last executing test programs: 16m8.747171069s ago: executing program 32 (id=3069): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe3}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001e40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000ac0)="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", 0x6c3}], 0x1}}], 0x1, 0x40) sendto$inet(r0, &(0x7f0000000580)="17", 0x1d4c, 0x10048095, 0x0, 0x0) 15m43.867726887s ago: executing program 5 (id=3671): setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x1000, 0x0, 0x2}, {}, {0x0, 0x5}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x2, @in=@dev={0xac, 0x14, 0x14, 0x13}, 0x0, 0x0, 0x0, 0x19, 0x0, 0x200, 0x4}}, 0xe8) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="98030000", @ANYRES16=r2, @ANYBLOB="010028057000fcdbdf253b00000008000300", @ANYRES32=r3, @ANYBLOB="04008e00080057001b0a000004006c000500190107000000080026006c0900005603330080b0c000ffffffffffff080211000001"], 0x398}}, 0x0) 15m43.800418598s ago: executing program 5 (id=3672): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x3, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x2141, 0x9, 0x0, 0x5, 0xfffffffffff7bbfe, 0x3, 0x0, 0x0, 0x602}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 15m43.800282179s ago: executing program 5 (id=3673): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000040)=0x5, 0x4) sendmsg$inet6(r0, &(0x7f0000001140)={&(0x7f00000002c0)={0xa, 0x4e21, 0x80000, @private2, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB], 0x28}, 0x200440d5) 15m43.800155579s ago: executing program 5 (id=3674): mkdirat(0xffffffffffffff9c, 0x0, 0x1c0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x58e, &(0x7f0000000180), 0x1, 0x451, &(0x7f0000001280)="$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") chdir(&(0x7f0000000000)='./file0\x00') open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./bus\x00', 0x0, 0x1008, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x14113e, 0x6ceac77f206eabb9) write$binfmt_script(r0, &(0x7f0000000080), 0x208e24b) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, 0x0, 0x4) 15m43.620367682s ago: executing program 5 (id=3677): r0 = socket(0x2, 0x3, 0xff) sendmmsg$inet(r0, &(0x7f0000001540)=[{{&(0x7f0000000000)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000040)="281effe935fdca249bd774480a584b135c556eabe1a3f2724200a50e8002a6e5", 0x20}], 0x1, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @local}}}], 0x20}}, {{&(0x7f0000000440)={0x2, 0x4e20, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}}], 0x2, 0x4800) 15m43.350610737s ago: executing program 5 (id=3684): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x3, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x2141, 0x9, 0x0, 0x5, 0xfffffffffff7bbfe, 0x3, 0x0, 0x0, 0x602}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 15m43.350491737s ago: executing program 33 (id=3684): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x3, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x2141, 0x9, 0x0, 0x5, 0xfffffffffff7bbfe, 0x3, 0x0, 0x0, 0x602}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 15m43.108254682s ago: executing program 1 (id=3690): connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @mcast2, 0x4000002}, 0x1c) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getgroups(0x2, &(0x7f0000001080)=[0xee01, 0xffffffffffffffff]) setgroups(0x40000000000002e6, &(0x7f0000000140)=[0x0]) keyctl$chown(0x4, r0, 0xee01, r1) keyctl$setperm(0x5, r0, 0x20925) keyctl$KEYCTL_MOVE(0x3, r0, 0x0, 0x0, 0x0) 15m43.038287494s ago: executing program 1 (id=3691): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x56a, 0x331, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x80, 0x0, [{{0x9, 0x4, 0x0, 0x2, 0x1, 0x3, 0x0, 0x1, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x4f8}}, {{{0x9, 0x5, 0x81, 0x3, 0x40, 0x4}}}}}]}}]}}, 0x0) r1 = syz_usb_connect(0x5, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000000003610ef171e7206de010203010902120001000000000000000000"], 0x0) syz_usb_control_io$uac1(r1, &(0x7f0000000080)={0x14, &(0x7f0000000180)={0x40, 0xe, 0xc4, {0xc4, 0x3, "84b52db1b43c2c3ac131b287c97f4a1e1332fd5284275a58cea9a5a4f7c58821d4757295b6a1490b52bce50f51884e2cf20fba93c0ca2ba45126dc724cbfa1e8938846a8cc42365829ad7311c2368d718ee3bdfb9b8b20c07f2a386bf39055d4e2769e2a87b54b6899afa49c4076931030e61e06924bf69ccc8583db616c9cf0d2c5b652ed081fed7195550007e8dc18b41c532f3dfb6dc0916afd2fde99414746ac9ec193ff12438abafd2da384e0067b6a5228de12a107bb52e27c448b133f468f"}}, 0x0}, &(0x7f0000000440)={0x44, &(0x7f00000000c0)={0x40, 0x9}, &(0x7f0000000280)={0x0, 0xa, 0x1, 0x40}, 0x0, &(0x7f0000000300)={0x20, 0x81, 0x2, "15aa"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000140)={0x24, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00220508"], 0x0}, 0x0) 15m42.475114445s ago: executing program 1 (id=3699): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f00008f0000/0x1000)=nil) shmget$private(0x0, 0x4000, 0x40, &(0x7f000087f000/0x4000)=nil) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) write$UHID_INPUT(r4, &(0x7f0000001040)={0xe, {"a2e3ad099b0d09451b5e090987f70e06d038e7ff7fc6e5539b0d3d0e8b089b3f323063090810e0879b0f0ac6e70a9b334d959b669a240d5b0af3988f7ef31952010affe8d178708c523c921b1b5b07070d073e0936cd3b78130daa61d8e81a0006005802b77f07227227b7ba67e0e78657a6f5c2a874e62a9ccdc0d31a0c9f318c0da1993bd160e233df4a62179c6f30e065cd5b91cd0ae19397273ce1766769f0c91c00305d3f46635eb016d5b1dda98e2d749be7bd1df1fb3b231fdcdb5075a9aaa1b469c3090000000000000075271b286329d169934288fd789aa37d6e98b224fd44b65b31334ffc55cc82cd3ac32ecdb08ced6f9081b4dd0d8b38f3cd4498bee800490841bdb114f6b7638354a1236e80f6a8abadea7662496bddbc42be6bfb2f17959d1faf6e56c71b1931870262f5e801119242ca026bfc821e7e7daf2451138e645bb80c617669314e2fbe70de98ec76a9e40dad47f36fd9f7d0d42a4b5f1185ccdcf16ff46295d8a0fa17713c5802630933a9a34af674f3f39fe23491237c08822dec110911e893d0a8c4f677747abc3609aa24b7d520fb29d095083bba2987a67399eac427d145d546a40b9f6ff14ac488ec130bb3850a27af9544ae15a7e454dea05918b41243513f000000000000000a3621c56cea8d20fa911a0c41db6ebe8cac64f17679141d54b34bbc9963ac4f4bb3309603f1d4ab966203861b5b15a841f2b575a8bd0d78248ebe4d9a80002695104f674c2431dca141fae269cab70e9a66f3c3a9a63e9639e1f59c0ede26c6b5d74b078a5e15c31634e5ae098ce9ee70771aaa18119a867e1088334975e9f73483b6a62fa678ca14ffd9f9db2a7869d858647a6526f889af43a6056080572286522449df466c632b3570243f989cce7cd9f465e41e610c20d80421d653a5520000008213b704c7fb082ff27590678ef9f190bae97909507041d860420c5664b27921b14dc1db8892fd32d0ad7bc946813591ad8deff4b05f60cea0da7710000000000000039f00bea37ce0d0d4aa202f928f28381aab144a5d429a04a6a2b83c7068ae949ed06e288e810bac9c76600025e19c907f8ea2e2010000008271a1f5f80800000000000000bdfffe492f21579d2c15b8c70cdb1c332d86d87341432750861ec2bc3451edca194b221cfec4603d276bbaa1dfa6d4fb8a48a76eafc9a9a0270e4c10d64cd5a62427264f2377fe763c43470833ac96c45f357cbbaba8f1b1fdcc7cbb61a7cdb9744ed7f9129aede2be21ccfdc4e9134f8684b3a4f354da9a795e96334e207dff70f1988037b2ed3aaf575c0b88d8f19d684078416d59fdee5325928974d12dad99dac44c3f0008047096a44002bebc2420aed92fa9b6578b4779415d4a1b75d5495c118045651cf41c2fc48b778efa5ea5677747430af4162b987b80c3e001cd34e5c92f76cc4c24eeb8bc4e9ac2aed9e53803ed0ca4ae3a9737d214060005ea6f1783e287b3bee96e3a726eafe2fdfaa78d1f48c13b64df07847754b8400daaa69bf5c8f4350aeae9ca1207e78283cd0b20ceb360c7e658828163e2d25c4aa348561f927e88f63aa70e73a5e69b3df3493e03f06572e1e007fa55a2999f596d067312f5779e8dbfdcf3427138f3d444d2639a10477f9bec4b0bbb6e3c04be68981f392203dd0ee3ef478e16dacfc5e3e03cf7ab8e3902f1b0ff034ef655b253ca509383815b1b6fc6522d4e4fdc11a4f0492d48604675fde2b34cf00500a2690891abf8ab9c015073014d9e08d4338b8780bdecd436cf0541359bafffa45237f104b96210403b2de9efed496f42355bc7872c827467cfa5c4e72730d56bd068ed211cf847535edecb7b373f78b095b68441a34cb51682a8ae4d24ad0465f3927f889b813076038e79a7962fb385a882e8020f06c4c2ba1dd5cac7c18876da865d258734dd73583df292892448039ef799cf0630becdcce04579b5561dc825ab829827955e020c1f67ee615feb6243378e0610060f02cca4e91b2f001edb9754fb4b55668dda93aec92a5de203717a284acfabe262fccfcbb2b75a2183c46eb65ca8104e1b4da7fbb77ab2fc043aead87c32ab875ee7c2e7b7019c982cd3b43eaeb189fb135c695a2de3a340047228032f88c042891824659e9e94265c803b35ee5f83a2b210520106b8a358b50ab7a1fa89af9c251fe5294b3d1802d0676d95f160ec97b1ad94e7475cb74642c37b4a6cc6c04effc1672db7e4b68d787d9a7a508ae54b3cd7369dde50e8c77d95a3d361c022babb171607caac2a3559ad4f75465f49c0d0ae3716db6e00cb11db4a5fade2a57c10238e204a67737c3b42aae501b20f7694a00f16e2d0174035a2c22656dc29880acebdbe8ddbd72ea4998d8ac2dfad2ba3a504767b6b45a45957f24d758ed024b3849c11d412a2a03b4047497022d9c30e23ef4df5ff754413d135273ea8e75f22f216c6b9990ae71806f2c00b4025c58b75c0f73cdb9a7b8fa367b50028067e7f16f4dd569d462f4f19eacdb3ed70eeebb4483f8fd777d443e8b40427db6fe29068c0ca3d2414442e8f3a154704b0e51bc664a137b26be719f4f7c9a5678a674dfc95df80b9ce375dd649c8c704e509bd88c8e63d8c7dd67071115c8982ba46af4d6adcc9f68a75b9397b035953faf46366e7205dd8d6f37525c1a0e94610dd94323f6c15d085197149bfd6655548cfd9c52c9711937f79abb1a124f1210465483cd3b2d78378cfb85ed82e7da0f6eb6d279f2ae455925d0f6f1ba571eba281f2a654fb39ddff3b484439ff158e7c5419e037f3e3ad038f2211f1033195563c7f93cd54b9094f226e783271e1e5a2a2c10712eab625d64931cd4ffe6738d97b9b5ef828ee9fb059fc01af0e79c1e14b1d25988c69a399567c1d93768f7971d31488b8658a20878b7c1d97ba02fc42939dde3d4a3339a65d507dc59c51097b50517705da56e9ebf0afa53282bff6235734352c19966eb95aade7cc66d7bbef724779ca1f731b3346ff177050373d79ff7b3e7f9bc0c1b4b266a8878b90baaa039d3e3b63979ac3df6e6f4859afd50238c7547a39b60810938044ae185d2ba3e00a4e73676864af090d81eaee5ee6cf1d0ab378dd4dd891e937c2ea5410e0513005000000000000003911fab964c271550027697b52160687461602f88df165d885b36ec2b6c25a2f33c715687e9d4afb96d6861aca47da73d6f3144345f48843dd014e5c5ad8fe995754bd9cf32fce1e31919c4b2082fb0a30b9deae84bed4b28045634073c9c58c89d9e99c81769177c6d594f88a4facfd4c735a20307c737afa2d60399473296b831dbd933d93994ba3064279b10ea0c5833f41f157ea2302993dbe433b1a85ae7e69fd1a47a284f4113c4c859465c3b415c3432f81db8719539d5bf372aaaea1cc43a6c5cbe59758bfee2916580dac4b008e595f437491d87abed02cefcd9db53d94d02daee67918e5d6787463183b4b87c1050000002f7809959bc048850613d17ca51055f2f416a44fe180d2d50c312cca7cb14a2bdc331f57a9817139a206fc76957227ffff2de20a4b8e3737fbb42913777c06376f799eba367e21f94ca598705f5dcb767d6f0900d6b0f6095e53c4c4234d0c1fbe434f6ab8f43c0013ee93b83946ee7759e89d7bdd1a32d7b311711b757fe43c06d21a35810d8fe98b27faea8aa12bc8716eefc5c97c45ac33eeec964c5214bc3a9359bdea1cccab94f15e36319cb34ebcacedb82c2ed3de5a8a8f0011e8f74e82d7f96093530e76692839d7961939adfdeeeaff19d11efcafb6d546fef271e89d6cc2389e81ff58cefcce3fbf4625a7e7de40e42e07b344340002000000000000f288a4510de03dab19d26285eda89156d50dd385a60333ba5bbf5d77cd7007ad1519ad5470de3dd6d6080cccf8a97406bb6b68a1f0c4549820a73c880f475f732ae00398e8bd1f4108b7807fb33b72685ec37a2d3f766413a60459516246e5a1d998a2017aef0948a68cf255315ab80dd349e891aef595dc4d470e8ac32a308e15fc37d06aeac289c0523f483e1ff7408c6087f1ab652f2ef91d4f2b01987b0f46da034e5c3f745a7ee8101a3934c54e24b48ec0275e2d0687dc746b0827cbf652f406c6b95f2722e58c05f752ce2126596e1cd7655b904801784c416b22f73d324678e2724f43f1fe687c7e8a60c28b82b6528341b648cdd56fed7cdcb7427d8392c6289455e8f8d2ab2242729251ae033a9e02210e62df0546a74b333a1c48f95fd54acb5741259e8c5488efeee327415cc19451432c2e14c27693102a3cd84857cd6586fc5ca9a93eb0145fac0662ff86107f998a8ef7df8aa14046c55b03d3d47f88a8d60f7774a2ee08758897fb411a94b3c2fc5d5f0db42c0456ec015f08e5247d33ae2d35603ff8454c16f8342856935125102bb784ed7148b6ce431b63ec00000000000000b90e29389f22fc5b59a70efaea2bd40195af4486220d702e30bfc43c10ec23ea6283994a7dde4dcb61fea6b651fb1d62458d0741a52830052fcc460db043afe525629b48d7cee458e4cb5e930ed624806c43a006e39336d07c2b8081c128ad2706f48261f7897484c297a1a6613bc18f5a38d442768af38041efe03d152ef95ff569e76db2391f4509d7f339d92fdb4a89364949da398000000000000000d80a4fe654578376e599aff3565b1d531f30912b9945030b81ea9935fd46edb44a78f615255490a4b621501f2a9e4d24624c4dac9274118c67584f5d374755534d7f68f679c4ff516a9c861a0e7e65868fcb2bf1cb9aea4e05df72a0f4b5482b9e935c5af3cf474bed79dfc248c1f5aea4b8b32c5d295e57079d0fe662a46b7f71cd47744db86c50b704c971d90295c7b2c7439a2d78ccfa79b5fc2bff6bbf840262bf89394b3e0691953264d2700c838fa2c7b3425260f59554e502dcea39cb313b0000000000004ca7c12f45858d6284ca6270d6b2f0e58fded8a7b4a302a97bc641df07720ba2b26bbfcc807ca0abb1b44322269c21c5ec685f068ea88067d905ea917bb03eefdaebdeabf2d0dce81204c915c8949de992587c2cb5fe36d7d3e5db21b094b8b7794cb5f07722e47a08d367e5f84c96ec664b72934b99b3109af65d77e86abd6859cddf4bbae1f0930462df15fddbc48562ea3511a8065ef028cf12f14dcf6ebecd8d884836174faf1aa609e5f1ee1162dfa13bdc1fa7cfaadba85c72e9758f03a755d0be53f8d2a1dfb1c68cc164b0a0780d971a96ea2c4d4ca0398c2235980a9307b3d5bd3b01faffd0a5dbed2881a9700af561ac8c6b00000000000000f96f06817fb903729a7fb6ff957697c9ede7885d94ffb0969be0daf60af93109eb1dee72e4363f51af62af6fb2a6df3bec89822a7a0b678058fa3fef86faec216eb6992162f8dcbf719c148cd2f9c55f49010c0000002c3e90f3943dbc10360a1a49700d1dfbf66d69f6fbaf506c8bcce8bb0d872a02238926407a4eddd5d0fc5a752f9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000", 0x1000}}, 0x1006) 15m41.573471942s ago: executing program 1 (id=3709): syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000040)='./file0\x00', 0x8000, &(0x7f0000000c00)=ANY=[@ANYBLOB="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", @ANYBLOB="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"], 0xf, 0x2a8, &(0x7f00000001c0)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x1214040, 0x0) chroot(&(0x7f0000000100)='./file0\x00') mount$bind(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2a05004, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00') 15m41.505590763s ago: executing program 1 (id=3710): r0 = syz_open_dev$loop(&(0x7f0000000000), 0x3627, 0x480) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) 15m41.270816198s ago: executing program 1 (id=3712): r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x601c2, 0x0) ftruncate(r0, 0x8800000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000034c0)=[{{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000000b80)=""/4096, 0x20001b80}, {&(0x7f0000001b80)=""/112, 0x70}], 0x2, 0x0, 0xa0028cb4}}], 0x40000000000013c, 0x700, 0x0) sendfile(r1, r0, 0x0, 0x100001100) 15m41.270520398s ago: executing program 34 (id=3712): r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x601c2, 0x0) ftruncate(r0, 0x8800000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000034c0)=[{{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000000b80)=""/4096, 0x20001b80}, {&(0x7f0000001b80)=""/112, 0x70}], 0x2, 0x0, 0xa0028cb4}}], 0x40000000000013c, 0x700, 0x0) sendfile(r1, r0, 0x0, 0x100001100) 15m4.643995856s ago: executing program 3 (id=4129): r0 = syz_open_dev$loop(0x0, 0x2, 0x20081) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000002c0)={r1, 0x0, {0x2a00, 0x80010000, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xd, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd64c6a4b4e00d9683dda1af1ea89de2b7fb0a0100000000000000000300", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "90be8b1c551265406c7f306003d8a0f4bd00000014000800000000000000007f"}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='contention_end\x00'}, 0x18) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x6e) 15m4.554759238s ago: executing program 3 (id=4130): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7b, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000002240)="2d12376647d788ad2cdbd0e68c140c7f72d35ae5869c470a1f53ea73c32220190e02cb0b770bb154d1d5d1b343cb1feadca1752e4397955e1a151721f1b28b9e32b7966f9ddd7ad3822c5ff3dc03786c1c86c2a6f7c271710c573396ca95e95a524201b0bf0539042ae14072693f9734306f7a21f92421e8e0ea335d07d1f2839c4c195930cd35c65dfc527de84f2cab4f0c78474734d7c5cba0c70ee0fd10ad5ed3f4b70308c29000e8cd98d57c90c7d9298ee4a2c41b141614627880ace9cfde45a0ae5f6f5cf3eb31254454e92eacdab64eb048b144e4fcc16afe59e7d7dad7696df64aa223d14d69bbe8ee2f76e1d4a32477a7cf108fea86a7e085c1575f683857cff342574109f74cf05e3f63f328f46735ba0578d84b4978ce545621b1666ca7da451d40e961a037822eebcbba9bf9e92af7281442efcaa8e0d3ecd6111d8fc1c742d0e7efe8e51a1c5e6ea04fec02a986cba677d9dc642d110df6f55c786c73f7ce4ebf9415bdb2680d0ff4597006d96e3c164114a4effae84380e492822c002b2e96f160a0784fd0ebe448eddaa801921576287f61a15be332a94eea951c0826874d105173a6b3f2a6e420ed5ef00b1f699b74c524a1859cb7d6dfb7257b6f0b92e17ce21237da0ec892735601b29693dce455876447f76df303a8cb34bd9c9241da9904c1c17d416753c71aeed9cc07d26b4a438df4e302cf120cda73c04d5a1b7295f1cb7ff88084211adde5fdf991f97cb522b56c561ad1119a4675fbf566b77660dfd457467652d23c739cc9ba93bbd5b464c46e46187ce71d7aab533e670c861b227454d7c21f9f16000eee0c1772a152c26acd2744c5553ace622369f15d5354a3b5ac4bb9261a766830d351fa931558dee7ff30768b2e29025c3b115179ed6a12ea76a23db3626bc033f85a43c3c3f50b75", 0x299, 0x4000, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f0000000700)="0c268a927f1f6588b967481241ba78600a34f65ac618ded8974895abeaf4b4834ff959bcecc7a95425a3a07e758044ab4ea6f7c555d88fecf90b037511bf746bec66ba", 0x994b6e03113064ae, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000035c0)=""/4106, 0x100a}], 0x1, 0x0, 0x0, 0x407006}, 0x104) 15m4.486720729s ago: executing program 3 (id=4131): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x1) recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001d40)=""/4078, 0xfee}, {&(0x7f0000000340)=""/141, 0x8d}, {&(0x7f0000002d40)=""/4116, 0x1005}, {&(0x7f0000000400)=""/6, 0x6}, {&(0x7f0000000440)=""/231, 0xe7}], 0x5}}], 0x3ffffbd, 0x0, 0x0) socket$tipc(0x1e, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r1}, 0x10) unshare(0x62040200) socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000005, 0x8031, 0xffffffffffffffff, 0x0) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) 15m3.89862741s ago: executing program 3 (id=4137): syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000001000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x14004, &(0x7f0000000340), 0xfe, 0x272, &(0x7f0000000cc0)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x8005, 0x0, 0x0, 0x15, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cbf7966d61fdcf335263bd9bffbcc2542ded71038259ca171ce1a311ef54ec32d71e14ef3dc177e9b48b00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x200]}) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0xc4042, 0x1ff) 15m3.609928896s ago: executing program 3 (id=4147): syz_open_procfs(0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180500000000c800000000004b"], &(0x7f00000001c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xa}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x2, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000011c0), r0) sendmsg$IEEE802154_LLSEC_LIST_DEV(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001200)={0x14, r4, 0x301, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40004) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x90) getdents64(r5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 15m3.226640534s ago: executing program 3 (id=4154): bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001580)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x4}, @in=@local, 0x0, 0x0, 0x4e24, 0x0, 0x2, 0x0, 0x0, 0x11}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9}, {}, 0x1, 0x0, 0x1}, {{@in=@multicast2, 0x4d2, 0x33}, 0x0, @in=@private=0xa010100, 0x3506, 0x0, 0x2, 0xb7, 0x2}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x1c) 15m3.219363554s ago: executing program 35 (id=4154): bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001580)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x4}, @in=@local, 0x0, 0x0, 0x4e24, 0x0, 0x2, 0x0, 0x0, 0x11}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x9}, {}, 0x1, 0x0, 0x1}, {{@in=@multicast2, 0x4d2, 0x33}, 0x0, @in=@private=0xa010100, 0x3506, 0x0, 0x2, 0xb7, 0x2}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x1c) 9m56.294472783s ago: executing program 8 (id=8123): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x15, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 9m56.291205163s ago: executing program 8 (id=8124): r0 = socket$inet6(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000200)={@local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @local}, @redirect={0x4, 0x2, 0x0, @broadcast=0x1000000, {0x15, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x11, 0x6, @empty, @dev={0xac, 0x14, 0x14, 0x15}, {[@timestamp_addr={0x44, 0x4, 0x0, 0x1, 0x5}, @timestamp_addr={0x44, 0x3c, 0x0, 0x1, 0x0, [{}, {@loopback}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x40000}, {@local, 0x800}, {@multicast2}, {@dev, 0x4}, {@private=0xa010102, 0x1}]}]}}}}}}}, 0x0) 9m56.273187593s ago: executing program 8 (id=8125): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000002000000000000000008082295"], &(0x7f00000002c0)='GPL\x00', 0x5, 0x0, 0x0, 0x40f00}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'veth0_macvtap\x00', 0x0}) r4 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000100)={r0, r3, 0x25, 0x4, @val=@uprobe_multi={0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0xffffffffffffffff}}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000000)={r4, r1, 0x4, r0}, 0x6) 9m56.182592175s ago: executing program 8 (id=8129): syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./file0\x00', 0x880, &(0x7f00000001c0)=ANY=[@ANYBLOB='shortname=lower,iocharset=iso8859-1,fmask=00000000000000000000066,uni_xlate=1,uni_xlate=0,fmask=00000000000000000000003,uid=', @ANYRESHEX=0x0, @ANYBLOB=',uni_xlate=0,utf8=1,check=strict,nonumtail=0,rodir,errors=continue,shortname=lower,umaQk=00000000000000000000007,rodir,sys_immutable,\x00'], 0x4, 0x2dc, &(0x7f0000000bc0)="$eJzs3c1uG1UfBvBnEsf221fCXrBCSIwEC1ZV0ytwhFIJkRVVFsACIppKKI6QWikSH8Ltii0bFiy4AiQkLoQNd8AFILGjlSoNmvE4toubj6pu+fj9Nj45c54z/zMZJ5NFjj969fjoVpnb97/8Nf1+kY1RRnlQZJiNzNzLktE3AQD+yR5UVX6vplYdL+6tzhVJ+muuDQBYj/N+/7deOm391L52114aALAmN997/52dvb3dd8uynxvHX5/s13/Z16/T4zu380nGOcy1DPIoaR4UttI8LdTNG1VVTTrlw7Ish3njeHKyXyePP/y5nX/nt6TJb2eQYdN1+rTR5N/e290upxbyk7qOK+35R3X+egZ5+TS8lL++Ip/9bt58faH+qxnkl4/zaca51RQxzfeyt/vVdlm+VX37xxcf1OXV+WJyst9rxs1Vm8/5WwMAAAAAAAAAAAAAAAAAAAAAwL/Y1XbvnF6a/Xvqrnb/nc1H9RdbKWeGy/vzTPPFbKLF/YGqqppU+X62P8+1siyrduA838krnXRezKoBAAAAAAAAAAAAAAAAAADg7+XuZ58fHYzHh3eeSaPYmM7aSfLwZvK084wWel7L8phRstTTa1dyMB63Z8/4cLgwYafpaePZnI0pkjPLqBfxjC7LeY3/LVa42Pjhx8tO2D9/zNbqcz1V48rqazi7u44OitXXsJdZT7+9Sb7rJvMx3VywjO6TDlW5zO3XXVFhMrhIfLbW6Tz/bw5NzkileHJhm6fvy7aneHwV3eaqroxvtY089gaZ3xsXup/Tn8b/+rOisFsHAAAAAAAAAAAAAAAAAACs1fy/f1ccvH9mdKPqra0sAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHiu5p//f4nGpA1fYHA3d+6+4CUCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwH/BnAAAA//+lXFN6") r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x24020000) r2 = syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_pidfd_open(r2, 0x0) setns(r3, 0x24020000) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r4, &(0x7f0000000100)='.