last executing test programs: 3.554947605s ago: executing program 3 (id=325): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940), 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000002f80)={0x0, 0x0, &(0x7f0000002f40)={&(0x7f0000000100)=@newtaction={0x14, 0x30, 0x400, 0x0, 0x4000}, 0x14}}, 0x20000084) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="4c00000010000104000000000000000000000006bdad3a9c0f46ea608a6b27e1967fa33ac289b2f772f5ec6197e6d6cb25a2f83bfca04c7b0c73f0e851b7db2b7b4beedb31418b5c2abd69adf987f8e6158435a52536cd76470378930f3f5b51", @ANYRES32=0x0, @ANYBLOB="00000000060000002c001280080001006774700020000280050005000100000014000800"/52], 0x4c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000000000000000000400000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_setup(0x49a9, &(0x7f00000007c0)={0x0, 0xad2a, 0x80, 0x0, 0x339}, 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x480040, 0x0) ioctl$TCSETSW(r3, 0x5403, &(0x7f00000000c0)={0xc20, 0xda5e, 0x8, 0x7, 0xf, "0119fbce19f5984043ced7090e669069863919"}) socket(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000000000000e1cb8ce620c3af0000000071101a00000000009500000700000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) r5 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000001d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x48, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}]}, 0x48}}, 0x0) ioctl$XFS_IOC_FSGEOMETRY_V4(r4, 0x8070587c, &(0x7f00000006c0)) r8 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x900) r9 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r9, 0x1, 0x45, &(0x7f0000000300), 0x4) setsockopt$RDS_GET_MR(r8, 0x114, 0x2, &(0x7f0000000380)={{&(0x7f00000002c0)=""/190, 0xbe}, &(0x7f0000000240), 0x75}, 0x20) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000500000ac4010000060a0b040000000000000000020000004c000480340001800b000100746172676574000024000280090001004d41524b000000000c00030002b51112d439c5920800024000000002140001800b0001006c6f6f6b75700000040002800900010073797a30000000000900020073797a3200000000f70007404884b24b02a8a7758a688958ed60ecfd057e10926ba77e5596b13e43cd4488e4aa68a75f7236ec205b6e4cac2a0d86c336bf07dbe861f4f57bcef92dcf818d532d4475b5daa4dadc1690f228e860bba5a0b5d9bde86862e8f7fc08f0debd4974c6fae7d737a0007ec948ac4d8714ebff6b25648fb910e0d6d07f023cf5fa4051627b9c5b69e265538f9ba683bf172a5ff815afa543c12e550a1bcc9287080c7c12cc89d216c56febb0b06134672ea6b0077c846396169475f271319988f49ec94f2996e5d0e1cb151fb223e556f10fb681d068e055eb34e5f8fc7a524ffe5f4632a6c74ad0fe0b1542497d76a5a4416c47805e001c0005800800014000000008080002"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000840}, 0x0) 3.389551753s ago: executing program 3 (id=332): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYRES64=r0, @ANYRES32=0x0, @ANYBLOB="00000000000000002c00128009000100626f6e64000000001c0002800500010004000000060018"], 0x4c}, 0x1, 0x0, 0x0, 0xa64a9ffc5b607ed4}, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 3.308222687s ago: executing program 3 (id=333): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000040900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = socket(0x2a, 0x2, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000001480)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xfffa}, {}, {0x1c, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_FLAGS={0x8, 0x16, 0x12}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000004}, 0x24000000) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) openat$ppp(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000780)=ANY=[@ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0500000000000000000000007fbdbc14e20210cb166f7b79973be48736643064742be19767a0430a96dcf0b515ae937d0766f0784068d6bfbf853d90f76bf6cad413542521645a211e634acf1327a0e96a42f4b3d8e2b2418a4276c2e2eddce5607525809deeae6cc46d26e53547056ef5303cb81c0f8f2694ad16044e6348bacb7a9c28bc03db61de13436ff3", @ANYRES32, @ANYBLOB], 0x10) syz_usb_connect(0x6, 0x24, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) sendmsg$inet(r4, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) socket$key(0xf, 0x3, 0x2) 2.802321991s ago: executing program 1 (id=339): r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() write$tun(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="083c86dd0005110004"], 0xfdef) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in=@dev}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000500)={'ip6gre0\x00', 0x0}) sendmsg$nl_xfrm(r0, &(0x7f00000008c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20040000}, 0x48885) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x4000, 0x11000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="61123000000000006113100000000a00bf2020000000000016000200071b48013f030100000000009500000000000000bc26000000000000bf67000000000000070200000fff07186702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) io_setup(0x8, 0x0) 1.846641899s ago: executing program 1 (id=351): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r0 = open(&(0x7f0000000000)='./file0\x00', 0x148640, 0x78e22799f4a46f8e) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = dup(r2) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x63) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000001c0)={r4, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)=[0x3], 0x0, 0x0, 0x1, 0x1}}, 0x40) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r5, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) recvfrom(r5, &(0x7f0000000480)=""/110, 0x168f6f3d, 0x734, 0x0, 0xfffffffffffffecb) r6 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x7, 0xf60d}, 0x9092, 0x4, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf40000000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r8, &(0x7f00000000c0)={0x1d, r9}, 0x10) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f00000001c0)) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000300), 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x3f000000, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) 1.839864409s ago: executing program 4 (id=352): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x62, 0xc1cc6, 0x0, 0x8000008, 0x3, 0xfffffffe, 0x2, 0x0, 0x7cce8c743ee810df, 0x4}) (async) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40505330, &(0x7f00000001c0)={0x800100, 0xfffffffd, 0x22, 0x6, 0x1101, 0x1}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) (async) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f0000000140)='./file1\x00', 0x804800, &(0x7f0000000340)=ANY=[@ANYRES8=0x0, @ANYBLOB="6092034e5823f645654f6e8edfc3b8e1a948efb0d4b9a9d4c30f5dacb3c1a7ea2587d59165777f070017c2921e793ec5a1384e143b57bb832f14bb43afdef6cb4ed4960b6c732be46a927cdd8c57f93ee6c15401df91ebcbe4f9989843313ea9f243d4dc3d276b966b898100a620b69b543033b9b7bcd9069b9248fbdff46c4a49f094a61938776ce1a1d0f0c84cb7a84bf0b1e2ce5f38f95e11d5b1977ead80625337f66dc391089ab8573d008a4bd03f6f9f01406db632558ed25be4beecd844ac00e52f95c5dc96a1e4a25c80d56aebf6cb33914d6bc72a40bf2fc94efed2f941cf3e"], 0xf9, 0x1213, &(0x7f0000000600)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) (async) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x181d011, 0x0, 0x40, 0x0, &(0x7f0000000140)) openat$sysfs(0xffffffffffffff9c, 0x0, 0x141a82, 0x0) (async) r2 = signalfd4(r1, &(0x7f0000000180)={[0x8]}, 0x8, 0x0) (async) rmdir(&(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') unshare(0x22020400) (async) io_setup(0x8001, &(0x7f0000000340)=0x0) io_submit(r3, 0x20000000000000ee, &(0x7f0000000340)) (async) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) (async) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="600000000101030000000000000000000a00000806001240000200004400018006000340000300002c00018014000300ff01000000000000000000000000000114000400000000000000000000000000000000000c0002800400010088000000fc395465c37804b8a6968f594a28c2718c738ea5704f0d61315208de86dcc2ba02625c118befb8e956ab8c3adec774388d61f9e1a0ff9b08c3c91e23b1e0f075578f223bf8181e9f0803fc9246493448ec7d8f87aa55061930547c2ffa8d33b44db2bdfa30fd1165de60bbb0f35e117516bfc12deb3092f64587b729d8d4a84db2dd38f422ae"], 0x60}}, 0x4000) (async) pselect6(0x40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffe}, 0x0, &(0x7f0000000240)={0x1f, 0xfffffffffffffffe, 0xe, 0x0, 0x7, 0x4, 0x0, 0xfffffffffffffffc}, &(0x7f0000000280)={0x0, 0x3938700}, 0x0) (async) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SG_BLKSECTGET(r2, 0x1267, &(0x7f0000000440)) (async) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r5, 0xc0505350, &(0x7f0000000700)={{0x0, 0x1}, {0x1, 0x2f}, 0xfffffff4}) (async) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 1.764335853s ago: executing program 4 (id=354): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x15, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180200001e00000000000000000000007a02500003ffffff95"], &(0x7f0000000080)='GPL\x00', 0x4, 0x98, &(0x7f00000001c0)=""/152, 0x40f00}, 0x94) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffd7}, 0x94) 1.734290744s ago: executing program 4 (id=355): syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000140)='./file2\x00', 0x20048a, &(0x7f0000000300), 0x12, 0x538, &(0x7f0000000340)="$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") setxattr$system_posix_acl(&(0x7f0000000040)='./file2\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000880)={{}, {0x1, 0x2, 0x100000}, [], {0x4, 0x2}, [], {0x10, 0x4}, {0x20, 0x1}}, 0x24, 0x2) 1.62457691s ago: executing program 2 (id=358): syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6bf8, 0x7}, 0x10208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_io_uring_setup(0x88f, 0x0, &(0x7f0000000200)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x2}, 0x1}) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) io_uring_enter(r1, 0x20047f6, 0xa511, 0xa, 0x0, 0x0) 1.62318501s ago: executing program 4 (id=359): r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_elf64(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/2067], 0x822) socket$inet(0x2, 0x2, 0x1) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c40)={&(0x7f0000000400)=ANY=[@ANYBLOB="9f00000018000000000000002000000020e1ffff03000000030000000100000f040000000a000000cf0000000400f000000000040000000000000000df51afad500077552ca5bd40a0b8d51d417df52d27e50911ce77c694a9709a8e49badbecffcad2452822998cb2487231e21d01299fc423dc5c421756f618e875bbc1519fd6e5e701"], &(0x7f0000001fc0)=""/4115, 0x3c, 0x1013, 0x1}, 0x28) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x44, &(0x7f0000009000), 0x4) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r6, &(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="30000000100001000200"/20, @ANYRES32=0x0, @ANYBLOB="0000004080140400080004000006000008001b0000000000c350822105db841e224c8671690724c5a524421b5dbec598f26c5f24492b57061790946ea234c363752c12b9d0baa5"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x0) r8 = semget$private(0x0, 0x5, 0x0) semctl$IPC_STAT(r8, 0x0, 0x12, &(0x7f0000000300)=""/160) 1.563905673s ago: executing program 2 (id=360): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newtaction={0x88, 0x30, 0xffff, 0x1000000, 0x0, {0x0, 0x0, 0x1300}, [{0x74, 0x1, [@m_mirred={0x70, 0x1, 0x0, 0x0, {{0xb}, {0x44, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x4, {{0x3, 0x0, 0x3, 0x5}}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x1, 0x0, 0x1, 0x400, 0xfffffffb}, 0x2, r2}}]}, {0x4}, {0xc, 0x7, {0x0, 0xffffffe4}}, {0xc, 0x8, {0x0, 0x2}}}}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) 1.516162495s ago: executing program 0 (id=361): r0 = socket$netlink(0x10, 0x3, 0x0) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x81, 0xfffffffb}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYBLOB='/'], 0x20) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r2, 0x0, {0x2, 0x0, 0x6}, 0x2}, 0x18) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2a442, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4012011, r5, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYRES16=r4, @ANYRES32=r4, @ANYRES16], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0xffffff1f, 0x0, 0x1}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$nl_route(0x10, 0x3, 0x0) capset(&(0x7f0000019340)={0x20071026}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff, 0xe}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x2, 0xc}, 0x50) r6 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r6) syz_usb_connect$cdc_ecm(0x0, 0x141, &(0x7f0000000500)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12f, 0x1, 0x1, 0x8, 0xa0, 0x7, "", [{{0x9, 0x4, 0x0, 0xc, 0x3, 0x2, 0x6, 0x0, 0x0, {{0x8, 0x24, 0x6, 0x0, 0x0, "b18f66"}, {0x2, 0x24, 0x0, 0x5}, {0xd, 0x24, 0xf, 0x1, 0x5, 0x7ff, 0x5a, 0x4}, [@mdlm_detail={0xda, 0x24, 0x13, 0x8, "d5ac5ac82f353d1855250b11baac3bc9d66545c10acfd4a20b2436fc573be73f3029402c2e55719f2addad4eb1b91c705b18a3603aea6b40e8f300098e735b4ad0de588d29ea23b91bda5cc7577b67f4ea9e4ab53f0ca80c4f2afb03ffdd665514d07862fdc659388facfe9133e38533eb7ee4a5ce2c68552d549a2998fe88b2714a3f9060880798e79a3804df159e58f43cc6e557311e05da387e8a2ebfa6dd74d72d2dbd885fb0abb1f3c0761d27ac0db5a7ed86033720659114edfee9f301c146a167ba763db3dc6b90c3b33a27967c6ddaa7163d"}, @acm={0x4, 0x24, 0x2, 0xa}, @mbim={0xc, 0x24, 0x1b, 0x6, 0x2652, 0xfd, 0x2, 0x126c, 0x2}, @network_terminal={0x7, 0x24, 0xa, 0x9a, 0x2, 0x7, 0xf4}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x8, 