last executing test programs: 2.296187537s ago: executing program 3 (id=4): r0 = socket(0x1e, 0x4, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000480), 0x4) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001e40)=""/174, 0xae}], 0x1, &(0x7f0000001fc0)=""/67, 0x43}, 0x1}], 0x1, 0x40002122, 0x0) sendmsg$tipc(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x3, {0x1, 0x1, 0x2}}, 0x10, &(0x7f0000000380)=[{&(0x7f00000000c0)="e8", 0x1}], 0x1}, 0x4800) 2.036909632s ago: executing program 4 (id=14): munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r0 = socket(0x1e, 0x4, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000480), 0x4) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000180)=""/175, 0x27}], 0x1, &(0x7f0000001fc0)=""/65, 0xffffffffffffff4b}, 0x40000001}], 0x1, 0x40002122, 0x0) sendmsg$tipc(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x3, {0x1, 0x1, 0x2}}, 0x10, &(0x7f0000000380)=[{&(0x7f00000003c0)="4a7b8798bfca14184162d5034c19d47d14bb527280d9c4e50f6e", 0x1a}], 0x1}, 0x2000c8c0) 1.940737558s ago: executing program 4 (id=15): mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) r1 = syz_io_uring_setup(0x497, &(0x7f00000000c0)={0x0, 0x7079, 0x400, 0x3, 0x288}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r0, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004a00)=ANY=[], 0x438}, 0x0, 0x12f4c4729364eade, 0x1}) io_uring_enter(r1, 0x3516, 0xa00100, 0x0, 0x0, 0x0) 1.872343792s ago: executing program 4 (id=17): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) socket$xdp(0x2c, 0x3, 0x0) syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x27, 0x4, 0x0, 0x0, 0x0, 0x7, 0x8601, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x1, @perf_config_ext={0x8, 0x6}, 0x10, 0x10000, 0x0, 0x4, 0x5, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0) 1.848346693s ago: executing program 3 (id=18): r0 = open(&(0x7f00000001c0)='./bus\x00', 0x4c27e, 0x2) fallocate(r0, 0x0, 0x0, 0x1000f4) prlimit64(0x0, 0xe, &(0x7f00000007c0)={0xb, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000440)=0x8) ioprio_set$pid(0x2, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x800000a1e) 1.834170514s ago: executing program 4 (id=19): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[], 0x1c}, 0x1, 0x0, 0x0, 0x45a3c1901f775339}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x20000000002, &(0x7f0000000040)) ptrace$cont(0x21, r0, 0x80000001, 0x4) 1.815822085s ago: executing program 3 (id=20): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff5653f, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, r2, {0x0, 0x9}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x81}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=@newtfilter={0x4c, 0x2c, 0xd27, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, r2, {0xc, 0xffe0}, {0x0, 0x9}, {0xfff3, 0x9}}, [@filter_kind_options=@f_flower={{0xb}, {0x1c, 0x2, [@TCA_FLOWER_KEY_ETH_TYPE={0x6, 0x8, 0x8848}, @TCA_FLOWER_KEY_MPLS_OPTS={0x8, 0x63, 0x0, 0x1, @TCA_FLOWER_KEY_MPLS_OPTS_LSE={0x4}}, @TCA_FLOWER_KEY_MPLS_BOS={0x5, 0x44, 0x6}]}}]}, 0x4c}}, 0x2000a100) 1.791465846s ago: executing program 4 (id=21): r0 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r0}, &(0x7f0000000000)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(0x0, 0x1, &(0x7f0000000040), 0x0) lchown(0x0, 0x0, 0xee01) 1.72775304s ago: executing program 3 (id=22): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) connect$unix(r1, &(0x7f00000027c0)=@file={0x0, './file0\x00'}, 0x6e) pselect6(0x40, &(0x7f0000000100)={0x2, 0x0, 0x3a, 0x0, 0x1, 0x7}, 0x0, &(0x7f0000000240)={0x1f, 0xc, 0x715, 0x8000000000000000, 0x0, 0x80000000000000, 0x800, 0xffffffffffffffff}, 0x0, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x400, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0xe}, 0x1c) 1.656293134s ago: executing program 4 (id=24): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100)={0x1f, 0xffff}, 0x6) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCFLSH(r1, 0x400455c8, 0x0) 972.432884ms ago: executing program 0 (id=34): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000440)=[{0x1, 0x2, 0x3, 0xc}, {0x5, 0x5, 0xf, 0x1}], 0x10, 0xe}, 0x94) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000440)=[{0x20, 0x2, 0x81, 0xfffff034}, {0x20, 0x0, 0x5, 0xfffff010}, {0x6, 0x0, 0x5}]}, 0x10) r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregset(0x4205, r0, 0x1, &(0x7f0000000100)={&(0x7f0000000040)="dcef58b7f29c1f7c93d183044aedba283413e674c7719c33a4b17f028f68610a6c55bb2bf8282853f3e16f8394a8676ff55a3507e2ad50248c6130863b0f7433c7fbc9b978a39eae88bffd05d139cedbee444f7c98e1f92b0f64462b4b470bedced2125e0b1f38fbaa348c6d75aa1a4011e9cdae15ecb9309b0101edbf6dd6d111d6132f1821a4e4cbec8438c571a70e7ca7b0451a6cc55c", 0x98}) ptrace$setregset(0x4205, r0, 0x200, &(0x7f00000001c0)={&(0x7f0000000440)="c94522e546f93f6dedf11f1509685636", 0x60}) 945.107076ms ago: executing program 0 (id=35): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = syz_io_uring_setup(0x22f, &(0x7f0000000080)={0x0, 0xab11, 0x10000, 0x1, 