.709769][T13508] kmem_cache_alloc_lru_noprof+0x6c/0x490 [ 296.709874][T13508] ? shmem_alloc_inode+0x34/0x50 [ 296.709913][T13508] ? kstrtouint+0x76/0xc0 [ 296.709948][T13508] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 296.709979][T13508] shmem_alloc_inode+0x34/0x50 [ 296.710031][T13508] alloc_inode+0x40/0x170 [ 296.710052][T13508] new_inode+0x1d/0xe0 [ 296.710078][T13508] shmem_get_inode+0x246/0x750 [ 296.710115][T13508] __shmem_file_setup+0x112/0x210 [ 296.710217][T13508] shmem_file_setup+0x3b/0x50 [ 296.710245][T13508] memfd_alloc_file+0x4e/0x300 [ 296.710279][T13508] __se_sys_memfd_create+0x2e1/0x3b0 [ 296.710337][T13508] __x64_sys_memfd_create+0x31/0x40 [ 296.710393][T13508] x64_sys_call+0x28cb/0x3000 [ 296.710418][T13508] do_syscall_64+0xc0/0x2a0 [ 296.710449][T13508] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 296.710518][T13508] RIP: 0033:0x7fa3acfbaeb9 [ 296.710533][T13508] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 296.710581][T13508] RSP: 002b:00007fa3aba16e08 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 296.710614][T13508] RAX: ffffffffffffffda RBX: 00000000000001f5 RCX: 00007fa3acfbaeb9 [ 296.710630][T13508] RDX: 00007fa3aba16ee0 RSI: 0000000000000000 RDI: 00007fa3ad027333 [ 296.710643][T13508] RBP: 0000200000000600 R08: 00000000ffffffff R09: 0000000000000000 [ 296.710657][T13508] R10: 0000000000000001 R11: 0000000000000202 R12: 0000200000000040 [ 296.710693][T13508] R13: 00007fa3aba16ee0 R14: 00007fa3aba16ea0 R15: 000020000000b800 [ 296.710787][T13508] [ 296.989106][ T29] audit: type=1326 audit(2000000107.040:3386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13500 comm="syz.7.3426" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 297.012770][ T29] audit: type=1326 audit(2000000107.040:3387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13500 comm="syz.7.3426" exe="/root/syz-executor" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 297.094672][T13516] netlink: 8 bytes leftover after parsing attributes in process `syz.8.3431'. [ 297.312907][T13525] FAULT_INJECTION: forcing a failure. [ 297.312907][T13525] name failslab, interval 1, probability 0, space 0, times 0 [ 297.325713][T13525] CPU: 0 UID: 0 PID: 13525 Comm: syz.7.3435 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 297.325753][T13525] Tainted: [W]=WARN [ 297.325762][T13525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 297.325779][T13525] Call Trace: [ 297.325788][T13525] [ 297.325796][T13525] __dump_stack+0x1d/0x30 [ 297.325823][T13525] dump_stack_lvl+0x95/0xd0 [ 297.325844][T13525] dump_stack+0x15/0x1b [ 297.325872][T13525] should_fail_ex+0x263/0x280 [ 297.325911][T13525] should_failslab+0x8c/0xb0 [ 297.325937][T13525] kmem_cache_alloc_noprof+0x68/0x490 [ 297.325970][T13525] ? vm_area_dup+0x33/0x2c0 [ 297.326005][T13525] vm_area_dup+0x33/0x2c0 [ 297.326038][T13525] __split_vma+0xe9/0x660 [ 297.326069][T13525] ? mas_find+0x5d5/0x700 [ 297.326099][T13525] vms_gather_munmap_vmas+0x2b2/0x7b0 [ 297.326144][T13525] do_vmi_align_munmap+0x1e1/0x400 [ 297.326198][T13525] do_vmi_munmap+0x1da/0x220 [ 297.326218][T13525] do_munmap+0x8d/0xc0 [ 297.326252][T13525] mremap_to+0x1a3/0x440 [ 297.326279][T13525] ? check_prep_vma+0x49b/0x660 [ 297.326314][T13525] __se_sys_mremap+0x7dd/0xb50 [ 297.326359][T13525] ? ksys_write+0x194/0x1a0 [ 297.326386][T13525] __x64_sys_mremap+0x67/0x80 [ 297.326416][T13525] x64_sys_call+0x2944/0x3000 [ 297.326449][T13525] do_syscall_64+0xc0/0x2a0 [ 297.326482][T13525] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 297.326510][T13525] RIP: 0033:0x7f768837aeb9 [ 297.326527][T13525] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 297.326551][T13525] RSP: 002b:00007f7686dd7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 297.326577][T13525] RAX: ffffffffffffffda RBX: 00007f76885f5fa0 RCX: 00007f768837aeb9 [ 297.326595][T13525] RDX: 0000000000004000 RSI: 0000000000004000 RDI: 0000200000580000 [ 297.326607][T13525] RBP: 00007f7686dd7090 R08: 00002000007ff000 R09: 0000000000000000 [ 297.326624][T13525] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 297.326641][T13525] R13: 00007f76885f6038 R14: 00007f76885f5fa0 R15: 00007ffc386401a8 [ 297.326666][T13525] [ 297.573481][T13529] netlink: 68 bytes leftover after parsing attributes in process `syz.7.3437'. [ 297.599439][T13517] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 297.610022][T13517] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.646779][T13517] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: ipvlan2 [ 297.656758][T13517] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.680852][T13533] loop8: detected capacity change from 0 to 512 [ 297.705017][T13517] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 297.715594][T13517] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.977807][T13538] lo speed is unknown, defaulting to 1000 [ 298.055044][T13533] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 298.134123][T13546] syzkaller0: entered promiscuous mode [ 298.139755][T13546] syzkaller0: entered allmulticast mode [ 298.691786][T13566] netlink: 24 bytes leftover after parsing attributes in process `syz.5.3447'. [ 299.204212][T13578] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3453'. [ 299.213886][T13576] loop9: detected capacity change from 0 to 512 [ 299.380847][T10245] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 299.453879][T13583] loop7: detected capacity change from 0 to 512 [ 299.616303][T13583] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 299.726097][T13583] netlink: 8 bytes leftover after parsing attributes in process `syz.7.3455'. [ 299.776152][T13576] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 299.861415][ T9953] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 300.245268][T13615] netlink: 28 bytes leftover after parsing attributes in process `syz.8.3464'. [ 300.271631][T13615] sctp: [Deprecated]: syz.8.3464 (pid 13615) Use of int in max_burst socket option deprecated. [ 300.271631][T13615] Use struct sctp_assoc_value instead [ 300.326857][T10678] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 300.373154][T13621] 9p: Could not find request transport: Qd [ 300.591503][T13634] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3466'. [ 300.638201][T13636] FAULT_INJECTION: forcing a failure. [ 300.638201][T13636] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 300.651492][T13636] CPU: 0 UID: 0 PID: 13636 Comm: syz.5.3471 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 300.651531][T13636] Tainted: [W]=WARN [ 300.651538][T13636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 300.651564][T13636] Call Trace: [ 300.651573][T13636] [ 300.651583][T13636] __dump_stack+0x1d/0x30 [ 300.651655][T13636] dump_stack_lvl+0x95/0xd0 [ 300.651791][T13636] dump_stack+0x15/0x1b [ 300.651818][T13636] should_fail_ex+0x263/0x280 [ 300.651859][T13636] should_fail+0xb/0x20 [ 300.651906][T13636] should_fail_usercopy+0x1a/0x20 [ 300.651962][T13636] _copy_to_user+0x20/0xa0 [ 300.651987][T13636] simple_read_from_buffer+0xb5/0x130 [ 300.652024][T13636] proc_fail_nth_read+0x10e/0x150 [ 300.652110][T13636] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 300.652146][T13636] vfs_read+0x1ab/0x7f0 [ 300.652214][T13636] ? __rcu_read_unlock+0x4e/0x70 [ 300.652244][T13636] ? __fget_files+0x184/0x1c0 [ 300.652268][T13636] ? __pfx_proc_reg_read_iter+0x10/0x10 [ 300.652326][T13636] ? mutex_lock+0x57/0x90 [ 300.652357][T13636] ksys_read+0xdc/0x1a0 [ 300.652381][T13636] __x64_sys_read+0x40/0x50 [ 300.652399][T13636] x64_sys_call+0x2889/0x3000 [ 300.652424][T13636] do_syscall_64+0xc0/0x2a0 [ 300.652539][T13636] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 300.652629][T13636] RIP: 0033:0x7fa3acf7b78e [ 300.652648][T13636] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 300.652684][T13636] RSP: 