0x8, 0x3, 0x2}}, {{0x9, 0x5, 0x3, 0x2, 0x200, 0xf9, 0x0, 0x3}}}}}]}}]}}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x3, [{0x4e, &(0x7f0000000300)=ANY=[@ANYBLOB="4e03becdde8b7d8bf7fcc315e3896c47097adc42e2f6e166eda27c68570cf310c7347db58d789897363165a77cd272f0d13c513207def71d68af37e9e775cf053eef02edce613d704c"]}, {0x2, &(0x7f0000000400)=@string={0x2}}, {0x0, 0x0}]}) r7 = socket$tipc(0x1e, 0x5, 0x0) r8 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r8, &(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0xfffffffd}}, 0x10) bind$tipc(r7, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x2}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f0000000040)={0x42, 0x1, 0x3}, 0x10) close(r6) ioctl$EVIOCRMFF(r6, 0x550c, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000400)={0x0, 0x0}) capset(&(0x7f0000000040)={0xf1504, r9}, &(0x7f0000000240)={0xad, 0x1, 0xb0a6, 0x4, 0x9, 0x1ff}) 1.515998425s ago: executing program 2 (id=362): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x220c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c00000012000301000000000fff000000009db7000000000000010004000000000000000000000000000000000000000000000000000000691d0f76e77044d1eb94e56239e4"], 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) 1.486227557s ago: executing program 3 (id=363): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1, 0xffffffff}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000003200)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000100000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bca2000000000000a6020000f8ffffffb703000018000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, &(0x7f0000000340), &(0x7f0000000380)=r1}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r1, 0x2000012, 0xe, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0xb}, 0x50) 1.464116158s ago: executing program 2 (id=364): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000700)=ANY=[@ANYRESDEC, @ANYRES8=0x0, @ANYRES32, @ANYRESHEX, @ANYBLOB="93c16f3d8748309ecd58027b48280d43ef569d1f321272f2bfa881102d0e0b36db0ccde507be04e8f088cafa586471ed590aef94d3d7c4dfe8c4da89f73659406c61194cac60fdd0b8dece9a72b986c27a01bea03abaf5a85d8a4f6951b5e93eabc2e141ab658f701c195d04db826a019b947a35e7c90d312f87f882057d29ad0954d4315db3aaba8fdc343f808d20cc0d22b623b4ae839959f8f810a0ca4205265e1528d13fbf591bdd3373448f9b42281cf34400fbb162aef6b5612579e6a005b7cdd94ba4d772d99cf7cab5bee40be3393b252991bdd7"], 0x0, 0x34}, 0x28) (async) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x100000000900000, 0x88}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x763c, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x26, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9805, 0x0, 0x7fc, 0x6}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000240)=r4, 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000003100)={&(0x7f0000000180)={0xa, 0x4e21, 0x1, @mcast1, 0x2}, 0x1c, &(0x7f0000000000)=[{&(0x7f0000000200)="8000e859667fbc13", 0x8}], 0x1}, 0x8050) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r3}, 0xc) (async) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) (async) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, 0x0, 0x20000000) (async) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r5) (async) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) (async) sendmsg$NFT_BATCH(r6, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a00000000000000000000000019000000040000040932050c8e7a55c8ab6400010073797a31000000000900010073797a31000000000900010073797a31000000000900010073797a30000000000900010073797a300000000008000240000000021400000011000100000000"], 0x80}, 0x1, 0x0, 0x0, 0x4008c10}, 0x40040) sendmsg$NFT_BATCH(r5, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c0000000c0a010100000000000000000a00000609ff030000797a31000000000900010073797a3100005a6a508aadc135f3467f85fd363f0000200003801400000011f2000000000000000004000100000af19beabc536f07de0628e863082698f9ac880bada55d2889fe296c8ce4de25f6bf852a75ceb69ce67cc88a9925af8139b514fd98ee29ea879f42385cbc2dbf22164f01a6864afb25d8a8afb549b05fa43c35c087733a"], 0x74}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) socket$inet_mptcp(0x2, 0x1, 0x106) (async) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) (async) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), r4) (async) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key$keyring(&(0x7f00000004c0), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0x0) 752.366993ms ago: executing program 0 (id=365): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@type_tag={0x4, 0x0, 0x0, 0x12, 0x2}, @type_tag={0x2, 0x0, 0x0, 0x12, 0x4}, @type_tag={0x7, 0x0, 0x0, 0x12, 0x1}, @fwd={0x4}]}, {0x0, [0x2e, 0x30, 0x2e, 0x5f, 0x61, 0x61, 0x5f]}}, 0x0, 0x51, 0x0, 0x1, 0x0, 0x0, @void, @value=0x20000000}, 0x28) 752.182543ms ago: executing program 0 (id=366): socket$key(0xf, 0x3, 0x2) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000003200)=ANY=[@ANYBLOB="5c01000010000100feffffff00010000fe880000ecffffffffffffff00000001fc010000000000000000000000000001000107144e230005000000003a080000", @ANYRES32=0x0, @ANYRES32=0x0], 0x15c}, 0x1, 0x0, 0x0, 0x8801}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000740)=@newsa={0x138, 0x1a, 0x1, 0xfffffffe, 0x100, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4001, 0x717, 0x4e23, 0x5, 0xa, 0x0, 0x20, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, {0xfe, 0x1000000000000192, 0x9ba3, 0xffff, 0x8251c, 0x5, 0xfffffffffffffffc, 0x4}, {0xffffffffffffffff, 0x0, 0x1f, 0xfffffffffffffffe}, {0xfffffffe, 0x3fc, 0xffffff80}, 0x7e, 0x3505, 0x2, 0x1, 0x0, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x240440d1}, 0x844) 708.903175ms ago: executing program 4 (id=367): socketpair$unix(0x1, 0x3, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000080)={[{@i_version}, {@nogrpid}, {@bh}]}, 0x1, 0x51d, &(0x7f0000000200)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0x32600) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) futimesat(r0, 0x0, &(0x7f0000000100)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x30da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000008}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0xb) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x10) r2 = getpid() socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r4, 0x1, 0x70bd27, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x30) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000ab4000000060a01040000000000000000020000280900010073797a30000000000900020073797a320000000088000480100001800c000100636f756e7465720014000180090001006d6173710000000004000280600001800a0001006c696d6974000000500002800c0001400000000000000008080004"], 0xdc}}, 0x0) r5 = socket$l2tp6(0xa, 0x2, 0x73) r6 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r6, &(0x7f0000000040)={0xa, 0x0, 0xfffffffe, @empty}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b40200000000f21f61118c000000000085000000ce0000009500000000000000"], &(0x7f0000000380)='GPL\x00', 0x5, 0x46, &(0x7f00000003c0)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x36c, 0x10, &(0x7f0000000000), 0x26}, 0x48) bind$l2tp6(r5, &(0x7f0000000000)={0xa, 0x0, 0xff, @empty, 0x0, 0x9}, 0x20) connect$l2tp6(r6, &(0x7f0000000080)={0xa, 0x0, 0x3, @loopback, 0x8, 0x3}, 0x20) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r7, &(0x7f0000000100)={0x0, 0x2800, &(0x7f0000000080)={&(0x7f00000001c0)={0x54, r8, 0x1, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}, {0x14, 0x2, @in={0x2, 0x0, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0x54}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x34, r8, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x20, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x48c05}, 0x4040140) 627.062449ms ago: executing program 0 (id=368): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x15, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180200001e00000000000000000000007a02500003ffffff95"], &(0x7f0000000080)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00}, 0x94) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2000000}, 0x94) 626.789069ms ago: executing program 3 (id=369): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x800000, &(0x7f0000000a00)={[{@dioread_lock}]}, 0x12, 0x522, &(0x7f00000023c0)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000001, 0x8031, 0xffffffffffffffff, 0x2000) fchownat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xee01, 0xee01, 0x1000) r0 = timerfd_create(0x0, 0x80000) timerfd_gettime(r0, &(0x7f0000000040)) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x2f, 0xa, 0x2, 0xd10, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8, 0x7800, 0x7fff}}) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0xcf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x2}, 0x1004, 0x0, 0x10000, 0x3, 0x2, 0x80004001, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = signalfd4(r3, &(0x7f0000000240)={[0x81]}, 0x8, 0x80000) perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x2, 0x6, 0xa6, 0x0, 0x73, 0x0, 0xb, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000002c0), 0x1}, 0x8000, 0xffffffff, 0x401, 0xb, 0x9, 0xffffffff, 0x78, 0x0, 0x3, 0x0, 0xf}, r4, 0xe, 0xffffffffffffffff, 0x0) symlinkat(&(0x7f0000000340)='./file0\x00', r4, &(0x7f0000000380)='./file0\x00') r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_ext={0x1c, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000ff00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000030000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000851000000600000095000000000000007f66400001000000cd400600010000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0x80, 0x0, &(0x7f0000000180), 0x40f00, 0x22, '\x00', r2, 0x0, r4, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0x3, 0x6, 0x2}, 0x10, 0x49ec, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000440)=[{0x4, 0x4, 0xf, 0xc}, {0x5, 0x2, 0xa, 0xc}]}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r5, 0x10, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000011008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x24000000) syz_clone(0x1000000, &(0x7f0000000540)="d6c968b46c7929c6548732f168aa79300eee85e04aebad9b26d552f3f40f4e366f2612738b4eb73db76571e9543259e834803c8a082b76d48a341d3753465c33b2082827b138e5f1319a24150feb0302f2a60e6781ab8fad55d73ba525ab6f09c0809ed9d87dae77a898137f24c5174facc0a6c3f38e18301188f9134853ec15526ad97918a7e2dc318bbf02c39d0981ae225702dc2577aedab585b6e98d11e92ca6c89e2c60e723f7753b026ca9f61d939357f237a7911c92e4a822", 0xbc, &(0x7f0000000300), &(0x7f0000000600), &(0x7f0000000640)="45a9c7a9ecafd220993253c7b4edfa5e662f6a4b94e4abe3f72cee93e423b1bd15a2") 567.577312ms ago: executing program 0 (id=370): syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6bf8, 0x7}, 0x10208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_io_uring_setup(0x88f, 0x0, &(0x7f0000000200)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x2}, 0x1}) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) io_uring_enter(r1, 0x20047f6, 0xa511, 0xa, 0x0, 0x0) 525.815544ms ago: executing program 2 (id=371): openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x148640, 0x78e22799f4a46f8a) pipe2$9p(&(0x7f0000000140), 0x800) open$dir(&(0x7f0000000100)='./file0\x00', 0xe8c40, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_setup(0x3a, &(0x7f0000000640)={0x0, 0xaddc, 0x10100, 0x0, 0x207}, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x80000001, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r0) syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = getpid() syz_pidfd_open(r1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x2, 0x56d, 0x2}, 0x48) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000009a40)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000020000010000040900010073797a30000000002c000000030a01080000000000000000010000000900030073797a32000000000900010073797a300000000050000000060a010400000000000000000100000008000b40000000000900010073797a30000000002800048024000180090001006d6574610000000014000280080001400000001208000240000000", @ANYRES64=r2], 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x0) 506.849825ms ago: executing program 1 (id=372): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0xc, &(0x7f0000000200)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x4, 0x1, 0xb, 0x2, 0xa, 0x0, 0x1000000}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) 420.382229ms ago: executing program 1 (id=373): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000840)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xc00}}, {{}, {0x95, 0x0, 0x0, 0x700}}, [@jmp={0x5, 0x1, 0x1, 0xa, 0xa, 0xfffffffffffffff5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x140}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0xb, 0x100a, &(0x7f00000009c0)=""/4106, 0x41100, 0x24}, 0x94) 420.082839ms ago: executing program 2 (id=374): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000040900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = socket(0x2a, 0x2, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000001480)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xfffa}, {}, {0x1c, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_FLAGS={0x8, 0x16, 0x12}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000004}, 