\x00', 0x9000, &(0x7f0000001dc0)={0x0, 0x85, 0x20000}, 0x20) 9m56.078385797s ago: executing program 8 (id=8134): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x61}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0x14, 0x0, &(0x7f0000000600)="b9ff033168c3268cb89e14f00800b86efafaf697", 0x0, 0xc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 9m55.870161571s ago: executing program 8 (id=8141): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc}, 0xe) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r1, 0x73}, 0x8) 9m55.803208102s ago: executing program 36 (id=8141): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc}, 0xe) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r1, 0x73}, 0x8) 6m6.202303634s ago: executing program 7 (id=12345): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x10, &(0x7f0000000480)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) listen(0xffffffffffffffff, 0x7f) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2, 0x0, 0x0, 0x1}}}}}}, 0x0) 6m6.155354285s ago: executing program 7 (id=12347): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000", @ANYRES32=r2], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 6m6.104255787s ago: executing program 7 (id=12349): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) syz_emit_ethernet(0x86, &(0x7f00000010c0)={@local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @local}, @redirect={0x4, 0x2, 0x0, @broadcast=0x1000000, {0x17, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x11, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x15}, {[@timestamp_addr={0x44, 0xc, 0x0, 0x1, 0x5, [{@private=0xa010102, 0x4e20fffc}]}, @timestamp_addr={0x44, 0x3c, 0x0, 0x1, 0x0, [{@multicast1}, {}, {@loopback}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@local, 0x800}, {@multicast2}, {@dev, 0x4}]}]}}}}}}}, 0x0) 6m6.055158307s ago: executing program 7 (id=12351): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) unshare(0x6020400) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1, 0x36b, &(0x7f0000000a00)="$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") syz_emit_ethernet(0x66, 0x0, 0x0) 6m5.886196311s ago: executing program 7 (id=12355): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000d80)="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", 0x156}, {&(0x7f0000000780)="029993440c7a1d95d3bb8cf353fd63c588ffa39f0ff0fced20927ea4b2a247", 0x1f}], 0x2}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000003c0)="b1", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000800)="f6b328c40d4cc969a0513b8ffd72381d4ef4a89954104d4a81db2fa3c0f906a33482e2821787ac54c0c62da54d1c77255c322358d0e272be2ccacf8f689f0115afd7305a1ce39e8b54734910fd9257fc4d3d2f910d5b9965f73440df67940c76ddc3df03db0d78c28fc030a88d5060290aa8ec", 0x73}, {&(0x7f00000008c0)="20c048210440d8394cdcb9ee88a6b7584a3e07b1b1d67f42b2dda515bffbb8de861e60d4ee6dad628fdf1055f9a1", 0x2e}], 0x2}}], 0x3, 0xc0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x501, 0x10008095, 0x0, 0x0) 6m5.352004091s ago: executing program 7 (id=12366): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x3c, r2, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@ETHTOOL_A_STRSET_HEADER={0x18}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x25, 0x1, 0x14}]}]}]}, 0x3c}}, 0x0) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r3, 0xc0189436, 0x0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, r4}, 0x50) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a09000000000000000000020000000900020073797a310000000008000440000000000900010073797a30000000000800034000000003"], 0x64}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x3, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x101}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x1f00, 0x11}, 0x94) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="440000001000ffff27b570a3ecdbdf25000090ce", @ANYRES32=0x0, @ANYBLOB="100a0500231a05001400128009000100697069700000000004000280050011000b0000000500100003000000"], 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x20040040) 6m5.321658201s ago: executing program 37 (id=12366): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x3c, r2, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@ETHTOOL_A_STRSET_HEADER={0x18}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x25, 0x1, 0x14}]}]}]}, 0x3c}}, 0x0) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r3, 0xc0189436, 0x0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, r4}, 0x50) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a09000000000000000000020000000900020073797a310000000008000440000000000900010073797a30000000000800034000000003"], 0x64}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x3, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x101}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x1f00, 0x11}, 0x94) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="440000001000ffff27b570a3ecdbdf25000090ce", @ANYRES32=0x0, @ANYBLOB="100a0500231a05001400128009000100697069700000000004000280050011000b0000000500100003000000"], 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x20040040) 4.198524957s ago: executing program 4 (id=17633): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='proc\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f00000017c0)='./file1\x00', 0x0, &(0x7f0000000000), 0x1, 0xb80, &(0x7f0000000c40)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r1 = io_uring_setup(0x437a, &(0x7f00000002c0)={0x0, 0x698c, 0x40, 0x2, 0xfffffffe}) r2 = epoll_create1(0x0) close_range(r1, r2, 0x200000000000000) r3 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) listen(r3, 0x0) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001dc0)={0x0, 0x7000, 0x80000}, 0x20) r4 = accept$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendto$packet(r4, &(0x7f0000000180)="3a00093ebcb0d0075c57d450aaa8f1e9979ee6ebf03119e747435a45a91dbea18b7516a61153e2334411329845185b51546c9db855", 0x35, 0xc084, &(0x7f0000000280)={0x11, 0x4, r5, 0x1, 0x4, 0x6, @local}, 0x14) r6 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r6, &(0x7f0000000080)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f00000000c0)=@req3={0x80000000, 0x0, 0x2}, 0x1c) accept4$inet6(r3, 0x0, 0x0, 0x0) sendmsg$tipc(r6, &(0x7f0000000640)={&(0x7f0000000300)=@nameseq={0x1e, 0x1, 0x2, {0x43, 0x0, 0x3}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0) open(&(0x7f0000000100)='./file1\x00', 0x64842, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0xe, 0xc3, &(0x7f000000cf3d)=""/195, 0x40f00, 0x0, '\x00', 0x0, @sock_ops}, 0x94) pwrite64(r7, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) 3.934337183s ago: executing program 9 (id=17635): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) readv(r0, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/135, 0xc9}], 0x1) 3.349754724s ago: executing program 4 (id=17641): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x18) socket$inet_mptcp(0x2, 0x1, 0x106) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) pipe2$9p(0x0, 0x800) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000000c0)=0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="010028bd7000070000000200000008000100", @ANYRES32=r2], 0x1c}, 0x1, 0x0, 0x0, 0x40089}, 0x8004) write$nci(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="414601", @ANYRES8], 0x4) 3.194446027s ago: executing program 4 (id=17645): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ptrace$setopts(0x4200, 0x0, 0x18, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) unshare(0x62040200) 3.01855327s ago: executing program 9 (id=17646): openat$nvram(0xffffffffffffff9c, 0x0, 0x800, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89b1, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0}}, 0x10) sendto$packet(r4, &(0x7f0000000180)="3a00093ebcb0d0075c57d450aaa8f1e9979ee6ebf03119e747435a45a91dbea18b7516a61153e2334411329845185b51546c9db855", 0x35, 0xc084, &(0x7f0000000280)={0x11, 0x4, r5, 0x1, 0x4, 0x6, @local}, 0x14) r6 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r6, &(0x7f0000000080)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f00000000c0)=@req3={0x80000000, 0x0, 0x2}, 0x1c) accept4$inet6(r3, 0x0, 0x0, 0x0) sendmsg$tipc(r6, &(0x7f0000000640)={&(0x7f0000000300)=@nameseq={0x1e, 0x1, 0x2, {0x43, 0x0, 0x3}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0) open(&(0x7f0000000100)='./file1\x00', 0x64842, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000280)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0xe, 0xc3, &(0x7f000000cf3d)=""/195, 0x40f00, 0x0, '\x00', 0x0, @sock_ops}, 0x94) pwrite64(r7, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) 1.085650149s ago: executing program 6 (id=17600): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0xfdfe, 0x7, @remote, 0x4}, 0x1c) connect$pppl2tp(r0, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x34000}], 0x1) 1.02530256s ago: executing program 0 (id=17649): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 1.02497591s ago: executing program 9 (id=17650): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYRESOCT, @ANYRES32=r1, @ANYRESDEC=r2], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01020000000000000000020000000900020073797a310000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x24048011}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000d80)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000d00)=ANY=[@ANYBLOB="140000001000010000000200000000000220000a3c000000120a09080000000000000000020000000900020073797a310000000008000440000000000900010073797a3000000000080003400000000a"], 0x64}, 0x1, 0x0, 0x0, 0x5}, 0x0) process_mrelease(0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000006003051878536f1216d114000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000740)=ANY=[@ANYRES64=r1, @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0xfffffff9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) open(&(0x7f0000000380)='./file0\x00', 0x82ff, 0x9a) r6 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$setlease(r6, 0x400, 0x1) fcntl$setlease(r6, 0x400, 0x300000000000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB="380000004800010000000700000000000a008000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\b\x00'], 0x38}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r8}, 0x10) io_uring_setup(0x6ecd, &(0x7f0000000140)={0x0, 0x49fd, 0x10003, 0x24002, 0x185}) syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 969.317031ms ago: executing program 6 (id=17652): r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000006c0), 0x20200) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000700)={0x3, 0x3, 0xfffffffc, 0x1, 0x7}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$kcm(0x2d, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000340)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000240)={r2}) close_range(r1, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3, 0x0, 0x2}, 0x18) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x88002, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r5, 0x107, 0x12, 0x0, &(0x7f0000001600)) pwritev(r4, 0x0, 0x0, 0x0, 0x0) 955.229491ms ago: executing program 0 (id=17653): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f000001a640)=@delchain={0x47c, 0x65, 0x2, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x1}, {0x0, 0x1}, {0x0, 0xb}}, [@filter_kind_options=@f_matchall={{0xd}, {0x440, 0x2, [@TCA_MATCHALL_ACT={0x43c, 0x2, [@m_sample={0x11c, 0x5, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x5}]}, {0xe5, 0x6, "38f25df555191be2c666d9a5f9fbf1c6674d930a6b49548795f779c04738d31476e7b46904303e774f670daac95204b3aa00967b9ec65d764b2e48bd715da197540ac2dbea2e115f4efd22ebb0c4531bf7fcd31b61547bd15f710737fab7ba50f6730bcf7c68fd6f6734dc220ebc37df3b8e187fddc4516e5f783c302bbc133134d2a06ab408a97de6505724f9be2eb62a565a1535810f54b758c56ab347d36db167b672425230830efb7606f51b3a894056ee7b74af7ad106d611b3d7c4a326bbd604993d9eba87f5d9d7c682cf9643bb5648bc70f946ebac22580878bb773b06"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x7}}}}, @m_ctinfo={0x90, 0x1b, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0x72a0, 0x4, 0xffffffffeffffff1, 0x2, 0x9}}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x7}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x8001}]}, {0x39, 0x6, "89a75f1f9832982c0a59ad5c7b043805d7ff0d0a67a9df5adf2ac6dab7c5cfad8bbf15a9388f68544ed8dea9946ee57f3ffd502c80"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_gact={0x110, 0x1d, 0x0, 0x0, {{0x9}, {0x88, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x2, 0xc7f, 0x5}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0xa96}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x160e, 0x6}}, @TCA_GACT_PARMS={0x18, 0x2, {0x400, 0x9, 0x5, 0x3, 0x3bc}}, @TCA_GACT_PARMS={0x18, 0x2, {0x4, 0x5, 0x4, 0xe, 0x2800000}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x92a, 0x10000000}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0xfd0, 0x7}}, @TCA_GACT_PARMS={0x18, 0x2, {0x2, 0x8, 0x4, 0xfff, 0x4}}]}, {0x5d, 0x6, "015c581fa268e87cd777a21a4aca6176b1acd3c4573cb5b8a04e655698f2a2beb41a6dd4120f7117c00a0e5775ad33bb1e629bea904fa46de53a7a59512190f5b8772a6c1599cf0fd101865d09219c94c1fb32f139037d6237"}, {0xc}, {0xc, 0x8, {0x1, 0x3}}}}, @m_tunnel_key={0x88, 0x3, 0x0, 0x0, {{0xf}, {0x28, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0xb, 0x81, 0x2, 0xffffffff, 0x3}, 0x1}}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x1}]}, {0x34, 0x6, "7c3b5bfcb83686732928afc192a22d90d27a9989759a481dd012b504df8599e1385efa6ed3eed4aa4eadeabe7be45721"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_mirred={0xf4, 0x16, 0x0, 0x0, {{0xb}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80000001, 0xfffffff7, 0x3, 0xe}, 0x4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x1, 0x4, 0x1, 0x8}, 0x3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x3, 0x0, 0x1, 0x5, 0x3}, 0x3}}]}, {0x66, 0x6, "605524e3626aca9778df374bbcad3d51d25178b24ec88e3a92acc301747daa26bb3deb8b829e8a55fdb30b1765bad6b2ed28273083ed0a35559ef9dfc77b5bd2e05bd2ccccad0ad73d611653ce29c79832ce1a80c857bc92eb376b42ab09b1778f1b"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}]}}, @TCA_CHAIN={0x8, 0xb, 0x6}]}, 0x47c}, 0x1, 0x0, 0x0, 0x81}, 0x20000080) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x21}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0xffffffffffffff2f}}], 0x4000000000003b4, 0x2040000, &(0x7f0000003700)={0x77359400}) 897.400903ms ago: executing program 6 (id=17654): sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x800000001fe, 0x82) r1 = dup(r0) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x17, 0x2000, 0x0, 0x0, 0x0}) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014fa0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) mkdir(&(0x7f0000000580)='./file0\x00', 0x92) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setrlimit(0x9, &(0x7f0000000080)={0x8606, 0xffff}) io_setup(0x8f0, &(0x7f0000002400)) 896.414782ms ago: executing program 9 (id=17655): r0 = semget(0x1, 0x4, 0x39c) semop(r0, &(0x7f0000000180)=[{0x2, 0x6, 0x800}, {0x3, 0xfb97}], 0x2) semop(r0, &(0x7f00000000c0)=[{0x1, 0xbbdd, 0x1000}, {0x1, 0x3}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000140)=[0x7fff]) 881.627953ms ago: executing program 0 (id=17656): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x404, &(0x7f0000000280)={[{@errors_remount}, {@resuid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@resgid}, {@lazytime}, {@quota}]}, 0x1, 0x42f, &(0x7f0000000940)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000000)) r2 = open(&(0x7f00000001c0)='./file2\x00', 0x86442, 0x0) dup3(r2, r0, 0x0) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r3, 0x3f0a, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04aef, 0x3d8, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x404, &(0x7f0000000280)={[{@errors_remount}, {@resuid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@resgid}, {@lazytime}, {@quota}]}, 0x1, 0x42f, &(0x7f0000000940)="$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") (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) syz_init_net_socket$x25(0x9, 0x5, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000000)) (async) open(&(0x7f00000001c0)='./file2\x00', 0x86442, 0x0) (async) dup3(r2, r0, 0x0) (async) io_setup(0x2, &(0x7f0000000400)) (async) io_submit(r3, 0x3f0a, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04aef, 0x3d8, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) (async) 868.413893ms ago: executing program 2 (id=17657): r0 = epoll_create1(0x80000) r1 = epoll_create1(0x80000) r2 = fcntl$dupfd(r0, 0x406, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000180)='mm_page_free\x00', r5, 0x0, 0x1000000}, 0x18) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x8000, &(0x7f0000000100), 0x1, 0x4c4, &(0x7f0000000f40)="$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") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000100)={0x1}) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) 847.131673ms ago: executing program 6 (id=17658): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000540)='inet_sock_set_state\x00', r3}, 0x10) listen(r2, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r4, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) recvfrom$inet(r4, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) 766.745855ms ago: executing program 6 (id=17659): r0 = open(0x0, 0x400, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'geneve1\x00', 0x5c9e}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703e3001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) r3 = socket$igmp(0x2, 0x3, 0x2) sendmsg$inet(r3, &(0x7f0000001ec0)={&(0x7f0000000c00)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000001d40)=[{&(0x7f0000000c40)="174f0309acc581c27c0835a541d5ace14751a6fb5991e1eabe613766930c5209d76188595688370a8db8878df98ad326d683f46b7b", 0x35}], 0x1, &(0x7f0000001dc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xd}, @loopback}}}], 0x20}, 0x4) 766.563475ms ago: executing program 0 (id=17660): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) close(r0) 754.528806ms ago: executing program 6 (id=17661): socket$kcm(0x11, 0x2, 0x0) socket$kcm(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x800, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$kcm(0x29, 0x2, 0x0) pipe2$9p(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000ac0)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b708000002001e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000d00)='sched_switch\x00', r5}, 0x10) r6 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000400), 0x20280, 0x0) ioctl$IMADDTIMER(r6, 0x80044940, &(0x7f0000000080)=0x14) close(r6) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000000)=@ethernet={0x306, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)="eb81c316d88321ba9e60697582f1bf64c97a5e5be29738ece96b09b253b37c822bf861a6aa4ac083f18b698889c9907ef1df6bcecbf1a274d920f7c8612705d4ff40f2c678afed5dc9e66889d58ab650daf576dee6ccb9a956e00e93e9af4642f209475fba754d46879145a54407114c68db79ab82aad1f7d029d85b41f8f2337441f79662ef2abf09ae01127cc4e3e4f4ed2a12f9c269caa7ffe88de45601f13ec77073006967415de6fe2ee0dec8f70657951c8332229e4b2924dc599cf3e4b2c7baffc47cfe9502ae964177605e56ab241e807f773a186d1675cce47be90b5642e498e186487c9e4f2de95eed5035071000ba09873717", 0xf8}, {&(0x7f0000000080)="ca45d5ca7a9bde53c6b2553817b70371b3cc3632de06d1e4e3193197c2d27ab64a0caa1e3e135386828efc2c", 