002b:00007fa3aba16fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 300.652725][T13636] RAX: ffffffffffffffda RBX: 00007fa3aba176c0 RCX: 00007fa3acf7b78e [ 300.652742][T13636] RDX: 000000000000000f RSI: 00007fa3aba170a0 RDI: 0000000000000004 [ 300.652791][T13636] RBP: 00007fa3aba17090 R08: 0000000000000000 R09: 0000000000000000 [ 300.652804][T13636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 300.652830][T13636] R13: 00007fa3ad236038 R14: 00007fa3ad235fa0 R15: 00007ffc3e18eb88 [ 300.652855][T13636] [ 301.349602][T13658] lo speed is unknown, defaulting to 1000 [ 301.526862][T13669] FAULT_INJECTION: forcing a failure. [ 301.526862][T13669] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 301.540004][T13669] CPU: 0 UID: 0 PID: 13669 Comm: syz.1.3482 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 301.540085][T13669] Tainted: [W]=WARN [ 301.540094][T13669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 301.540110][T13669] Call Trace: [ 301.540118][T13669] [ 301.540126][T13669] __dump_stack+0x1d/0x30 [ 301.540151][T13669] dump_stack_lvl+0x95/0xd0 [ 301.540270][T13669] dump_stack+0x15/0x1b [ 301.540296][T13669] should_fail_ex+0x263/0x280 [ 301.540397][T13669] should_fail+0xb/0x20 [ 301.540440][T13669] should_fail_usercopy+0x1a/0x20 [ 301.540491][T13669] _copy_from_user+0x1c/0xb0 [ 301.540519][T13669] bpf_test_init+0xb9/0x130 [ 301.540563][T13669] bpf_prog_test_run_xdp+0x306/0xa10 [ 301.540648][T13669] ? __rcu_read_unlock+0x4e/0x70 [ 301.540693][T13669] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 301.540736][T13669] bpf_prog_test_run+0x204/0x340 [ 301.540857][T13669] __sys_bpf+0x4c0/0x7b0 [ 301.540992][T13669] __x64_sys_bpf+0x41/0x50 [ 301.541023][T13669] x64_sys_call+0x28e1/0x3000 [ 301.541057][T13669] do_syscall_64+0xc0/0x2a0 [ 301.541098][T13669] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 301.541202][T13669] RIP: 0033:0x7f7e92afaeb9 [ 301.541224][T13669] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 301.541249][T13669] RSP: 002b:00007f7e91557028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 301.541276][T13669] RAX: ffffffffffffffda RBX: 00007f7e92d75fa0 RCX: 00007f7e92afaeb9 [ 301.541367][T13669] RDX: 0000000000000050 RSI: 0000200000000280 RDI: 000000000000000a [ 301.541384][T13669] RBP: 00007f7e91557090 R08: 0000000000000000 R09: 0000000000000000 [ 301.541493][T13669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 301.541510][T13669] R13: 00007f7e92d76038 R14: 00007f7e92d75fa0 R15: 00007fff30d5d3a8 [ 301.541536][T13669] [ 301.941872][T13687] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 301.941872][T13687] The task syz.8.3486 (13687) triggered the difference, watch for misbehavior. [ 302.229685][T13691] lo speed is unknown, defaulting to 1000 [ 302.281090][T13695] netlink: 28 bytes leftover after parsing attributes in process `syz.5.3492'. [ 302.311911][T13697] FAULT_INJECTION: forcing a failure. [ 302.311911][T13697] name failslab, interval 1, probability 0, space 0, times 0 [ 302.324801][T13697] CPU: 0 UID: 0 PID: 13697 Comm: syz.9.3494 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 302.324835][T13697] Tainted: [W]=WARN [ 302.324871][T13697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 302.324889][T13697] Call Trace: [ 302.324896][T13697] [ 302.324956][T13697] __dump_stack+0x1d/0x30 [ 302.324983][T13697] dump_stack_lvl+0x95/0xd0 [ 302.325012][T13697] dump_stack+0x15/0x1b [ 302.325079][T13697] should_fail_ex+0x263/0x280 [ 302.325200][T13697] should_failslab+0x8c/0xb0 [ 302.325232][T13697] kmem_cache_alloc_noprof+0x68/0x490 [ 302.325262][T13697] ? getname_flags+0x7f/0x3b0 [ 302.325297][T13697] getname_flags+0x7f/0x3b0 [ 302.325399][T13697] __x64_sys_symlinkat+0x4d/0x70 [ 302.325429][T13697] x64_sys_call+0x2a36/0x3000 [ 302.325463][T13697] do_syscall_64+0xc0/0x2a0 [ 302.325506][T13697] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 302.325596][T13697] RIP: 0033:0x7fdfd82baeb9 [ 302.325650][T13697] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 302.325670][T13697] RSP: 002b:00007fdfd6d17028 EFLAGS: 00000246 ORIG_RAX: 000000000000010a [ 302.325690][T13697] RAX: ffffffffffffffda RBX: 00007fdfd8535fa0 RCX: 00007fdfd82baeb9 [ 302.325704][T13697] RDX: 0000200000000b40 RSI: ffffffffffffff9c RDI: 0000200000000b00 [ 302.325718][T13697] RBP: 00007fdfd6d17090 R08: 0000000000000000 R09: 0000000000000000 [ 302.325743][T13697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 302.325759][T13697] R13: 00007fdfd8536038 R14: 00007fdfd8535fa0 R15: 00007ffc979ca568 [ 302.325787][T13697] [ 302.345876][T13695] sctp: [Deprecated]: syz.5.3492 (pid 13695) Use of int in max_burst socket option deprecated. [ 302.345876][T13695] Use struct sctp_assoc_value instead [ 302.585433][T13700] 9p: Could not find request transport: Qd [ 302.593889][T13701] netlink: 76 bytes leftover after parsing attributes in process `syz.9.3495'. [ 302.633978][T13701] loop9: detected capacity change from 0 to 128 [ 302.672293][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 302.672311][ T29] audit: type=1326 audit(2000000112.730:3413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13699 comm="syz.9.3495" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fdfd82baeb9 code=0x0 [ 302.781845][T13709] loop8: detected capacity change from 0 to 512 [ 302.799508][T13709] EXT4-fs: Mount option(s) incompatible with ext2 [ 302.842162][T13709] loop8: detected capacity change from 0 to 1024 [ 302.849077][T13709] ext4: Unknown parameter 'appraise' [ 303.039485][T13722] netlink: 24 bytes leftover after parsing attributes in process `syz.8.3504'. [ 303.153169][T13728] FAULT_INJECTION: forcing a failure. [ 303.153169][T13728] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 303.166401][T13728] CPU: 1 UID: 0 PID: 13728 Comm: syz.8.3506 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 303.166509][T13728] Tainted: [W]=WARN [ 303.166516][T13728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 303.166529][T13728] Call Trace: [ 303.166536][T13728] [ 303.166544][T13728] __dump_stack+0x1d/0x30 [ 303.166569][T13728] dump_stack_lvl+0x95/0xd0 [ 303.166649][T13728] dump_stack+0x15/0x1b [ 303.166675][T13728] should_fail_ex+0x263/0x280 [ 303.166781][T13728] should_fail+0xb/0x20 [ 303.166814][T13728] should_fail_usercopy+0x1a/0x20 [ 303.166850][T13728] _copy_from_iter+0xcf/0xea0 [ 303.166875][T13728] ? __alloc_skb+0x397/0x4b0 [ 303.166975][T13728] ? __alloc_skb+0x219/0x4b0 [ 303.167012][T13728] netlink_sendmsg+0x4ae/0x6f0 [ 303.167041][T13728] ? __pfx_netlink_sendmsg+0x10/0x10 [ 303.167063][T13728] ____sys_sendmsg+0x5af/0x600 [ 303.167104][T13728] ___sys_sendmsg+0x195/0x1e0 [ 303.167172][T13728] __x64_sys_sendmsg+0xd4/0x160 [ 303.167198][T13728] x64_sys_call+0x17ba/0x3000 [ 303.167231][T13728] do_syscall_64+0xc0/0x2a0 [ 303.167341][T13728] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 303.167370][T13728] RIP: 0033:0x7fe1c2ebaeb9 [ 303.167390][T13728] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 303.167436][T13728] RSP: 002b:00007fe1c1917028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 303.167455][T13728] RAX: ffffffffffffffda RBX: 00007fe1c3135fa0 RCX: 00007fe1c2ebaeb9 [ 303.167472][T13728] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 303.167560][T13728] RBP: 00007fe1c1917090 R08: 0000000000000000 R09: 0000000000000000 [ 303.167578][T13728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 303.167592][T13728] R13: 00007fe1c3136038 R14: 00007fe1c3135fa0 R15: 00007ffc915e64a8 [ 303.167612][T13728] [ 303.412868][ T29] audit: type=1326 audit(2000000113.470:3414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13735 comm="syz.7.3511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 303.436556][ T29] audit: type=1326 audit(2000000113.470:3415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13735 