0x24000000) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) openat$ppp(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000780)=ANY=[@ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0500000000000000000000007fbdbc14e20210cb166f7b79973be48736643064742be19767a0430a96dcf0b515ae937d0766f0784068d6bfbf853d90f76bf6cad413542521645a211e634acf1327a0e96a42f4b3d8e2b2418a4276c2e2eddce5607525809deeae6cc46d26e53547056ef5303cb81c0f8f2694ad16044e6348bacb7a9c28bc03db61de13436ff3", @ANYRES32], 0x10) syz_usb_connect(0x6, 0x24, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) sendmsg$inet(r4, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) socket$key(0xf, 0x3, 0x2) 418.4421ms ago: executing program 1 (id=375): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc091, 0x2, @perf_config_ext={0x4, 0x3}, 0x444, 0x0, 0x10000, 0x0, 0x2, 0x80000003, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001680)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x40001}, 0x4040850) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a48000000030a0fdb00000000000000000a0000050900030073797a30000000000900010073797a310000000014000480080002403cb140bb0800014000000003080005400000000014000000110001"], 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e1f, 0xffffffff, @loopback, 0xbf}, 0x1c) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./bus\x00', 0x40c, &(0x7f0000000400)={[{@init_itable}, {@dioread_nolock}, {@abort}, {@grpjquota}, {@lazytime}, {@auto_da_alloc}, {@mblk_io_submit}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x100}}, {@min_batch_time={'min_batch_time', 0x3d, 0x7a}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x8}}]}, 0xfd, 0x501, &(0x7f0000000e80)="$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") r2 = creat(&(0x7f0000000e40)='./file1\x00', 0x18) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0xa4c42, 0x108) fallocate(r2, 0x0, 0xbf5, 0x2000402) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r5) sendmsg$NL80211_CMD_GET_WIPHY(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000e00)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01032abd70000000000001000000080001001200000008000300", @ANYRES32=r4], 0x30}, 0x1, 0x0, 0x0, 0x4000064}, 0x40) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0xc, r2, 0x0, 0x54, 0x0, 0xfffffffffe000001}) 369.577711ms ago: executing program 0 (id=376): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40008c5}, 0x20000080) socket(0x10, 0x803, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) file_getattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xd00) keyctl$read(0xb, 0x0, &(0x7f0000000280)=""/90, 0x5a) socket$l2tp6(0xa, 0x2, 0x73) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x108) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000008, 0x4010, 0xffffffffffffffff, 0x8000000) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1f, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYRES8=r0], 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_usb_connect(0x6, 0x1fc, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000940)=ANY=[@ANYBLOB="440000001300290a000000000000000007000000", @ANYRES32, @ANYBLOB="00000000000000001c001a800800028008000200080000003e127a510800020010"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[], 0xa0}}, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f0000000000), 0x4000000000001f2, 0xfff0) 69.054137ms ago: executing program 4 (id=377): r0 = socket(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x1e}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20}, {0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x4000000000, 0x4, 0x2}, {}, 0x0, 0x6e6bb9, 0x1}, {{@in=@broadcast, 0xfffffffc, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x2, 0x7, 0x200}}, 0xe8) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214f6fffffffffff8070000001f00000000000000080009000da6ffff", 0x24) 14.138659ms ago: executing program 3 (id=378): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000040900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = socket(0x2a, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0xfffa}, {}, {0x1c, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_FLAGS={0x8, 0x16, 0x12}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000004}, 0x24000000) r4 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r4, &(0x7f00000002c0), 0x40000000000009f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000780)=ANY=[], 0x10) syz_usb_connect(0x6, 0x24, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r7}, &(0x7f00000006c0), &(0x7f0000000700)=r6}, 0x20) sendmsg$inet(r5, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) socket$key(0xf, 0x3, 0x2) 0s ago: executing program 1 (id=379): r0 = socket(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x1e}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20}, {0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x4000000000, 0x4, 0x2}, {}, 0x0, 0x6e6bb9, 0x1}, {{@in=@broadcast, 0xfffffffc, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x2, 0x7, 0x200}}, 0xe8) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214f6fffffffffff8070000001f00000000000000080009000da6ffff", 0x24) kernel console output (not intermixed with test programs): [ 17.780465][ T28] audit: type=1400 audit(1774379289.588:62): avc: denied { search } for pid=3193 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 17.803018][ T28] audit: type=1400 audit(1774379289.588:63): avc: denied { search } for pid=3193 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 17.825960][ T28] audit: type=1400 audit(1774379289.588:64): avc: denied { search } for pid=3193 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 17.848968][ T28] audit: type=1400 audit(1774379289.588:65): avc: denied { search } for pid=3193 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 17.872202][ T28] audit: type=1400 audit(1774379289.598:66): avc: denied { read open } for pid=3194 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.1.167' (ED25519) to the list of known hosts. [ 23.102093][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 23.102108][ T28] audit: type=1400 audit(1774379294.918:70): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.131052][ T28] audit: type=1400 audit(1774379294.938:71): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.131950][ T3299] cgroup: Unknown subsys name 'net' [ 23.159166][ T28] audit: type=1400 audit(1774379294.968:72): avc: denied { unmount } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.291948][ T3299] cgroup: Unknown subsys name 'cpuset' [ 23.298033][ T3299] cgroup: Unknown subsys name 'rlimit' [ 23.448612][ T28] audit: type=1400 audit(1774379295.258:73): avc: denied { setattr } for pid=3299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.478553][ T28] audit: type=1400 audit(1774379295.258:74): avc: denied { create } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.499108][ T28] audit: type=1400 audit(1774379295.258:75): avc: denied { write } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.519516][ T28] audit: type=1400 audit(1774379295.258:76): avc: denied { read } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.539937][ T28] audit: type=1400 audit(1774379295.278:77): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.546457][ T3305] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.565060][ T28] audit: type=1400 audit(1774379295.278:78): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.596766][ T28] audit: type=1400 audit(1774379295.288:79): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 23.682123][ T3299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.699009][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 24.783753][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.791001][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.798364][ T3311] bridge_slave_0: entered allmulticast mode [ 24.804782][ T3311] bridge_slave_0: entered promiscuous mode [ 24.813128][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.820235][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.827449][ T3311] bridge_slave_1: entered allmulticast mode [ 24.834081][ T3311] bridge_slave_1: entered promiscuous mode [ 24.853254][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.865400][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.887264][ T3311] team0: Port device team_slave_0 added [ 24.902300][ T3311] team0: Port device team_slave_1 added [ 24.942912][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.949938][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 24.976027][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.989101][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.996072][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.022021][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.071804][ T3311] hsr_slave_0: entered promiscuous mode [ 25.078031][ T3311] hsr_slave_1: entered promiscuous mode [ 25.096364][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 25.182151][ T3322] chnl_net:caif_netlink_parms(): no params data found [ 25.233763][ T3323] chnl_net:caif_netlink_parms(): no params data found [ 25.254680][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.261930][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.269033][ T3320] bridge_slave_0: entered allmulticast mode [ 25.275481][ T3320] bridge_slave_0: entered promiscuous mode [ 25.282036][ T3324] chnl_net:caif_netlink_parms(): no params data found [ 25.291200][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.298270][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.305402][ T3320] bridge_slave_1: entered allmulticast mode [ 25.311902][ T3320] bridge_slave_1: entered promiscuous mode [ 25.341824][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.349015][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.356120][ T3322] bridge_slave_0: entered allmulticast mode [ 25.362457][ T3322] bridge_slave_0: entered promiscuous mode [ 25.368981][ T3322] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.376097][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.383409][ T3322] bridge_slave_1: entered allmulticast mode [ 25.389866][ T3322] bridge_slave_1: entered promiscuous mode [ 25.407629][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 25.422140][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 25.457843][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 25.472523][ T3320] team0: Port device team_slave_0 added [ 25.480677][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.487904][ T3323] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.495128][ T3323] bridge_slave_0: entered allmulticast mode [ 25.501638][ T3323] bridge_slave_0: entered promiscuous mode [ 25.508727][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 25.522925][ T3320] team0: Port device team_slave_1 added [ 25.541440][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.548540][ T3323] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.555727][ T3323] bridge_slave_1: entered allmulticast mode [ 25.562179][ T3323] bridge_slave_1: entered promiscuous mode [ 25.577086][ T3322] team0: Port device team_slave_0 added [ 25.583867][ T3322] team0: Port device team_slave_1 added [ 25.600364][ T3311] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 25.610881][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.618034][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.644282][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.659370][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.666438][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.692538][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.703315][ T3324] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.710417][ T3324] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.717679][ T3324] bridge_slave_0: entered allmulticast mode [ 25.724078][ T3324] bridge_slave_0: entered promiscuous mode [ 25.735334][ T3311] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 25.754798][ T3324] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.762017][ T3324] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.769099][ T3324] bridge_slave_1: entered allmulticast mode [ 25.775870][ T3324] bridge_slave_1: entered promiscuous mode [ 25.790845][ T3324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 25.801488][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 25.810563][ T3311] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 25.819087][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.826185][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.852326][ T3322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.864407][ T3324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 25.878826][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 25.892564][ T3311] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 25.901331][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.908288][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 25.934262][ T3322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.967319][ T3324] team0: Port device team_slave_0 added [ 25.973770][ T3323] team0: Port device team_slave_0 added [ 25.980427][ T3323] team0: Port device team_slave_1 added [ 25.987987][ T3320] hsr_slave_0: entered promiscuous mode [ 25.993958][ T3320] hsr_slave_1: entered promiscuous mode [ 