0x2c}, {&(0x7f0000000340)="6cf9cf96aed1a7c0dedb6acae78912764a49f51912289cc266e57d681b7e4553817e5a1415d197d719741b07cc38dea3d932bf7954a5c66a5215e8cb7d06bc884f8056580380b8110117f61484f887135bbf27d32d997d0651affaa0e4f898a5d4c30b9ef93ae5d7c9983ca9dc28149068964c003d2209b74655cdd9a5cc042040f1d779224e70685e0d1c59fd7924d391e4a83728dcffd4a49f440d1adaf5d1a768d0874f657af6b4a5d65736e7b7e629aa8768eb5669fea40ff3c1362246a4301abba26596756673", 0xc9}], 0x3}, 0x40001) 634.491568ms ago: executing program 0 (id=17662): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x7}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1, 0x0, 0x401}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) close(r4) 614.359778ms ago: executing program 2 (id=17663): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 593.852998ms ago: executing program 2 (id=17664): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000000bf0000000000000000008500000020000000850000007d00000095"], &(0x7f0000000080)='GPL\x00', 0x4}, 0x94) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000001580)=[{{0x0, 0x0, &(0x7f0000000d00)=[{0x0}, {&(0x7f0000000800)=""/242, 0xf2}], 0x2}}], 0x1, 0xc0010041, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) recvmmsg(r1, &(0x7f00000002c0), 0x220, 0x100, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000680)="e0b9547ed387dbe9abc89b6f5bff", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 176.012237ms ago: executing program 4 (id=17665): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x18) r4 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r4, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) connect$vsock_stream(r4, &(0x7f0000000400)={0x28, 0x0, 0x2710, @host}, 0x10) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c23003f) write$cgroup_devices(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="80fd"], 0xa) r6 = socket(0x10, 0x803, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r0, @ANYRES32=r7, @ANYRESOCT=r2, @ANYRESDEC=r1, @ANYRES8, @ANYRES32=r4], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x24, r1, 0x0, 0x0, 0xffffff77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r8, 0x0, 0x8000000000000000}, 0x18) nanosleep(&(0x7f00000003c0), 0x0) sendmsg$nl_route(r6, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r9}, 0x18) getsockname$packet(r6, 0x0, &(0x7f0000000200)) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x40}, 0x1, 0x0, 0x0, 0x4014}, 0x4c094) r11 = socket(0x10, 0x3, 0x0) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route_sched(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=@newqdisc={0xb8, 0x24, 0x5820a61ca228659, 0x0, 0xfffffffe, {0x0, 0x0, 0x0, r12, {0x0, 0x9}, {0xffff, 0xffff}, {0x5, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0x5, 0x9, 0x1ff}}}}, @TCA_STAB={0x74, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x3, 0x1, 0xffff, 0x8000, 0x1, 0x3800000, 0x9, 0x4}}, {0xc, 0x2, [0xff, 0x9, 0xfe0a, 0x8]}}, {{0x1c, 0x1, {0x2, 0x6, 0x0, 0x13, 0x0, 0x5, 0x5, 0x2}}, {0x8, 0x2, [0x2, 0x0]}}, {{0x1c, 0x1, {0x9, 0xa9, 0x9, 0x0, 0x0, 0x6bd, 0x53a6, 0x2}}, {0x8, 0x2, [0x1, 0x2]}}]}]}, 0xb8}}, 0x800) 124.046747ms ago: executing program 0 (id=17666): bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = socket$key(0xf, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xc, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000680)='jbd2_handle_extend\x00', r1, 0x0, 0x4}, 0xfffffffffffffec7) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000400)={0xa}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000010c0)=ANY=[@ANYBLOB="1c0000003e000781fcfffffff6dbdf25017c000008000380"], 0x1c}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), r8) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newtaction={0x74, 0x30, 0x1, 0x0, 0x25dfdbfe, {}, [{0x60, 0x1, [@m_mpls={0x5c, 0x1, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x0, 0x0, 0x30000001, 0x8000000}, 0x1}}, @TCA_MPLS_LABEL={0x8}, @TCA_MPLS_PROTO={0x6, 0x4, 0x8847}]}, {0x4, 0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}]}]}, 0x74}}, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)=ANY=[@ANYRES8=r4, @ANYRES8=r0, @ANYRESDEC=r5], 0x184}, 0x1, 0x0, 0x0, 0x2044840}, 0x20050) sendmsg$TIPC_NL_BEARER_DISABLE(r6, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7707bf899a923e39}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES16=r9, @ANYRES16=r4], 0x188}, 0x1, 0x0, 0x0, 0x4004000}, 0x20040884) epoll_pwait(r2, &(0x7f0000000380)=[{}, {}, {}], 0x3, 0x8001, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x101}, 0x4b) r11 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r11, &(0x7f0000000040)={0x1f, 0x2003, @none, 0x0, 0x1}, 0xe) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000700)=0x2f) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES16=r3, @ANYBLOB="0000000000000000b7080000000200007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r13}, 0x3d) 123.444277ms ago: executing program 2 (id=17667): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffee8, &(0x7f00000044c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="480601080000000000000000050000000400078000000300856173683a6e65742c2e65740000000000000780000003000100000005000400000000000900020073797a31000000a98b0004000200000000000000"], 0x48}, 0x1, 0x0, 0x0, 0x200400c1}, 0x8000000) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0x4000000805, 0x0) listen(r1, 0x5) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$nl_route(0x10, 0x3, 0x0) r2 = syz_clone(0x43100000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) rmdir(&(0x7f0000000400)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x41d6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x12ee4, 0x0, 0x56, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xc, 0xffffffffffffffff, 0x2) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) getpeername$l2tp(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) futex(0x0, 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) timer_create(0x7, &(0x7f0000000140)={0x0, 0x6, 0x4, @tid=r2}, &(0x7f0000000340)) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00') r7 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f0000000240)={0x80000011}) write(r5, &(0x7f0000000340), 0x11000) io_setup(0x3fc, &(0x7f0000000500)=0x0) io_submit(r8, 0x1, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r5, 0x0}]) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x40, 0x7fff0000}]}) unshare(0x28000600) 57.761449ms ago: executing program 4 (id=17668): perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x400556, 0x0, 0x0, 0x41000, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x40, 0x7ffc1ffb}]}) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x21081e, &(0x7f00000001c0)={[{@grpquota}, {@nogrpid}, {@quota}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$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") bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0)={0x0, r0}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x8, &(0x7f00000057c0)=ANY=[@ANYBLOB="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"], &(0x7f00000014c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000003c0)='writeback_queue_io\x00', r2, 0x0, 0x8}, 0x18) prctl$PR_SET_NAME(0xf, &(0x7f0000000480)='gtp\x00') lchown(&(0x7f0000000080)='./file1\x00', 0xee01, 0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x17, &(0x7f0000000200)={0x2b, 0x7, 0x81}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xfec8d000) mlock(&(0x7f0000656000/0x3000)=nil, 0x3000) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) ppoll(0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x1b, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0xc, &(0x7f00000000c0)={0x0, 0x1}, 0x8}, 0x94) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) 57.454739ms ago: executing program 2 (id=17669): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = socket$l2tp6(0xa, 0x2, 0x73) syz_create_resource$binfmt(&(0x7f0000000280)='\xe9\x1fq\x89Y\x1e\x923aK\x00') bind$l2tp6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x20) r1 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r1, &(0x7f0000000000)={0xa, 0x0, 0x1, @empty, 0x0, 0x6}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000001000500050007000000000008000900030000001400200000000000000000000000e1ffe000000108000a0000000000060002000100000014001f"], 0x5c}, 0x1, 0x6c}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x10, 0x4, &(0x7f0000000440)=ANY=[], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r4 = socket$unix(0x1, 0x5, 0x0) bind$unix(r4, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r4, 0x402) r5 = socket$unix(0x1, 0x5, 0x0) connect$unix(r5, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$packet_fanout_data(r4, 0x107, 0x16, &(0x7f0000000240)={0x6, &(0x7f0000000080)=[{0xa20, 0xd, 0x7, 0xafd}, {0x6, 0x10, 0x5d, 0x8}, {0x9, 0xf8, 0x40, 0xfffffffb}, {0x0, 0x0, 0x5, 0x7f}, {0xc, 0x10, 0xf7}, {0x2, 0xb, 0x9, 0x7fffffff}]}, 0x10) accept(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = openat$selinux_policy(0xffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r6, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x4814) pipe2$watch_queue(0x0, 0x80) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000200)='io_uring_link\x00'}, 0x18) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 28.653559ms ago: executing program 9 (id=17670): sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x800000001fe, 0x82) r1 = dup(r0) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x17, 0x2000, 0x0, 0x0, 0x0}) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014fa0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) mkdir(&(0x7f0000000580)='./file0\x00', 0x92) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setrlimit(0x9, &(0x7f0000000080)={0x8606, 0xffff}) io_setup(0x8f0, &(0x7f0000002400)) 0s ago: executing program 2 (id=17671): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0xfdfe, 0x7, @remote, 0x4}, 0x1c) connect$pppl2tp(r0, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="16000000000000000400000007"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000000000000081, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r4}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00'}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x18) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x34000}], 0x1) kernel console output (not intermixed with test programs): netns cleanup_net [ 1093.165531][ T3977] RIP: 0010:xfrm_state_fini+0x179/0x1f0 [ 1093.171124][ T3977] Code: 48 8d bb 30 0e 00 00 e8 45 a8 bc fc 48 8b bb 30 0e 00 00 e8 d9 28 c9 fc 5b 41 5e 41 5f 5d c3 cc cc cc cc cc e8 d8 ea a1 fc 90 <0f> 0b 90 e9 d9 fe ff ff e8 ca ea a1 fc 90 0f 0b 90 4c 89 f7 e8 0e [ 1093.190928][ T3977] RSP: 0018:ffffc9000fd6fc60 EFLAGS: 00010293 [ 1093.197038][ T3977] RAX: ffffffff84b60e78 RBX: ffff88810aafc740 RCX: ffff88811c252100 [ 1093.205027][ T3977] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88810aafd540 [ 1093.213117][ T3977] RBP: ffffffff86c8b9c0 R08: 0000000000000000 R09: 0000000000000000 [ 1093.221133][ T3977] R10: ffffffff88e69930 R11: ffffffff856970d0 R12: ffffffff86c8b9e0 [ 1093.229274][ T3977] R13: ffff88810aafc768 R14: ffff88810aafd540 R15: ffff88810aafc740 [ 1093.237340][ T3977] FS: 0000000000000000(0000) GS:ffff8882aef40000(0000) knlGS:0000000000000000 [ 1093.246354][ T3977] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1093.253010][ T3977] CR2: 0000000000000000 CR3: 000000010ecf8000 CR4: 00000000003506f0 [ 1093.261208][ T3977] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 1093.269269][ T3977] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1093.277314][ T3977] Call Trace: [ 1093.280666][ T3977] [ 1093.283710][ T3977] xfrm_net_exit+0x2d/0x60 [ 1093.288227][ T3977] ops_undo_list+0x278/0x410 [ 1093.292861][ T3977] cleanup_net+0x2de/0x4d0 [ 1093.297364][ T3977] process_scheduled_works+0x4cb/0x9d0 [ 1093.302943][ T3977] worker_thread+0x582/0x770 [ 1093.307612][ T3977] kthread+0x489/0x510 [ 1093.311713][ T3977] ? __pfx_worker_thread+0x10/0x10 [ 1093.316942][ T3977] ? __pfx_kthread+0x10/0x10 [ 1093.321614][ T3977] ret_from_fork+0x11f/0x1b0 [ 1093.326233][ T3977] ? __pfx_kthread+0x10/0x10 [ 1093.330874][ T3977] ret_from_fork_asm+0x1a/0x30 [ 1093.335767][ T3977] [ 1093.338874][ T3977] ---[ end trace 0000000000000000 ]--- [ 1093.345180][ T3977] ------------[ cut here ]------------ [ 1093.350696][ T3977] WARNING: CPU: 1 PID: 3977 at net/xfrm/xfrm_state.c:3310 xfrm_state_fini+0x1b9/0x1f0 [ 1093.360425][ T3977] Modules linked in: [ 1093.364342][ T3977] CPU: 1 UID: 0 PID: 3977 Comm: kworker/u8:12 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1093.375995][ T3977] Tainted: [W]=WARN [ 1093.379994][ T3977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1093.390102][ T3977] Workqueue: netns cleanup_net [ 1093.394963][ T3977] RIP: 0010:xfrm_state_fini+0x1b9/0x1f0 [ 1093.400612][ T3977] Code: a8 bc fc 4d 8b 3e e9 06 ff ff ff e8 b1 ea a1 fc 90 0f 0b 90 4c 89 f7 e8 f5 a7 bc fc 4d 8b 3e e9 24 ff ff ff e8 98 ea a1 fc 90 <0f> 0b 90 4c 89 f7 e8 dc a7 bc fc 4d 8b 3e e9 42 ff ff ff e8 7f ea [ 1093.420334][ T3977] RSP: 0018:ffffc9000fd6fc60 EFLAGS: 00010293 [ 1093.426427][ T3977] RAX: ffffffff84b60eb8 RBX: ffff88810aafc740 RCX: ffff88811c252100 [ 1093.434447][ T3977] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888116271b00 [ 1093.442477][ T3977] RBP: 0000000000000080 R08: 000188810aafd55f R09: 0000000000000000 [ 1093.450605][ T3977] R10: ffff888116271900 R11: 00018881162716ff R12: ffffffff86c8b9e0 [ 1093.458722][ T3977] R13: ffff88810aafc768 R14: ffff88810aafd558 R15: ffff888116271b00 [ 1093.466747][ T3977] FS: 0000000000000000(0000) GS:ffff8882aef40000(0000) knlGS:0000000000000000 [ 1093.475815][ T3977] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1093.482494][ T3977] CR2: 0000000000000000 CR3: 000000010ecf8000 CR4: 00000000003506f0 [ 1093.490536][ T3977] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 1093.498544][ T3977] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1093.506556][ T3977] Call Trace: [ 1093.509853][ T3977] [ 1093.512804][ T3977] xfrm_net_exit+0x2d/0x60 [ 1093.517327][ T3977] ops_undo_list+0x278/0x410 [ 1093.521955][ T3977] cleanup_net+0x2de/0x4d0 [ 1093.526411][ T3977] process_scheduled_works+0x4cb/0x9d0 [ 1093.532082][ T3977] worker_thread+0x582/0x770 [ 1093.536820][ T3977] kthread+0x489/0x510 [ 1093.540934][ T3977] ? __pfx_worker_thread+0x10/0x10 [ 1093.546169][ T3977] ? __pfx_kthread+0x10/0x10 [ 1093.550863][ T3977] ret_from_fork+0x11f/0x1b0 [ 1093.555488][ T3977] ? __pfx_kthread+0x10/0x10 [ 1093.560139][ T3977] ret_from_fork_asm+0x1a/0x30 [ 1093.564950][ T3977] [ 1093.568055][ T3977] ---[ end trace 0000000000000000 ]--- [ 1093.574216][ T3977] ------------[ cut here ]------------ [ 1093.579721][ T3977] WARNING: CPU: 1 PID: 3977 at net/xfrm/xfrm_state.c:3312 xfrm_state_fini+0x1d2/0x1f0 [ 1093.589415][ T3977] Modules linked in: [ 1093.593492][ T3977] CPU: 1 UID: 0 PID: 3977 Comm: kworker/u8:12 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1093.605328][ T3977] Tainted: [W]=WARN [ 1093.609276][ T3977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1093.619464][ T3977] Workqueue: netns cleanup_net [ 1093.624375][ T3977] RIP: 0010:xfrm_state_fini+0x1d2/0x1f0 [ 1093.630080][ T3977] Code: a7 bc fc 4d 8b 3e e9 24 ff ff ff e8 98 ea a1 fc 90 0f 0b 90 4c 89 f7 e8 dc a7 bc fc 4d 8b 3e e9 42 ff ff ff e8 7f ea a1 fc 90 <0f> 0b 90 4c 89 f7 e8 c3 a7 bc fc 4d 8b 3e e9 60 ff ff ff 66 66 2e [ 1093.649890][ T3977] RSP: 0018:ffffc9000fd6fc60 EFLAGS: 00010293 [ 1093.655903][T10016] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1093.656062][ T3977] RAX: ffffffff84b60ed1 RBX: ffff88810aafc740 RCX: ffff88811c252100 [ 1093.671046][ T3977] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888116271f80 [ 1093.679279][ T3977] RBP: 0000000000000080 R08: 000188810aafd557 R09: 0000000000000000 [ 1093.687424][ T3977] R10: ffff888116271680 R11: 0001888116271b7f R12: ffffffff86c8b9e0 [ 1093.695416][ T3977] R13: ffff88810aafc768 R14: ffff88810aafd550 R15: ffff888116271f80 [ 1093.703636][ T3977] FS: 0000000000000000(0000) GS:ffff8882aef40000(0000) knlGS:0000000000000000 [ 1093.712717][ T3977] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1093.719472][ T3977] CR2: 0000000000000000 CR3: 000000010ecf8000 CR4: 00000000003506f0 [ 1093.727601][ T3977] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 1093.735610][ T3977] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1093.743661][ T3977] Call Trace: [ 1093.746971][ T3977] [ 1093.749919][ T3977] xfrm_net_exit+0x2d/0x60 [ 1093.754373][ T3977] ops_undo_list+0x278/0x410 [ 1093.759023][ T3977] cleanup_net+0x2de/0x4d0 [ 1093.763540][ T3977] process_scheduled_works+0x4cb/0x9d0 [ 1093.769107][ T3977] worker_thread+0x582/0x770 [ 1093.773794][ T3977] kthread+0x489/0x510 [ 1093.777935][ T3977] ? __pfx_worker_thread+0x10/0x10 [ 1093.783077][ T3977] ? __pfx_kthread+0x10/0x10 [ 1093.787727][ T3977] ret_from_fork+0x11f/0x1b0 [ 1093.792416][ T3977] ? __pfx_kthread+0x10/0x10 [ 1093.797064][ T3977] ret_from_fork_asm+0x1a/0x30 [ 1093.801947][ T3977] [ 1093.805106][ T3977] ---[ end trace 0000000000000000 ]--- [ 1094.019994][T10016] veth0_vlan: entered promiscuous mode [ 1094.082674][T10016] veth1_vlan: entered promiscuous mode [ 1094.173442][T10016] veth0_macvtap: entered promiscuous mode [ 1094.268319][T10016] veth1_macvtap: entered promiscuous mode [ 1094.381246][T10016] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1094.599488][T10016] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1094.787235][T10691] IPv6: NLM_F_CREATE should be specified when creating new route [ 1094.849186][ T5703] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1094.876193][ T5703] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1094.896834][ T5703] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1094.920002][ T5703] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1094.976027][ T3411] hid-generic 0000:3000000:0000.0014: unknown main item tag 0x4 [ 1094.983807][ T3411] hid-generic 0000:3000000:0000.0014: unknown main item tag 0x2 [ 1095.025859][ T3411] hid-generic 0000:3000000:0000.0014: unknown main item tag 0x0 [ 1095.033733][ T3411] hid-generic 0000:3000000:0000.0014: unknown main item tag 0x0 [ 1095.041550][ T3411] hid-generic 0000:3000000:0000.0014: unknown main item tag 0x0 [ 1095.049380][ T3411] hid-generic 0000:3000000:0000.0014: unknown main item tag 0x0 [ 1095.057123][ T3411] hid-generic 0000:3000000:0000.0014: unknown main item tag 0x0 [ 1095.064784][ T3411] hid-generic 0000:3000000:0000.0014: unknown main item tag 0x0 [ 1095.071082][T10744] netlink: 4 bytes leftover after parsing attributes in process `syz.0.17055'. [ 1095.072580][ T3411] hid-generic 0000:3000000:0000.0014: unknown main item tag 0x0 [ 1095.089266][ T3411] hid-generic 0000:3000000:0000.0014: unknown main item tag 0x0 [ 1095.160325][ T3411] hid-generic 0000:3000000:0000.0014: hidraw0: HID v0.00 Device [sy] on syz0 [ 1095.257128][T10786] FAULT_INJECTION: forcing a failure. [ 1095.257128][T10786] name failslab, interval 1, probability 0, space 0, times 0 [ 1095.270024][T10786] CPU: 1 UID: 0 PID: 10786 Comm: syz.2.17120 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1095.270063][T10786] Tainted: [W]=WARN [ 1095.270070][T10786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1095.270135][T10786] Call Trace: [ 1095.270144][T10786] [ 1095.270153][T10786] __dump_stack+0x1d/0x30 [ 1095.270179][T10786] dump_stack_lvl+0xe8/0x140 [ 1095.270198][T10786] dump_stack+0x15/0x1b [ 1095.270222][T10786] should_fail_ex+0x265/0x280 [ 1095.270312][T10786] should_failslab+0x8c/0xb0 [ 1095.270341][T10786] kmem_cache_alloc_noprof+0x50/0x310 [ 1095.270385][T10786] ? alloc_empty_file+0x76/0x200 [ 1095.270426][T10786] alloc_empty_file+0x76/0x200 [ 1095.270480][T10786] alloc_file_pseudo+0xc6/0x160 [ 1095.270522][T10786] __shmem_file_setup+0x1de/0x210 [ 1095.270572][T10786] shmem_file_setup+0x3b/0x50 [ 1095.270605][T10786] __se_sys_memfd_create+0x2c3/0x590 [ 1095.270636][T10786] __x64_sys_memfd_create+0x31/0x40 [ 1095.270716][T10786] x64_sys_call+0x2abe/0x2ff0 [ 1095.270784][T10786] do_syscall_64+0xd2/0x200 [ 1095.270816][T10786] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1095.270914][T10786] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1095.270944][T10786] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1095.270980][T10786] RIP: 0033:0x7f2e2185eec9 [ 1095.270999][T10786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1095.271022][T10786] RSP: 002b:00007f2e202a5e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 1095.271104][T10786] RAX: ffffffffffffffda RBX: 000000000000048d RCX: 00007f2e2185eec9 [ 1095.271120][T10786] RDX: 00007f2e202a5ef0 RSI: 0000000000000000 RDI: 00007f2e218e2960 [ 1095.271132][T10786] RBP: 0000200000000580 R08: 00007f2e202a5bb7 R09: 00007f2e202a5e40 [ 1095.271144][T10786] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000500 [ 1095.271156][T10786] R13: 00007f2e202a5ef0 R14: 00007f2e202a5eb0 R15: 0000200000000540 [ 1095.271176][T10786] [ 1096.180848][ T5703] netdevsim netdevsim9 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1096.247176][ T5703] netdevsim netdevsim9 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1096.285414][ T5703] netdevsim netdevsim9 