0x100002cf}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000009c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xffffffffffffff31}) io_uring_enter(r1, 0x7a98, 0x0, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x4, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10000007}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002280)={r4, 0x0, 0xe, 0x0, &(0x7f00000008c0)="e02742e8680d85ff9782762f86dd", 0x0, 0x57af, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 914.660417ms ago: executing program 0 (id=36): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], 0x0, 0x119f, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="ffd2"], 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r1, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=[0x0], 0x0, 0x0, 0x1, 0x1}}, 0x40) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x20, 0x10012, r0, 0x0) 862.24377ms ago: executing program 3 (id=39): r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x0, 0x3}, {0x10040002, 0x0, 0x7, 0x5}], 0x10, 0x80}, 0x94) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000008c0)=r3, 0x4) 856.490761ms ago: executing program 0 (id=40): r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x3, @local}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0x2300, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000040)=0x1) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) 832.154562ms ago: executing program 3 (id=41): memfd_secret(0x80000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) setresuid(0x0, 0xee00, 0x0) setrlimit(0x40000000000008, &(0x7f0000000000)) mlockall(0x1) 817.677333ms ago: executing program 0 (id=42): r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) close(r0) socket$tipc(0x1e, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000500)='GPL\x00', 0x2, 0x0, 0x0, 0xe0e4f3ee43f6dc44, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000480), 0x84, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 786.156905ms ago: executing program 0 (id=44): syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000001440), 0x2, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r1) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000d80)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010426bd7000f8dbdf250200000008000100", @ANYRES32=r3], 0x1c}}, 0x4008054) 683.50267ms ago: executing program 2 (id=47): r0 = socket$nl_route(0x10, 0x3, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) truncate(&(0x7f0000000180)='./file0\x00', 0x8fff5) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r1, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x1], 0x0, 0x0, 0x20000000000000b2, 0x1}}, 0x40) close_range(r0, 0xffffffffffffffff, 0x0) 606.274855ms ago: executing program 2 (id=48): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x5, 0x20005, 0xb, 0x0, 0x0, 0x0, 0xcd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = add_key$fscrypt_v1(&(0x7f0000002a00), &(0x7f0000000500)={'fscrypt:', @desc2}, &(0x7f0000000580)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa00", 0x29}, 0x48, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) r2 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000380)={'fscrypt:', @desc2}, &(0x7f0000000300)={0x0, "6075ae1e1ee721441705322225930e6c1e3e1000000000000000d7cf6e021a805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138", 0x25}, 0x88, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x4, r2, r1, r1, 0x0) keyctl$KEYCTL_MOVE(0x4, r0, r0, 0x0, 0x0) 471.561192ms ago: executing program 1 (id=50): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xa, 0xb, 0x42, 0x3e, 0x42}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000280)}, 0x20) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0e00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000c00100000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/13], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f00000001c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x42f, &(0x7f00000014c0)=""/4101, 0x41000, 0xc}, 0x94) 445.220294ms ago: executing program 2 (id=51): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x4, 0x6, 0xbaa}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r2}, 0x38) 433.834005ms ago: executing program 1 (id=52): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000380), 0x1000a) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r0, 0x0) setresuid(0x0, 0xee01, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xc, &(0x7f0000000000)=0x1, 0x4) 381.855108ms ago: executing program 1 (id=53): r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000140)=@name={0x1e, 0x2, 0x0, {{0x42}}}, 0x10) bind$tipc(r0, &(0x7f00000001c0)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x2, 0x10000000}}, 0x10) bind$tipc(r0, &(0x7f0000000240)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) bind$tipc(r0, &(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x2}, 0x2}}, 0x10) sendmsg$tipc(r0, &(0x7f0000002340)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x4, 0x4}}, 0x10, 0x0}, 0x0) 322.111101ms ago: executing program 1 (id=54): r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_elf32(r0, &(0x7f00000008c0)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x7, 0x0, 0x3, 0x7, 0x2, 0x3, 0x3, 0x309, 0x38, 0xfffffffc, 0xe, 0x0, 0x20, 0x1, 0x5}, [{0x3, 0x8, 0xf3, 0x7f, 0x4, 0x200004, 0xc, 0x400}]}, 0x58) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4200004b) close(r0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) 288.357683ms ago: executing program 2 (id=55): r0 = syz_io_uring_setup(0x810, &(0x7f0000000600)={0x0, 0x6a1c, 0x80, 0x0, 0x12c}, &(0x7f0000000100)=0x0, &(0x7f00000003c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffff8, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x2f, 0x24, 0x8, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0xda1a0b6210925d15, 0x0, @fd=r0, 0x0, 0x0, 0x1, 0x1}) io_uring_enter(r0, 0x22d0, 0x20, 0x0, 0x0, 0x0) 265.254735ms ago: executing program 1 (id=56): getgroups(0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file2\x00', 0x808800, &(0x7f0000000180)={[{@usrquota}, {@init_itable}, {@data_err_ignore}, {@nojournal_checksum}, {@data_err_ignore}, {@resuid}]}, 0x1, 0x4cd, &(0x7f0000000280)="$eJzs3M9vFGUfAPDvbHdpgZfXioiCKAU0Nia2UFA4eMHExIMmRjzIsWkrQRYwtAchREpi8Ezi3Xg03jTxqkfjyT8ADx5MDAkxXABPa2Z3pt3ur+7CtqXs55Ns+zwzz8zzPDPzzD77PDsbwMAaS/8kEf+LiFsR8VQtujLBWO3f/btXZx7cvToTi5XKqX+Sarp7aTyTb7c9i4wXIgpfJg07rJm/fOXcdLk8dymLTy6c/2xy/vKV18+enz4zd2buwtSJE8eOHjn+5tQbvVeqRX5pve7t/eLivj3vnr75/kwxXz6S/a+vR1vF3oox1mHdK73t6rG3oy6cNB+na+taGLo2kl3WpbT9Xy0fPL3RBQLWTaVSqQy3X71YaXS9aQmwaSWx0SUANkb+Rp9+/s1f69T1eCzcOVn7AJTW+372qq0pRiFLU2r4fNtPYxHx8eK/36Sv6DQO8ecaFQAAGDi/nMx7go39v0Lsrkv3/2wOZTQino6InRHxTETsiohnI6ppn4uI5xszSCIqHfLf1RBfzv/HbBahcPuRK9lB2v97K5vbWtn/y3t/MTqUxXZE5B3mucPZMRmP0vAnZ8tzR9rsf8sq+df3/9JXmn/eF8zKcbvYMEA3O70w/XC1bXbnesTeYmP9k2J64vJpnCQi9kTE3h72O1oXPvvad/uWIqWV6Vavf1WlxZRez/NxrVS+jXi1dv4XY8X5X84x6Tw/OTkS5bnDk+lVcLhlHr/9fuODdvmvWv+f/mrc5J3jP5961GovSc//trrrP/L52+X6jyYRydJ87XxEZai3PG788VV1v2OHmtc97PW/JfmoGs7b1+fTCwuXjkRsSd5rXj61vG0ez9On9R8/1Lr978y2SY/ECxGRXsQvRsRLEbE/K/uBiDgYES2qtuTXt1/+tN26Lq//NZPWf7bl/W/F+V+er+8ykG+cLhk6d+DWgzY3j+7O/7FqaDxb0vr+l6y4RXRb0kc7egAAALA5FKL63f/CxFK4UJiYqI0B7YpthfLF+YX9EXFhtvaMwGiUCvlIV208uJTk45+jdfGphvjRbNz466Gt1fjEzMXy7EZXHgbc9mqbT5raf+rvHsd5gU2oD/NowCa1WvvffXOdCgKsO+//MLjq2v9imySLvikDTybv/zC4WrX/a/F9x2cX3DNg86toyzDQtH8YXMX4cClcfey55dO2wJPI+z8MpF6f6+8tUBluvWokWvxiwMjaFGNri7w2JJD2rPq4w1JEdJd468NkkXcB2//CQ6G3HQ5H86qh6LRV0sPvOOSB9KismvjM7r5f/PlvovT7svlhuZ2WujzdfQpsyO0IAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg7/4LAAD///QJ1ng=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x82044, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r1, &(0x7f0000004200)='t', 0x1) sendfile(r1, r0, 0x0, 0x3ffff) 147.263152ms ago: executing program 2 (id=57): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x14, 0x4, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x80000004, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r0, &(0x7f0000000280), &(0x7f0000000a80)=@udp6=r1}, 0x20) close_range(r1, 0xffffffffffffffff, 0x0) 100.438184ms ago: executing program 2 (id=58): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000100)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@abort}, {@resgid}, {@bh}, {@nouid32}]}, 0x1, 0x553, &(0x7f0000001080)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x0) pwritev2(r0, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5412, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105842, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000200)={0xc4b, 0x800, 0xfffffff9, 0x1, 0x9}) writev(r1, &(0x7f0000000a40)=[{0x0}, {&(0x7f0000000e00)='t', 0x2fd200}, {0x0, 0x2200}, {&(0x7f0000001000)="d6", 0x20c00}], 0x21) 0s ago: executing program 1 (id=59): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000000, 0x2}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1ff, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) kernel console output (not intermixed with test programs): [ 21.896841][ T29] audit: type=1400 audit(1769598883.490:62): avc: denied { search } for pid=3194 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 21.918831][ T29] audit: type=1400 audit(1769598883.490:63): avc: denied { search } for pid=3194 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=477 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 21.941394][ T29] audit: type=1400 audit(1769598883.490:64): avc: denied { search } for pid=3194 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=481 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 21.964321][ T29] audit: type=1400 audit(1769598883.490:65): avc: denied { search } for pid=3194 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 21.987411][ T29] audit: type=1400 audit(1769598883.490:66): avc: denied { read open } for pid=3195 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.0.244' (ED25519) to the list of known hosts. [ 28.507428][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 28.507445][ T29] audit: type=1400 audit(1769598890.100:70): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.536656][ T29] audit: type=1400 audit(1769598890.130:71): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.538922][ T3299] cgroup: Unknown subsys name 'net' [ 28.564634][ T29] audit: type=1400 audit(1769598890.160:72): avc: denied { unmount } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.664196][ T3299] cgroup: Unknown subsys name 'cpuset' [ 28.670448][ T3299] cgroup: Unknown subsys name 'rlimit' [ 28.802053][ T29] audit: type=1400 audit(1769598890.390:73): avc: denied { setattr } for pid=3299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.825394][ T29] audit: type=1400 audit(1769598890.390:74): avc: denied { create } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.845963][ T29] audit: type=1400 audit(1769598890.390:75): avc: denied { write } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.866398][ T29] audit: type=1400 audit(1769598890.390:76): avc: denied { read } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.886708][ T29] audit: type=1400 audit(1769598890.390:77): avc: denied { read } for pid=3040 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 28.910894][ T3305] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.912571][ T29] audit: type=1400 audit(1769598890.420:78): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 28.944363][ T29] audit: type=1400 audit(1769598890.420:79): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 28.992155][ T3299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 30.757960][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 30.783467][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 30.852747][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 30.909053][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.916193][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.923834][ T3314] bridge_slave_0: entered allmulticast mode [ 30.930348][ T3314] bridge_slave_0: entered promiscuous mode [ 30.939413][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.946547][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.953875][ T3314] bridge_slave_1: entered allmulticast mode [ 30.960584][ T3314] bridge_slave_1: entered promiscuous mode [ 30.967114][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.974337][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.983436][ T3315] bridge_slave_0: entered allmulticast mode [ 30.990140][ T3315] bridge_slave_0: entered promiscuous mode [ 30.999011][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.006132][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.013397][ T3315] bridge_slave_1: entered allmulticast mode [ 31.020171][ T3315] bridge_slave_1: entered promiscuous mode [ 31.049327][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.061708][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.086259][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 31.104019][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 31.112965][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.120208][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.127363][ T3312] bridge_slave_0: entered allmulticast mode [ 31.133986][ T3312] bridge_slave_0: entered promiscuous mode [ 31.141801][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.152405][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.176722][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.183880][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.191363][ T3312] bridge_slave_1: entered allmulticast mode [ 31.198050][ T3312] bridge_slave_1: entered promiscuous mode [ 31.216026][ T3314] team0: Port device team_slave_0 added [ 31.245581][ T3314] team0: Port device team_slave_1 added [ 31.252668][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.267391][ T3315] team0: Port device team_slave_0 added [ 31.284904][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.299161][ T3315] team0: Port device team_slave_1 added [ 31.305204][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.312172][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.338202][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.370091][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.377098][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.403025][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.421716][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.428855][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.436160][ T3319] bridge_slave_0: entered allmulticast mode [ 31.442492][ T3319] bridge_slave_0: entered promiscuous mode [ 31.461116][ T3312] team0: Port device team_slave_0 added [ 31.471489][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.478612][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.486196][ T3319] bridge_slave_1: entered allmulticast mode [ 31.492784][ T3319] bridge_slave_1: entered promiscuous mode [ 31.499616][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.506650][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.532593][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.544348][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.551423][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.558715][ T3313] bridge_slave_0: entered