25.999799][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 26.005539][ T3320] Cannot create hsr debugfs directory [ 26.011706][ T3324] team0: Port device team_slave_1 added [ 26.042259][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 26.049226][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 26.075315][ T3324] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 26.086280][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 26.093283][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 26.119443][ T3323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 26.131174][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 26.138354][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 26.164538][ T3323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 26.177534][ T3322] hsr_slave_0: entered promiscuous mode [ 26.183743][ T3322] hsr_slave_1: entered promiscuous mode [ 26.189484][ T3322] debugfs: 'hsr0' already exists in 'hsr' [ 26.195306][ T3322] Cannot create hsr debugfs directory [ 26.201135][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 26.208192][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 26.234225][ T3324] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 26.308953][ T3324] hsr_slave_0: entered promiscuous mode [ 26.315042][ T3324] hsr_slave_1: entered promiscuous mode [ 26.321018][ T3324] debugfs: 'hsr0' already exists in 'hsr' [ 26.326809][ T3324] Cannot create hsr debugfs directory [ 26.334308][ T3323] hsr_slave_0: entered promiscuous mode [ 26.340337][ T3323] hsr_slave_1: entered promiscuous mode [ 26.346315][ T3323] debugfs: 'hsr0' already exists in 'hsr' [ 26.352058][ T3323] Cannot create hsr debugfs directory [ 26.489689][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.508633][ T3320] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 26.517892][ T3320] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 26.531017][ T3320] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 26.542865][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.549729][ T3320] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 26.567328][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.574413][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.593616][ T3322] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 26.603056][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.610086][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.622919][ T3322] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 26.643278][ T3322] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 26.653890][ T3322] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 26.684791][ T3324] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 26.698549][ T3324] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 26.713360][ T3324] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 26.722723][ T3324] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 26.735030][ T3323] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 26.749371][ T3323] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 26.758794][ T3323] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 26.770645][ T3323] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 26.802043][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.824787][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.858394][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.873102][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.880196][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.890924][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.898010][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.921799][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.937903][ T3311] veth0_vlan: entered promiscuous mode [ 26.948797][ T3311] veth1_vlan: entered promiscuous mode [ 26.958614][ T3322] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.971940][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.979015][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.993156][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.000311][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.014831][ T3324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 27.032122][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 27.050583][ T3324] 8021q: adding VLAN 0 to HW filter on device team0 [ 27.070086][ T57] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.077246][ T57] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.087862][ T3323] 8021q: adding VLAN 0 to HW filter on device team0 [ 27.099413][ T3311] veth0_macvtap: entered promiscuous mode [ 27.107626][ T358] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.114765][ T358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.133190][ T358] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.140251][ T358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.150940][ T3311] veth1_macvtap: entered promiscuous mode [ 27.175325][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.182861][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.203785][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.227810][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.238508][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.255388][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.265070][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.282668][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.291848][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.309501][ T3322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.391862][ T3324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.402531][ T3311] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 27.436433][ T3323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.508604][ T3320] veth0_vlan: entered promiscuous mode [ 27.533457][ T3320] veth1_vlan: entered promiscuous mode [ 27.567831][ T3323] veth0_vlan: entered promiscuous mode [ 27.595548][ T3320] veth0_macvtap: entered promiscuous mode [ 27.603406][ T3323] veth1_vlan: entered promiscuous mode [ 27.615979][ T3323] veth0_macvtap: entered promiscuous mode [ 27.624396][ T3323] veth1_macvtap: entered promiscuous mode [ 27.634882][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.643507][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.674756][ T12] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.699614][ T3322] veth0_vlan: entered promiscuous mode [ 27.707988][ T1677] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.717544][ T1677] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.732573][ T1677] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.742028][ T3324] veth0_vlan: entered promiscuous mode [ 27.747806][ T3320] veth1_macvtap: entered promiscuous mode [ 27.762180][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.772218][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.833782][ T41] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.880815][ T41] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.933096][ T3322] veth1_vlan: entered promiscuous mode [ 27.977932][ T41] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 28.034485][ T3324] veth1_vlan: entered promiscuous mode [ 28.240819][ T28] kauditd_printk_skb: 37 callbacks suppressed [ 28.240834][ T28] audit: type=1400 audit(1774379300.048:117): avc: denied { name_bind } for pid=3490 comm="syz.3.4" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 28.721814][ T3497] FAULT_INJECTION: forcing a failure. [ 28.721814][ T3497] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 28.748865][ T3497] CPU: 1 UID: 0 PID: 3497 Comm: syz.3.4 Not tainted syzkaller #0 PREEMPT(full) [ 28.748894][ T3497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 28.748912][ T3497] Call Trace: [ 28.748918][ T3497] [ 28.748928][ T3497] __dump_stack+0x1d/0x30 [ 28.748987][ T3497] dump_stack_lvl+0x95/0xd0 [ 28.749004][ T3497] dump_stack+0x15/0x1b [ 28.749021][ T3497] should_fail_ex+0x263/0x280 [ 28.749048][ T3497] should_fail+0xb/0x20 [ 28.749091][ T3497] should_fail_usercopy+0x1a/0x20 [ 28.749116][ T3497] _copy_from_iter+0xcf/0xea0 [ 28.749141][ T3497] ? __alloc_skb+0x4f6/0x690 [ 28.749166][ T3497] ? __alloc_skb+0x200/0x690 [ 28.749192][ T3497] netlink_sendmsg+0x4ae/0x6f0 [ 28.749217][ T3497] ? __pfx_netlink_sendmsg+0x10/0x10 [ 28.749293][ T3497] ____sys_sendmsg+0x563/0x5b0 [ 28.749371][ T3497] ___sys_sendmsg+0x195/0x1e0 [ 28.749481][ T3497] __x64_sys_sendmsg+0xd4/0x160 [ 28.749550][ T3497] x64_sys_call+0x194c/0x3020 [ 28.749569][ T3497] do_syscall_64+0x12c/0x370 [ 28.749591][ T3497] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 28.749638][ T3497] RIP: 0033:0x7f2ffaf4c799 [ 28.749657][ T3497] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 28.749670][ T3497] RSP: 002b:00007f2ff995d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 28.749692][ T3497] RAX: ffffffffffffffda RBX: 00007f2ffb1c6180 RCX: 00007f2ffaf4c799 [ 28.749705][ T3497] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000008 [ 28.749717][ T3497] RBP: 00007f2ff995d090 R08: 0000000000000000 R09: 0000000000000000 [ 28.749727][ T3497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 28.749777][ T3497] R13: 00007f2ffb1c6218 R14: 00007f2ffb1c6180 R15: 00007ffe0d275a08 [ 28.749794][ T3497] [ 29.432124][ T28] audit: type=1400 audit(1774379301.228:118): avc: denied { ioctl } for pid=3493 comm="syz.2.3" path="socket:[3801]" dev="sockfs" ino=3801 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 29.476683][ T28] audit: type=1400 audit(1774379301.238:119): avc: denied { create } for pid=3493 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 29.503188][ T41] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.515875][ T3324] veth0_macvtap: entered promiscuous mode [ 29.516760][ T28] audit: type=1400 audit(1774379301.268:120): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 29.526567][ T3322] veth0_macvtap: entered promiscuous mode [ 29.553233][ T28] audit: type=1400 audit(1774379301.268:121): avc: denied { open } for pid=3311 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 29.560444][ T3324] veth1_macvtap: entered promiscuous mode [ 29.606753][ T3322] veth1_macvtap: entered promiscuous mode [ 29.627067][ T28] audit: type=1400 audit(1774379301.268:122): avc: denied { ioctl } for pid=3311 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=101 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 29.637146][ T3501] netlink: 12 bytes leftover after parsing attributes in process `syz.1.9'. [ 29.652703][ T28] audit: type=1400 audit(1774379301.448:123): avc: denied { setopt } for pid=3500 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 29.686695][ T28] audit: type=1400 audit(1774379301.498:124): avc: denied { tracepoint } for pid=3502 comm="syz.2.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.687200][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.722200][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.744245][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.752301][ T28] audit: type=1400 audit(1774379301.568:125): avc: denied { bind } for pid=3500 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 29.772344][ T28] audit: type=1400 audit(1774379301.568:126): avc: denied { write } for pid=3500 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 29.799144][ T57] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.813680][ T3507] netlink: 164 bytes leftover after parsing attributes in process `syz.2.11'. [ 29.827090][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.834761][ T57] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.846687][ T57] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.860760][ T57] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.870153][ T57] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.900002][ T57] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.932735][ T57] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.972285][ T3513] netlink: 48 bytes leftover after parsing attributes in process `syz.0.1'. [ 29.991645][ T2087] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.063543][ T3519] loop2: detected capacity change from 0 to 128 [ 30.090196][ T3521] loop4: detected capacity change from 0 to 1024 [ 30.097130][ T3510] loop1: detected capacity change from 0 to 8192 [ 30.109808][ T3521] EXT4-fs: Invalid want_extra_isize 64872 [ 30.127439][ T3519] netlink: 8 bytes leftover after parsing attributes in process `syz.2.14'. [ 30.136417][ T3510] FAT-fs (loop1): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 30.157960][ T3523] netlink: 8 bytes leftover after parsing attributes in process `syz.2.14'. [ 30.195927][ T3510] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12'. [ 30.297814][ C0] hrtimer: interrupt took 74628 ns [ 30.680645][ T3510] syzkaller0: entered promiscuous mode [ 30.699076][ T3510] syzkaller0: entered allmulticast mode [ 32.149236][ T3568] netlink: 32 bytes leftover after parsing attributes in process `syz.3.31'. [ 32.234521][ T3568] delete_channel: no stack [ 32.256995][ T3568] netlink: 12 bytes leftover after parsing attributes in process `syz.3.31'. [ 32.271066][ T3572] pimreg: entered allmulticast mode [ 32.294957][ T3568] netlink: 12 bytes leftover after parsing attributes in process `syz.3.31'. [ 32.340534][ T3568] syz.3.31 (3568) used greatest stack depth: 9736 