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1096.303978][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 1096.303997][ T29] audit: type=1400 audit(1758717050.999:20744): avc: denied { create } for pid=10862 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1096.370611][ T5703] netdevsim netdevsim9 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1096.391900][ T29] audit: type=1400 audit(1758717051.039:20745): avc: denied { write } for pid=10862 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1096.492953][T10875] netlink: 28 bytes leftover after parsing attributes in process `syz.0.17136'. [ 1096.518265][T10820] netlink: 256 bytes leftover after parsing attributes in process `syz.4.17130'. [ 1096.527848][ T29] audit: type=1326 audit(1758717051.219:20746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10876 comm="syz.9.17138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1096.575340][ T29] audit: type=1326 audit(1758717051.249:20747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10876 comm="syz.9.17138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1096.599289][ T29] audit: type=1326 audit(1758717051.249:20748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10876 comm="syz.9.17138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1096.622981][ T29] audit: type=1326 audit(1758717051.249:20749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10876 comm="syz.9.17138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1096.646892][ T29] audit: type=1326 audit(1758717051.249:20750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10876 comm="syz.9.17138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1096.670764][ T29] audit: type=1326 audit(1758717051.249:20751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10876 comm="syz.9.17138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1096.694461][ T29] audit: type=1326 audit(1758717051.249:20752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10876 comm="syz.9.17138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1096.718067][ T29] audit: type=1326 audit(1758717051.249:20753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10876 comm="syz.9.17138" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1096.917569][T10901] FAULT_INJECTION: forcing a failure. [ 1096.917569][T10901] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1096.930831][T10901] CPU: 0 UID: 0 PID: 10901 Comm: syz.9.17143 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1096.930873][T10901] Tainted: [W]=WARN [ 1096.930883][T10901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1096.930973][T10901] Call Trace: [ 1096.930982][T10901] [ 1096.930992][T10901] __dump_stack+0x1d/0x30 [ 1096.931021][T10901] dump_stack_lvl+0xe8/0x140 [ 1096.931047][T10901] dump_stack+0x15/0x1b [ 1096.931068][T10901] should_fail_ex+0x265/0x280 [ 1096.931165][T10901] should_fail+0xb/0x20 [ 1096.931191][T10901] should_fail_usercopy+0x1a/0x20 [ 1096.931277][T10901] _copy_from_user+0x1c/0xb0 [ 1096.931356][T10901] __sys_bind+0x106/0x2a0 [ 1096.931389][T10901] __x64_sys_bind+0x3f/0x50 [ 1096.931414][T10901] x64_sys_call+0x2b6e/0x2ff0 [ 1096.931441][T10901] do_syscall_64+0xd2/0x200 [ 1096.931494][T10901] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1096.931521][T10901] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1096.931559][T10901] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1096.931649][T10901] RIP: 0033:0x7f26b346eec9 [ 1096.931668][T10901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1096.931688][T10901] RSP: 002b:00007f26b1ecf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1096.931708][T10901] RAX: ffffffffffffffda RBX: 00007f26b36c5fa0 RCX: 00007f26b346eec9 [ 1096.931721][T10901] RDX: 0000000000000006 RSI: 0000200000000140 RDI: 0000000000000004 [ 1096.931734][T10901] RBP: 00007f26b1ecf090 R08: 0000000000000000 R09: 0000000000000000 [ 1096.931794][T10901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1096.931807][T10901] R13: 00007f26b36c6038 R14: 00007f26b36c5fa0 R15: 00007ffe251ecf68 [ 1096.931847][T10901] [ 1097.150279][T10916] loop9: detected capacity change from 0 to 1024 [ 1097.172208][T10916] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1097.244592][T10916] netlink: 4 bytes leftover after parsing attributes in process `syz.9.17146'. [ 1097.382465][ T8704] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1097.393005][T10972] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 1097.460586][T10980] bridge0: entered promiscuous mode [ 1097.465928][T10980] macsec1: entered promiscuous mode [ 1097.475058][T10980] bridge0: port 3(macsec1) entered blocking state [ 1097.481810][T10980] bridge0: port 3(macsec1) entered disabled state [ 1097.488781][T10980] macsec1: entered allmulticast mode [ 1097.488786][T10976] FAULT_INJECTION: forcing a failure. [ 1097.488786][T10976] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1097.488824][T10976] CPU: 0 UID: 0 PID: 10976 Comm: syz.9.17152 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1097.488866][T10976] Tainted: [W]=WARN [ 1097.488875][T10976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1097.488894][T10976] Call Trace: [ 1097.488902][T10976] [ 1097.488913][T10976] __dump_stack+0x1d/0x30 [ 1097.488944][T10976] dump_stack_lvl+0xe8/0x140 [ 1097.489048][T10976] dump_stack+0x15/0x1b [ 1097.489070][T10976] should_fail_ex+0x265/0x280 [ 1097.489106][T10976] should_fail_alloc_page+0xf2/0x100 [ 1097.489145][T10976] __alloc_frozen_pages_noprof+0xff/0x360 [ 1097.489198][T10976] alloc_pages_mpol+0xb3/0x250 [ 1097.489246][T10976] vma_alloc_folio_noprof+0x1aa/0x300 [ 1097.489302][T10976] do_wp_page+0x5db/0x24e0 [ 1097.489345][T10976] ? __rcu_read_lock+0x37/0x50 [ 1097.489370][T10976] handle_mm_fault+0x77d/0x2c20 [ 1097.489407][T10976] ? __rcu_read_unlock+0x4f/0x70 [ 1097.489512][T10976] do_user_addr_fault+0x3fe/0x1090 [ 1097.489583][T10976] exc_page_fault+0x62/0xa0 [ 1097.489697][T10976] asm_exc_page_fault+0x26/0x30 [ 1097.489740][T10976] RIP: 0010:rep_movs_alternative+0x4a/0x90 [ 1097.489872][T10976] Code: f6 01 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb c5 a4 c3 cc cc cc cc 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 [ 1097.489898][T10976] RSP: 0018:ffffc900029e7888 EFLAGS: 00050206 [ 1097.489919][T10976] RAX: ffff88813c6cdd20 RBX: ffff888130630000 RCX: 0000000000007480 [ 1097.489937][T10976] RDX: 0000000000000000 RSI: ffff888130630b80 RDI: 0000200000003000 [ 1097.489955][T10976] RBP: 0000200000002480 R08: 0000000000000010 R09: 0000000000000000 [ 1097.489972][T10976] R10: 0001888130630000 R11: 0001888130637fff R12: 000020000000a480 [ 1097.490006][T10976] R13: ffffc900029e7e80 R14: 0000000000008000 R15: 00007ffffffff000 [ 1097.490030][T10976] _copy_to_iter+0x141/0xe70 [ 1097.490186][T10976] ? xfd_validate_state+0x45/0xf0 [ 1097.490233][T10976] ? save_fpregs_to_fpstate+0x100/0x160 [ 1097.490274][T10976] ? _raw_spin_unlock+0x26/0x50 [ 1097.490306][T10976] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 1097.490357][T10976] __skb_datagram_iter+0x2f4/0x690 [ 1097.490398][T10976] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 1097.490441][T10976] skb_copy_datagram_iter+0x3d/0x110 [ 1097.490551][T10976] unix_stream_read_actor+0x43/0x70 [ 1097.490623][T10976] unix_stream_read_generic+0x6b1/0x1580 [ 1097.490676][T10976] ? __pfx_autoremove_wake_function+0x10/0x10 [ 1097.490751][T10976] unix_stream_recvmsg+0xc3/0xf0 [ 1097.490787][T10976] ? __pfx_unix_stream_read_actor+0x10/0x10 [ 1097.490822][T10976] ? __pfx_unix_stream_recvmsg+0x10/0x10 [ 1097.490859][T10976] sock_recvmsg+0x136/0x170 [ 1097.490923][T10976] ____sys_recvmsg+0xf5/0x280 [ 1097.490970][T10976] ___sys_recvmsg+0x11f/0x370 [ 1097.491022][T10976] __x64_sys_recvmsg+0xd1/0x160 [ 1097.491075][T10976] x64_sys_call+0x2b42/0x2ff0 [ 1097.491105][T10976] do_syscall_64+0xd2/0x200 [ 1097.491194][T10976] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1097.491227][T10976] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1097.491271][T10976] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1097.491300][T10976] RIP: 0033:0x7f26b346eec9 [ 1097.491337][T10976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1097.491362][T10976] RSP: 002b:00007f26b1ecf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1097.491466][T10976] RAX: ffffffffffffffda RBX: 00007f26b36c5fa0 RCX: 00007f26b346eec9 [ 1097.491482][T10976] RDX: 0000000040000100 RSI: 0000200000001140 RDI: 0000000000000005 [ 1097.491500][T10976] RBP: 00007f26b1ecf090 R08: 0000000000000000 R09: 0000000000000000 [ 1097.491517][T10976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1097.491534][T10976] R13: 00007f26b36c6038 R14: 00007f26b36c5fa0 R15: 00007ffe251ecf68 [ 1097.491629][T10976] [ 1097.883285][T10980] bridge0: entered allmulticast mode [ 1097.890262][T10980] macsec1: left allmulticast mode [ 1097.895506][T10980] bridge0: left allmulticast mode [ 1097.901742][T10980] bridge0: left promiscuous mode [ 1097.917682][T10994] wireguard0: entered promiscuous mode [ 1097.923198][T10994] wireguard0: entered allmulticast mode [ 1098.001877][T11005] netlink: 28 bytes leftover after parsing attributes in process `syz.4.17159'. [ 1098.348856][T11015] usb usb8: usbfs: process 11015 (syz.2.17162) did not claim interface 0 before use [ 1099.029243][T11056] FAULT_INJECTION: forcing a failure. [ 1099.029243][T11056] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1099.042443][T11056] CPU: 0 UID: 0 PID: 11056 Comm: syz.4.17171 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1099.042482][T11056] Tainted: [W]=WARN [ 1099.042489][T11056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1099.042552][T11056] Call Trace: [ 1099.042559][T11056] [ 1099.042589][T11056] __dump_stack+0x1d/0x30 [ 1099.042660][T11056] dump_stack_lvl+0xe8/0x140 [ 1099.042686][T11056] dump_stack+0x15/0x1b [ 1099.042707][T11056] should_fail_ex+0x265/0x280 [ 1099.042731][T11056] should_fail+0xb/0x20 [ 1099.042752][T11056] should_fail_usercopy+0x1a/0x20 [ 1099.042830][T11056] _copy_from_user+0x1c/0xb0 [ 1099.042865][T11056] __sys_bpf+0x178/0x7b0 [ 1099.042900][T11056] __x64_sys_bpf+0x41/0x50 [ 1099.042929][T11056] x64_sys_call+0x2aea/0x2ff0 [ 1099.043004][T11056] do_syscall_64+0xd2/0x200 [ 1099.043044][T11056] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1099.043077][T11056] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1099.043167][T11056] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1099.043195][T11056] RIP: 0033:0x7f615536eec9 [ 1099.043214][T11056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1099.043280][T11056] RSP: 002b:00007f6153dcf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1099.043318][T11056] RAX: ffffffffffffffda RBX: 00007f61555c5fa0 RCX: 00007f615536eec9 [ 1099.043335][T11056] RDX: 0000000000000023 RSI: 0000200000000400 RDI: 0000000000000005 [ 1099.043356][T11056] RBP: 00007f6153dcf090 R08: 0000000000000000 R09: 0000000000000000 [ 1099.043368][T11056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1099.043382][T11056] R13: 00007f61555c6038 R14: 00007f61555c5fa0 R15: 00007ffd353e72d8 [ 1099.043450][T11056] [ 1099.414421][T11105] netlink: 28 bytes leftover after parsing attributes in process `syz.6.17177'. [ 1100.274185][T11116] loop4: detected capacity change from 0 to 8192 [ 1100.400290][T11152] netlink: 8 bytes leftover after parsing attributes in process `syz.6.17185'. [ 1100.432502][T11152] netlink: 'syz.6.17185': attribute type 10 has an invalid length. [ 1100.474353][T11152] team0: Device hsr_slave_0 failed to register rx_handler [ 1100.776225][T11161] loop9: detected capacity change from 0 to 512 [ 1100.809737][T11161] EXT4-fs (loop9): revision level too high, forcing read-only mode [ 1100.829298][T11161] EXT4-fs (loop9): orphan cleanup on readonly fs [ 1100.843365][T11161] EXT4-fs warning (device loop9): ext4_enable_quotas:7172: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 1100.876748][T11161] EXT4-fs (loop9): Cannot turn on quotas: error -117 [ 1100.896766][T11161] EXT4-fs error (device loop9): ext4_validate_block_bitmap:441: comm syz.9.17188: bg 0: block 40: padding at end of block bitmap is not set [ 1100.928607][T11161] EXT4-fs error (device loop9) in ext4_mb_clear_bb:6657: Corrupt filesystem [ 1101.003110][T11161] EXT4-fs (loop9): 1 truncate cleaned up [ 1101.013914][T11161] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 1101.074881][ T8704] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1102.057093][ T29] kauditd_printk_skb: 343 callbacks suppressed [ 1102.057111][ T29] audit: type=1326 audit(1758717056.759:21096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11241 comm="syz.9.17197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1102.122098][ T29] audit: type=1326 audit(1758717056.789:21097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11241 comm="syz.9.17197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1102.145868][ T29] audit: type=1326 audit(1758717056.799:21098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11241 comm="syz.9.17197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1102.169598][ T29] audit: type=1326 audit(1758717056.799:21099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11241 comm="syz.9.17197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1102.193369][ T29] audit: type=1326 audit(1758717056.799:21100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11241 comm="syz.9.17197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=296 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1102.217309][ T29] audit: type=1326 audit(1758717056.799:21101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11241 comm="syz.9.17197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1102.241017][ T29] audit: type=1326 audit(1758717056.799:21102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11241 comm="syz.9.17197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1102.264725][ T29] audit: type=1326 audit(1758717056.799:21103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11241 comm="syz.9.17197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1102.288870][ T29] audit: type=1326 audit(1758717056.799:21104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11241 comm="syz.9.17197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1102.312679][ T29] audit: type=1326 audit(1758717056.799:21105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11241 comm="syz.9.17197" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1103.796630][T11302] 9pnet: Could not find request transport: Fd [ 1104.335461][T11354] loop9: detected capacity change from 0 to 4096 [ 1104.344394][T11354] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1105.960424][ T8704] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1106.101118][ T5703] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1106.191526][ T5703] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1106.309869][ T5703] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1106.382024][ T5703] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1106.606001][T11416] chnl_net:caif_netlink_parms(): no params data found [ 1106.689596][ T5703] bridge_slave_1: left allmulticast mode [ 1106.695394][ T5703] bridge_slave_1: left promiscuous mode [ 1106.701163][ T5703] bridge0: port 2(bridge_slave_1) entered disabled state [ 1106.713273][ T5703] bridge_slave_0: left allmulticast mode [ 1106.719113][ T5703] bridge_slave_0: left promiscuous mode [ 1106.724973][ T5703] bridge0: port 1(bridge_slave_0) entered disabled state [ 1107.050362][ T5703] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1107.071328][ T5703] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1107.099867][ T5703] bond0 (unregistering): Released all slaves [ 1107.202189][ T5703] tipc: Left network mode [ 1107.206923][T11416] bridge0: port 1(bridge_slave_0) entered blocking state [ 1107.214043][T11416] bridge0: port 1(bridge_slave_0) entered disabled state [ 1107.228859][T11416] bridge_slave_0: entered allmulticast mode [ 1107.236203][T11416] bridge_slave_0: entered promiscuous mode [ 1107.282357][T11416] bridge0: port 2(bridge_slave_1) entered blocking state [ 1107.289548][T11416] bridge0: port 2(bridge_slave_1) entered disabled state [ 1107.306438][T11416] bridge_slave_1: entered allmulticast mode [ 1107.316559][T11416] bridge_slave_1: entered promiscuous mode [ 1107.448037][ T5703] hsr_slave_0: left promiscuous mode [ 1107.453906][ T5703] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1107.461451][ T5703] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1107.581411][ T5703] veth1_macvtap: left promiscuous mode [ 1107.588904][ T5703] veth0_macvtap: left promiscuous mode [ 1107.595271][ T5703] veth1_vlan: left promiscuous mode [ 1107.693712][ T5703] team0 (unregistering): Port device team_slave_1 removed [ 1107.710241][ T5703] team0 (unregistering): Port device team_slave_0 removed [ 1107.780855][T11416] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1107.793837][T11416] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1107.830317][T11416] team0: Port device team_slave_0 added [ 1107.837662][T11416] team0: Port device team_slave_1 added [ 1107.886224][T11416] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1107.893354][T11416] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1107.919515][T11416] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1107.992126][T11416] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1107.999176][T11416] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1108.025222][T11416] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1108.049152][ T29] kauditd_printk_skb: 103 callbacks suppressed [ 1108.049178][ T29] audit: type=1400 audit(1758717062.749:21209): avc: denied { bind } for pid=11775 comm="syz.0.17236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1108.104578][ T3412] hid_parser_main: 6 callbacks suppressed [ 1108.104600][ T3412] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 1108.131476][ T3412] hid-generic 0000:0000:0000.0015: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1108.150841][T11416] hsr_slave_0: entered promiscuous mode [ 1108.165515][T11416] hsr_slave_1: entered promiscuous mode [ 1108.179688][T11416] debugfs: 'hsr0' already exists in 'hsr' [ 1108.185476][T11416] Cannot create hsr debugfs directory [ 1108.295028][T11781] netlink: 4 bytes leftover after parsing attributes in process `syz.2.17237'. [ 1108.542185][ T5703] ------------[ cut here ]------------ [ 1108.547777][ T5703] WARNING: CPU: 1 PID: 5703 at net/xfrm/xfrm_state.c:3303 xfrm_state_fini+0x179/0x1f0 [ 1108.557529][ T5703] Modules linked in: [ 1108.561454][ T5703] CPU: 1 UID: 0 PID: 5703 Comm: kworker/u8:14 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1108.573140][ T5703] Tainted: [W]=WARN [ 1108.576996][ T5703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1108.587116][ T5703] Workqueue: netns cleanup_net [ 1108.591923][ T5703] RIP: 0010:xfrm_state_fini+0x179/0x1f0 [ 1108.597563][ T5703] Code: 48 8d bb 30 0e 00 00 e8 45 a8 bc fc 48 8b bb 30 0e 00 00 e8 d9 28 c9 fc 5b 41 5e 41 5f 5d c3 cc cc cc cc cc e8 d8 ea a1 fc 90 <0f> 0b 90 e9 d9 fe ff ff e8 ca ea a1 fc 90 0f 0b 90 4c 89 f7 e8 0e [ 1108.617244][ T5703] RSP: 0018:ffffc90012e0fc60 EFLAGS: 00010293 [ 1108.623361][ T5703] RAX: ffffffff84b60e78 RBX: ffff88810aaf97c0 RCX: ffff888119dd2100 [ 1108.631471][ T5703] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88810aafa5c0 [ 1108.639493][ T5703] RBP: ffffffff86c8b9c0 R08: 0001ffff86847f7f R09: 0000000000000000 [ 1108.647582][ T5703] R10: ffffc90012e0fbe8 R11: 0001c90012e0fbe8 R12: ffffffff86c8b9e0 [ 1108.655617][ T5703] R13: ffff88810aaf97e8 R14: ffff88810aafa5c0 R15: ffff88810aaf97c0 [ 1108.663636][ T5703] FS: 0000000000000000(0000) GS:ffff8882aef40000(0000) knlGS:0000000000000000 [ 1108.672689][ T5703] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1108.679335][ T5703] CR2: 00007f0d73345fac CR3: 000000013e5c8000 CR4: 00000000003506f0 [ 1108.687343][ T5703] DR0: 0000000000000002 DR1: 0000200000000300 DR2: 0000000000000000 [ 1108.695352][ T5703] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1108.703376][ T5703] Call Trace: [ 1108.706702][ T5703] [ 1108.709660][ T5703] xfrm_net_exit+0x2d/0x60 [ 1108.714176][ T5703] ops_undo_list+0x278/0x410 [ 1108.718849][ T5703] cleanup_net+0x2de/0x4d0 [ 1108.723920][ T5703] process_scheduled_works+0x4cb/0x9d0 [ 1108.729470][ T5703] worker_thread+0x582/0x770 [ 1108.734106][ T5703] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 1108.739968][ T5703] kthread+0x489/0x510 [ 1108.744072][ T5703] ? finish_task_switch+0xad/0x2b0 [ 1108.749234][ T5703] ? __pfx_worker_thread+0x10/0x10 [ 1108.754487][ T5703] ? __pfx_kthread+0x10/0x10 [ 1108.759238][ T5703] ret_from_fork+0x11f/0x1b0 [ 1108.763919][ T5703] ? __pfx_kthread+0x10/0x10 [ 1108.768601][ T5703] ret_from_fork_asm+0x1a/0x30 [ 1108.773547][ T5703] [ 1108.776601][ T5703] ---[ end trace 0000000000000000 ]--- [ 1108.782992][ T5703] ------------[ cut here ]------------ [ 1108.788480][ T5703] WARNING: CPU: 1 PID: 5703 at net/xfrm/xfrm_state.c:3310 xfrm_state_fini+0x1b9/0x1f0 [ 1108.798130][ T5703] Modules linked in: [ 1108.802057][ T5703] CPU: 1 UID: 0 PID: 5703 