allmulticast mode [ 31.565128][ T3313] bridge_slave_0: entered promiscuous mode [ 31.572269][ T3312] team0: Port device team_slave_1 added [ 31.577992][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.585079][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.592415][ T3313] bridge_slave_1: entered allmulticast mode [ 31.599057][ T3313] bridge_slave_1: entered promiscuous mode [ 31.615201][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.622170][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.648096][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.687988][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.698365][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.714736][ T3314] hsr_slave_0: entered promiscuous mode [ 31.720973][ T3314] hsr_slave_1: entered promiscuous mode [ 31.727886][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.752240][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.759269][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.785205][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.803692][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.837553][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.844597][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.870582][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.883812][ T3315] hsr_slave_0: entered promiscuous mode [ 31.889830][ T3315] hsr_slave_1: entered promiscuous mode [ 31.895796][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 31.901536][ T3315] Cannot create hsr debugfs directory [ 31.913686][ T3319] team0: Port device team_slave_0 added [ 31.920216][ T3313] team0: Port device team_slave_0 added [ 31.942078][ T3319] team0: Port device team_slave_1 added [ 31.954424][ T3313] team0: Port device team_slave_1 added [ 31.998297][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.005318][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.031421][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.045330][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.052360][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.078369][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.099169][ T3312] hsr_slave_0: entered promiscuous mode [ 32.105164][ T3312] hsr_slave_1: entered promiscuous mode [ 32.111058][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 32.116852][ T3312] Cannot create hsr debugfs directory [ 32.122672][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.129773][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.155821][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.172198][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.179185][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.205183][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.269700][ T3319] hsr_slave_0: entered promiscuous mode [ 32.275861][ T3319] hsr_slave_1: entered promiscuous mode [ 32.281821][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 32.287597][ T3319] Cannot create hsr debugfs directory [ 32.311052][ T3313] hsr_slave_0: entered promiscuous mode [ 32.317256][ T3313] hsr_slave_1: entered promiscuous mode [ 32.323219][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 32.329170][ T3313] Cannot create hsr debugfs directory [ 32.403294][ T3315] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 32.411848][ T3315] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 32.443632][ T3315] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 32.462392][ T3315] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 32.508758][ T3314] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 32.518193][ T3314] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 32.527157][ T3314] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 32.538244][ T3314] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 32.568675][ T3313] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 32.580761][ T3313] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 32.593281][ T3313] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 32.602133][ T3313] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 32.651121][ T3319] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 32.659980][ T3319] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 32.673964][ T3319] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 32.682817][ T3319] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 32.708322][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.730987][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.739658][ T3312] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 32.758958][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.768101][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.775559][ T3312] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 32.788235][ T3312] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 32.797464][ T3312] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 