bytes left [ 32.373996][ T3575] loop1: detected capacity change from 0 to 2048 [ 32.427561][ T3575] EXT4-fs (loop1): Invalid log cluster size: 16776453 [ 32.535032][ T3581] netlink: 44 bytes leftover after parsing attributes in process `syz.3.37'. [ 32.553976][ T3581] netlink: 'syz.3.37': attribute type 5 has an invalid length. [ 32.618166][ T3569] loop4: detected capacity change from 0 to 4096 [ 32.631030][ T3569] EXT4-fs: Ignoring removed nomblk_io_submit option [ 32.800861][ T3569] EXT4-fs (loop4): stripe (97) is not aligned with cluster size (16), stripe is disabled [ 32.849735][ T3569] [EXT4 FS bs=4096, gc=1, bpg=524288, ipg=32, mo=a842e018, mo2=0002] [ 32.873686][ T3569] System zones: 0-5 [ 33.112241][ T3569] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 33.523407][ T3604] loop0: detected capacity change from 0 to 512 [ 33.696040][ T3608] tmpfs: Unknown parameter 'noswOp' [ 33.741416][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 33.741434][ T28] audit: type=1400 audit(1774379305.518:172): avc: denied { remount } for pid=3596 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 33.915950][ T3604] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 33.948357][ T3604] EXT4-fs error (device loop0): ext4_orphan_get:1396: comm syz.0.42: couldn't read orphan inode 26 (err -116) [ 33.961716][ T3604] loop0: lost filesystem error report for type 5 error -116 [ 33.964922][ T3604] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 33.986661][ T3604] ext4 filesystem being mounted at /6/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 34.034189][ T3322] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.056285][ T28] audit: type=1400 audit(1774379305.868:173): avc: denied { add_name } for pid=3603 comm="syz.0.42" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 34.059443][ T3604] EXT4-fs error (device loop0): ext4_do_update_inode:5569: inode #3: comm syz.0.42: corrupted inode contents [ 34.079709][ T3612] syz.1.43 uses obsolete (PF_INET,SOCK_PACKET) [ 34.097394][ T28] audit: type=1400 audit(1774379305.868:174): avc: denied { create } for pid=3603 comm="syz.0.42" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 34.138672][ T28] audit: type=1400 audit(1774379305.938:175): avc: denied { ioctl } for pid=3611 comm="syz.1.43" path="socket:[5141]" dev="sockfs" ino=5141 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 34.156056][ T3615] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 34.163600][ T28] audit: type=1400 audit(1774379305.948:176): avc: denied { create } for pid=3614 comm="syz.4.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 34.197719][ T28] audit: type=1400 audit(1774379305.948:177): avc: denied { create } for pid=3614 comm="syz.4.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 34.201521][ T3604] EXT4-fs error (device loop0): ext4_dirty_inode:6450: inode #3: comm syz.0.42: mark_inode_dirty error [ 34.216876][ T28] audit: type=1400 audit(1774379305.948:178): avc: denied { setopt } for pid=3614 comm="syz.4.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 34.250182][ T3604] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz.0.42: bg 0: block 64: padding at end of block bitmap is not set [ 34.263725][ T28] audit: type=1400 audit(1774379306.078:179): avc: denied { ioctl } for pid=3614 comm="syz.4.44" path="socket:[5056]" dev="sockfs" ino=5056 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 34.267779][ T3604] Quota error (device loop0): write_blk: dquota write failed [ 34.297171][ T3604] Quota error (device loop0): qtree_write_dquot: Error -117 occurred while creating quota [ 34.308094][ T3604] EXT4-fs error (device loop0): ext4_acquire_dquot:7001: comm syz.0.42: Failed to acquire dquot type 0 [ 34.350534][ T3615] Zero length message leads to an empty skb [ 34.358327][ T3619] bond0: entered promiscuous mode [ 34.363613][ T3619] bond_slave_0: entered promiscuous mode [ 34.369459][ T3619] bond_slave_1: entered promiscuous mode [ 34.377292][ T3619] batadv0: entered promiscuous mode [ 34.383564][ T3619] 8021q: adding VLAN 0 to HW filter on device hsr1 [ 34.391612][ T3604] syz.0.42 (3604) used greatest stack depth: 7816 bytes left [ 34.399355][ T3619] bond0: left promiscuous mode [ 34.400356][ T3324] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.404432][ T3619] bond_slave_0: left promiscuous mode [ 34.418838][ T3619] bond_slave_1: left promiscuous mode [ 34.425555][ T3619] batadv0: left promiscuous mode [ 34.770807][ T3639] process 'syz.3.52' launched './file1' with NULL argv: empty string added [ 35.192703][ T3652] __nla_validate_parse: 3 callbacks suppressed [ 35.192732][ T3652] netlink: 40 bytes leftover after parsing attributes in process `syz.4.54'. [ 35.214884][ T3652] loop4: detected capacity change from 0 to 512 [ 35.221443][ T3652] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 35.485349][ T3656] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 35.645808][ T3662] FAULT_INJECTION: forcing a failure. [ 35.645808][ T3662] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 35.659039][ T3662] CPU: 0 UID: 0 PID: 3662 Comm: syz.2.55 Not tainted syzkaller #0 PREEMPT(full) [ 35.659067][ T3662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 35.659147][ T3662] Call Trace: [ 35.659197][ T3662] [ 35.659204][ T3662] __dump_stack+0x1d/0x30 [ 35.659232][ T3662] dump_stack_lvl+0x95/0xd0 [ 35.659253][ T3662] dump_stack+0x15/0x1b [ 35.659345][ T3662] should_fail_ex+0x263/0x280 [ 35.659370][ T3662] should_fail+0xb/0x20 [ 35.659396][ T3662] should_fail_usercopy+0x1a/0x20 [ 35.659421][ T3662] _copy_to_user+0x20/0xa0 [ 35.659503][ T3662] simple_read_from_buffer+0xb5/0x130 [ 35.659523][ T3662] proc_fail_nth_read+0x10e/0x150 [ 35.659550][ T3662] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 35.659708][ T3662] vfs_read+0x1ab/0x7f0 [ 35.659739][ T3662] ? __rcu_read_unlock+0x4e/0x70 [ 35.659821][ T3662] ? __fget_files+0x184/0x1c0 [ 35.659844][ T3662] ? mutex_lock+0x57/0x90 [ 35.659869][ T3662] ksys_read+0xdc/0x1a0 [ 35.659882][ T3662] __x64_sys_read+0x40/0x50 [ 35.659895][ T3662] x64_sys_call+0x2886/0x3020 [ 35.660035][ T3662] do_syscall_64+0x12c/0x370 [ 35.660054][ T3662] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 35.660112][ T3662] RIP: 0033:0x7f3d88a3cfce [ 35.660129][ T3662] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 35.660145][ T3662] RSP: 002b:00007f3d874b5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 35.660164][ T3662] RAX: ffffffffffffffda RBX: 00007f3d874b66c0 RCX: 00007f3d88a3cfce [ 35.660175][ T3662] RDX: 000000000000000f RSI: 00007f3d874b60a0 RDI: 000000000000000a [ 35.660186][ T3662] RBP: 00007f3d874b6090 R08: 0000000000000000 R09: 0000000000000000 [ 35.660197][ T3662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 35.660248][ T3662] R13: 00007f3d88cf6128 R14: 00007f3d88cf6090 R15: 00007fff664b3448 [ 35.660266][ T3662] [ 35.874768][ T3667] loop1: detected capacity change from 0 to 512 [ 35.911296][ T3667] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=8856c01c, mo2=0002] [ 35.919809][ T3667] EXT4-fs (loop1): orphan cleanup on readonly fs [ 35.953339][ T3667] EXT4-fs warning (device loop1): ext4_enable_quotas:7236: Failed to enable quota tracking (type=2, err=-22, ino=15). Please run e2fsck to fix. [ 35.977567][ T3667] EXT4-fs (loop1): Cannot turn on quotas: error -22 [ 35.985506][ T3667] EXT4-fs error (device loop1): ext4_ext_check_inode:521: inode #13: comm syz.1.60: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 36.045919][ T3672] loop3: detected capacity change from 0 to 1024 [ 36.069423][ T3672] ======================================================= [ 36.069423][ T3672] WARNING: The mand mount option has been deprecated and [ 36.069423][ T3672] and is ignored by this kernel. Remove the mand [ 36.069423][ T3672] option from the mount to silence this warning. [ 36.069423][ T3672] ======================================================= [ 36.106830][ T3667] loop1: lost file I/O error report for ino 13 type 5 pos 0x0 len 0x0 error -117 [ 36.106984][ T3667] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.60: couldn't read orphan inode 13 (err -117) [ 36.116233][ C0] EXT4-fs (loop1): error count since last fsck: 1 [ 36.116251][ C0] EXT4-fs (loop1): last error at time 1774379307: ext4_ext_check_inode:521: inode 13 [ 36.145166][ T3667] loop1: lost filesystem error report for type 5 error -117 [ 36.146046][ T3667] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 36.187352][ T3672] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 36.231322][ T3672] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 36.324378][ T3672] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 36.331897][ T3672] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 36.339392][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.525310][ T3693] loop0: detected capacity change from 0 to 1024 [ 36.532129][ T3693] EXT4-fs: test_dummy_encryption option not supported [ 36.612098][ T3692] netlink: 8 bytes leftover after parsing attributes in process `syz.4.68'. [ 37.041735][ T3709] netlink: 32 bytes leftover after parsing attributes in process `syz.4.75'. [ 38.075208][ T3717] loop2: detected capacity change from 0 to 512 [ 38.186728][ T3720] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.194098][ T3720] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.211350][ T3720] bridge0: entered promiscuous mode [ 38.216719][ T3722] loop1: detected capacity change from 0 to 512 [ 38.218346][ T3720] A link change request failed with some changes committed already. Interface bridge0 may have been left with an inconsistent configuration, please check. [ 38.264466][ T3722] EXT4-fs error (device loop1): __ext4_fill_super:5563: inode #2: comm syz.1.79: iget: checksum invalid [ 38.338422][ T3722] loop1: lost file I/O error report for ino 2 type 5 pos 0x0 len 0x0 error -74 [ 38.338598][ T3722] EXT4-fs (loop1): get root inode failed [ 38.347661][ C1] EXT4-fs (loop1): error count since last fsck: 1 [ 38.347678][ C1] EXT4-fs (loop1): initial error at time 1774379310: __ext4_fill_super:5563: inode 2 [ 38.347702][ C1] EXT4-fs (loop1): last error at time 1774379310: __ext4_fill_super:5563: inode 2 [ 38.412978][ T3717] EXT4-fs error (device loop2): ext4_orphan_get:1391: inode #15: comm syz.2.76: inode has both inline data and extents flags [ 38.421373][ T3722] EXT4-fs (loop1): mount failed [ 38.457163][ T3717] loop2: lost file I/O error report for ino 15 type 5 pos 0x0 len 0x0 error -117 [ 38.461248][ C1] EXT4-fs (loop2): error count since last fsck: 1 [ 38.476821][ C1] EXT4-fs (loop2): initial error at time 1774379310: ext4_orphan_get:1391: inode 15 [ 38.486233][ C1] EXT4-fs (loop2): last error at time 1774379310: ext4_orphan_get:1391: inode 15 [ 38.551302][ T3717] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.76: couldn't read orphan inode 15 (err -117) [ 38.563334][ T3717] loop2: lost filesystem error report for type 5 error -117 [ 38.563831][ T3717] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.592206][ T3715] netlink: 28 bytes leftover after parsing attributes in process `syz.2.76'. [ 38.730035][ T3750] netlink: 44 bytes leftover after parsing attributes in process `syz.3.84'. [ 38.739373][ T3750] netlink: 43 bytes leftover after parsing attributes in process `syz.3.84'. [ 38.749135][ T3750] netlink: 'syz.3.84': attribute type 6 has an invalid length. [ 38.757772][ T3750] netlink: 'syz.3.84': attribute type 5 has an invalid length. [ 38.783898][ T3750] netlink: 43 bytes leftover after parsing attributes in process `syz.3.84'. [ 38.922875][ T3320] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.106678][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 41.106737][ T28] audit: type=1400 audit(1774379312.378:209): avc: denied { create } for pid=3758 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 41.135137][ T28] audit: type=1400 audit(1774379312.588:210): avc: denied { bind } for pid=3758 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 41.154605][ T28] audit: type=1400 audit(1774379312.708:211): avc: denied { listen } for pid=3758 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 41.781278][ T28] audit: type=1400 audit(1774379312.828:212): avc: denied { connect } for pid=3758 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 41.794292][ T3730] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 41.875482][ T28] audit: type=1400 audit(1774379313.128:213): avc: denied { read } for pid=3758 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 41.916581][ T3769] syzkaller0: entered promiscuous mode [ 41.922299][ T3769] syzkaller0: entered allmulticast mode [ 41.957463][ T28] audit: type=1400 audit(1774379313.228:214): avc: denied { setopt } for pid=3758 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 41.978824][ T3769] tipc: Started in network mode [ 41.984567][ T3769] tipc: Node identity 5670e2ef7a1a, cluster identity 4711 [ 41.992072][ T3769] tipc: Enabled bearer , priority 0 [ 41.998713][ T28] audit: type=1326 audit(1774379313.628:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3763 comm="syz.2.88" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f3d88a7c799 code=0x0 [ 42.031946][ T28] audit: type=1400 audit(1774379313.728:216): avc: denied { read write } for pid=3772 comm="syz.0.92" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 42.059785][ T3767] tipc: Resetting bearer [ 42.071502][ T3767] tipc: Disabling bearer [ 42.081027][ T28] audit: type=1400 audit(1774379313.728:217): avc: denied { open } for pid=3772 comm="syz.0.92" path="/dev/sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 42.167827][ T3786] loop3: detected capacity change from 0 to 164 [ 42.184336][ T28] audit: type=1400 audit(1774379313.788:218): avc: denied { ioctl } for pid=3772 comm="syz.0.92" path="/dev/sg0" dev="devtmpfs" ino=135 ioctlcmd=0x943b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 42.525331][ T3810] netlink: 4 bytes leftover after parsing attributes in process `syz.2.102'. [ 43.860774][ T3813] loop9: detected capacity change from 0 to 7 [ 43.913683][ C1] I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 43.923293][ C1] Buffer I/O error on dev loop9, logical block 0, async page read [ 43.931563][ C1] I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 43.941111][ C1] Buffer I/O error on dev loop9, logical block 0, async page read [ 43.949015][ T3813] loop9: unable to read partition table [ 43.989543][ T3813] loop_reread_partitions: partition scan of loop9 (Cj̖P=ý?