comm="syz.7.3511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 303.460193][ T29] audit: type=1326 audit(2000000113.470:3416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13735 comm="syz.7.3511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 303.484035][ T29] audit: type=1326 audit(2000000113.470:3417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13735 comm="syz.7.3511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 303.507576][ T29] audit: type=1326 audit(2000000113.480:3418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13735 comm="syz.7.3511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 303.532272][ T29] audit: type=1326 audit(2000000113.480:3419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13735 comm="syz.7.3511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 303.555870][ T29] audit: type=1326 audit(2000000113.480:3420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13735 comm="syz.7.3511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=166 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 303.579475][ T29] audit: type=1326 audit(2000000113.480:3421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13735 comm="syz.7.3511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f768837aeb9 code=0x7ffc0000 [ 303.593235][T13745] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 303.617080][T13744] loop8: detected capacity change from 0 to 1764 [ 303.624747][T13744] grow_buffers: requested out-of-range block 18446744072010032070 for device loop8 [ 303.634139][T13744] isofs_fill_super: bread failed, dev=loop8, iso_blknum=1297723875, block=-1699519546 [ 303.649910][T13745] loop7: detected capacity change from 0 to 512 [ 303.780921][T13745] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 303.886332][ T9953] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 303.911383][T13763] loop7: detected capacity change from 0 to 256 [ 303.939895][T13765] FAULT_INJECTION: forcing a failure. [ 303.939895][T13765] name failslab, interval 1, probability 0, space 0, times 0 [ 303.952772][T13765] CPU: 1 UID: 0 PID: 13765 Comm: syz.7.3520 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 303.952863][T13765] Tainted: [W]=WARN [ 303.952870][T13765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 303.952926][T13765] Call Trace: [ 303.952935][T13765] [ 303.952945][T13765] __dump_stack+0x1d/0x30 [ 303.952974][T13765] dump_stack_lvl+0x95/0xd0 [ 303.952995][T13765] dump_stack+0x15/0x1b [ 303.953015][T13765] should_fail_ex+0x263/0x280 [ 303.953105][T13765] should_failslab+0x8c/0xb0 [ 303.953202][T13765] kmem_cache_alloc_noprof+0x68/0x490 [ 303.953234][T13765] ? security_inode_alloc+0x37/0x100 [ 303.953294][T13765] security_inode_alloc+0x37/0x100 [ 303.953334][T13765] inode_init_always_gfp+0x4b7/0x500 [ 303.953364][T13765] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 303.953405][T13765] alloc_inode+0x58/0x170 [ 303.953475][T13765] new_inode+0x1d/0xe0 [ 303.953503][T13765] shmem_get_inode+0x246/0x750 [ 303.953544][T13765] __shmem_file_setup+0x112/0x210 [ 303.953580][T13765] shmem_file_setup+0x3b/0x50 [ 303.953674][T13765] memfd_alloc_file+0x4e/0x300 [ 303.953708][T13765] __se_sys_memfd_create+0x2e1/0x3b0 [ 303.953801][T13765] __x64_sys_memfd_create+0x31/0x40 [ 303.953834][T13765] x64_sys_call+0x28cb/0x3000 [ 303.953921][T13765] do_syscall_64+0xc0/0x2a0 [ 303.953965][T13765] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 303.953994][T13765] RIP: 0033:0x7f768837aeb9 [ 303.954009][T13765] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 303.954028][T13765] RSP: 002b:00007f7686dd6e08 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 303.954069][T13765] RAX: ffffffffffffffda RBX: 00000000000001f5 RCX: 00007f768837aeb9 [ 303.954086][T13765] RDX: 00007f7686dd6ee0 RSI: 0000000000000000 RDI: 00007f76883e7333 [ 303.954103][T13765] RBP: 0000200000000600 R08: 00000000ffffffff R09: 0000000000000000 [ 303.954120][T13765] R10: 0000000000000001 R11: 0000000000000202 R12: 0000200000000040 [ 303.954218][T13765] R13: 00007f7686dd6ee0 R14: 00007f7686dd6ea0 R15: 000020000000b800 [ 303.954244][T13765] [ 303.957048][T13761] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3519'. [ 304.213545][ T29] audit: type=1326 audit(2000000114.270:3422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13775 comm="syz.5.3523" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3acfbaeb9 code=0x7ffc0000 [ 304.287216][T13789] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3528'. [ 304.310142][T13791] FAULT_INJECTION: forcing a failure. [ 304.310142][T13791] name failslab, interval 1, probability 0, space 0, times 0 [ 304.322840][T13791] CPU: 1 UID: 0 PID: 13791 Comm: syz.5.3526 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 304.322937][T13791] Tainted: [W]=WARN [ 304.322943][T13791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 304.322953][T13791] Call Trace: [ 304.322958][T13791] [ 304.322965][T13791] __dump_stack+0x1d/0x30 [ 304.323004][T13791] dump_stack_lvl+0x95/0xd0 [ 304.323152][T13791] dump_stack+0x15/0x1b [ 304.323203][T13791] should_fail_ex+0x263/0x280 [ 304.323291][T13791] should_failslab+0x8c/0xb0 [ 304.323341][T13791] kmem_cache_alloc_noprof+0x68/0x490 [ 304.323363][T13791] ? getname_flags+0x7f/0x3b0 [ 304.323385][T13791] getname_flags+0x7f/0x3b0 [ 304.323407][T13791] user_path_at+0x28/0x130 [ 304.323484][T13791] __x64_sys_umount+0x85/0xe0 [ 304.323513][T13791] x64_sys_call+0xd6a/0x3000 [ 304.323535][T13791] do_syscall_64+0xc0/0x2a0 [ 304.323563][T13791] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 304.323654][T13791] RIP: 0033:0x7fa3acfbaeb9 [ 304.323753][T13791] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 304.323769][T13791] RSP: 002b:00007fa3ab9f6028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 304.323787][T13791] RAX: ffffffffffffffda RBX: 00007fa3ad236090 RCX: 00007fa3acfbaeb9 [ 304.323799][T13791] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000001c0 [ 304.323815][T13791] RBP: 00007fa3ab9f6090 R08: 0000000000000000 R09: 0000000000000000 [ 304.323827][T13791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.323837][T13791] R13: 00007fa3ad236128 R14: 00007fa3ad236090 R15: 00007ffc3e18eb88 [ 304.323855][T13791] [ 304.577434][T13802] FAULT_INJECTION: forcing a failure. [ 304.577434][T13802] name failslab, interval 1, probability 0, space 0, times 0 [ 304.590243][T13802] CPU: 0 UID: 0 PID: 13802 Comm: syz.5.3532 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 304.590283][T13802] Tainted: [W]=WARN [ 304.590291][T13802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 304.590306][T13802] Call Trace: [ 304.590315][T13802] [ 304.590325][T13802] __dump_stack+0x1d/0x30 [ 304.590354][T13802] dump_stack_lvl+0x95/0xd0 [ 304.590379][T13802] dump_stack+0x15/0x1b [ 304.590403][T13802] should_fail_ex+0x263/0x280 [ 304.590440][T13802] should_failslab+0x8c/0xb0 [ 304.590468][T13802] kmem_cache_alloc_noprof+0x68/0x490 [ 304.590497][T13802] ? mas_alloc_nodes+0x1a2/0x210 [ 304.590531][T13802] mas_alloc_nodes+0x1a2/0x210 [ 304.590562][T13802] mas_preallocate+0x2ca/0x510 [ 304.590598][T13802] __split_vma+0x240/0x660 [ 304.590626][T13802] ? mas_find+0x5d5/0x700 [ 304.590659][T13802] vms_gather_munmap_vmas+0x2b2/0x7b0 [ 304.590706][T13802] do_vmi_align_munmap+0x1e1/0x400 [ 304.590757][T13802] do_vmi_munmap+0x1da/0x220 [ 304.590780][T13802] do_munmap+0x8d/0xc0 [ 304.590821][T13802] mremap_to+0x1a3/0x440 [ 304.590848][T13802] ? check_prep_vma+0x49b/0x660 [ 304.590879][T13802] __se_sys_mremap+0x7dd/0xb50 [ 304.590916][T13802] ? ksys_write+0x194/0x1a0 [ 304.590941][T13802] __x64_sys_mremap+0x67/0x80 [ 304.590968][T13802] x64_sys_call+0x2944/0x3000 [ 304.590997][T13802] do_syscall_64+0xc0/0x2a0 [ 304.591038][T13802] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 304.591064][T13802] RIP: 0033:0x7fa3acfbaeb9 [ 