Comm: kworker/u8:14 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1108.814328][ T5703] Tainted: [W]=WARN [ 1108.818219][ T5703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1108.828332][ T5703] Workqueue: netns cleanup_net [ 1108.833126][ T5703] RIP: 0010:xfrm_state_fini+0x1b9/0x1f0 [ 1108.838746][ T5703] Code: a8 bc fc 4d 8b 3e e9 06 ff ff ff e8 b1 ea a1 fc 90 0f 0b 90 4c 89 f7 e8 f5 a7 bc fc 4d 8b 3e e9 24 ff ff ff e8 98 ea a1 fc 90 <0f> 0b 90 4c 89 f7 e8 dc a7 bc fc 4d 8b 3e e9 42 ff ff ff e8 7f ea [ 1108.858446][ T5703] RSP: 0018:ffffc90012e0fc60 EFLAGS: 00010293 [ 1108.864613][ T5703] RAX: ffffffff84b60eb8 RBX: ffff88810aaf97c0 RCX: ffff888119dd2100 [ 1108.872645][ T5703] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881196e4b80 [ 1108.880726][ T5703] RBP: 0000000000000080 R08: 000188810aafa5df R09: 0000000000000000 [ 1108.888760][ T5703] R10: ffff88813dca0c80 R11: 000188813dca08ff R12: ffffffff86c8b9e0 [ 1108.896777][ T5703] R13: ffff88810aaf97e8 R14: ffff88810aafa5d8 R15: ffff8881196e4b80 [ 1108.904778][ T5703] FS: 0000000000000000(0000) GS:ffff8882aef40000(0000) knlGS:0000000000000000 [ 1108.913755][ T5703] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1108.920379][ T5703] CR2: 00007f0d73345fac CR3: 000000013e5c8000 CR4: 00000000003506f0 [ 1108.928397][ T5703] DR0: 0000000000000002 DR1: 0000200000000300 DR2: 0000000000000000 [ 1108.936382][ T5703] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1108.944388][ T5703] Call Trace: [ 1108.947765][ T5703] [ 1108.950793][ T5703] xfrm_net_exit+0x2d/0x60 [ 1108.955237][ T5703] ops_undo_list+0x278/0x410 [ 1108.959982][ T5703] cleanup_net+0x2de/0x4d0 [ 1108.964532][ T5703] process_scheduled_works+0x4cb/0x9d0 [ 1108.970046][ T5703] worker_thread+0x582/0x770 [ 1108.974743][ T5703] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 1108.980656][ T5703] kthread+0x489/0x510 [ 1108.984781][ T5703] ? finish_task_switch+0xad/0x2b0 [ 1108.989936][ T5703] ? __pfx_worker_thread+0x10/0x10 [ 1108.995186][ T5703] ? __pfx_kthread+0x10/0x10 [ 1108.999846][ T5703] ret_from_fork+0x11f/0x1b0 [ 1109.004471][ T5703] ? __pfx_kthread+0x10/0x10 [ 1109.009113][ T5703] ret_from_fork_asm+0x1a/0x30 [ 1109.013914][ T5703] [ 1109.016963][ T5703] ---[ end trace 0000000000000000 ]--- [ 1109.023318][ T5703] ------------[ cut here ]------------ [ 1109.029008][ T5703] WARNING: CPU: 1 PID: 5703 at net/xfrm/xfrm_state.c:3312 xfrm_state_fini+0x1d2/0x1f0 [ 1109.038732][ T5703] Modules linked in: [ 1109.042724][ T5703] CPU: 1 UID: 0 PID: 5703 Comm: kworker/u8:14 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1109.054353][ T5703] Tainted: [W]=WARN [ 1109.058222][ T5703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1109.068413][ T5703] Workqueue: netns cleanup_net [ 1109.073371][ T5703] RIP: 0010:xfrm_state_fini+0x1d2/0x1f0 [ 1109.079261][ T5703] Code: a7 bc fc 4d 8b 3e e9 24 ff ff ff e8 98 ea a1 fc 90 0f 0b 90 4c 89 f7 e8 dc a7 bc fc 4d 8b 3e e9 42 ff ff ff e8 7f ea a1 fc 90 <0f> 0b 90 4c 89 f7 e8 c3 a7 bc fc 4d 8b 3e e9 60 ff ff ff 66 66 2e [ 1109.099023][ T5703] RSP: 0018:ffffc90012e0fc60 EFLAGS: 00010293 [ 1109.105141][ T5703] RAX: ffffffff84b60ed1 RBX: ffff88810aaf97c0 RCX: ffff888119dd2100 [ 1109.113153][ T5703] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881196e4a80 [ 1109.121318][ T5703] RBP: 0000000000000080 R08: 000188810aafa5d7 R09: 0000000000000000 [ 1109.129414][ T5703] R10: ffff8881196e4000 R11: 00018881196e4bff R12: ffffffff86c8b9e0 [ 1109.137430][ T5703] R13: ffff88810aaf97e8 R14: ffff88810aafa5d0 R15: ffff8881196e4a80 [ 1109.145455][ T5703] FS: 0000000000000000(0000) GS:ffff8882aef40000(0000) knlGS:0000000000000000 [ 1109.154403][ T5703] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1109.161029][ T5703] CR2: 00007f0d73345fac CR3: 000000013e5c8000 CR4: 00000000003506f0 [ 1109.169045][ T5703] DR0: 0000000000000002 DR1: 0000200000000300 DR2: 0000000000000000 [ 1109.177043][ T5703] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1109.185029][ T5703] Call Trace: [ 1109.188355][ T5703] [ 1109.191355][ T5703] xfrm_net_exit+0x2d/0x60 [ 1109.195804][ T5703] ops_undo_list+0x278/0x410 [ 1109.200436][ T5703] cleanup_net+0x2de/0x4d0 [ 1109.205036][ T5703] process_scheduled_works+0x4cb/0x9d0 [ 1109.210565][ T5703] worker_thread+0x582/0x770 [ 1109.215234][ T5703] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 1109.221136][ T5703] kthread+0x489/0x510 [ 1109.225399][ T5703] ? finish_task_switch+0xad/0x2b0 [ 1109.229291][T11933] netlink: 28 bytes leftover after parsing attributes in process `syz.2.17244'. [ 1109.230560][ T5703] ? __pfx_worker_thread+0x10/0x10 [ 1109.244891][ T5703] ? __pfx_kthread+0x10/0x10 [ 1109.249618][ T5703] ret_from_fork+0x11f/0x1b0 [ 1109.254385][ T5703] ? __pfx_kthread+0x10/0x10 [ 1109.259044][ T5703] ret_from_fork_asm+0x1a/0x30 [ 1109.263855][ T5703] [ 1109.266948][ T5703] ---[ end trace 0000000000000000 ]--- [ 1109.322594][ T29] audit: type=1400 audit(1758717063.989:21210): avc: denied { cpu } for pid=11932 comm="syz.2.17244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1109.355606][ T29] audit: type=1326 audit(1758717064.049:21211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11957 comm="syz.0.17245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f778700eec9 code=0x7ffc0000 [ 1109.379378][ T29] audit: type=1326 audit(1758717064.049:21212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11957 comm="syz.0.17245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f778700eec9 code=0x7ffc0000 [ 1109.380568][T11416] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1109.426061][ T29] audit: type=1326 audit(1758717064.099:21213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11957 comm="syz.0.17245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f778700eec9 code=0x7ffc0000 [ 1109.450248][ T29] audit: type=1326 audit(1758717064.099:21214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11957 comm="syz.0.17245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f778700eec9 code=0x7ffc0000 [ 1109.474223][ T29] audit: type=1326 audit(1758717064.099:21215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11957 comm="syz.0.17245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f778700eec9 code=0x7ffc0000 [ 1109.498031][ T29] audit: type=1326 audit(1758717064.119:21216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11957 comm="syz.0.17245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f778700eec9 code=0x7ffc0000 [ 1109.521824][ T29] audit: type=1326 audit(1758717064.119:21217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11957 comm="syz.0.17245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f778700eec9 code=0x7ffc0000 [ 1109.545604][ T29] audit: type=1326 audit(1758717064.119:21218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11957 comm="syz.0.17245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f778700eec9 code=0x7ffc0000 [ 1109.573752][T11416] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1109.587671][T11933] loop2: detected capacity change from 0 to 512 [ 1109.616173][T11933] EXT4-fs error (device loop2): ext4_xattr_inode_iget:442: comm syz.2.17244: error while reading EA inode 32 err=-116 [ 1109.640721][T11416] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1109.640908][T11933] EXT4-fs (loop2): Remounting filesystem read-only [ 1109.654245][T11933] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2848: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 1109.667518][T11933] EXT4-fs warning (device loop2): ext4_evict_inode:257: couldn't mark inode dirty (err -30) [ 1109.678122][T11933] EXT4-fs (loop2): 1 orphan inode deleted [ 1109.681804][T11416] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1109.684580][T11933] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1109.718603][T11933] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1112.100663][T11416] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1112.128857][T11416] 8021q: adding VLAN 0 to HW filter on device team0 [ 1112.203930][T17579] bridge0: port 1(bridge_slave_0) entered blocking state [ 1112.211105][T17579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1112.356394][T17575] bridge0: port 2(bridge_slave_1) entered blocking state [ 1112.363642][T17575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1112.388103][T12022] loop2: detected capacity change from 0 to 764 [ 1112.418354][T12022] rock: corrupted directory entry. extent=32, offset=2044, size=237 [ 1112.592685][T11416] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1112.661580][T12073] netlink: 4 bytes leftover after parsing attributes in process `syz.2.17261'. [ 1112.695010][T12077] netlink: 8 bytes leftover after parsing attributes in process `syz.2.17262'. [ 1112.704181][T12077] netlink: 8 bytes leftover after parsing attributes in process `syz.2.17262'. [ 1112.782147][T11416] veth0_vlan: entered promiscuous mode [ 1112.801476][T11416] veth1_vlan: entered promiscuous mode [ 1112.908162][T11416] veth0_macvtap: entered promiscuous mode [ 1112.915974][T11416] veth1_macvtap: entered promiscuous mode [ 1112.929241][T11416] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1112.938866][T11416] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1112.981459][ T3977] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1113.034403][ T3977] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1113.055111][ T3977] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1113.101515][ T3977] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1113.846385][ T29] kauditd_printk_skb: 153 callbacks suppressed [ 1113.846404][ T29] audit: type=1400 audit(1758717068.539:21372): avc: denied { audit_control } for pid=12139 comm="syz.0.17272" capability=30 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1115.147310][ T29] audit: type=1326 audit(1758717069.839:21373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12182 comm="syz.2.17280" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1115.171164][ T29] audit: type=1326 audit(1758717069.839:21374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12182 comm="syz.2.17280" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1115.194967][ T29] audit: type=1326 audit(1758717069.839:21375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12182 comm="syz.2.17280" exe="/root/syz-executor" sig=0 arch=c000003e syscall=131 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1115.218747][ T29] audit: type=1326 audit(1758717069.839:21376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12182 comm="syz.2.17280" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1115.242433][ T29] audit: type=1326 audit(1758717069.849:21377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12182 comm="syz.2.17280" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1115.299732][ T29] audit: type=1400 audit(1758717069.949:21378): avc: denied { append } for pid=12185 comm="syz.6.17282" name="001" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1115.323039][ T29] audit: type=1326 audit(1758717069.959:21379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12182 comm="syz.2.17280" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1115.346812][ T29] audit: type=1326 audit(1758717069.959:21380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12182 comm="syz.2.17280" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1115.385020][T12189] netlink: 20 bytes leftover after parsing attributes in process `syz.0.17279'. [ 1115.453619][T12189] team_slave_0: entered promiscuous mode [ 1115.477238][T12189] team_slave_0: left promiscuous mode [ 1115.488030][ T29] audit: type=1326 audit(1758717070.099:21381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12180 comm="syz.0.17279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f778700eec9 code=0x7ffc0000 [ 1115.529718][T12207] loop2: detected capacity change from 0 to 512 [ 1115.570055][T12207] EXT4-fs error (device loop2): ext4_orphan_get:1418: comm syz.2.17285: bad orphan inode 11862016 [ 1115.623125][T12207] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 1115.661879][T12207] ext4 filesystem being mounted at /343/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 1117.044837][ T2340] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 1117.059019][T12253] netlink: 40 bytes leftover after parsing attributes in process `syz.4.17292'. [ 1117.157231][T12276] FAULT_INJECTION: forcing a failure. [ 1117.157231][T12276] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.169986][T12276] CPU: 1 UID: 0 PID: 12276 Comm: syz.0.17300 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1117.170027][T12276] Tainted: [W]=WARN [ 1117.170091][T12276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1117.170106][T12276] Call Trace: [ 1117.170113][T12276] [ 1117.170121][T12276] __dump_stack+0x1d/0x30 [ 1117.170144][T12276] dump_stack_lvl+0xe8/0x140 [ 1117.170163][T12276] dump_stack+0x15/0x1b [ 1117.170210][T12276] should_fail_ex+0x265/0x280 [ 1117.170274][T12276] should_failslab+0x8c/0xb0 [ 1117.170307][T12276] __kvmalloc_node_noprof+0x123/0x4e0 [ 1117.170462][T12276] ? alloc_fdtable+0x10b/0x1d0 [ 1117.170491][T12276] alloc_fdtable+0x10b/0x1d0 [ 1117.170582][T12276] dup_fd+0x4c7/0x540 [ 1117.170610][T12276] copy_files+0x98/0xf0 [ 1117.170643][T12276] copy_process+0xc5b/0x2000 [ 1117.170685][T12276] kernel_clone+0x16c/0x5c0 [ 1117.170798][T12276] __se_sys_clone3+0x1c2/0x200 [ 1117.170906][T12276] __x64_sys_clone3+0x31/0x40 [ 1117.170936][T12276] x64_sys_call+0x1fc9/0x2ff0 [ 1117.170964][T12276] do_syscall_64+0xd2/0x200 [ 1117.171028][T12276] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1117.171115][T12276] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1117.171169][T12276] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1117.171197][T12276] RIP: 0033:0x7f778700eec9 [ 1117.171216][T12276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1117.171239][T12276] RSP: 002b:00007f7785a6ef08 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1117.171262][T12276] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f778700eec9 [ 1117.171277][T12276] RDX: 00007f7785a6ef20 RSI: 0000000000000058 RDI: 00007f7785a6ef20 [ 1117.171364][T12276] RBP: 00007f7785a6f090 R08: 0000000000000000 R09: 0000000000000058 [ 1117.171385][T12276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1117.171432][T12276] R13: 00007f7787266038 R14: 00007f7787265fa0 R15: 00007ffc46767e18 [ 1117.171456][T12276] [ 1117.374814][T12274] loop9: detected capacity change from 0 to 4096 [ 1117.406226][T12274] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1117.459637][T12282] serio: Serial port ptm0 [ 1117.754669][T12293] FAULT_INJECTION: forcing a failure. [ 1117.754669][T12293] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.767568][T12293] CPU: 0 UID: 0 PID: 12293 Comm: syz.0.17303 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1117.767611][T12293] Tainted: [W]=WARN [ 1117.767626][T12293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1117.767653][T12293] Call Trace: [ 1117.767660][T12293] [ 1117.767737][T12293] __dump_stack+0x1d/0x30 [ 1117.767762][T12293] dump_stack_lvl+0xe8/0x140 [ 1117.767785][T12293] dump_stack+0x15/0x1b [ 1117.767803][T12293] should_fail_ex+0x265/0x280 [ 1117.767832][T12293] should_failslab+0x8c/0xb0 [ 1117.767897][T12293] kmem_cache_alloc_node_noprof+0x57/0x320 [ 1117.767933][T12293] ? __alloc_skb+0x101/0x320 [ 1117.767960][T12293] __alloc_skb+0x101/0x320 [ 1117.767984][T12293] ? ip_generic_getfrag+0x135/0x1b0 [ 1117.768106][T12293] __ip_append_data+0x1935/0x2440 [ 1117.768149][T12293] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 1117.768251][T12293] ip_append_data+0xd6/0x130 [ 1117.768289][T12293] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 1117.768442][T12293] udp_sendmsg+0x36e/0x13c0 [ 1117.768482][T12293] ? __rcu_read_unlock+0x4f/0x70 [ 1117.768509][T12293] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 1117.768605][T12293] ? avc_has_perm+0xf7/0x180 [ 1117.768637][T12293] ? __pfx_udp_sendmsg+0x10/0x10 [ 1117.768672][T12293] inet_sendmsg+0xac/0xd0 [ 1117.768709][T12293] __sock_sendmsg+0x102/0x180 [ 1117.768752][T12293] __sys_sendto+0x268/0x330 [ 1117.768838][T12293] __x64_sys_sendto+0x76/0x90 [ 1117.768867][T12293] x64_sys_call+0x2d05/0x2ff0 [ 1117.768895][T12293] do_syscall_64+0xd2/0x200 [ 1117.769007][T12293] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1117.769039][T12293] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1117.769076][T12293] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1117.769102][T12293] RIP: 0033:0x7f778700eec9 [ 1117.769179][T12293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1117.769227][T12293] RSP: 002b:00007f7785a6f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1117.769245][T12293] RAX: ffffffffffffffda RBX: 00007f7787265fa0 RCX: 00007f778700eec9 [ 1117.769259][T12293] RDX: 0000000000006200 RSI: 0000200000000c80 RDI: 0000000000000007 [ 1117.769275][T12293] RBP: 00007f7785a6f090 R08: 0000000000000000 R09: 0000000000000000 [ 1117.769290][T12293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1117.769304][T12293] R13: 00007f7787266038 R14: 00007f7787265fa0 R15: 00007ffc46767e18 [ 1117.769333][T12293] [ 1118.080605][ T8704] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1118.093278][T12301] netlink: 32 bytes leftover after parsing attributes in process `syz.2.17307'. [ 1118.533226][T12322] netlink: 'syz.9.17314': attribute type 10 has an invalid length. [ 1118.572593][T12322] team0: Port device dummy0 added [ 1118.711170][T12325] netlink: 40 bytes leftover after parsing attributes in process `syz.2.17315'. [ 1118.799278][T12329] loop9: detected capacity change from 0 to 164 [ 1118.819278][T12329] Unable to read rock-ridge attributes [ 1118.838113][T12329] FAULT_INJECTION: forcing a failure. [ 1118.838113][T12329] name failslab, interval 1, probability 0, space 0, times 0 [ 1118.850848][T12329] CPU: 0 UID: 0 PID: 12329 Comm: syz.9.17317 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1118.850939][T12329] Tainted: [W]=WARN [ 1118.850948][T12329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1118.850965][T12329] Call Trace: [ 1118.850973][T12329] [ 1118.850983][T12329] __dump_stack+0x1d/0x30 [ 1118.851011][T12329] dump_stack_lvl+0xe8/0x140 [ 1118.851046][T12329] dump_stack+0x15/0x1b [ 1118.851067][T12329] should_fail_ex+0x265/0x280 [ 1118.851101][T12329] should_failslab+0x8c/0xb0 [ 1118.851133][T12329] kmem_cache_alloc_noprof+0x50/0x310 [ 1118.851193][T12329] ? security_file_alloc+0x32/0x100 [ 1118.851284][T12329] security_file_alloc+0x32/0x100 [ 1118.851439][T12329] init_file+0x5c/0x1d0 [ 1118.851478][T12329] alloc_empty_file+0x8b/0x200 [ 1118.851580][T12329] path_openat+0x68/0x2170 [ 1118.851604][T12329] ? __rcu_read_unlock+0x4f/0x70 [ 1118.851631][T12329] ? _parse_integer_limit+0x170/0x190 [ 1118.851660][T12329] ? __rcu_read_unlock+0x4f/0x70 [ 1118.851690][T12329] ? __perf_event_task_sched_in+0xa5b/0xac0 [ 1118.851717][T12329] ? plist_check_list+0x1e4/0x210 [ 1118.851752][T12329] ? save_fpregs_to_fpstate+0x100/0x160 [ 1118.851848][T12329] ? _raw_spin_unlock+0x26/0x50 [ 1118.851879][T12329] do_filp_open+0x109/0x230 [ 1118.851913][T12329] do_sys_openat2+0xa6/0x110 [ 1118.851989][T12329] __x64_sys_openat+0xf2/0x120 [ 1118.852027][T12329] x64_sys_call+0x2e9c/0x2ff0 [ 1118.852054][T12329] do_syscall_64+0xd2/0x200 [ 1118.852165][T12329] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1118.852203][T12329] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1118.852237][T12329] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1118.852326][T12329] RIP: 0033:0x7f26b346eec9 [ 1118.852345][T12329] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1118.852368][T12329] RSP: 002b:00007f26b1ecf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1118.852410][T12329] RAX: ffffffffffffffda RBX: 00007f26b36c5fa0 RCX: 00007f26b346eec9 [ 1118.852427][T12329] RDX: 0000000000149442 RSI: 0000200000000280 RDI: ffffffffffffff9c [ 1118.852441][T12329] RBP: 00007f26b1ecf090 R08: 0000000000000000 R09: 0000000000000000 [ 1118.852453][T12329] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000001 [ 1118.852464][T12329] R13: 00007f26b36c6038 R14: 00007f26b36c5fa0 R15: 00007ffe251ecf68 [ 1118.852483][T12329] [ 1119.182715][ T29] kauditd_printk_skb: 128 callbacks suppressed [ 1119.182733][ T29] audit: type=1326 audit(1758717073.879:21510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12346 comm="syz.6.17324" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0d730eeec9 code=0x7ffc0000 [ 1119.229962][ T29] audit: type=1326 audit(1758717073.909:21511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12346 comm="syz.6.17324" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0d730eeec9 code=0x7ffc0000 [ 1119.253839][ T29] audit: type=1326 audit(1758717073.909:21512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12346 comm="syz.6.17324" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0d730eeec9 code=0x7ffc0000 [ 1119.256137][T12343] loop4: detected capacity change from 0 to 8192 [ 1119.277594][ T29] audit: type=1326 audit(1758717073.909:21513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12346 