}X %`ր{֐ȵ4FLQk݊) failed (rc=-5) [ 44.004533][ C1] I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 44.014132][ C1] Buffer I/O error on dev loop9, logical block 0, async page read [ 44.031242][ C1] I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 44.040848][ C1] Buffer I/O error on dev loop9, logical block 0, async page read [ 44.052093][ C1] I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 44.061677][ C1] Buffer I/O error on dev loop9, logical block 0, async page read [ 44.070108][ C1] I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 44.079691][ C1] Buffer I/O error on dev loop9, logical block 0, async page read [ 44.091086][ C1] I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 44.100680][ C1] Buffer I/O error on dev loop9, logical block 0, async page read [ 44.555871][ T3844] batadv_slave_0: entered promiscuous mode [ 44.635297][ T3844] batman_adv: batadv0: Adding interface: macsec1 [ 44.648878][ T3844] batman_adv: batadv0: The MTU of interface macsec1 is too small (1468) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 44.686782][ T3844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 44.700941][ T3844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.712261][ T3844] batman_adv: batadv0: Interface activated: macsec1 [ 44.921919][ T3865] FAULT_INJECTION: forcing a failure. [ 44.921919][ T3865] name failslab, interval 1, probability 0, space 0, times 1 [ 44.934709][ T3865] CPU: 0 UID: 0 PID: 3865 Comm: syz.2.125 Not tainted syzkaller #0 PREEMPT(full) [ 44.934734][ T3865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 44.934801][ T3865] Call Trace: [ 44.934809][ T3865] [ 44.934817][ T3865] __dump_stack+0x1d/0x30 [ 44.934858][ T3865] dump_stack_lvl+0x95/0xd0 [ 44.934879][ T3865] dump_stack+0x15/0x1b [ 44.934949][ T3865] should_fail_ex+0x263/0x280 [ 44.934977][ T3865] should_failslab+0x8c/0xb0 [ 44.934998][ T3865] kmem_cache_alloc_noprof+0x66/0x400 [ 44.935028][ T3865] ? skb_clone+0x151/0x1f0 [ 44.935135][ T3865] skb_clone+0x151/0x1f0 [ 44.935157][ T3865] __netlink_deliver_tap+0x2c9/0x500 [ 44.935190][ T3865] netlink_unicast+0x66b/0x690 [ 44.935234][ T3865] netlink_sendmsg+0x5c8/0x6f0 [ 44.935258][ T3865] ? __pfx_netlink_sendmsg+0x10/0x10 [ 44.935309][ T3865] ____sys_sendmsg+0x563/0x5b0 [ 44.935336][ T3865] ___sys_sendmsg+0x195/0x1e0 [ 44.935490][ T3865] __x64_sys_sendmsg+0xd4/0x160 [ 44.935548][ T3865] x64_sys_call+0x194c/0x3020 [ 44.935570][ T3865] do_syscall_64+0x12c/0x370 [ 44.935643][ T3865] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 44.935704][ T3865] RIP: 0033:0x7f3d88a7c799 [ 44.935724][ T3865] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 44.935738][ T3865] RSP: 002b:00007f3d87495028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 44.935755][ T3865] RAX: ffffffffffffffda RBX: 00007f3d88cf6180 RCX: 00007f3d88a7c799 [ 44.935766][ T3865] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000009 [ 44.935776][ T3865] RBP: 00007f3d87495090 R08: 0000000000000000 R09: 0000000000000000 [ 44.935834][ T3865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 44.935879][ T3865] R13: 00007f3d88cf6218 R14: 00007f3d88cf6180 R15: 00007fff664b3448 [ 44.935896][ T3865] [ 44.935920][ T3865] netlink: 4 bytes leftover after parsing attributes in process `syz.2.125'. [ 44.970876][ T3866] netlink: 36 bytes leftover after parsing attributes in process `syz.1.126'. [ 45.107490][ T3862] loop3: detected capacity change from 0 to 8192 [ 45.191399][ T3303] loop3: p2 p3 p4 < > [ 45.195672][ T3303] loop3: partition table partially beyond EOD, truncated [ 45.202947][ T3303] loop3: p2 size 590592 extends beyond EOD, truncated [ 45.211446][ T3303] loop3: p3 start 4294967295 is beyond EOD, truncated [ 45.218510][ T3303] loop3: p4 start 117440516 is beyond EOD, truncated [ 45.254359][ T3862] loop3: p2 p3 p4 < > [ 45.258832][ T3862] loop3: partition table partially beyond EOD, truncated [ 45.266376][ T3862] loop3: p2 size 590592 extends beyond EOD, truncated [ 45.274772][ T3862] loop3: p3 start 4294967295 is beyond EOD, truncated [ 45.281758][ T3862] loop3: p4 start 117440516 is beyond EOD, truncated [ 45.483481][ T3874] loop1: detected capacity change from 0 to 1024 [ 45.524256][ T3303] udevd[3303]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 45.549935][ T3874] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 45.592617][ T3875] netlink: 'syz.3.128': attribute type 12 has an invalid length. [ 46.242785][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 46.242801][ T28] audit: type=1400 audit(1774379318.058:230): avc: denied { getopt } for pid=3880 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.945522][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 47.256500][ T3899] pimreg: entered allmulticast mode [ 47.270904][ T28] audit: type=1400 audit(1774379319.078:231): avc: denied { write } for pid=3901 comm="syz.4.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 47.361125][ T3913] netlink: 'syz.1.139': attribute type 2 has an invalid length. [ 47.383988][ T3913] netlink: 48 bytes leftover after parsing attributes in process `syz.1.139'. [ 47.651563][ T28] audit: type=1400 audit(1774379319.438:232): avc: denied { create } for pid=3909 comm="syz.1.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 48.374935][ T3932] FAULT_INJECTION: forcing a failure. [ 48.374935][ T3932] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 48.393487][ T3902] loop4: detected capacity change from 0 to 1764 [ 48.448577][ T3932] CPU: 1 UID: 0 PID: 3932 Comm: syz.2.147 Not tainted syzkaller #0 PREEMPT(full) [ 48.448605][ T3932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 48.448616][ T3932] Call Trace: [ 48.448622][ T3932] [ 48.448629][ T3932] __dump_stack+0x1d/0x30 [ 48.448654][ T3932] dump_stack_lvl+0x95/0xd0 [ 48.448671][ T3932] dump_stack+0x15/0x1b [ 48.448687][ T3932] should_fail_ex+0x263/0x280 [ 48.448752][ T3932] should_fail+0xb/0x20 [ 48.448769][ T3932] should_fail_usercopy+0x1a/0x20 [ 48.448791][ T3932] strncpy_from_user+0x27/0x250 [ 48.448821][ T3932] ? kmem_cache_alloc_noprof+0x18c/0x400 [ 48.448844][ T3932] do_getname+0x59/0x1c0 [ 48.448865][ T3932] getname_uflags+0x23/0x30 [ 48.448885][ T3932] __x64_sys_execveat+0x5d/0xa0 [ 48.448915][ T3932] x64_sys_call+0x2a33/0x3020 [ 48.448934][ T3932] do_syscall_64+0x12c/0x370 [ 48.448954][ T3932] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 48.449045][ T3932] RIP: 0033:0x7f3d88a7c799 [ 48.449058][ T3932] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 48.449074][ T3932] RSP: 002b:00007f3d874d7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 48.449173][ T3932] RAX: ffffffffffffffda RBX: 00007f3d88cf5fa0 RCX: 00007f3d88a7c799 [ 48.449187][ T3932] RDX: 0000000000000000 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 48.449200][ T3932] RBP: 00007f3d874d7090 R08: 0000000000001000 R09: 0000000000000000 [ 48.449213][ T3932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 48.449225][ T3932] R13: 00007f3d88cf6038 R14: 00007f3d88cf5fa0 R15: 00007fff664b3448 [ 48.449241][ T3932] [ 48.670494][ T28] audit: type=1400 audit(1774379320.458:233): avc: denied { write } for pid=3933 comm="syz.0.148" name="event2" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 48.697605][ T28] audit: type=1400 audit(1774379320.458:234): avc: denied { open } for pid=3933 comm="syz.0.148" path="/dev/input/event2" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 50.589188][ T3956] netlink: 56 bytes leftover after parsing attributes in process `syz.1.154'. [ 51.589636][ T28] audit: type=1400 audit(1774379323.398:235): avc: denied { ioctl } for pid=3957 comm="syz.2.156" path="socket:[6816]" dev="sockfs" ino=6816 ioctlcmd=0x6721 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 51.707083][ T3964] sch_tbf: burst 6 is lower than device ip6gre0 mtu (1448) ! [ 51.727287][ T3966] netlink: 300 bytes leftover after parsing attributes in process `syz.3.160'. [ 51.749868][ T3967] loop1: detected capacity change from 0 to 4096 [ 51.774063][ T3967] EXT4-fs: Ignoring removed nomblk_io_submit option [ 51.811346][ T3967] EXT4-fs (loop1): stripe (97) is not aligned with cluster size (16), stripe is disabled [ 51.823725][ T28] audit: type=1400 audit(1774379323.628:236): avc: denied { create } for pid=3976 comm="syz.2.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 51.857481][ T28] audit: type=1400 audit(1774379323.628:237): avc: denied { read } for pid=3976 comm="syz.2.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 51.859120][ T1033] Process accounting resumed [ 51.883353][ T3981] Driver unsupported XDP return value 0 on prog (id 41) dev N/A, expect packet loss! [ 51.893964][ T3971] loop4: detected capacity change from 0 to 1024 [ 51.901407][ T28] audit: type=1400 audit(1774379323.658:238): avc: denied { bpf } for pid=3978 comm="syz.3.164" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 51.925010][ T3971] EXT4-fs: dax option not supported [ 51.950229][ T3967] [EXT4 FS bs=4096, gc=1, bpg=524288, ipg=32, mo=a842e018, mo2=0002] [ 51.955581][ T28] audit: type=1400 audit(1774379323.658:239): avc: denied { perfmon } for pid=3978 comm="syz.3.164" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 51.979416][ T28] audit: type=1400 audit(1774379323.748:240): avc: denied { connect } for pid=3970 comm="syz.4.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 52.009399][ T3967] System zones: 0-5 [ 52.020097][ T3967] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 52.097797][ T28] audit: type=1400 audit(1774379323.908:241): avc: denied { read } for pid=3961 comm="syz.1.157" dev="sockfs" ino=6819 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 52.399598][ T28] audit: type=1400 audit(1774379324.208:242): avc: denied { bind } for pid=3984 comm="syz.2.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 52.420265][ T28] audit: type=1400 audit(1774379324.208:243): avc: denied { name_bind } for pid=3984 comm="syz.2.165" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 52.452905][ T28] audit: type=1400 audit(1774379324.208:244): avc: denied { node_bind } for pid=3984 comm="syz.2.165" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 52.475429][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 52.535324][ T4001] netlink: 48 bytes leftover after parsing attributes in process `syz.1.168'. [ 52.615092][ T57] Bluetooth: hci0: Frame reassembly failed (-84) [ 52.636055][ T3999] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 52.812650][ T3999] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 52.938720][ T3999] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 53.042948][ T4014] loop4: detected capacity change from 0 to 1024 [ 53.068525][ T3999] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 53.088949][ T4014] ext4: Unknown parameter 'uid' [ 53.129445][ T4014] loop4: detected capacity change from 0 to 4096 [ 53.137034][ T4014] EXT4-fs: Ignoring removed bh option [ 53.156272][ T4014] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 53.184152][ T1677] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.192563][ T1677] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.211410][ T3322] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 53.260574][ T4024] netlink: 8 bytes leftover after parsing attributes in process `syz.4.175'. [ 53.263643][ T1677] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.326358][ T1677] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.586205][ T4035] netlink: 4 bytes leftover after parsing attributes in process `syz.4.180'. [ 53.619917][ T4037] loop4: detected capacity change from 0 to 512 [ 53.626558][ T4037] EXT4-fs: Ignoring removed oldalloc option [ 53.634781][ T4037] EXT4-fs error (device loop4): ext4_get_branch:178: inode #11: block 4294967295: comm syz.4.181: invalid block [ 53.646627][ T4037] loop4: lost file I/O error report for ino 11 type 5 pos 0x0 len 0x0 error -117 [ 53.646841][ T4037] EXT4-fs error (device loop4): ext4_free_branches:1023: inode #11: comm syz.4.181: invalid indirect mapped block 4294967295 (level 1) [ 53.656016][ C1] EXT4-fs (loop4): error count since last fsck: 1 [ 53.656033][ C1] EXT4-fs (loop4): initial error at time 1774379325: ext4_get_branch:178: inode 11: block 4294967295 [ 