304.591082][T13802] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 304.591104][T13802] RSP: 002b:00007fa3aba17028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 304.591127][T13802] RAX: ffffffffffffffda RBX: 00007fa3ad235fa0 RCX: 00007fa3acfbaeb9 [ 304.591144][T13802] RDX: 0000000000004000 RSI: 0000000000004000 RDI: 0000200000580000 [ 304.591160][T13802] RBP: 00007fa3aba17090 R08: 00002000007ff000 R09: 0000000000000000 [ 304.591176][T13802] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 304.591191][T13802] R13: 00007fa3ad236038 R14: 00007fa3ad235fa0 R15: 00007ffc3e18eb88 [ 304.591214][T13802] [ 304.813224][T13804] FAULT_INJECTION: forcing a failure. [ 304.813224][T13804] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 304.826481][T13804] CPU: 1 UID: 0 PID: 13804 Comm: syz.7.3531 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 304.826526][T13804] Tainted: [W]=WARN [ 304.826565][T13804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 304.826578][T13804] Call Trace: [ 304.826584][T13804] [ 304.826593][T13804] __dump_stack+0x1d/0x30 [ 304.826701][T13804] dump_stack_lvl+0x95/0xd0 [ 304.826724][T13804] dump_stack+0x15/0x1b [ 304.826744][T13804] should_fail_ex+0x263/0x280 [ 304.826776][T13804] should_fail+0xb/0x20 [ 304.826884][T13804] should_fail_usercopy+0x1a/0x20 [ 304.826982][T13804] _copy_to_user+0x20/0xa0 [ 304.827010][T13804] simple_read_from_buffer+0xb5/0x130 [ 304.827053][T13804] proc_fail_nth_read+0x10e/0x150 [ 304.827082][T13804] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 304.827172][T13804] vfs_read+0x1ab/0x7f0 [ 304.827195][T13804] ? __rcu_read_unlock+0x4e/0x70 [ 304.827240][T13804] ? __fget_files+0x184/0x1c0 [ 304.827266][T13804] ? mutex_lock+0x57/0x90 [ 304.827405][T13804] ksys_read+0xdc/0x1a0 [ 304.827425][T13804] __x64_sys_read+0x40/0x50 [ 304.827504][T13804] x64_sys_call+0x2889/0x3000 [ 304.827529][T13804] do_syscall_64+0xc0/0x2a0 [ 304.827569][T13804] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 304.827652][T13804] RIP: 0033:0x7f768833b78e [ 304.827668][T13804] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 304.827687][T13804] RSP: 002b:00007f7686dd6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 304.827706][T13804] RAX: ffffffffffffffda RBX: 00007f7686dd76c0 RCX: 00007f768833b78e [ 304.827801][T13804] RDX: 000000000000000f RSI: 00007f7686dd70a0 RDI: 0000000000000004 [ 304.827814][T13804] RBP: 00007f7686dd7090 R08: 0000000000000000 R09: 0000000000000000 [ 304.827826][T13804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.827892][T13804] R13: 00007f76885f6038 R14: 00007f76885f5fa0 R15: 00007ffc386401a8 [ 304.827917][T13804] [ 305.094102][T13820] netlink: 4 bytes leftover after parsing attributes in process `syz.8.3539'. [ 305.103707][T13820] netlink: 8 bytes leftover after parsing attributes in process `syz.8.3539'. [ 305.161129][T13822] loop8: detected capacity change from 0 to 512 [ 305.185996][T13822] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 305.421293][T13833] lo speed is unknown, defaulting to 1000 [ 305.480041][T13845] netlink: 56 bytes leftover after parsing attributes in process `syz.1.3548'. [ 305.489091][T13845] netlink: 56 bytes leftover after parsing attributes in process `syz.1.3548'. [ 305.528445][T10245] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 305.547240][T13848] FAULT_INJECTION: forcing a failure. [ 305.547240][T13848] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 305.560437][T13848] CPU: 0 UID: 0 PID: 13848 Comm: syz.5.3547 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 305.560473][T13848] Tainted: [W]=WARN [ 305.560483][T13848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 305.560499][T13848] Call Trace: [ 305.560557][T13848] [ 305.560649][T13848] __dump_stack+0x1d/0x30 [ 305.560677][T13848] dump_stack_lvl+0x95/0xd0 [ 305.560722][T13848] dump_stack+0x15/0x1b [ 305.560749][T13848] should_fail_ex+0x263/0x280 [ 305.560791][T13848] should_fail+0xb/0x20 [ 305.560869][T13848] should_fail_usercopy+0x1a/0x20 [ 305.560913][T13848] _copy_to_user+0x20/0xa0 [ 305.560941][T13848] simple_read_from_buffer+0xb5/0x130 [ 305.560989][T13848] proc_fail_nth_read+0x10e/0x150 [ 305.561119][T13848] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 305.561187][T13848] vfs_read+0x1ab/0x7f0 [ 305.561208][T13848] ? __rcu_read_unlock+0x4e/0x70 [ 305.561248][T13848] ? __fget_files+0x184/0x1c0 [ 305.561301][T13848] ? mutex_lock+0x57/0x90 [ 305.561333][T13848] ksys_read+0xdc/0x1a0 [ 305.561370][T13848] __x64_sys_read+0x40/0x50 [ 305.561393][T13848] x64_sys_call+0x2889/0x3000 [ 305.561524][T13848] do_syscall_64+0xc0/0x2a0 [ 305.561561][T13848] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 305.561602][T13848] RIP: 0033:0x7fa3acf7b78e [ 305.561621][T13848] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 305.561642][T13848] RSP: 002b:00007fa3ab9f5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 305.561739][T13848] RAX: ffffffffffffffda RBX: 00007fa3ab9f66c0 RCX: 00007fa3acf7b78e [ 305.561756][T13848] RDX: 000000000000000f RSI: 00007fa3ab9f60a0 RDI: 0000000000000009 [ 305.561812][T13848] RBP: 00007fa3ab9f6090 R08: 0000000000000000 R09: 0000000000000000 [ 305.561829][T13848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 305.561844][T13848] R13: 00007fa3ad236128 R14: 00007fa3ad236090 R15: 00007ffc3e18eb88 [ 305.561868][T13848] [ 305.819742][T13851] syzkaller0: entered promiscuous mode [ 305.825447][T13851] syzkaller0: entered allmulticast mode [ 305.903117][T13860] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3554'. [ 306.180648][T13840] loop7: detected capacity change from 0 to 8192 [ 306.189716][T13840] vfat: Unknown parameter '' [ 306.285481][T13875] VFS: Mount too revealing [ 306.438167][T13878] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3562'. [ 306.608602][ T37] netdevsim netdevsim5 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 306.619102][ T37] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 306.770973][T13893] netlink: 20 bytes leftover after parsing attributes in process `syz.7.3566'. [ 306.799383][ T6219] lo speed is unknown, defaulting to 1000 [ 306.800164][T13893] netlink: 152 bytes leftover after parsing attributes in process `syz.7.3566'. [ 306.821986][ T37] netdevsim netdevsim5 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 306.832377][ T37] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 306.911430][T13903] netlink: 28 bytes leftover after parsing attributes in process `syz.7.3570'. [ 306.926151][ T37] netdevsim netdevsim5 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 306.936561][ T37] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 307.050195][ T37] netdevsim netdevsim5 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 307.060567][ T37] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 307.106667][T13887] lo speed is unknown, defaulting to 1000 [ 307.253388][ T37] bridge_slave_1: left allmulticast mode [ 307.259194][ T37] bridge_slave_1: left promiscuous mode [ 307.264940][ T37] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.324709][ T37] bridge_slave_0: left allmulticast mode [ 307.330557][ T37] bridge_slave_0: left promiscuous mode [ 307.336313][ T37] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.475406][ T37] bond1 (unregistering): (slave ip6gretap1): Releasing active interface [ 307.491714][ T37] ip6gretap1 (unregistering): left allmulticast mode [ 307.613376][ T37] bond1 (unregistering): left allmulticast mode [ 307.619791][ T37] bond1 (unregistering): left promiscuous mode [ 307.636476][ T37] team0: Port device macvlan2 removed [ 307.654921][ T37] bond1 (unregistering): Released all slaves [ 307.674433][ T37] bond2 (unregistering): Released all slaves [ 307.697974][ T37] bond3 (unregistering): left allmulticast mode [ 307.704383][ T37] bond3 (unregistering): left promiscuous mode [ 307.713937][T13935] loop7: detected capacity change from 0 to 512 [ 307.721444][ T37] team0: Port device macvlan3 removed [ 307.733585][ T37] bond3 (unregistering): Released all slaves [ 307.757290][ T37] bond4 (unregistering): left allmulticast mode [ 307.763690][ T37] bond4 (unregistering): left promiscuous mode [ 307.777485][T13935] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 307.796793][ T37] team0: Port device macvlan4 removed [ 307.805657][ T37] bond4 (unregistering): Released all slaves [ 307.814987][ T37] bond0 (unregistering): Released all slaves [ 307.933210][ T9] lo speed is unknown, defaulting to 1000 [ 308.119690][ T37] hsr_slave_0: left promiscuous mode [ 308.125562][ T37] hsr_slave_1: left promiscuous mode [ 308.140928][ T37] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 308.148391][ T37] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 308.163535][ T37] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 308.170983][ T37] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 308.187005][ T37] batman_adv: batadv0: Removing interface: ipvlan2 [ 308.295217][ T37] veth1_macvtap: left promiscuous mode [ 308.300817][ T37] veth0_macvtap: left promiscuous mode [ 308.306461][ T37] veth1_vlan: left promiscuous mode [ 308.310377][ T9953] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 308.311799][ T37] veth0_vlan: left promiscuous mode [ 308.548866][ T37] team0 (unregistering): Port device team_slave_1 removed [ 308.560890][ T37] team0 (unregistering): Port device team_slave_0 removed [ 308.641402][T13918] lo speed is unknown, defaulting to 1000 [ 308.661721][T13887] chnl_net:caif_netlink_parms(): no params data found [ 308.825393][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 308.825439][ T29] audit: type=1326 audit(2000000118.890:3433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13977 comm="syz.1.3581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 308.849784][T13887] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.855347][ T29] audit: type=1326 audit(2000000118.890:3434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13977 comm="syz.1.3581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 308.862293][T13887] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.862738][T13887] bridge_slave_0: entered allmulticast mode [ 308.885838][ T29] audit: type=1326 audit(2000000118.890:3435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13977 comm="syz.1.3581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 308.894573][T13887] bridge_slave_0: entered promiscuous mode [ 308.898743][ T29] audit: type=1326 audit(2000000118.890:3436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13977 comm="syz.1.3581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 308.925920][T13887] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.928069][ T29] audit: type=1326 audit(2000000118.890:3437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13977 comm="syz.1.3581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 308.951647][T13887] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.958565][ T29] audit: type=1326 audit(2000000118.890:3438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13977 comm="syz.1.3581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=43 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 309.012507][ T29] audit: type=1326 audit(2000000118.890:3439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13977 comm="syz.1.3581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 309.036117][ T29] audit: type=1326 audit(2000000118.890:3440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13977 comm="syz.1.3581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 309.059768][ T29] audit: type=1326 audit(2000000118.890:3441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13977 comm="syz.1.3581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 309.061402][T13887] bridge_slave_1: entered allmulticast mode [ 309.083293][ T29] audit: type=1326 audit(2000000118.890:3442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13977 comm="syz.1.3581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7f7e92afaeb9 code=0x7ffc0000 [ 309.116490][T13887] bridge_slave_1: entered promiscuous mode [ 309.179053][ T37] IPVS: stop unused estimator thread 0... [ 309.204731][T13986] netlink: 16 bytes leftover after parsing attributes in process `syz.8.3582'. [ 309.217524][T13918] chnl_net:caif_netlink_parms(): no params data found [ 309.237568][T13887] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 309.294628][T13887] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 309.344789][T13998] FAULT_INJECTION: forcing a failure. [ 309.344789][T13998] name failslab, interval 1, probability 0, space 0, times 0 [ 309.357612][T13998] CPU: 0 UID: 0 PID: 13998 Comm: syz.1.3584 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 309.357669][T13998] Tainted: [W]=WARN [ 309.357676][T13998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 309.357725][T13998] Call Trace: [ 309.357731][T13998] [ 309.357739][T13998] __dump_stack+0x1d/0x30 [ 309.357773][T13998] dump_stack_lvl+0x95/0xd0 [ 309.357798][T13998] dump_stack+0x15/0x1b [ 309.357928][T13998] should_fail_ex+0x263/0x280 [ 309.357960][T13998] should_failslab+0x8c/0xb0 [ 309.357988][T13998] __kvmalloc_node_noprof+0x148/0x680 [ 309.358062][T13998] ? bpf_test_run_xdp_live+0x137/0x1360 [ 309.358109][T13998] bpf_test_run_xdp_live+0x137/0x1360 [ 309.358144][T13998] ? avc_has_perm_noaudit+0xab/0x130 [ 309.358199][T13998] ? selinux_file_open+0x2e6/0x330 [ 309.358236][T13998] ? should_fail_ex+0xd9/0x280 [ 309.358296][T13998] ? __pfx_xdp_test_run_init_page+0x10/0x10 [ 309.358318][T13998] ? _copy_from_user+0x89/0xb0 [ 309.358339][T13998] ? bpf_test_init+0xf4/0x130 [ 309.358372][T13998] bpf_prog_test_run_xdp+0x57b/0xa10 [ 309.358431][T13998] ? __rcu_read_unlock+0x4e/0x70 [ 309.358464][T13998] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 309.358506][T13998] bpf_prog_test_run+0x204/0x340 [ 309.358580][T13998] __sys_bpf+0x4c0/0x7b0 [ 309.358618][T13998] __x64_sys_bpf+0x41/0x50 [ 309.358644][T13998] x64_sys_call+0x28e1/0x3000 [ 309.358672][T13998] do_syscall_64+0xc0/0x2a0 [ 309.358766][T13998] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 309.358793][T13998] RIP: 0033:0x7f7e92afaeb9 [ 309.358813][T13998] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 309.358868][T13998] RSP: 002b:00007f7e91557028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 309.358894][T13998] RAX: ffffffffffffffda RBX: 00007f7e92d75fa0 RCX: 00007f7e92afaeb9 [ 309.358911][T13998] RDX: 0000000000000050 RSI: 0000200000000280 RDI: 000000000000000a [ 309.358928][T13998] RBP: 00007f7e91557090 R08: 0000000000000000 R09: 0000000000000000 [ 309.358945][T13998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 309.359023][T13998] R13: 00007f7e92d76038 R14: 00007f7e92d75fa0 R15: 00007fff30d5d3a8 [ 309.359049][T13998] [ 309.406205][T13918] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.592219][T13918] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.620455][T13918] bridge_slave_0: entered allmulticast mode [ 309.627777][T13918] bridge_slave_0: entered promiscuous mode [ 309.637520][T13887] team0: Port device team_slave_0 added [ 309.657113][T13918] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.664300][T13918] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.697953][T13918] bridge_slave_1: entered allmulticast mode [ 309.705656][T14013] 9p: Bad value for 'wfdno' [ 309.712034][T13918] bridge_slave_1: entered promiscuous mode [ 309.731823][T13887] team0: Port device team_slave_1 added [ 309.795237][T13918] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 309.811024][T13887] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 309.818054][T13887] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 