comm="syz.6.17324" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0d730eeec9 code=0x7ffc0000 [ 1119.277660][ T29] audit: type=1326 audit(1758717073.909:21514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12346 comm="syz.6.17324" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0d730eeec9 code=0x7ffc0000 [ 1119.331380][ T29] audit: type=1326 audit(1758717073.909:21515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12346 comm="syz.6.17324" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0d730eeec9 code=0x7ffc0000 [ 1119.355216][ T29] audit: type=1326 audit(1758717073.909:21516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12346 comm="syz.6.17324" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0d730eeec9 code=0x7ffc0000 [ 1119.379112][ T29] audit: type=1326 audit(1758717073.909:21517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12346 comm="syz.6.17324" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0d730eeec9 code=0x7ffc0000 [ 1119.403104][ T29] audit: type=1326 audit(1758717073.909:21518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12346 comm="syz.6.17324" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0d730eeec9 code=0x7ffc0000 [ 1119.426905][ T29] audit: type=1326 audit(1758717073.909:21519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12346 comm="syz.6.17324" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0d730eeec9 code=0x7ffc0000 [ 1119.456790][T12352] 9pnet_fd: Insufficient options for proto=fd [ 1119.474128][T12332] netlink: 24 bytes leftover after parsing attributes in process `syz.0.17318'. [ 1119.544803][T12368] wireguard0: entered promiscuous mode [ 1119.550483][T12368] wireguard0: entered allmulticast mode [ 1119.589177][T12375] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12375 comm=syz.6.17331 [ 1120.532309][T12423] netlink: 4 bytes leftover after parsing attributes in process `syz.4.17337'. [ 1120.533250][T12423] netlink: 4 bytes leftover after parsing attributes in process `syz.4.17337'. [ 1121.822654][T12475] bond1: entered promiscuous mode [ 1121.827917][T12475] bond1: entered allmulticast mode [ 1121.845137][T12475] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1121.873517][T12475] loop9: detected capacity change from 0 to 1024 [ 1121.934978][T12475] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1121.987859][T12475] EXT4-fs error (device loop9): __ext4_new_inode:1073: comm syz.9.17351: reserved inode found cleared - inode=18 [ 1122.059744][ T8704] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1122.458535][T12569] usb usb8: usbfs: process 12569 (syz.0.17362) did not claim interface 0 before use [ 1122.530604][T12571] loop9: detected capacity change from 0 to 4096 [ 1122.581163][T12571] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1123.113110][T12613] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 1123.150599][T12631] netlink: 324 bytes leftover after parsing attributes in process `syz.2.17367'. [ 1123.181877][T12631] loop2: detected capacity change from 0 to 1024 [ 1123.200996][T12631] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1123.327048][ T8704] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1123.350232][ T2340] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1123.473739][T12701] netlink: 64 bytes leftover after parsing attributes in process `syz.4.17375'. [ 1123.494489][T12703] netlink: 4 bytes leftover after parsing attributes in process `syz.9.17376'. [ 1123.549811][T12701] loop4: detected capacity change from 0 to 128 [ 1123.578970][T12701] FAT-fs (loop4): bogus number of FAT structure [ 1123.586086][T12701] FAT-fs (loop4): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 1123.596845][T12701] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1123.670159][T12701] 9pnet_fd: Insufficient options for proto=fd [ 1123.746168][T12717] loop4: detected capacity change from 0 to 4096 [ 1123.757073][T12717] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1123.847666][T12732] usb usb8: usbfs: process 12732 (syz.2.17379) did not claim interface 0 before use [ 1123.968377][T12740] FAULT_INJECTION: forcing a failure. [ 1123.968377][T12740] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.981226][T12740] CPU: 1 UID: 0 PID: 12740 Comm: syz.6.17383 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1123.981323][T12740] Tainted: [W]=WARN [ 1123.981332][T12740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1123.981356][T12740] Call Trace: [ 1123.981365][T12740] [ 1123.981375][T12740] __dump_stack+0x1d/0x30 [ 1123.981403][T12740] dump_stack_lvl+0xe8/0x140 [ 1123.981428][T12740] dump_stack+0x15/0x1b [ 1123.981492][T12740] should_fail_ex+0x265/0x280 [ 1123.981523][T12740] should_failslab+0x8c/0xb0 [ 1123.981620][T12740] kmem_cache_alloc_node_noprof+0x57/0x320 [ 1123.981659][T12740] ? __alloc_skb+0x101/0x320 [ 1123.981687][T12740] __alloc_skb+0x101/0x320 [ 1123.981769][T12740] skb_copy_expand+0xfb/0x560 [ 1123.981834][T12740] uevent_net_rcv_skb+0x1c7/0x2a0 [ 1123.981874][T12740] netlink_rcv_skb+0x120/0x220 [ 1123.981900][T12740] ? __pfx_uevent_net_rcv_skb+0x10/0x10 [ 1123.981937][T12740] uevent_net_rcv+0x1c/0x30 [ 1123.981974][T12740] netlink_unicast+0x5c0/0x690 [ 1123.982009][T12740] netlink_sendmsg+0x58b/0x6b0 [ 1123.982045][T12740] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1123.982118][T12740] __sock_sendmsg+0x145/0x180 [ 1123.982161][T12740] ____sys_sendmsg+0x31e/0x4e0 [ 1123.982192][T12740] ___sys_sendmsg+0x17b/0x1d0 [ 1123.982294][T12740] __x64_sys_sendmsg+0xd4/0x160 [ 1123.982332][T12740] x64_sys_call+0x191e/0x2ff0 [ 1123.982353][T12740] do_syscall_64+0xd2/0x200 [ 1123.982503][T12740] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1123.982529][T12740] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1123.982567][T12740] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1123.982596][T12740] RIP: 0033:0x7f0d730eeec9 [ 1123.982647][T12740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1123.982666][T12740] RSP: 002b:00007f0d71b57038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1123.982685][T12740] RAX: ffffffffffffffda RBX: 00007f0d73345fa0 RCX: 00007f0d730eeec9 [ 1123.982701][T12740] RDX: 000000000009c000 RSI: 0000200000000700 RDI: 0000000000000003 [ 1123.982787][T12740] RBP: 00007f0d71b57090 R08: 0000000000000000 R09: 0000000000000000 [ 1123.982859][T12740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1123.982871][T12740] R13: 00007f0d73346038 R14: 00007f0d73345fa0 R15: 00007ffc6574ec28 [ 1123.982945][T12740] [ 1124.231450][ T29] kauditd_printk_skb: 84 callbacks suppressed [ 1124.231480][ T29] audit: type=1400 audit(1758717078.929:21604): avc: denied { unmount } for pid=8704 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1124.420754][ T29] audit: type=1326 audit(1758717079.119:21605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12787 comm="syz.9.17390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1124.503742][ T29] audit: type=1326 audit(1758717079.119:21606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12787 comm="syz.9.17390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1124.527549][ T29] audit: type=1326 audit(1758717079.139:21607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12787 comm="syz.9.17390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1124.551433][ T29] audit: type=1326 audit(1758717079.139:21608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12787 comm="syz.9.17390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1124.575157][ T29] audit: type=1326 audit(1758717079.139:21609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12787 comm="syz.9.17390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1124.599019][ T29] audit: type=1326 audit(1758717079.139:21610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12787 comm="syz.9.17390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1124.622752][ T29] audit: type=1326 audit(1758717079.139:21611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12787 comm="syz.9.17390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1124.646615][ T29] audit: type=1326 audit(1758717079.139:21612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12787 comm="syz.9.17390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1124.670836][ T29] audit: type=1326 audit(1758717079.139:21613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12787 comm="syz.9.17390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1124.704872][T11416] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1124.723168][T12811] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17395'. [ 1124.733749][T12811] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17395'. [ 1124.769049][T12820] netlink: 4 bytes leftover after parsing attributes in process `syz.4.17394'. [ 1124.779595][T12820] netlink: 4 bytes leftover after parsing attributes in process `syz.4.17394'. [ 1124.833337][T12828] loop2: detected capacity change from 0 to 128 [ 1124.851021][T12828] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 1124.873573][T12828] ext4 filesystem being mounted at /358/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 1125.010829][T12842] veth0: entered promiscuous mode [ 1125.023146][T12841] loop4: detected capacity change from 0 to 512 [ 1125.048901][T12841] EXT4-fs error (device loop4): ext4_xattr_inode_iget:437: inode #11: comm syz.4.17403: missing EA_INODE flag [ 1125.069415][T12841] EXT4-fs error (device loop4): ext4_xattr_inode_iget:442: comm syz.4.17403: error while reading EA inode 11 err=-117 [ 1125.098948][T12841] EXT4-fs (loop4): 1 orphan inode deleted [ 1125.114483][T12841] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1125.167389][T11416] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1125.185535][T12850] netlink: 12 bytes leftover after parsing attributes in process `syz.4.17405'. [ 1125.599160][T12818] veth0: left promiscuous mode [ 1125.640963][T12913] usb usb8: usbfs: process 12913 (syz.6.17411) did not claim interface 0 before use [ 1125.811813][ T2340] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 1125.919280][T12922] netlink: 'syz.9.17414': attribute type 1 has an invalid length. [ 1125.971710][T12926] netlink: 4 bytes leftover after parsing attributes in process `syz.9.17414'. [ 1126.052507][T12922] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1126.123936][T12926] bond2 (unregistering): Released all slaves [ 1126.169603][T12964] loop2: detected capacity change from 0 to 2048 [ 1126.187091][T12964] EXT4-fs: Ignoring removed orlov option [ 1126.204961][T12964] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1126.278915][T12964] FAULT_INJECTION: forcing a failure. [ 1126.278915][T12964] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.291663][T12964] CPU: 1 UID: 0 PID: 12964 Comm: syz.2.17415 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1126.291767][T12964] Tainted: [W]=WARN [ 1126.291773][T12964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1126.291788][T12964] Call Trace: [ 1126.291798][T12964] [ 1126.291808][T12964] __dump_stack+0x1d/0x30 [ 1126.291835][T12964] dump_stack_lvl+0xe8/0x140 [ 1126.291925][T12964] dump_stack+0x15/0x1b [ 1126.291941][T12964] should_fail_ex+0x265/0x280 [ 1126.291966][T12964] should_failslab+0x8c/0xb0 [ 1126.292000][T12964] __kmalloc_noprof+0xa5/0x3e0 [ 1126.292100][T12964] ? ext4_find_extent+0x16b/0x7a0 [ 1126.292161][T12964] ext4_find_extent+0x16b/0x7a0 [ 1126.292191][T12964] ext4_ext_map_blocks+0x11f/0x38a0 [ 1126.292274][T12964] ? __list_del_entry_valid_or_report+0x65/0x130 [ 1126.292308][T12964] ? __rmqueue_pcplist+0x9d2/0xbd0 [ 1126.292415][T12964] ext4_map_query_blocks+0xa8/0x480 [ 1126.292484][T12964] ext4_map_blocks+0x330/0xd00 [ 1126.292515][T12964] ? css_rstat_updated+0xb7/0x240 [ 1126.292550][T12964] ? xa_load+0xb1/0xe0 [ 1126.292616][T12964] ext4_getblk+0x114/0x510 [ 1126.292651][T12964] ext4_bread_batch+0x5c/0x320 [ 1126.292706][T12964] __ext4_find_entry+0x840/0xf40 [ 1126.292756][T12964] ? d_alloc_parallel+0xba9/0xc60 [ 1126.292813][T12964] ext4_lookup+0xbb/0x390 [ 1126.292839][T12964] __lookup_slow+0x193/0x250 [ 1126.292881][T12964] lookup_slow+0x3c/0x60 [ 1126.292988][T12964] walk_component+0x1ec/0x220 [ 1126.293067][T12964] path_lookupat+0xfe/0x2a0 [ 1126.293104][T12964] filename_lookup+0x147/0x340 [ 1126.293162][T12964] filename_setxattr+0x56/0x400 [ 1126.293198][T12964] path_setxattrat+0x2c9/0x310 [ 1126.293247][T12964] __x64_sys_setxattr+0x6e/0x90 [ 1126.293273][T12964] x64_sys_call+0xad2/0x2ff0 [ 1126.293361][T12964] do_syscall_64+0xd2/0x200 [ 1126.293402][T12964] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1126.293432][T12964] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1126.293463][T12964] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1126.293531][T12964] RIP: 0033:0x7f2e2185eec9 [ 1126.293552][T12964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1126.293569][T12964] RSP: 002b:00007f2e202c7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 1126.293588][T12964] RAX: ffffffffffffffda RBX: 00007f2e21ab5fa0 RCX: 00007f2e2185eec9 [ 1126.293640][T12964] RDX: 0000200000001400 RSI: 0000200000000080 RDI: 0000200000000380 [ 1126.293713][T12964] RBP: 00007f2e202c7090 R08: 0000000000000000 R09: 0000000000000000 [ 1126.293746][T12964] R10: 0000000000000835 R11: 0000000000000246 R12: 0000000000000001 [ 1126.293758][T12964] R13: 00007f2e21ab6038 R14: 00007f2e21ab5fa0 R15: 00007ffc4657c598 [ 1126.293782][T12964] [ 1126.598000][ T2340] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1126.642181][T13019] FAULT_INJECTION: forcing a failure. [ 1126.642181][T13019] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.654937][T13019] CPU: 0 UID: 0 PID: 13019 Comm: syz.2.17421 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1126.654973][T13019] Tainted: [W]=WARN [ 1126.654980][T13019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1126.654997][T13019] Call Trace: [ 1126.655007][T13019] [ 1126.655017][T13019] __dump_stack+0x1d/0x30 [ 1126.655045][T13019] dump_stack_lvl+0xe8/0x140 [ 1126.655141][T13019] dump_stack+0x15/0x1b [ 1126.655163][T13019] should_fail_ex+0x265/0x280 [ 1126.655255][T13019] should_failslab+0x8c/0xb0 [ 1126.655288][T13019] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 1126.655332][T13019] ? v9fs_session_init+0x78/0xde0 [ 1126.655365][T13019] kstrdup+0x3e/0xd0 [ 1126.655398][T13019] v9fs_session_init+0x78/0xde0 [ 1126.655458][T13019] ? __rcu_read_unlock+0x4f/0x70 [ 1126.655487][T13019] ? avc_has_perm_noaudit+0x1b1/0x200 [ 1126.655521][T13019] ? should_fail_ex+0xdb/0x280 [ 1126.655551][T13019] ? v9fs_mount+0x51/0x5c0 [ 1126.655593][T13019] ? should_failslab+0x8c/0xb0 [ 1126.655626][T13019] ? __kmalloc_cache_noprof+0x189/0x320 [ 1126.655665][T13019] v9fs_mount+0x67/0x5c0 [ 1126.655737][T13019] ? selinux_capable+0x31/0x40 [ 1126.655765][T13019] ? __pfx_v9fs_mount+0x10/0x10 [ 1126.655861][T13019] legacy_get_tree+0x78/0xd0 [ 1126.655891][T13019] vfs_get_tree+0x57/0x1d0 [ 1126.655944][T13019] do_new_mount+0x207/0x5e0 [ 1126.656008][T13019] ? security_capable+0x83/0x90 [ 1126.656038][T13019] path_mount+0x4a4/0xb20 [ 1126.656094][T13019] ? user_path_at+0x109/0x130 [ 1126.656137][T13019] __se_sys_mount+0x28f/0x2e0 [ 1126.656230][T13019] ? fput+0x8f/0xc0 [ 1126.656271][T13019] __x64_sys_mount+0x67/0x80 [ 1126.656331][T13019] x64_sys_call+0x2b4d/0x2ff0 [ 1126.656360][T13019] do_syscall_64+0xd2/0x200 [ 1126.656401][T13019] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1126.656472][T13019] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1126.656510][T13019] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1126.656534][T13019] RIP: 0033:0x7f2e2185eec9 [ 1126.656595][T13019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1126.656689][T13019] RSP: 002b:00007f2e202c7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1126.656713][T13019] RAX: ffffffffffffffda RBX: 00007f2e21ab5fa0 RCX: 00007f2e2185eec9 [ 1126.656729][T13019] RDX: 00002000000004c0 RSI: 0000200000000480 RDI: 0000200000000380 [ 1126.656744][T13019] RBP: 00007f2e202c7090 R08: 0000200000000680 R09: 0000000000000000 [ 1126.656757][T13019] R10: 0000000000000016 R11: 0000000000000246 R12: 0000000000000002 [ 1126.656772][T13019] R13: 00007f2e21ab6038 R14: 00007f2e21ab5fa0 R15: 00007ffc4657c598 [ 1126.656792][T13019] [ 1128.207022][T13165] netlink: 40 bytes leftover after parsing attributes in process `syz.6.17437'. [ 1128.408973][T13207] netlink: 40 bytes leftover after parsing attributes in process `syz.4.17439'. [ 1128.559493][T13222] loop2: detected capacity change from 0 to 512 [ 1128.566681][T13222] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 1128.586098][T13224] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=45568 sclass=netlink_route_socket pid=13224 comm=syz.9.17443 [ 1128.895428][T13251] netlink: 'syz.2.17455': attribute type 10 has an invalid length. [ 1128.903491][T13251] netlink: 40 bytes leftover after parsing attributes in process `syz.2.17455'. [ 1128.913047][T13251] batman_adv: batadv0: Adding interface: veth1_vlan [ 1128.919714][T13251] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1128.945786][T13251] batman_adv: batadv0: Interface activated: veth1_vlan [ 1129.065683][T13283] FAULT_INJECTION: forcing a failure. [ 1129.065683][T13283] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.078599][T13283] CPU: 0 UID: 0 PID: 13283 Comm: syz.6.17459 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1129.078650][T13283] Tainted: [W]=WARN [ 1129.078659][T13283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1129.078677][T13283] Call Trace: [ 1129.078686][T13283] [ 1129.078696][T13283] __dump_stack+0x1d/0x30 [ 1129.078763][T13283] dump_stack_lvl+0xe8/0x140 [ 1129.078788][T13283] dump_stack+0x15/0x1b [ 1129.078861][T13283] should_fail_ex+0x265/0x280 [ 1129.078941][T13283] should_failslab+0x8c/0xb0 [ 1129.078970][T13283] kmem_cache_alloc_noprof+0x50/0x310 [ 1129.079035][T13283] ? audit_log_start+0x365/0x6c0 [ 1129.079070][T13283] audit_log_start+0x365/0x6c0 [ 1129.079103][T13283] audit_seccomp+0x48/0x100 [ 1129.079129][T13283] ? __seccomp_filter+0x68c/0x10d0 [ 1129.079206][T13283] __seccomp_filter+0x69d/0x10d0 [ 1129.079236][T13283] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1129.079318][T13283] ? vfs_write+0x7e8/0x960 [ 1129.079357][T13283] __secure_computing+0x82/0x150 [ 1129.079386][T13283] syscall_trace_enter+0xcf/0x1e0 [ 1129.079416][T13283] do_syscall_64+0xac/0x200 [ 1129.079479][T13283] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1129.079581][T13283] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1129.079623][T13283] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1129.079652][T13283] RIP: 0033:0x7f0d730eeec9 [ 1129.079712][T13283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1129.079733][T13283] RSP: 002b:00007f0d71b57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000045 [ 1129.079755][T13283] RAX: ffffffffffffffda RBX: 00007f0d73345fa0 RCX: 00007f0d730eeec9 [ 1129.079774][T13283] RDX: 0000000000000fd1 RSI: 0000000000000000 RDI: 0000000000000000 [ 1129.079786][T13283] RBP: 00007f0d71b57090 R08: 0000000000000000 R09: 0000000000000000 [ 1129.079799][T13283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1129.079884][T13283] R13: 00007f0d73346038 R14: 00007f0d73345fa0 R15: 00007ffc6574ec28 [ 1129.079910][T13283] [ 1129.289140][ T29] kauditd_printk_skb: 99 callbacks suppressed [ 1129.289154][ T29] audit: type=1326 audit(1758717083.899:21711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13282 comm="syz.6.17459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f0d730ed8dc code=0x7ffc0000 [ 1129.318881][ T29] audit: type=1326 audit(1758717083.899:21712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13282 comm="syz.6.17459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f0d730ed97f code=0x7ffc0000 [ 1129.342521][ T29] audit: type=1326 audit(1758717083.899:21713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13282 comm="syz.6.17459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f0d730edb2a code=0x7ffc0000 [ 1129.366116][ T29] audit: type=1326 audit(1758717083.899:21714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13282 comm="syz.6.17459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0d730eeec9 code=0x7ffc0000 [ 1129.389857][ T29] audit: type=1326 audit(1758717083.899:21715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13282 comm="syz.6.17459" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0d730eeec9 code=0x7ffc0000 [ 1129.441000][ T29] audit: type=1326 audit(1758717084.139:21716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13287 comm="syz.0.17461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f778700eec9 code=0x7ffc0000 [ 1129.464813][ T29] audit: type=1326 audit(1758717084.139:21717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13287 comm="syz.0.17461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f778700eec9 code=0x7ffc0000 [ 1129.514693][ T29] audit: type=1326 audit(1758717084.139:21718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13287 comm="syz.0.17461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=296 compat=0 ip=0x7f778700eec9 code=0x7ffc0000 [ 1129.538595][ T29] audit: type=1326 audit(1758717084.139:21719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13287 comm="syz.0.17461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f778700eec9 code=0x7ffc0000 [ 1129.562551][ T29] audit: type=1326 audit(1758717084.139:21720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13287 comm="syz.0.17461" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f778700eec9 code=0x7ffc0000 [ 1129.630924][T13320] loop9: detected capacity change from 0 to 256 [ 1129.720122][T13333] FAULT_INJECTION: forcing a failure. [ 1129.720122][T13333] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.732868][T13333] CPU: 1 UID: 0 PID: 13333 Comm: syz.4.17475 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1129.732905][T13333] Tainted: [W]=WARN [ 1129.732912][T13333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1129.732925][T13333] Call Trace: [ 1129.732932][T13333] [ 1129.732941][T13333] __dump_stack+0x1d/0x30 [ 1129.733011][T13333] dump_stack_lvl+0xe8/0x140 [ 1129.733031][T13333] dump_stack+0x15/0x1b [ 1129.733048][T13333] should_fail_ex+0x265/0x280 [ 1129.733074][T13333] ? alloc_fs_context+0x44/0x4e0 [ 1129.733143][T13333] should_failslab+0x8c/0xb0 [ 1129.733171][T13333] __kmalloc_cache_noprof+0x4c/0x320 [ 1129.733233][T13333] alloc_fs_context+0x44/0x4e0 [ 1129.733257][T13333] fs_context_for_mount+0x22/0x30 [ 1129.733278][T13333] do_new_mount+0xe9/0x5e0 [ 1129.733301][T13333] ? security_capable+0x83/0x90 [ 1129.733339][T13333] path_mount+0x4a4/0xb20 [ 1129.733362][T13333] ? user_path_at+0x109/0x130 [ 1129.733396][T13333] __se_sys_mount+0x28f/0x2e0 [ 1129.733419][T13333] ? fput+0x8f/0xc0 [ 1129.733461][T13333] __x64_sys_mount+0x67/0x80 [ 1129.733485][T13333] x64_sys_call+0x2b4d/0x2ff0 [ 1129.733507][T13333] do_syscall_64+0xd2/0x200 [ 1129.733596][T13333] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1129.733622][T13333] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1129.733654][T13333] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1129.733680][T13333] RIP: 0033:0x7fcd8f7eeec9 [ 1129.733695][T13333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1129.733714][T13333] RSP: 002b:00007fcd8e257038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1129.733752][T13333] RAX: ffffffffffffffda RBX: 00007fcd8fa45fa0 RCX: 00007fcd8f7eeec9 [ 1129.733765][T13333] RDX: 0000200000000100 RSI: 0000200000000040 RDI: 0000000000000000 [ 1129.733778][T13333] RBP: 00007fcd8e257090 R08: 0000200000000140 R09: 0000000000000000 [ 1129.733791][T13333] R10: 0000000000000080 R11: 0000000000000246 R12: 0000000000000001 [ 1129.733885][T13333] R13: 00007fcd8fa46038 R14: 00007fcd8fa45fa0 R15: 00007fffbe578c28 [ 1129.733905][T13333] [ 1130.023631][T13345] FAULT_INJECTION: forcing a failure. [ 1130.023631][T13345] name failslab, interval 1, probability 0, space 0, times 0 [ 1130.036388][T13345] CPU: 1 UID: 0 PID: 13345 Comm: syz.4.17479 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1130.036488][T13345] Tainted: [W]=WARN [ 1130.036496][T13345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1130.036515][T13345] Call Trace: [ 1130.036523][T13345] [ 1130.036571][T13345] __dump_stack+0x1d/0x30 [ 1130.036596][T13345] dump_stack_lvl+0xe8/0x140 [ 1130.036620][T13345] dump_stack+0x15/0x1b [ 1130.036646][T13345] should_fail_ex+0x265/0x280 [ 1130.036677][T13345] should_failslab+0x8c/0xb0 [ 1130.036710][T13345] __kvmalloc_node_noprof+0x123/0x4e0 [ 1130.036748][T13345] ? io_alloc_cache_init+0x31/0xa0 [ 1130.036827][T13345] io_alloc_cache_init+0x31/0xa0 [ 1130.036868][T13345] io_rsrc_cache_init+0x43/0x50 [ 1130.036962][T13345] io_ring_ctx_alloc+0x312/0x660 [ 1130.036998][T13345] io_uring_create+0x10f/0x610 [ 1130.037065][T13345] __se_sys_io_uring_setup+0x1f7/0x210 [ 1130.037100][T13345] __x64_sys_io_uring_setup+0x31/0x40 [ 1130.037194][T13345] x64_sys_call+0x2b21/0x2ff0 [ 1130.037223][T13345] do_syscall_64+0xd2/0x200 [ 1130.037277][T13345] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1130.037302][T13345] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1130.037332][T13345] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1130.037356][T13345] RIP: 0033:0x7fcd8f7eeec9 [ 1130.037419][T13345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1130.037443][T13345] RSP: 002b:00007fcd8e256fc8 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1130.037468][T13345] RAX: ffffffffffffffda RBX: 00007fcd8fa45fa0 RCX: 00007fcd8f7eeec9 [ 1130.037484][T13345] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000000000003c0c [ 1130.037501][T13345] RBP: 0000200000000400 R08: 0000000000000000 R09: 0000000000000000 [ 1130.037525][T13345] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000002 [ 1130.037537][T13345] R13: 0000000000000000 R14: 0000000000003c0c R15: 0000000000000000 [ 1130.037600][T13345] [ 1130.065177][T13350] loop9: detected capacity change from 0 to 1024 [ 1130.417032][T13361] usb usb8: usbfs: process 13361 (syz.0.17483) did not claim interface 0 before use [ 1130.489704][T13385] loop9: detected capacity change from 0 to 2048 [ 1130.520926][T13385] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1130.595105][T13360] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1130.658584][T13360] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1130.680608][T13417] netlink: 8 bytes leftover after parsing attributes in process `syz.6.17498'. [ 1130.689651][T13417] netlink: 12 bytes leftover after parsing attributes in process `syz.6.17498'. [ 1130.703365][ T3977] netdevsim netdevsim6 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1130.726357][T13360] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1130.751036][ T3977] netdevsim netdevsim6 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1130.769256][T13422] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17498'. [ 1130.778627][ T3977] netdevsim netdevsim6 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1130.787776][ T3977] netdevsim netdevsim6 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1130.800436][T13360] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1130.872807][T17579] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1130.899595][T17579] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1130.913177][T17579] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1130.924219][T17579] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1130.989137][T13444] FAULT_INJECTION: forcing a failure. [ 1130.989137][T13444] name failslab, interval 1, probability 0, space 0, times 0 [ 1131.001862][T13444] CPU: 0 UID: 0 PID: 13444 Comm: syz.0.17502 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1131.001903][T13444] Tainted: [W]=WARN [ 1131.001912][T13444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1131.001928][T13444] Call Trace: [ 1131.001937][T13444] [ 1131.001946][T13444] __dump_stack+0x1d/0x30 [ 1131.001986][T13444] dump_stack_lvl+0xe8/0x140 [ 1131.002011][T13444] dump_stack+0x15/0x1b [ 1131.002032][T13444] should_fail_ex+0x265/0x280 [ 1131.002064][T13444] ? __hw_addr_add_ex+0x162/0x440 [ 1131.002090][T13444] should_failslab+0x8c/0xb0 [ 1131.002119][T13444] __kmalloc_cache_noprof+0x4c/0x320 [ 1131.002228][T13444] __hw_addr_add_ex+0x162/0x440 [ 1131.002338][T13444] ? __pfx_hsr_dev_setup+0x10/0x10 [ 1131.002373][T13444] dev_addr_init+0xb1/0x120 [ 1131.002396][T13444] alloc_netdev_mqs+0x1c5/0xa30 [ 1131.002509][T13444] rtnl_create_link+0x239/0x710 [ 1131.002546][T13444] rtnl_newlink_create+0x14c/0x620 [ 1131.002570][T13444] ? __list_del_entry_valid_or_report+0x65/0x130 [ 1131.002604][T13444] ? __mutex_lock+0x25d/0xcc0 [ 1131.002712][T13444] rtnl_newlink+0xf29/0x12d0 [ 1131.002742][T13444] ? number+0x9ae/0xab0 [ 1131.002774][T13444] ? xas_load+0x413/0x430 [ 1131.002812][T13444] ? __memcg_slab_free_hook+0x135/0x230 [ 1131.002930][T13444] ? __rcu_read_unlock+0x4f/0x70 [ 1131.002957][T13444] ? avc_has_perm_noaudit+0x1b1/0x200 [ 1131.002993][T13444] ? cred_has_capability+0x210/0x280 [ 1131.003021][T13444] ? selinux_capable+0x31/0x40 [ 1131.003105][T13444] ? security_capable+0x83/0x90 [ 1131.003138][T13444] ? ns_capable+0x7d/0xb0 [ 1131.003164][T13444] ? __pfx_rtnl_newlink+0x10/0x10 [ 1131.003244][T13444] rtnetlink_rcv_msg+0x5fb/0x6d0 [ 1131.003318][T13444] netlink_rcv_skb+0x120/0x220 [ 1131.003350][T13444] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1131.003443][T13444] rtnetlink_rcv+0x1c/0x30 [ 1131.003476][T13444] netlink_unicast+0x5c0/0x690 [ 1131.003513][T13444] netlink_sendmsg+0x58b/0x6b0 [ 1131.003577][T13444] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1131.003611][T13444] __sock_sendmsg+0x145/0x180 [ 1131.003654][T13444] ____sys_sendmsg+0x31e/0x4e0 [ 1131.003692][T13444] ___sys_sendmsg+0x17b/0x1d0 [ 1131.003742][T13444] __x64_sys_sendmsg+0xd4/0x160 [ 1131.003780][T13444] x64_sys_call+0x191e/0x2ff0 [ 1131.003802][T13444] do_syscall_64+0xd2/0x200 [ 1131.003891][T13444] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1131.003919][T13444] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1131.003951][T13444] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1131.003976][T13444] RIP: 0033:0x7f778700eec9 [ 1131.003995][T13444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1131.004093][T13444] RSP: 002b:00007f7785a6f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1131.004119][T13444] RAX: ffffffffffffffda RBX: 00007f7787265fa0 RCX: 00007f778700eec9 [ 1131.004135][T13444] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000004 [ 1131.004148][T13444] RBP: 00007f7785a6f090 R08: 0000000000000000 R09: 0000000000000000 [ 1131.004163][T13444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1131.004199][T13444] R13: 00007f7787266038 R14: 00007f7787265fa0 R15: 00007ffc46767e18 [ 1131.004224][T13444] [ 1131.322812][T13384] EXT4-fs error (device loop9): ext4_mb_generate_buddy:1289: group 0, block bitmap and bg descriptor inconsistent: 0 vs 150994969 free clusters [ 1131.337947][T13384] EXT4-fs (loop9): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 2048 with error 28 [ 1131.350527][T13384] EXT4-fs (loop9): This should not happen!! Data will be lost [ 1131.350527][T13384] [ 1131.360268][T13384] EXT4-fs (loop9): Total free blocks count 0 [ 1131.366267][T13384] EXT4-fs (loop9): Free/Dirty block details [ 1131.372239][T13384] EXT4-fs (loop9): free_blocks=2415919504 [ 1131.378018][T13384] EXT4-fs (loop9): dirty_blocks=8256 [ 1131.383321][T13384] EXT4-fs (loop9): Block reservation details [ 1131.389433][T13384] EXT4-fs (loop9): i_reserved_data_blocks=512 [ 1131.418842][ T5703] EXT4-fs (loop9): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 1 with error 28 [ 1131.574374][T13478] veth0_vlan: entered allmulticast mode [ 1131.627241][T13487] netlink: 'syz.4.17514': attribute type 10 has an invalid length. [ 1131.635366][T13487] netlink: 40 bytes leftover after parsing attributes in process `syz.4.17514'. [ 1131.648219][T13487] batman_adv: batadv0: Adding interface: veth1_vlan [ 1131.654945][T13487] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1131.682421][T13487] batman_adv: batadv0: Interface activated: veth1_vlan [ 1131.730210][T13502] netlink: 8 bytes leftover after parsing attributes in process `syz.4.17518'. [ 1132.227298][T13558] FAULT_INJECTION: forcing a failure. [ 1132.227298][T13558] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.239953][T13558] CPU: 1 UID: 0 PID: 13558 Comm: syz.9.17529 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1132.239984][T13558] Tainted: [W]=WARN [ 1132.239993][T13558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1132.240009][T13558] Call Trace: [ 1132.240051][T13558] [ 1132.240059][T13558] __dump_stack+0x1d/0x30 [ 1132.240119][T13558] dump_stack_lvl+0xe8/0x140 [ 1132.240137][T13558] dump_stack+0x15/0x1b [ 1132.240151][T13558] should_fail_ex+0x265/0x280 [ 1132.240173][T13558] should_failslab+0x8c/0xb0 [ 1132.240275][T13558] kmem_cache_alloc_node_noprof+0x57/0x320 [ 1132.240378][T13558] ? __alloc_skb+0x101/0x320 [ 1132.240399][T13558] __alloc_skb+0x101/0x320 [ 1132.240416][T13558] ? audit_log_start+0x365/0x6c0 [ 1132.240444][T13558] audit_log_start+0x380/0x6c0 [ 1132.240482][T13558] audit_seccomp+0x48/0x100 [ 1132.240505][T13558] ? __seccomp_filter+0x68c/0x10d0 [ 1132.240524][T13558] __seccomp_filter+0x69d/0x10d0 [ 1132.240629][T13558] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1132.240753][T13558] ? vfs_write+0x7e8/0x960 [ 1132.240772][T13558] ? __rcu_read_unlock+0x4f/0x70 [ 1132.240798][T13558] ? __fget_files+0x184/0x1c0 [ 1132.240861][T13558] __secure_computing+0x82/0x150 [ 1132.240881][T13558] syscall_trace_enter+0xcf/0x1e0 [ 1132.240943][T13558] do_syscall_64+0xac/0x200 [ 1132.240975][T13558] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1132.241002][T13558] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1132.241078][T13558] RIP: 0033:0x7f26b346eec9 [ 1132.241092][T13558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1132.241107][T13558] RSP: 002b:00007f26b1ecf038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 1132.241126][T13558] RAX: ffffffffffffffda RBX: 00007f26b36c5fa0 RCX: 00007f26b346eec9 [ 1132.241137][T13558] RDX: 0000200000000280 RSI: 0000200000000000 RDI: 0000200000000400 [ 1132.241148][T13558] RBP: 00007f26b1ecf090 R08: 0000000000000000 R09: 0000000000000000 [ 1132.241159][T13558] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000001 [ 1132.241249][T13558] R13: 00007f26b36c6038 R14: 00007f26b36c5fa0 R15: 00007ffe251ecf68 [ 1132.241275][T13558] [ 1132.515932][T13567] netlink: 12 bytes leftover after parsing attributes in process `syz.2.17533'. [ 1132.540055][T13567] Invalid ELF header magic: != ELF [ 1132.554458][T13567] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=13567 comm=+}[@ [ 1132.669437][T13593] netlink: 76 bytes leftover after parsing attributes in process `syz.4.17541'. [ 1132.682340][T13593] netlink: 19 bytes leftover after parsing attributes in process `syz.4.17541'. [ 1132.749410][T13612] netlink: 72 bytes leftover after parsing attributes in process `syz.2.17542'. [ 1132.808802][T13627] FAULT_INJECTION: forcing a failure. [ 1132.808802][T13627] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1132.822190][T13627] CPU: 1 UID: 0 PID: 13627 Comm: syz.4.17547 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1132.822232][T13627] Tainted: [W]=WARN [ 1132.822257][T13627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1132.822273][T13627] Call Trace: [ 1132.822282][T13627] [ 1132.822292][T13627] __dump_stack+0x1d/0x30 [ 1132.822412][T13627] dump_stack_lvl+0xe8/0x140 [ 1132.822449][T13627] dump_stack+0x15/0x1b [ 1132.822469][T13627] should_fail_ex+0x265/0x280 [ 1132.822597][T13627] should_fail+0xb/0x20 [ 1132.822623][T13627] should_fail_usercopy+0x1a/0x20 [ 1132.822651][T13627] _copy_from_user+0x1c/0xb0 [ 1132.822809][T13627] ___sys_sendmsg+0xc1/0x1d0 [ 1132.822856][T13627] __x64_sys_sendmsg+0xd4/0x160 [ 1132.822978][T13627] x64_sys_call+0x191e/0x2ff0 [ 1132.823006][T13627] do_syscall_64+0xd2/0x200 [ 1132.823046][T13627] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1132.823086][T13627] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1132.823179][T13627] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1132.823207][T13627] RIP: 0033:0x7fcd8f7eeec9 [ 1132.823251][T13627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1132.823313][T13627] RSP: 002b:00007fcd8e257038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1132.823331][T13627] RAX: ffffffffffffffda RBX: 00007fcd8fa45fa0 RCX: 00007fcd8f7eeec9 [ 1132.823350][T13627] RDX: 0000000000000000 RSI: 0000200000000340 RDI: 0000000000000003 [ 1132.823389][T13627] RBP: 00007fcd8e257090 R08: 0000000000000000 R09: 0000000000000000 [ 1132.823405][T13627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1132.823436][T13627] R13: 00007fcd8fa46038 R14: 00007fcd8fa45fa0 R15: 00007fffbe578c28 [ 1132.823461][T13627] [ 1133.006379][T13646] netlink: 20 bytes leftover after parsing attributes in process `syz.6.17540'. [ 1133.040418][T13649] netlink: 12 bytes leftover after parsing attributes in process `syz.4.17549'. [ 1133.062944][T13649] Invalid ELF header magic: != ELF [ 1133.078108][T13649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=13649 comm=+}[@ [ 1133.331964][T13731] netlink: 176 bytes leftover after parsing attributes in process `syz.6.17565'. [ 1133.370546][T13735] ip6gretap0: entered promiscuous mode [ 1133.380969][T13735] ip6gretap0: left promiscuous mode [ 1134.349316][T13791] netlink: 2 bytes leftover after parsing attributes in process `syz.0.17581'. [ 1134.467642][ T29] kauditd_printk_skb: 419 callbacks suppressed [ 1134.467672][ T29] audit: type=1400 audit(1758717089.169:22138): avc: denied { relabelfrom } for pid=13816 comm="syz.4.17582" name="" dev="pipefs" ino=179993 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1135.525723][ T29] audit: type=1326 audit(1758717090.219:22139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13899 comm="syz.2.17595" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1135.549613][ T29] audit: type=1326 audit(1758717090.219:22140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13899 comm="syz.2.17595" exe="/root/syz-executor" sig=0 arch=c000003e syscall=325 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1135.573379][ T29] audit: type=1326 audit(1758717090.219:22141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13899 comm="syz.2.17595" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1135.597236][ T29] audit: type=1326 audit(1758717090.219:22142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13899 comm="syz.2.17595" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1135.651794][T13909] loop2: detected capacity change from 0 to 512 [ 1135.683497][T13909] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 1135.712909][T13904] ALSA: seq fatal error: cannot create timer (-19) [ 1135.743929][T13909] EXT4-fs error (device loop2): ext4_get_branch:178: inode #11: block 4294967295: comm syz.2.17596: invalid block [ 1135.779544][T13909] EXT4-fs error (device loop2): ext4_free_branches:1023: inode #11: comm syz.2.17596: invalid indirect mapped block 4294967295 (level 1) [ 1135.816710][T13909] EXT4-fs error (device loop2): ext4_free_branches:1023: inode #11: comm syz.2.17596: invalid indirect mapped block 4294967295 (level 1) [ 1135.950757][T13909] EXT4-fs (loop2): 2 truncates cleaned up [ 1135.966913][T13909] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1136.004070][ T2340] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1136.233659][T13934] chnl_net:caif_netlink_parms(): no params data found [ 1136.547174][T13934] bridge0: port 1(bridge_slave_0) entered blocking state [ 1136.554294][T13934] bridge0: port 1(bridge_slave_0) entered disabled state [ 1136.596432][T13934] bridge_slave_0: entered allmulticast mode [ 1136.610657][T13934] bridge_slave_0: entered promiscuous mode [ 1136.623229][T13934] bridge0: port 2(bridge_slave_1) entered blocking state [ 1136.630448][T13934] bridge0: port 2(bridge_slave_1) entered disabled state [ 1136.777004][T13934] bridge_slave_1: entered allmulticast mode [ 1136.796600][T13934] bridge_slave_1: entered promiscuous mode [ 1136.990898][ T29] audit: type=1326 audit(1758717091.689:22143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14172 comm="syz.2.17610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1137.021801][T13934] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1137.038360][T13934] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1137.047595][ T29] audit: type=1326 audit(1758717091.709:22144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14172 comm="syz.2.17610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1137.071391][ T29] audit: type=1326 audit(1758717091.709:22145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14172 comm="syz.2.17610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1137.095009][ T29] audit: type=1326 audit(1758717091.709:22146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14172 comm="syz.2.17610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1137.119001][ T29] audit: type=1326 audit(1758717091.709:22147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14172 comm="syz.2.17610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2e2185eec9 code=0x7ffc0000 [ 1137.308016][T14220] loop2: detected capacity change from 0 to 164 [ 1137.322340][T14220] syz.2.17611: attempt to access beyond end of device [ 1137.322340][T14220] loop2: rw=524288, sector=263328, nr_sectors = 4 limit=164 [ 1137.338995][T14220] syz.2.17611: attempt to access beyond end of device [ 1137.338995][T14220] loop2: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 1137.461744][T13934] team0: Port device team_slave_0 added [ 1137.503894][T13934] team0: Port device team_slave_1 added [ 1137.538168][T13934] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1137.545175][T13934] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1137.571228][T13934] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1137.584219][T13934] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1137.591301][T13934] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1137.617687][T13934] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1137.673657][T13934] hsr_slave_0: entered promiscuous mode [ 1137.687025][T13934] hsr_slave_1: entered promiscuous mode [ 1137.698098][T13934] debugfs: 'hsr0' already exists in 'hsr' [ 1137.703888][T13934] Cannot create hsr debugfs directory [ 1138.039305][T13934] netdevsim netdevsim6 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1138.049672][T13934] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1138.187521][T13934] netdevsim netdevsim6 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1138.197979][T13934] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1138.329023][T13934] netdevsim netdevsim6 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1138.339428][T13934] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1138.622445][T13934] netdevsim netdevsim6 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1138.632815][T13934] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1138.647819][T14267] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 1138.656045][T14267] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 1138.674807][T14377] __nla_validate_parse: 3 callbacks suppressed [ 1138.674826][T14377] netlink: 32 bytes leftover after parsing attributes in process `syz.2.17618'. [ 1138.702942][T14267] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 1138.713418][T14267] block device autoloading is deprecated and will be removed. [ 1139.226263][T14419] loop4: detected capacity change from 0 to 4096 [ 1139.247620][T14419] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1139.358764][ T5898] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1139.369179][ T5898] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1139.378877][ T5898] bond0 (unregistering): Released all slaves [ 1139.408065][T13934] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 1139.482385][T13934] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 1139.502598][ T5898] hsr_slave_0: left promiscuous mode [ 1139.510741][ T5898] hsr_slave_1: left promiscuous mode [ 1139.516869][ T5898] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1139.524301][ T5898] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1139.537555][ T5898] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1139.545011][ T5898] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1139.560610][ T5898] veth1_macvtap: left promiscuous mode [ 1139.576545][ T5898] veth0_macvtap: left promiscuous mode [ 1139.582187][ T5898] veth1_vlan: left promiscuous mode [ 1139.584814][T14442] FAULT_INJECTION: forcing a failure. [ 1139.584814][T14442] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1139.600814][T14442] CPU: 1 UID: 0 PID: 14442 Comm: syz.0.17636 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1139.600976][T14442] Tainted: [W]=WARN [ 1139.600986][T14442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1139.601003][T14442] Call Trace: [ 1139.601010][T14442] [ 1139.601020][T14442] __dump_stack+0x1d/0x30 [ 1139.601084][T14442] dump_stack_lvl+0xe8/0x140 [ 1139.601107][T14442] dump_stack+0x15/0x1b [ 1139.601128][T14442] should_fail_ex+0x265/0x280 [ 1139.601160][T14442] should_fail+0xb/0x20 [ 1139.601225][T14442] should_fail_usercopy+0x1a/0x20 [ 1139.601251][T14442] _copy_to_user+0x20/0xa0 [ 1139.601306][T14442] simple_read_from_buffer+0xb5/0x130 [ 1139.601328][T14442] proc_fail_nth_read+0x10e/0x150 [ 1139.601379][T14442] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1139.601405][T14442] vfs_read+0x1a5/0x770 [ 1139.601426][T14442] ? __rcu_read_unlock+0x4f/0x70 [ 1139.601449][T14442] ? __fget_files+0x184/0x1c0 [ 1139.601476][T14442] ksys_read+0xda/0x1a0 [ 1139.601556][T14442] __x64_sys_read+0x40/0x50 [ 1139.601586][T14442] x64_sys_call+0x27bc/0x2ff0 [ 1139.601614][T14442] do_syscall_64+0xd2/0x200 [ 1139.601731][T14442] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1139.601756][T14442] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1139.601786][T14442] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1139.601808][T14442] RIP: 0033:0x7f778700d8dc [ 1139.601858][T14442] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1139.601882][T14442] RSP: 002b:00007f7785a6f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1139.601907][T14442] RAX: ffffffffffffffda RBX: 00007f7787265fa0 RCX: 00007f778700d8dc [ 1139.601930][T14442] RDX: 000000000000000f RSI: 00007f7785a6f0a0 RDI: 0000000000000004 [ 1139.601950][T14442] RBP: 00007f7785a6f090 R08: 0000000000000000 R09: 0000000000000000 [ 1139.601966][T14442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1139.601982][T14442] R13: 00007f7787266038 R14: 00007f7787265fa0 R15: 00007ffc46767e18 [ 1139.602052][T14442] [ 1139.885073][ T5898] team0 (unregistering): Port device team_slave_1 removed [ 1139.894979][ T5898] team0 (unregistering): Port device team_slave_0 removed [ 1139.925565][T13934] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 1139.942963][T13934] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 1140.022848][T13934] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1140.045916][T13934] 8021q: adding VLAN 0 to HW filter on device team0 [ 1140.065270][T11416] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1140.081801][T17579] bridge0: port 1(bridge_slave_0) entered blocking state [ 1140.088928][T17579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1140.099078][T17579] bridge0: port 2(bridge_slave_1) entered blocking state [ 1140.106233][T17579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1140.190522][ T5898] ------------[ cut here ]------------ [ 1140.196193][ T5898] WARNING: CPU: 0 PID: 5898 at net/xfrm/xfrm_state.c:3303 xfrm_state_fini+0x179/0x1f0 [ 1140.205968][ T5898] Modules linked in: [ 1140.210223][ T5898] CPU: 0 UID: 0 PID: 5898 Comm: kworker/u8:2 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1140.221908][ T5898] Tainted: [W]=WARN [ 1140.225728][ T5898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1140.236031][ T5898] Workqueue: netns cleanup_net [ 1140.241090][ T5898] RIP: 0010:xfrm_state_fini+0x179/0x1f0 [ 1140.246763][ T5898] Code: 48 8d bb 30 0e 00 00 e8 45 a8 bc fc 48 8b bb 30 0e 00 00 e8 d9 28 c9 fc 5b 41 5e 41 5f 5d c3 cc cc cc cc cc e8 d8 ea a1 fc 90 <0f> 0b 90 e9 d9 fe ff ff e8 ca ea a1 fc 90 0f 0b 90 4c 89 f7 e8 0e [ 1140.266426][ T5898] RSP: 0018:ffffc900014efc60 EFLAGS: 00010293 [ 1140.272612][ T5898] RAX: ffffffff84b60e78 RBX: ffff88810aaf8000 RCX: ffff88813e7ed280 [ 1140.280728][ T5898] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88810aaf8e00 [ 1140.288854][ T5898] RBP: ffffffff86c8b9c0 R08: 0001ffff86847f7f R09: 0000000000000000 [ 1140.296880][ T5898] R10: ffffc900014efbe8 R11: 0001c900014efbe8 R12: ffffffff86c8b9e0 [ 1140.304917][ T5898] R13: ffff88810aaf8028 R14: ffff88810aaf8e00 R15: ffff88810aaf8000 [ 1140.312944][ T5898] FS: 0000000000000000(0000) GS:ffff8882aee40000(0000) knlGS:0000000000000000 [ 1140.322009][ T5898] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1140.328690][ T5898] CR2: 0000200000001881 CR3: 000000012769a000 CR4: 00000000003506f0 [ 1140.336722][ T5898] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1140.344723][ T5898] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1140.352764][ T5898] Call Trace: [ 1140.354660][T13934] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1140.356057][ T5898] [ 1140.356069][ T5898] xfrm_net_exit+0x2d/0x60 [ 1140.370317][ T5898] ops_undo_list+0x278/0x410 [ 1140.375715][ T5898] cleanup_net+0x2de/0x4d0 [ 1140.380225][ T5898] process_scheduled_works+0x4cb/0x9d0 [ 1140.386081][ T5898] worker_thread+0x582/0x770 [ 1140.390769][ T5898] kthread+0x489/0x510 [ 1140.395033][ T5898] ? finish_task_switch+0xad/0x2b0 [ 1140.400283][ T5898] ? __pfx_worker_thread+0x10/0x10 [ 1140.405576][ T5898] ? __pfx_kthread+0x10/0x10 [ 1140.410310][ T5898] ret_from_fork+0x11f/0x1b0 [ 1140.414921][ T5898] ? __pfx_kthread+0x10/0x10 [ 1140.419621][ T5898] ret_from_fork_asm+0x1a/0x30 [ 1140.424480][ T5898] [ 1140.427549][ T5898] ---[ end trace 0000000000000000 ]--- [ 1140.433859][ T5898] ------------[ cut here ]------------ [ 1140.439459][ T5898] WARNING: CPU: 0 PID: 5898 at net/xfrm/xfrm_state.c:3310 xfrm_state_fini+0x1b9/0x1f0 [ 1140.449157][ T5898] Modules linked in: [ 1140.453129][ T5898] CPU: 0 UID: 0 PID: 5898 Comm: kworker/u8:2 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1140.464752][ T5898] Tainted: [W]=WARN [ 1140.468635][ T5898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1140.478833][ T5898] Workqueue: netns cleanup_net [ 1140.483659][ T5898] RIP: 0010:xfrm_state_fini+0x1b9/0x1f0 [ 1140.489275][ T5898] Code: a8 bc fc 4d 8b 3e e9 06 ff ff ff e8 b1 ea a1 fc 90 0f 0b 90 4c 89 f7 e8 f5 a7 bc fc 4d 8b 3e e9 24 ff ff ff e8 98 ea a1 fc 90 <0f> 0b 90 4c 89 f7 e8 dc a7 bc fc 4d 8b 3e e9 42 ff ff ff e8 7f ea [ 1140.508951][ T5898] RSP: 0018:ffffc900014efc60 EFLAGS: 00010293 [ 1140.515047][ T5898] RAX: ffffffff84b60eb8 RBX: ffff88810aaf8000 RCX: ffff88813e7ed280 [ 1140.523655][ T5898] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881121acb80 [ 1140.531702][ T5898] RBP: 0000000000000040 R08: 000188810aaf8e1f R09: 0000000000000000 [ 1140.539726][ T5898] R10: ffff8881121ac780 R11: 00018881121ac73f R12: ffffffff86c8b9e0 [ 1140.546555][ T29] kauditd_printk_skb: 149 callbacks suppressed [ 1140.546580][ T29] audit: type=1326 audit(1758717095.169:22297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14496 comm="syz.9.17646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1140.547753][ T5898] R13: ffff88810aaf8028 R14: ffff88810aaf8e18 R15: ffff8881121acb80 [ 1140.553928][ T29] audit: type=1326 audit(1758717095.169:22298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14496 comm="syz.9.17646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1140.577625][ T5898] FS: 0000000000000000(0000) GS:ffff8882aee40000(0000) knlGS:0000000000000000 [ 1140.585631][ T29] audit: type=1326 audit(1758717095.169:22299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14496 comm="syz.9.17646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1140.585661][ T29] audit: type=1326 audit(1758717095.169:22300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14496 comm="syz.9.17646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1140.609374][ T5898] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1140.618314][ T29] audit: type=1326 audit(1758717095.169:22301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14496 comm="syz.9.17646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1140.641996][ T5898] CR2: 0000200000001881 CR3: 000000012769a000 CR4: 00000000003506f0 [ 1140.642022][ T5898] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1140.665681][ T29] audit: type=1326 audit(1758717095.169:22302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14496 comm="syz.9.17646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1140.665719][ T29] audit: type=1326 audit(1758717095.169:22303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14496 comm="syz.9.17646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1140.665746][ T29] audit: type=1326 audit(1758717095.169:22304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14496 comm="syz.9.17646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1140.672424][ T5898] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1140.696057][ T29] audit: type=1326 audit(1758717095.169:22305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14496 comm="syz.9.17646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1140.704064][ T5898] Call Trace: [ 1140.704074][ T5898] [ 1140.704082][ T5898] xfrm_net_exit+0x2d/0x60 [ 1140.712088][ T29] audit: type=1326 audit(1758717095.169:22306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14496 comm="syz.9.17646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f26b346eec9 code=0x7ffc0000 [ 1140.735984][ T5898] ops_undo_list+0x278/0x410 [ 1140.854108][ T5898] cleanup_net+0x2de/0x4d0 [ 1140.858706][ T5898] process_scheduled_works+0x4cb/0x9d0 [ 1140.864263][ T5898] worker_thread+0x582/0x770 [ 1140.869017][ T5898] kthread+0x489/0x510 [ 1140.873114][ T5898] ? finish_task_switch+0xad/0x2b0 [ 1140.878296][ T5898] ? __pfx_worker_thread+0x10/0x10 [ 1140.883475][ T5898] ? __pfx_kthread+0x10/0x10 [ 1140.888217][ T5898] ret_from_fork+0x11f/0x1b0 [ 1140.892898][ T5898] ? __pfx_kthread+0x10/0x10 [ 1140.897668][ T5898] ret_from_fork_asm+0x1a/0x30 [ 1140.898377][T13934] veth0_vlan: entered promiscuous mode [ 1140.902541][ T5898] [ 1140.902554][ T5898] ---[ end trace 0000000000000000 ]--- [ 1140.915295][T13934] veth1_vlan: entered promiscuous mode [ 1140.917555][ T5898] ------------[ cut here ]------------ [ 1140.927570][ T5898] WARNING: CPU: 0 PID: 5898 at net/xfrm/xfrm_state.c:3312 xfrm_state_fini+0x1d2/0x1f0 [ 1140.937234][ T5898] Modules linked in: [ 1140.941167][ T5898] CPU: 0 UID: 0 PID: 5898 Comm: kworker/u8:2 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1140.944713][T13934] veth0_macvtap: entered promiscuous mode [ 1140.952744][ T5898] Tainted: [W]=WARN [ 1140.962308][ T5898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1140.972522][ T5898] Workqueue: netns cleanup_net [ 1140.977372][ T5898] RIP: 0010:xfrm_state_fini+0x1d2/0x1f0 [ 1140.983049][ T5898] Code: a7 bc fc 4d 8b 3e e9 24 ff ff ff e8 98 ea a1 fc 90 0f 0b 90 4c 89 f7 e8 dc a7 bc fc 4d 8b 3e e9 42 ff ff ff e8 7f ea a1 fc 90 <0f> 0b 90 4c 89 f7 e8 c3 a7 bc fc 4d 8b 3e e9 60 ff ff ff 66 66 2e [ 1140.994740][T13934] veth1_macvtap: entered promiscuous mode [ 1141.002754][ T5898] RSP: 0018:ffffc900014efc60 EFLAGS: 00010293 [ 1141.014564][ T5898] RAX: ffffffff84b60ed1 RBX: ffff88810aaf8000 RCX: ffff88813e7ed280 [ 1141.022681][ T5898] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881121ac6c0 [ 1141.031049][ T5898] RBP: 0000000000000040 R08: 000188810aaf8e17 R09: 0000000000000000 [ 1141.039087][ T5898] R10: ffff8881121ac700 R11: 00018881121acbbf R12: ffffffff86c8b9e0 [ 1141.047413][ T5898] R13: ffff88810aaf8028 R14: ffff88810aaf8e10 R15: ffff8881121ac6c0 [ 1141.055513][ T5898] FS: 0000000000000000(0000) GS:ffff8882aee40000(0000) knlGS:0000000000000000 [ 1141.064570][ T5898] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1141.071286][ T5898] CR2: 0000200000001881 CR3: 000000012769a000 CR4: 00000000003506f0 [ 1141.079319][ T5898] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1141.079546][T13934] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1141.087446][ T5898] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1141.087464][ T5898] Call Trace: [ 1141.104341][T13934] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1141.106057][ T5898] [ 1141.106069][ T5898] xfrm_net_exit+0x2d/0x60 [ 1141.120718][ T5898] ops_undo_list+0x278/0x410 [ 1141.121031][ T5703] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1141.125337][ T5898] cleanup_net+0x2de/0x4d0 [ 1141.136196][ T5703] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1141.138687][ T5898] process_scheduled_works+0x4cb/0x9d0 [ 1141.152867][ T5898] worker_thread+0x582/0x770 [ 1141.157561][ T5898] kthread+0x489/0x510 [ 1141.161801][ T5898] ? finish_task_switch+0xad/0x2b0 [ 1141.166947][ T5898] ? __pfx_worker_thread+0x10/0x10 [ 1141.172184][ T5898] ? __pfx_kthread+0x10/0x10 [ 1141.176909][ T5898] ret_from_fork+0x11f/0x1b0 [ 1141.181610][ T5898] ? __pfx_kthread+0x10/0x10 [ 1141.186412][ T5898] ret_from_fork_asm+0x1a/0x30 [ 1141.191262][ T5898] [ 1141.194293][ T5898] ---[ end trace 0000000000000000 ]--- [ 1141.290844][T14515] FAULT_INJECTION: forcing a failure. [ 1141.290844][T14515] name failslab, interval 1, probability 0, space 0, times 0 [ 1141.303593][T14515] CPU: 0 UID: 0 PID: 14515 Comm: syz.9.17647 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1141.303635][T14515] Tainted: [W]=WARN [ 1141.303696][T14515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1141.303713][T14515] Call Trace: [ 1141.303721][T14515] [ 1141.303731][T14515] __dump_stack+0x1d/0x30 [ 1141.303754][T14515] dump_stack_lvl+0xe8/0x140 [ 1141.303861][T14515] dump_stack+0x15/0x1b [ 1141.303878][T14515] should_fail_ex+0x265/0x280 [ 1141.303982][T14515] ? audit_log_d_path+0x8d/0x150 [ 1141.304013][T14515] should_failslab+0x8c/0xb0 [ 1141.304043][T14515] __kmalloc_cache_noprof+0x4c/0x320 [ 1141.304114][T14515] audit_log_d_path+0x8d/0x150 [ 1141.304166][T14515] audit_log_d_path_exe+0x42/0x70 [ 1141.304197][T14515] audit_log_task+0x1e9/0x250 [ 1141.304228][T14515] audit_seccomp+0x61/0x100 [ 1141.304317][T14515] ? __seccomp_filter+0x68c/0x10d0 [ 1141.304343][T14515] __seccomp_filter+0x69d/0x10d0 [ 1141.304366][T14515] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1141.304406][T14515] ? vfs_write+0x7e8/0x960 [ 1141.304434][T14515] ? __rcu_read_unlock+0x4f/0x70 [ 1141.304457][T14515] ? should_fail_ex+0xdb/0x280 [ 1141.304560][T14515] __secure_computing+0x82/0x150 [ 1141.304607][T14515] syscall_trace_enter+0xcf/0x1e0 [ 1141.304638][T14515] do_syscall_64+0xac/0x200 [ 1141.304679][T14515] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1141.304705][T14515] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 1141.304758][T14515] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1141.304864][T14515] RIP: 0033:0x7f26b346d8dc [ 1141.304882][T14515] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1141.304903][T14515] RSP: 002b:00007f26b1ecf030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1141.304927][T14515] RAX: ffffffffffffffda RBX: 00007f26b36c5fa0 RCX: 00007f26b346d8dc [ 1141.304943][T14515] RDX: 000000000000000f RSI: 00007f26b1ecf0a0 RDI: 0000000000000005 [ 1141.304958][T14515] RBP: 00007f26b1ecf090 R08: 0000000000000000 R09: 0000000000000000 [ 1141.304974][T14515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1141.305032][T14515] R13: 00007f26b36c6038 R14: 00007f26b36c5fa0 R15: 00007ffe251ecf68 [ 1141.305051][T14515] [ 1141.987158][ T5703] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1141.998473][T14541] usb usb8: usbfs: process 14541 (syz.0.17643) did not claim interface 0 before use [ 1142.086250][ T5703] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1142.391174][T14547] netlink: 4 bytes leftover after parsing attributes in process `syz.9.17650'. [ 1142.404839][T14547] netlink: 4 bytes leftover after parsing attributes in process `syz.9.17650'. [ 1142.451366][T14544] loop4: detected capacity change from 0 to 4096 [ 1142.472091][T14544] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1142.548716][T14597] loop2: detected capacity change from 0 to 512 [ 1142.568203][T14597] EXT4-fs error (device loop2): ext4_ext_check_inode:523: inode #3: comm syz.2.17657: pblk 24 bad header/extent: invalid extent entries - magic f30a, entries 3, max 4(4), depth 0(0) [ 1142.593733][T14597] EXT4-fs error (device loop2): ext4_quota_enable:7131: comm syz.2.17657: Bad quota inode: 3, type: 0 [ 1142.607861][T14597] EXT4-fs warning (device loop2): ext4_enable_quotas:7172: Failed to enable quota tracking (type=0, err=-117, ino=3). Please run e2fsck to fix. [ 1142.625539][T14597] EXT4-fs (loop2): mount failed [ 1143.253690][T11416] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1143.340933][T14664] loop4: detected capacity change from 0 to 512 [ 1143.359400][T14664] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1143.381508][T14664] ext4 filesystem being mounted at /74/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 1143.424499][ T3977] ================================================================== [ 1143.432630][ T3977] BUG: KCSAN: data-race in l2tp_tunnel_del_work / sk_common_release [ 1143.440680][ T3977] [ 1143.443026][ T3977] write to 0xffff888110c64320 of 8 bytes by task 14674 on cpu 1: [ 1143.450768][ T3977] sk_common_release+0xae/0x230 [ 1143.455653][ T3977] udp_lib_close+0x15/0x20 [ 1143.460099][ T3977] inet_release+0xcb/0xf0 [ 1143.464466][ T3977] inet6_release+0x3e/0x60 [ 1143.468908][ T3977] sock_close+0x68/0x150 [ 1143.473172][ T3977] __fput+0x29b/0x650 [ 1143.477190][ T3977] ____fput+0x1c/0x30 [ 1143.481225][ T3977] task_work_run+0x12e/0x1a0 [ 1143.485837][ T3977] exit_to_user_mode_loop+0xe4/0x100 [ 1143.491141][ T3977] do_syscall_64+0x1d6/0x200 [ 1143.495767][ T3977] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1143.501690][ T3977] [ 1143.504025][ T3977] read to 0xffff888110c64320 of 8 bytes by task 3977 on cpu 0: [ 1143.511573][ T3977] l2tp_tunnel_del_work+0x2f/0x1a0 [ 1143.516737][ T3977] process_scheduled_works+0x4cb/0x9d0 [ 1143.522255][ T3977] worker_thread+0x582/0x770 [ 1143.526902][ T3977] kthread+0x489/0x510 [ 1143.530988][ T3977] ret_from_fork+0x11f/0x1b0 [ 1143.535594][ T3977] ret_from_fork_asm+0x1a/0x30 [ 1143.540378][ T3977] [ 1143.542705][ T3977] value changed: 0xffff88811a1ce3c0 -> 0x0000000000000000 [ 1143.549817][ T3977] [ 1143.552144][ T3977] Reported by Kernel Concurrency Sanitizer on: [ 1143.558301][ T3977] CPU: 0 UID: 0 PID: 3977 Comm: kworker/u8:12 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1143.569855][ T3977] Tainted: [W]=WARN [ 1143.573682][ T3977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1143.583754][ T3977] Workqueue: l2tp l2tp_tunnel_del_work [ 1143.589239][ T3977] ================================================================== [ 1143.745809][T11416] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000.