53.656078][ C1] EXT4-fs (loop4): last error at time 1774379325: ext4_get_branch:178: inode 11: block 4294967295 [ 53.697782][ T4037] loop4: lost file I/O error report for ino 11 type 5 pos 0x0 len 0x0 error -117 [ 53.698085][ T4037] EXT4-fs error (device loop4): ext4_free_branches:1023: inode #11: comm syz.4.181: invalid indirect mapped block 4294967295 (level 1) [ 53.721184][ T4037] loop4: lost file I/O error report for ino 11 type 5 pos 0x0 len 0x0 error -117 [ 53.721582][ T4037] EXT4-fs (loop4): 2 truncates cleaned up [ 53.736698][ T4037] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 53.858530][ T4042] bridge_slave_0: left allmulticast mode [ 53.865545][ T4042] bridge_slave_0: left promiscuous mode [ 53.871501][ T4042] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.880215][ T4042] bridge_slave_1: left allmulticast mode [ 53.886965][ T4042] bridge_slave_1: left promiscuous mode [ 53.892705][ T4042] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.901070][ T4044] netlink: 'syz.3.182': attribute type 7 has an invalid length. [ 53.935407][ T4042] bond0: (slave bond_slave_0): Releasing backup interface [ 53.947725][ T4042] bond0: (slave bond_slave_1): Releasing backup interface [ 53.962280][ T4042] team0: Port device team_slave_0 removed [ 53.972226][ T4042] team0: Port device team_slave_1 removed [ 53.982160][ T4042] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 53.998483][ T4044] netlink: 'syz.3.182': attribute type 7 has an invalid length. [ 54.140956][ T4054] syzkaller0: entered promiscuous mode [ 54.146489][ T4054] syzkaller0: entered allmulticast mode [ 54.502908][ T3322] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 54.670155][ T4005] Bluetooth: hci0: command 0x1003 tx timeout [ 54.676224][ T3687] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 55.218257][ T4086] loop0: detected capacity change from 0 to 164 [ 55.225152][ T4086] iso9660: Bad value for 'uid' [ 55.236922][ T4086] iso9660: Bad value for 'uid' [ 55.401904][ T4090] netlink: 20 bytes leftover after parsing attributes in process `syz.2.199'. [ 55.502561][ T4096] loop4: detected capacity change from 0 to 1764 [ 55.522732][ T4096] iso9660: Corrupted directory entry in block 2 of inode 1920 [ 55.958421][ T4108] loop3: detected capacity change from 0 to 512 [ 55.961468][ T4108] EXT4-fs: inline encryption not supported [ 55.963360][ T4108] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 55.963511][ T4108] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (256 blocks) [ 56.623976][ T28] kauditd_printk_skb: 27 callbacks suppressed [ 56.624058][ T28] audit: type=1400 audit(1774379328.438:272): avc: denied { mount } for pid=4112 comm="syz.3.209" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 56.996556][ T4123] netlink: 16186 bytes leftover after parsing attributes in process `syz.2.212'. [ 57.334804][ T4132] loop4: detected capacity change from 0 to 1024 [ 57.397894][ T4132] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 57.901068][ T4140] loop1: detected capacity change from 0 to 4096 [ 58.030967][ T4140] EXT4-fs: Ignoring removed nomblk_io_submit option [ 58.072648][ T4140] EXT4-fs (loop1): stripe (97) is not aligned with cluster size (16), stripe is disabled [ 58.182200][ T4140] [EXT4 FS bs=4096, gc=1, bpg=524288, ipg=32, mo=a842e018, mo2=0002] [ 58.262459][ T4140] System zones: 0-5 [ 58.303011][ T4140] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 58.691953][ T3322] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 59.152921][ T28] audit: type=1400 audit(1774379330.968:273): avc: denied { bind } for pid=4159 comm="syz.2.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 59.480843][ T4163] batadv_slave_0: entered promiscuous mode [ 59.598375][ T4163] batman_adv: batadv0: Adding interface: macsec1 [ 59.606184][ T4163] batman_adv: batadv0: The MTU of interface macsec1 is too small (1468) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 59.634367][ T4163] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 59.645365][ T4163] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 59.656281][ T4163] batman_adv: batadv0: Interface activated: macsec1 [ 59.784095][ T4168] loop2: detected capacity change from 0 to 128 [ 59.974873][ T4167] syz.2.224: attempt to access beyond end of device [ 59.974873][ T4167] loop2: rw=8390657, sector=138, nr_sectors = 2 limit=128 [ 59.991363][ T4167] Buffer I/O error on dev loop2, logical block 69, lost async page write [ 60.141290][ T28] audit: type=1400 audit(1774379331.948:274): avc: denied { create } for pid=4175 comm="syz.2.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 60.181342][ T28] audit: type=1400 audit(1774379331.948:275): avc: denied { write } for pid=4175 comm="syz.2.227" path="socket:[7269]" dev="sockfs" ino=7269 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 60.268233][ T4178] netlink: 20 bytes leftover after parsing attributes in process `syz.2.227'. [ 60.322468][ T28] audit: type=1400 audit(1774379332.138:276): avc: denied { getopt } for pid=4175 comm="syz.2.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 60.381276][ T28] audit: type=1400 audit(1774379332.188:277): avc: denied { mounton } for pid=4179 comm="syz.0.228" path="/proc/110/task" dev="proc" ino=7271 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 60.404028][ T28] audit: type=1400 audit(1774379332.198:278): avc: denied { setopt } for pid=4175 comm="syz.2.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 60.571349][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.611095][ T28] audit: type=1400 audit(1774379333.418:279): avc: denied { ioctl } for pid=4199 comm="syz.2.236" path="/dev/ppp" dev="devtmpfs" ino=140 ioctlcmd=0x7451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 61.645963][ T28] audit: type=1400 audit(1774379333.448:280): avc: denied { block_suspend } for pid=4208 comm="syz.0.240" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 61.800834][ T28] audit: type=1400 audit(1774379333.608:281): avc: denied { read } for pid=4221 comm="syz.1.245" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 61.851347][ T28] audit: type=1400 audit(1774379333.608:282): avc: denied { open } for pid=4221 comm="syz.1.245" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 61.921129][ T4230] loop1: detected capacity change from 0 to 128 [ 61.963291][ T4230] capability: warning: `syz.1.246' uses deprecated v2 capabilities in a way that may be insecure [ 61.980780][ T28] audit: type=1400 audit(1774379333.608:283): avc: denied { ioctl } for pid=4221 comm="syz.1.245" path="socket:[6142]" dev="sockfs" ino=6142 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 62.086350][ T4232] FAULT_INJECTION: forcing a failure. [ 62.086350][ T4232] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 62.108106][ T28] audit: type=1400 audit(1774379333.838:284): avc: denied { ioctl } for pid=4229 comm="syz.1.246" path="socket:[8201]" dev="sockfs" ino=8201 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 62.164948][ T4232] CPU: 0 UID: 0 PID: 4232 Comm: syz.1.247 Not tainted syzkaller #0 PREEMPT(full) [ 62.164973][ T4232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 62.164983][ T4232] Call Trace: [ 62.164989][ T4232] [ 62.164994][ T4232] __dump_stack+0x1d/0x30 [ 62.165069][ T4232] dump_stack_lvl+0x95/0xd0 [ 62.165167][ T4232] dump_stack+0x15/0x1b [ 62.165187][ T4232] should_fail_ex+0x263/0x280 [ 62.165212][ T4232] should_fail+0xb/0x20 [ 62.165230][ T4232] should_fail_usercopy+0x1a/0x20 [ 62.165297][ T4232] _copy_from_user+0x1c/0xb0 [ 62.165325][ T4232] ___sys_sendmsg+0xc1/0x1e0 [ 62.165365][ T4232] __x64_sys_sendmsg+0xd4/0x160 [ 62.165468][ T4232] x64_sys_call+0x194c/0x3020 [ 62.165491][ T4232] do_syscall_64+0x12c/0x370 [ 62.165510][ T4232] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 62.165587][ T4232] RIP: 0033:0x7f44f1d2c799 [ 62.165602][ T4232] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 62.165761][ T4232] RSP: 002b:00007f44f0787028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 62.165778][ T4232] RAX: ffffffffffffffda RBX: 00007f44f1fa5fa0 RCX: 00007f44f1d2c799 [ 62.165791][ T4232] RDX: 0000000000040004 RSI: 0000200000000180 RDI: 0000000000000003 [ 62.165840][ T4232] RBP: 00007f44f0787090 R08: 0000000000000000 R09: 0000000000000000 [ 62.165850][ T4232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 62.165860][ T4232] R13: 00007f44f1fa6038 R14: 00007f44f1fa5fa0 R15: 00007ffcafc7dc38 [ 62.165875][ T4232] [ 62.221298][ T28] audit: type=1400 audit(1774379333.838:285): avc: denied { setattr } for pid=4229 comm="syz.1.246" name="" dev="pipefs" ino=2489 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 62.350495][ T28] audit: type=1400 audit(1774379333.838:286): avc: denied { read } for pid=4229 comm="syz.1.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 62.441894][ T28] audit: type=1400 audit(1774379334.248:287): avc: denied { create } for pid=4237 comm="syz.1.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 62.535480][ T28] audit: type=1400 audit(1774379334.258:288): avc: denied { setopt } for pid=4237 comm="syz.1.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 62.588470][ T4246] netlink: 8 bytes leftover after parsing attributes in process `syz.0.253'. [ 63.641788][ T28] audit: type=1400 audit(1774379335.438:289): avc: denied { write } for pid=4261 comm="syz.4.257" lport=55861 faddr=::ffff:100.1.1.0 fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 65.154844][ T4263] loop4: detected capacity change from 0 to 512 [ 65.212573][ T4263] EXT4-fs (loop4): 1 truncate cleaned up [ 65.277012][ T4263] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 65.351616][ T4284] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 65.445194][ T4272] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=4272 comm=syz.3.260 [ 65.464141][ T3322] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 65.614707][ T4272] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 65.626054][ T4272] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 65.636550][ T4284] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 65.671939][ T4272] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 65.718079][ T4272] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 65.769568][ T4299] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=534 sclass=netlink_route_socket pid=4299 comm=syz.1.268 [ 66.167919][ T4284] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.524979][ T4284] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 66.611428][ T50] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.639297][ T50] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.652424][ T50] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.668328][ T50] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.768313][ T4336] loop1: detected capacity change from 0 to 4096 [ 66.793290][ T4319] loop4: detected capacity change from 0 to 8192 [ 66.793866][ T4336] EXT4-fs: Ignoring removed nomblk_io_submit option [ 66.816724][ T4336] EXT4-fs (loop1): stripe (97) is not aligned with cluster size (16), stripe is disabled [ 66.816766][ T4342] netlink: 36 bytes leftover after parsing attributes in process `syz.0.278'. [ 66.837369][ T4336] [EXT4 FS bs=4096, gc=1, bpg=524288, ipg=32, mo=a842e018, mo2=0002] [ 66.856721][ T4336] System zones: 0-5 [ 66.862047][ T3561] loop4: p2 p3 p4 < > [ 66.866427][ T3561] loop4: partition table partially beyond EOD, truncated [ 66.873760][ T3561] loop4: p2 size 590592 extends beyond EOD, truncated [ 66.882623][ T4336] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 66.887833][ T3561] loop4: p3 start 4294967295 is beyond EOD, truncated [ 66.900909][ T3561] loop4: p4 start 117440516 is beyond EOD, truncated [ 66.918556][ T4319] loop4: p2 p3 p4 < > [ 66.918577][ T4319] loop4: partition table partially beyond EOD, truncated [ 66.918692][ T4319] loop4: p2 size 590592 extends beyond EOD, truncated [ 66.923180][ T4319] loop4: p3 start 4294967295 is beyond EOD, truncated [ 66.923221][ T4319] loop4: p4 start 117440516 is beyond EOD, truncated [ 67.024623][ T4349] netlink: 44 bytes leftover after parsing attributes in process `syz.2.280'. [ 67.024646][ T4349] netlink: 43 bytes leftover after parsing attributes in process `syz.2.280'. [ 67.024660][ T4349] netlink: 'syz.2.280': attribute type 5 has an invalid length. [ 67.024671][ T4349] netlink: 43 bytes leftover after parsing attributes in process `syz.2.280'. [ 67.069226][ T4355] capability: warning: `syz.2.281' uses 32-bit capabilities (legacy support in use) [ 67.212797][ T4369] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=534 sclass=netlink_route_socket pid=4369 comm=syz.3.285 [ 67.260850][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 67.260867][ T28] audit: type=1400 audit(1774379339.068:296): avc: denied { audit_write } for pid=4372 comm="syz.4.288" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 67.318136][ T4377] xt_TPROXY: Can be used only with -p tcp or -p udp [ 67.397489][ T4379] netlink: 8 bytes leftover after parsing attributes in process `syz.4.291'. [ 67.796676][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 67.808299][ T4386] loop4: detected capacity change from 0 to 128 [ 68.060475][ T4386] EXT4-fs (loop4): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 68.294819][ T4386] ext4 filesystem being mounted at /65/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 68.315846][ T4395] loop2: detected capacity change from 0 to 1024 [ 68.523069][ T3322] EXT4-fs (loop4): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 68.553722][ T28] audit: type=1400 audit(1774379340.348:297): avc: denied { read } for pid=4410 comm="syz.0.300" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 68.572778][ T4419] tipc: Started in network mode [ 68.579051][ T28] audit: type=1400 audit(1774379340.348:298): avc: denied { open } for pid=4410 comm="syz.0.300" path="/dev/rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 68.603496][ T4419] tipc: Node identity 00000000000000000000000000000001, cluster identity 4711 [ 68.618459][ T28] audit: type=1400 audit(1774379340.348:299): avc: denied { ioctl } for pid=4410 comm="syz.0.300" path="/dev/rtc0" dev="devtmpfs" ino=244 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 68.641511][ T4419] tipc: New replicast peer: 0000:0000:0000:0000:0000:00ff:0000:0000 [ 68.664075][ T4422] loop0: detected capacity change from 0 to 4096 [ 68.670612][ T4419] tipc: Enabled bearer , priority 10 [ 68.685129][ T4426] loop4: detected capacity change from 0 to 164 [ 68.692624][ T28] audit: type=1400 audit(1774379340.498:300): avc: denied { setopt } for pid=4424 comm="syz.4.