309.844159][T13887] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 309.857457][T13887] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 309.864508][T13887] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 309.890470][T13887] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 309.906195][T13918] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 309.949037][ T37] bridge_slave_1: left allmulticast mode [ 309.954777][ T37] bridge_slave_1: left promiscuous mode [ 309.960464][ T37] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.968371][ T37] bridge_slave_0: left allmulticast mode [ 309.974164][ T37] bridge_slave_0: left promiscuous mode [ 309.979963][ T37] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.998438][ T37] ip6gretap0 (unregistering): left promiscuous mode [ 310.011496][ T37] bond1 (unregistering): (slave ip6gretap1): Releasing active interface [ 310.059702][ T37] bridge0 (unregistering): left promiscuous mode [ 310.074080][T14018] loop8: detected capacity change from 0 to 512 [ 310.094699][T14018] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 310.109465][ T37] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 310.119937][ T37] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 310.130345][ T37] bond0 (unregistering): Released all slaves [ 310.138721][ T37] bond1 (unregistering): Released all slaves [ 310.147467][ T37] bond2 (unregistering): left allmulticast mode [ 310.153865][ T37] bond2 (unregistering): left promiscuous mode [ 310.161309][ T37] team0: Port device macvlan2 removed [ 310.169282][ T37] bond2 (unregistering): Released all slaves [ 310.180067][ T37] bond3 (unregistering): Released all slaves [ 310.189348][ T37] bond4 (unregistering): left allmulticast mode [ 310.195730][ T37] bond4 (unregistering): left promiscuous mode [ 310.203124][ T37] team0: Port device macvlan4 removed [ 310.210116][ T37] bond4 (unregistering): Released all slaves [ 310.218628][ T37] bond5 (unregistering): left allmulticast mode [ 310.224982][ T37] bond5 (unregistering): left promiscuous mode [ 310.232246][ T37] team0: Port device macvlan5 removed [ 310.239706][ T37] bond5 (unregistering): Released all slaves [ 310.249143][ T37] bond6 (unregistering): left allmulticast mode [ 310.255666][ T37] bond6 (unregistering): left promiscuous mode [ 310.263074][ T37] team0: Port device macvlan6 removed [ 310.270037][ T37] bond6 (unregistering): Released all slaves [ 310.278454][ T37] bond7 (unregistering): left allmulticast mode [ 310.284972][ T37] bond7 (unregistering): left promiscuous mode [ 310.292024][ T37] team0: Port device macvlan7 removed [ 310.299332][ T37] bond7 (unregistering): Released all slaves [ 310.308030][ T37] bond8 (unregistering): left allmulticast mode [ 310.314406][ T37] bond8 (unregistering): left promiscuous mode [ 310.321789][ T37] team0: Port device macvlan8 removed [ 310.328911][ T37] bond8 (unregistering): Released all slaves [ 310.459138][T13887] hsr_slave_0: entered promiscuous mode [ 310.464763][T10245] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 310.466298][T13887] hsr_slave_1: entered promiscuous mode [ 310.482067][T13887] debugfs: 'hsr0' already exists in 'hsr' [ 310.488126][T13887] Cannot create hsr debugfs directory [ 310.496550][ T37] hsr_slave_0: left promiscuous mode [ 310.502279][ T37] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 310.510000][ T37] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 310.566022][ T37] team0 (unregistering): Port device team_slave_1 removed [ 310.576595][ T37] team0 (unregistering): Port device team_slave_0 removed [ 310.596180][T14041] FAULT_INJECTION: forcing a failure. [ 310.596180][T14041] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 310.609477][T14041] CPU: 0 UID: 0 PID: 14041 Comm: syz.1.3591 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 310.609519][T14041] Tainted: [W]=WARN [ 310.609527][T14041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 310.609540][T14041] Call Trace: [ 310.609545][T14041] [ 310.609553][T14041] __dump_stack+0x1d/0x30 [ 310.609578][T14041] dump_stack_lvl+0x95/0xd0 [ 310.609658][T14041] dump_stack+0x15/0x1b [ 310.609684][T14041] should_fail_ex+0x263/0x280 [ 310.609725][T14041] should_fail+0xb/0x20 [ 310.609821][T14041] should_fail_usercopy+0x1a/0x20 [ 310.609854][T14041] _copy_from_iter+0xcf/0xea0 [ 310.609878][T14041] ? __alloc_skb+0x397/0x4b0 [ 310.609922][T14041] ? __alloc_skb+0x219/0x4b0 [ 310.609958][T14041] netlink_sendmsg+0x4ae/0x6f0 [ 310.609987][T14041] ? __pfx_netlink_sendmsg+0x10/0x10 [ 310.610088][T14041] ____sys_sendmsg+0x5af/0x600 [ 310.610116][T14041] ___sys_sendmsg+0x195/0x1e0 [ 310.610179][T14041] __x64_sys_sendmsg+0xd4/0x160 [ 310.610201][T14041] x64_sys_call+0x17ba/0x3000 [ 310.610225][T14041] do_syscall_64+0xc0/0x2a0 [ 310.610282][T14041] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 310.610310][T14041] RIP: 0033:0x7f7e92afaeb9 [ 310.610329][T14041] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 310.610348][T14041] RSP: 002b:00007f7e91557028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 310.610368][T14041] RAX: ffffffffffffffda RBX: 00007f7e92d75fa0 RCX: 00007f7e92afaeb9 [ 310.610423][T14041] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 310.610509][T14041] RBP: 00007f7e91557090 R08: 0000000000000000 R09: 0000000000000000 [ 310.610648][T14041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 310.610662][T14041] R13: 00007f7e92d76038 R14: 00007f7e92d75fa0 R15: 00007fff30d5d3a8 [ 310.610684][T14041] [ 310.805567][T13918] team0: Port device team_slave_0 added [ 310.827702][T13918] team0: Port device team_slave_1 added [ 310.862999][T13918] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 310.870104][T13918] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 310.896161][T13918] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 310.909096][T13918] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 310.916213][T13918] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 310.942287][T13918] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 311.005388][T13918] hsr_slave_0: entered promiscuous mode [ 311.012995][T13918] hsr_slave_1: entered promiscuous mode [ 311.018899][T13918] debugfs: 'hsr0' already exists in 'hsr' [ 311.024717][T13918] Cannot create hsr debugfs directory [ 311.341068][T13887] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 311.351896][T13887] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 311.366775][T13887] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 311.385387][T13887] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 311.494794][T14107] FAULT_INJECTION: forcing a failure. [ 311.494794][T14107] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 311.508216][T14107] CPU: 0 UID: 0 PID: 14107 Comm: syz.7.3597 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 311.508252][T14107] Tainted: [W]=WARN [ 311.508259][T14107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 311.508272][T14107] Call Trace: [ 311.508279][T14107] [ 311.508288][T14107] __dump_stack+0x1d/0x30 [ 311.508325][T14107] dump_stack_lvl+0x95/0xd0 [ 311.508396][T14107] dump_stack+0x15/0x1b [ 311.508421][T14107] should_fail_ex+0x263/0x280 [ 311.508459][T14107] should_fail+0xb/0x20 [ 311.508493][T14107] should_fail_usercopy+0x1a/0x20 [ 311.508534][T14107] strncpy_from_user+0x27/0x250 [ 311.508568][T14107] getname_flags+0xad/0x3b0 [ 311.508624][T14107] user_path_at+0x28/0x130 [ 311.508652][T14107] __x64_sys_umount+0x85/0xe0 [ 311.508716][T14107] x64_sys_call+0xd6a/0x3000 [ 311.508748][T14107] do_syscall_64+0xc0/0x2a0 [ 311.508786][T14107] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 311.508858][T14107] RIP: 0033:0x7f768837aeb9 [ 311.508873][T14107] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 311.508893][T14107] RSP: 002b:00007f7686dd7028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 311.508974][T14107] RAX: ffffffffffffffda RBX: 00007f76885f5fa0 RCX: 00007f768837aeb9 [ 311.509073][T14107] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000001c0 [ 311.509090][T14107] RBP: 00007f7686dd7090 R08: 0000000000000000 R09: 0000000000000000 [ 311.509103][T14107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 311.509120][T14107] R13: 00007f76885f6038 R14: 00007f76885f5fa0 R15: 00007ffc386401a8 [ 311.509216][T14107] [ 311.591556][T13887] 8021q: adding VLAN 0 to HW filter on device bond0 [ 311.732172][T13887] 8021q: adding VLAN 0 to HW filter on device team0 [ 311.970350][T13887] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 311.980879][T13887] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 312.003291][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.010461][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.019783][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.026944][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.072068][T13918] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 312.087249][T13918] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 312.100603][T14113] lo speed is unknown, defaulting to 1000 [ 312.125026][T13918] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 312.155488][T13918] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 312.233150][T13887] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 312.321152][T13918] 8021q: adding VLAN 0 to HW filter on device bond0 [ 312.364267][T13918] 8021q: adding VLAN 0 to HW filter on device team0 [ 312.385819][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.392989][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.418197][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.425512][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.480889][T13918] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 312.601112][T13918] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 312.681619][T13887] veth0_vlan: entered promiscuous mode [ 312.703771][T13887] veth1_vlan: entered promiscuous mode [ 312.738572][T13887] veth0_macvtap: entered promiscuous mode [ 312.746883][T13887] veth1_macvtap: entered promiscuous mode [ 312.776742][T13887] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 312.801424][T14197] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3601'. [ 312.812048][T13887] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 312.968746][ T37] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.986403][T13918] veth0_vlan: entered promiscuous mode [ 313.002699][ T37] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.026785][T13918] veth1_vlan: entered promiscuous mode [ 313.048637][ T37] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.097422][T14222] syzkaller0: entered promiscuous mode [ 313.103087][T14222] syzkaller0: entered allmulticast mode [ 313.117974][T13918] veth0_macvtap: entered promiscuous mode [ 313.135062][T13918] veth1_macvtap: entered promiscuous mode [ 313.147656][T13918] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 313.162858][T13918] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 313.183429][ T37] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.248669][ T37] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.266240][ T37] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.286766][T14238] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3603'. [ 313.297619][ T37] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.316371][ T37] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.335645][T14241] netlink: 60 bytes leftover after parsing attributes in process `syz.8.3605'. [ 313.477936][T14257] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.485278][T14257] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.538613][T14268] loop7: detected capacity change from 0 to 512 [ 313.563337][T14268] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 313.573780][T14257] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 313.591996][T14268] EXT4-fs (loop7): 1 truncate cleaned up [ 313.601586][T14257] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 313.610181][T14268] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 313.673026][ T5172] netdevsim netdevsim9 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 313.692813][ T5172] netdevsim netdevsim9 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 313.723452][ T5172] netdevsim netdevsim9 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 313.753972][ T5172] netdevsim netdevsim9 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 313.819872][T14268] ================================================================== [ 313.828028][T14268] BUG: KCSAN: data-race in xas_clear_mark / xas_find_marked [ 313.835399][T14268] [ 313.837758][T14268] read-write to 0xffff88811b0a46c8 of 8 bytes by task 14282 on cpu 1: [ 313.845947][T14268] xas_clear_mark+0x91/0x180 [ 313.850582][T14268] __folio_start_writeback+0x270/0x370 [ 313.856077][T14268] ext4_bio_write_folio+0x5ad/0x9f0 [ 313.861352][T14268] mpage_process_page_bufs+0x4a1/0x620 [ 313.866856][T14268] mpage_prepare_extent_to_map+0x7d4/0xc50 [ 313.872712][T14268] ext4_do_writepages+0x6fe/0x2800 [ 313.877880][T14268] ext4_writepages+0x18f/0x320 [ 313.882687][T14268] do_writepages+0x1c6/0x310 [ 313.887323][T14268] filemap_write_and_wait_range+0x166/0x370 [ 313.893253][T14268] kiocb_write_and_wait+0x7a/0x110 [ 313.898403][T14268] __iomap_dio_rw+0x5ed/0x14c0 [ 313.903202][T14268] iomap_dio_rw+0x40/0x90 [ 313.907566][T14268] ext4_file_read_iter+0x20f/0x290 [ 313.912729][T14268] copy_splice_read+0x471/0x6c0 [ 313.917624][T14268] splice_direct_to_actor+0x28f/0x670 [ 313.923020][T14268] do_splice_direct+0x119/0x1a0 [ 313.927911][T14268] do_sendfile+0x382/0x650 [ 313.932368][T14268] __x64_sys_sendfile64+0x105/0x150 [ 313.937598][T14268] x64_sys_call+0x2db1/0x3000 [ 313.942306][T14268] do_syscall_64+0xc0/0x2a0 [ 313.946859][T14268] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 313.952779][T14268] [ 313.955137][T14268] read to 0xffff88811b0a46c8 of 8 bytes by task 14268 on cpu 0: [ 313.962787][T14268] xas_find_marked+0x213/0x620 [ 313.967589][T14268] filemap_get_folios_tag+0xfa/0x510 [ 313.972907][T14268] mpage_prepare_extent_to_map+0x328/0xc50 [ 313.978743][T14268] ext4_do_writepages+0x6fe/0x2800 [ 313.983886][T14268] ext4_writepages+0x18f/0x320 [ 313.988675][T14268] do_writepages+0x1c6/0x310 [ 313.993301][T14268] file_write_and_wait_range+0x178/0x2f0 [ 313.998968][T14268] generic_buffers_fsync_noflush+0x45/0x130 [ 314.004894][T14268] ext4_sync_file+0x1aa/0x680 [ 314.009606][T14268] vfs_fsync_range+0x10d/0x130 [ 314.014398][T14268] ext4_buffered_write_iter+0x34f/0x3c0 [ 314.019990][T14268] ext4_file_write_iter+0x380/0xf70 [ 314.025231][T14268] iter_file_splice_write+0x6bc/0xa80 [ 314.030627][T14268] direct_splice_actor+0x156/0x2a0 [ 314.035762][T14268] splice_direct_to_actor+0x311/0x670 [ 314.041160][T14268] do_splice_direct+0x119/0x1a0 [ 314.046033][T14268] do_sendfile+0x382/0x650 [ 314.050503][T14268] __x64_sys_sendfile64+0x105/0x150 [ 314.055740][T14268] x64_sys_call+0x2db1/0x3000 [ 314.060450][T14268] do_syscall_64+0xc0/0x2a0 [ 314.064991][T14268] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 314.070914][T14268] [ 314.073254][T14268] value changed: 0x0000ffff00000000 -> 0x0000fff000000000 [ 314.080385][T14268] [ 314.082724][T14268] Reported by Kernel Concurrency Sanitizer on: [ 314.088899][T14268] CPU: 0 UID: 0 PID: 14268 Comm: syz.7.3610 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 314.100312][T14268] Tainted: [W]=WARN [ 314.104132][T14268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 314.114224][T14268] ================================================================== [ 314.128038][ T29] kauditd_printk_skb: 96 callbacks suppressed [ 