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 68.713831][ T4426] iso9660: Bad value for 'gid' [ 68.718599][ T4426] iso9660: Bad value for 'gid' [ 68.806890][ T28] audit: type=1400 audit(1774379340.548:301): avc: denied { ioctl } for pid=4424 comm="syz.4.301" path="socket:[7684]" dev="sockfs" ino=7684 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 68.851845][ T4439] netlink: 48 bytes leftover after parsing attributes in process `syz.0.307'. [ 68.974246][ T28] audit: type=1400 audit(1774379340.778:302): avc: denied { create } for pid=4406 comm="syz.1.295" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 69.001472][ T4443] loop0: detected capacity change from 0 to 128 [ 69.151116][ T4453] netlink: 16 bytes leftover after parsing attributes in process `syz.2.311'. [ 69.393268][ T28] audit: type=1400 audit(1774379341.208:303): avc: denied { unlink } for pid=3311 comm="syz-executor" name="file0" dev="tmpfs" ino=307 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 69.446584][ T4463] netlink: 8 bytes leftover after parsing attributes in process `syz.1.315'. [ 69.458547][ T4463] netlink: 8 bytes leftover after parsing attributes in process `syz.1.315'. [ 69.562900][ T28] audit: type=1400 audit(1774379341.378:304): avc: denied { ioctl } for pid=4465 comm="syz.1.316" path="socket:[7784]" dev="sockfs" ino=7784 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 69.590812][ T4468] lo speed is unknown, defaulting to 1000 [ 69.597487][ T4468] lo speed is unknown, defaulting to 1000 [ 69.606148][ T4468] lo speed is unknown, defaulting to 1000 [ 69.661723][ T4468] infiniband syU: set active [ 69.666516][ T1033] lo speed is unknown, defaulting to 1000 [ 69.672610][ T4468] infiniband syU: added lo [ 69.694502][ T4468] RDS/IB: syU: added [ 69.698620][ T4468] smc: adding ib device syU with port count 1 [ 69.705128][ T4468] smc: ib device syU port 1 has no pnetid [ 69.706811][ T4466] loop1: detected capacity change from 0 to 2048 [ 69.711257][ T1033] lo speed is unknown, defaulting to 1000 [ 69.729664][ T4468] lo speed is unknown, defaulting to 1000 [ 69.775272][ T4478] netlink: 48 bytes leftover after parsing attributes in process `syz.0.318'. [ 69.784228][ T3393] tipc: Node number set to 1 [ 69.807159][ T4468] lo speed is unknown, defaulting to 1000 [ 69.813130][ T28] audit: type=1400 audit(1774379341.618:305): avc: denied { map } for pid=4459 comm="syz.4.314" path="socket:[7768]" dev="sockfs" ino=7768 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 69.846298][ T4468] lo speed is unknown, defaulting to 1000 [ 69.852922][ T4466] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 69.881035][ T4468] lo speed is unknown, defaulting to 1000 [ 69.897175][ T4466] EXT4-fs error (device loop1): ext4_iget_extra_inode:5025: inode #15: comm syz.1.316: corrupted in-inode xattr: invalid ea_ino [ 69.940259][ T4491] netlink: 44 bytes leftover after parsing attributes in process `syz.3.325'. [ 69.981466][ T4491] netlink: 56 bytes leftover after parsing attributes in process `syz.3.325'. [ 69.993930][ T4468] lo speed is unknown, defaulting to 1000 [ 69.995370][ T4491] netlink: 8 bytes leftover after parsing attributes in process `syz.3.325'. [ 70.032434][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 70.097678][ T4503] loop1: detected capacity change from 0 to 736 [ 70.281488][ T4522] netlink: 164 bytes leftover after parsing attributes in process `syz.1.334'. [ 70.529002][ T4531] netlink: 8 bytes leftover after parsing attributes in process `syz.1.336'. [ 70.673248][ T4507] loop0: detected capacity change from 0 to 1024 [ 70.772135][ T4507] EXT4-fs: test_dummy_encryption option not supported [ 70.985648][ T4558] dummy0 speed is unknown, defaulting to 1000 [ 70.997736][ T4558] dummy0 speed is unknown, defaulting to 1000 [ 71.031901][ T4558] dummy0 speed is unknown, defaulting to 1000 [ 71.038352][ T4558] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 71.053516][ T4558] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 71.097950][ T4559] lo speed is unknown, defaulting to 1000 [ 71.158632][ T4558] dummy0 speed is unknown, defaulting to 1000 [ 71.186008][ T4558] dummy0 speed is unknown, defaulting to 1000 [ 71.206980][ T4559] dummy0 speed is unknown, defaulting to 1000 [ 71.220710][ T4558] dummy0 speed is unknown, defaulting to 1000 [ 71.244287][ T4558] dummy0 speed is unknown, defaulting to 1000 [ 71.283011][ T4558] dummy0 speed is unknown, defaulting to 1000 [ 71.609101][ T4568] bond1: entered promiscuous mode [ 71.638611][ T4568] netlink: 'syz.2.349': attribute type 1 has an invalid length. [ 71.700361][ T4588] loop0: detected capacity change from 0 to 512 [ 71.723490][ T4588] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 71.747820][ T4588] ext4 filesystem being mounted at /82/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 71.773094][ T4588] EXT4-fs error (device loop0): ext4_mb_generate_buddy:1315: group 0, block bitmap and bg descriptor inconsistent: 96 vs 1632 free clusters [ 71.803735][ T4596] loop4: detected capacity change from 0 to 512 [ 71.821038][ T3324] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 71.843830][ T4596] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 71.857753][ T4596] ext4 filesystem being mounted at /75/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 71.873335][ T4596] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1315: group 0, block bitmap and bg descriptor inconsistent: 96 vs 1632 free clusters [ 71.903282][ T3322] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 72.169663][ T3376] lo speed is unknown, defaulting to 1000 [ 72.824169][ T4630] loop4: detected capacity change from 0 to 512 [ 72.831608][ T4630] EXT4-fs: Ignoring removed i_version option [ 72.842183][ T4630] EXT4-fs: Ignoring removed bh option [ 72.857762][ T4630] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 72.870666][ T4630] ext4 filesystem being mounted at /77/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 72.919584][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 72.919598][ T28] audit: type=1400 audit(1774379344.728:315): avc: denied { add_name } for pid=4629 comm="syz.4.367" name="memory.events" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 72.951511][ T4637] loop3: detected capacity change from 0 to 512 [ 72.974049][ T28] audit: type=1400 audit(1774379344.788:316): avc: denied { map } for pid=4629 comm="syz.4.367" path="/77/bus/memory.events" dev="loop4" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 73.036853][ T4637] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 73.049742][ T4637] ext4 filesystem being mounted at /68/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 73.106647][ T4651] loop1: detected capacity change from 0 to 512 [ 73.160023][ T4651] EXT4-fs: Ignoring removed mblk_io_submit option [ 73.189857][ T4654] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=534 sclass=netlink_route_socket pid=4654 comm=syz.0.376 [ 73.204295][ T4651] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 73.246947][ T28] audit: type=1400 audit(1774379345.058:317): avc: denied { setattr } for pid=4635 comm="syz.3.369" name="/" dev="loop3" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 73.269633][ T4656] Quota error (device loop3): do_check_range: Getting dqdh_next_free 4294967294 out of range 0-6 [ 73.287217][ T4651] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 73.329117][ T4651] ext4 filesystem being mounted at /65/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 73.340962][ T4656] Quota error (device loop3): qtree_write_dquot: Error -117 occurred while creating quota [ 73.376407][ T4656] EXT4-fs error (device loop3): ext4_acquire_dquot:7001: comm syz.3.369: Failed to acquire dquot type 0 [ 73.376601][ T28] audit: type=1400 audit(1774379345.188:318): avc: denied { write } for pid=4650 comm="syz.1.375" name="file1" dev="loop1" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 73.431706][ T28] audit: type=1400 audit(1774379345.188:319): avc: denied { open } for pid=4650 comm="syz.1.375" path="/65/bus/file1" dev="loop1" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 73.468194][ T3322] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 73.479558][ T28] audit: type=1400 audit(1774379345.198:320): avc: denied { read append } for pid=4650 comm="syz.1.375" name="file2" dev="loop1" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 73.503927][ T3323] EXT4-fs error (device loop3): __ext4_iget:5378: inode #13: block 127754: comm syz-executor: invalid block [ 73.524813][ T28] audit: type=1400 audit(1774379345.228:321): avc: denied { write } for pid=4659 comm="syz.3.369" path="/68/bus/core" dev="loop3" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 73.531901][ T3323] EXT4-fs error (device loop3): __ext4_iget:5378: inode #13: block 127754: comm syz-executor: invalid block [ 73.550114][ T28] audit: type=1400 audit(1774379345.268:322): avc: denied { ioctl } for pid=4650 comm="syz.1.375" path="/65/bus/file2" dev="loop1" ino=16 ioctlcmd=0x660f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 73.593511][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 73.734922][ T4661] ================================================================== [ 73.743027][ T4661] BUG: KCSAN: data-race in kick_pool / wq_worker_running [ 73.750036][ T4661] [ 73.752334][ T4661] read-write to 0xffff888237d2a8a4 of 4 bytes by task 3302 on cpu 1: [ 73.760366][ T4661] wq_worker_running+0x9b/0x120 [ 73.765196][ T4661] synchronize_rcu_expedited+0x5f8/0x770 [ 73.770807][ T4661] synchronize_rcu+0x35/0x2e0 [ 73.775467][ T4661] xfrm_state_gc_task+0x98/0x650 [ 73.780383][ T4661] process_scheduled_works+0x513/0xa10 [ 73.785828][ T4661] worker_thread+0x58a/0x780 [ 73.790396][ T4661] kthread+0x22a/0x280 [ 73.794532][ T4661] ret_from_fork+0x150/0x360 [ 73.799104][ T4661] ret_from_fork_asm+0x1a/0x30 [ 73.803846][ T4661] [ 73.806143][ T4661] read to 0xffff888237d2a8a4 of 4 bytes by task 4661 on cpu 0: [ 73.813664][ T4661] kick_pool+0x49/0x2d0 [ 73.817815][ T4661] __queue_work+0x896/0xaf0 [ 73.822299][ T4661] queue_work_on+0xa9/0x140 [ 73.826791][ T4661] xfrm_state_find+0x1cc4/0x3270 [ 73.831709][ T4661] xfrm_resolve_and_create_bundle+0x592/0x1f50 [ 73.837844][ T4661] xfrm_lookup_with_ifid+0x443/0x1590 [ 73.843196][ T4661] xfrm_lookup_route+0x3a/0x110 [ 73.848036][ T4661] ip6_dst_lookup_flow+0x97/0xc0 [ 73.852953][ T4661] rawv6_sendmsg+0xc37/0x1230 [ 73.857610][ T4661] inet_sendmsg+0xc5/0xd0 [ 73.861921][ T4661] ____sys_sendmsg+0x519/0x5b0 [ 73.866708][ T4661] ___sys_sendmsg+0x195/0x1e0 [ 73.871368][ T4661] __sys_sendmmsg+0x185/0x320 [ 73.876031][ T4661] __x64_sys_sendmmsg+0x57/0x70 [ 73.880859][ T4661] x64_sys_call+0x27aa/0x3020 [ 73.885514][ T4661] do_syscall_64+0x12c/0x370 [ 73.890079][ T4661] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 73.895945][ T4661] [ 73.898245][ T4661] value changed: 0x00000000 -> 0x00000001 [ 73.903947][ T4661] [ 73.906249][ T4661] Reported by Kernel Concurrency Sanitizer on: [ 73.912373][ T4661] CPU: 0 UID: 0 PID: 4661 Comm: syz.4.377 Not tainted syzkaller #0 PREEMPT(full) [ 73.921540][ T4661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 73.931574][ T4661] ================================================================== [ 74.024553][ T3323] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 74.037938][ T30] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.077315][ T30] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.174248][ T30] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.223081][ T30] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.434171][ T30] bond0 (unregistering): Released all slaves [ 74.501346][ T30] tipc: Disabling bearer [ 74.531274][ T30] tipc: Left network mode [ 74.575375][ T30] hsr_slave_0: left promiscuous mode [ 74.587701][ T30] hsr_slave_1: left promiscuous mode [ 74.601133][ T30] veth1_macvtap: left promiscuous mode [ 74.609385][ T30] veth0_macvtap: left promiscuous mode [ 74.615027][ T30] veth1_vlan: left promiscuous mode [ 74.621061][ T30] veth0_vlan: left promiscuous mode