314.128066][ T29] audit: type=1400 audit(2000000123.940:3539): avc: denied { write } for pid=3301 comm="syz-executor" path="pipe:[1493]" dev="pipefs" ino=1493 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 314.134596][T14296] loop9: detected capacity change from 0 to 512 [ 314.212951][ T29] audit: type=1400 audit(2000000124.230:3540): avc: denied { recv } for pid=10 comm="kworker/0:1" saddr=10.128.0.163 src=45416 daddr=10.128.0.157 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 314.331269][T14296] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 314.456451][ T4727] bond1: (slave syz_tun): Releasing backup interface [ 314.675068][T14267] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 314.957005][ T3349] bridge_slave_1: left allmulticast mode [ 314.962929][ T3349] bridge_slave_1: left promiscuous mode [ 314.968647][ T3349] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.976610][ T3349] bridge_slave_0: left allmulticast mode [ 314.982262][ T3349] bridge_slave_0: left promiscuous mode [ 314.988032][ T3349] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.004457][ T3349] bond2 (unregistering): (slave ip6erspan0): Releasing backup interface [ 315.015268][ T3349] bond3 (unregistering): (slave ip6gretap1): Releasing active interface [ 315.124422][ T3349] bond1 (unregistering): Released all slaves [ 315.132439][ T3349] bond2 (unregistering): Released all slaves [ 315.141571][ T3349] team0: Port device macvlan2 removed [ 315.148581][ T3349] bond3 (unregistering): Released all slaves [ 315.157614][ T3349] bond4 (unregistering): Released all slaves [ 315.165957][ T3349] bond5 (unregistering): left allmulticast mode [ 315.172242][ T3349] bond5 (unregistering): left promiscuous mode [ 315.179445][ T3349] team0: Port device macvlan3 removed [ 315.186637][ T3349] bond5 (unregistering): Released all slaves [ 315.195301][ T3349] bond6 (unregistering): left allmulticast mode [ 315.201581][ T3349] bond6 (unregistering): left promiscuous mode [ 315.209099][ T3349] team0: Port device macvlan4 removed [ 315.216178][ T3349] bond6 (unregistering): Released all slaves [ 315.224871][ T3349] bond0 (unregistering): Released all slaves [ 315.276615][ T3349] tipc: Left network mode [ 315.284422][ T3349] hsr_slave_0: left promiscuous mode [ 315.379774][ T3349] team0 (unregistering): Port device team_slave_1 removed [ 315.389680][ T3349] team0 (unregistering): Port device team_slave_0 removed [ 315.607239][ T3349] IPVS: stop unused estimator thread 0... [ 315.687664][ T3349] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 315.946647][ T3349] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 315.987350][ T3349] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 316.045565][ T3349] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 316.104323][ T3349] netdevsim netdevsim8 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 316.114680][ T3349] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 316.165564][ T3349] netdevsim netdevsim8 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 316.175985][ T3349] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 316.275348][ T3349] netdevsim netdevsim8 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 316.285831][ T3349] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 316.325862][ T3349] netdevsim netdevsim8 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 316.336404][ T3349] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 316.403762][ T3349] bridge_slave_1: left allmulticast mode [ 316.409549][ T3349] bridge_slave_1: left promiscuous mode [ 316.415352][ T3349] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.423511][ T3349] bridge_slave_0: left allmulticast mode [ 316.429178][ T3349] bridge_slave_0: left promiscuous mode [ 316.435078][ T3349] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.443593][ T3349] bridge_slave_1: left allmulticast mode [ 316.449238][ T3349] bridge_slave_1: left promiscuous mode [ 316.455069][ T3349] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.462781][ T3349] bridge_slave_0: left allmulticast mode [ 316.468431][ T3349] bridge_slave_0: left promiscuous mode [ 316.474191][ T3349] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.585905][ T3349] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 316.589444][T14296] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 316.605264][ T3349] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 316.615611][ T3349] bond0 (unregistering): Released all slaves [ 316.625454][ T3349] bond1 (unregistering): (slave ip6gretap1): Releasing active interface [ 316.633944][ T3349] ip6gretap1 (unregistering): left allmulticast mode [ 316.824719][ T3349] bond0 (unregistering): left allmulticast mode [ 316.831063][ T3349] bond0 (unregistering): left promiscuous mode [ 316.838932][ T3349] team0: Port device macvlan2 removed [ 316.846849][ T3349] bond0 (unregistering): Released all slaves [ 316.855049][ T3349] bond1 (unregistering): left allmulticast mode [ 316.861303][ T3349] bond1 (unregistering): left promiscuous mode [ 316.869592][ T3349] team0: Port device macvlan3 removed [ 316.877257][ T3349] bond1 (unregistering): Released all slaves [ 316.887156][ T3349] bond2 (unregistering): Released all slaves [ 316.941726][ T3349] hsr_slave_0: left promiscuous mode [ 316.948229][ T3349] hsr_slave_1: left promiscuous mode [ 316.954361][ T3349] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 316.961769][ T3349] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 316.969674][ T3349] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 316.977152][ T3349] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 316.987192][ T3349] hsr_slave_0: left promiscuous mode [ 316.993109][ T3349] hsr_slave_1: left promiscuous mode [ 316.998708][ T3349] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 317.006161][ T3349] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 317.014000][ T3349] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 317.021410][ T3349] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 317.035619][ T3349] veth1_macvtap: left promiscuous mode [ 317.041137][ T3349] veth0_macvtap: left promiscuous mode [ 317.048271][ T3349] veth1_vlan: left promiscuous mode [ 317.054566][ T3349] veth0_vlan: left promiscuous mode [ 317.060372][ T3349] veth1_macvtap: left promiscuous mode [ 317.066114][ T3349] veth0_macvtap: left promiscuous mode [ 317.071690][ T3349] veth1_vlan: left promiscuous mode [ 317.077217][ T3349] veth0_vlan: left promiscuous mode [ 317.178610][ T3349] team0 (unregistering): Port device team_slave_1 removed [ 317.190493][ T3349] team0 (unregistering): Port device team_slave_0 removed [ 317.248882][ T3349] team0 (unregistering): Port device team_slave_1 removed [ 317.258842][ T3349] team0 (unregistering): Port device team_slave_0 removed [ 317.933912][ T3349] bridge_slave_1: left allmulticast mode [ 317.939676][ T3349] bridge_slave_1: left promiscuous mode [ 317.945656][ T3349] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.954003][ T3349] bridge_slave_0: left allmulticast mode [ 317.959655][ T3349] bridge_slave_0: left promiscuous mode [ 317.965422][ T3349] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.044634][ T3349] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 318.054690][ T3349] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 318.063844][ T3349] bond0 (unregistering): Released all slaves [ 318.099575][ T3349] hsr_slave_0: left promiscuous mode [ 318.105889][ T3349] hsr_slave_1: left promiscuous mode [ 318.111627][ T3349] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 318.119383][ T3349] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 318.170101][ T3349] team0 (unregistering): Port device team_slave_1 removed [ 318.180974][ T3349] team0 (unregistering): Port device team_slave_0 removed