32.812045][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.819257][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.828207][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.835363][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.856984][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.864152][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.873071][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.880134][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.895816][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.921646][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.944977][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.952231][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.972033][ T3315] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 32.982587][ T3315] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.995833][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.002929][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.028757][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.052892][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.067936][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.086163][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.093413][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.117834][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.125062][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.153935][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.189522][ T380] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.196799][ T380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.208940][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.225027][ T380] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.232090][ T380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.265817][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.277774][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.398114][ T3315] veth0_vlan: entered promiscuous mode [ 33.427918][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.438991][ T3315] veth1_vlan: entered promiscuous mode [ 33.452832][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.469895][ T3314] veth0_vlan: entered promiscuous mode [ 33.489185][ T3315] veth0_macvtap: entered promiscuous mode [ 33.500300][ T3315] veth1_macvtap: entered promiscuous mode [ 33.530255][ T3314] veth1_vlan: entered promiscuous mode [ 33.539764][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.561845][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.598008][ T12] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.608890][ T3313] veth0_vlan: entered promiscuous mode [ 33.618837][ T12] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.629749][ T3314] veth0_macvtap: entered promiscuous mode [ 33.644493][ T3313] veth1_vlan: entered promiscuous mode [ 33.656096][ T3314] veth1_macvtap: entered promiscuous mode [ 33.662991][ T12] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.687416][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 33.687436][ T29] audit: type=1400 audit(1769598895.280:90): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/root/syzkaller.WFQx9Q/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 33.714221][ T12] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.733572][ T29] audit: type=1400 audit(1769598895.320:91): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 33.749049][ T3313] veth0_macvtap: entered promiscuous mode [ 33.765272][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.779238][ T3312] veth0_vlan: entered promiscuous mode [ 33.779645][ T29] audit: type=1400 audit(1769598895.350:92): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/root/syzkaller.WFQx9Q/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 33.810155][ T29] audit: type=1400 audit(1769598895.350:93): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 33.810373][ T3319] veth0_vlan: entered promiscuous mode [ 33.831977][ T29] audit: type=1400 audit(1769598895.350:94): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/root/syzkaller.WFQx9Q/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 33.845468][ T3313] veth1_macvtap: entered promiscuous mode [ 33.864089][ T29] audit: type=1400 audit(1769598895.350:95): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/root/syzkaller.WFQx9Q/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 33.879845][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.897226][ T29] audit: type=1400 audit(1769598895.360:96): avc: denied { unmount } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 33.923869][ T29] audit: type=1400 audit(1769598895.360:97): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 33.946638][ T29] audit: type=1400 audit(1769598895.360:98): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="gadgetfs" ino=3860 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 33.971793][ T3315] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 33.998962][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.020762][ T3312] veth1_vlan: entered promiscuous mode [ 34.023106][ T29] audit: type=1400 audit(1769598895.600:99): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 34.031350][ T3319] veth1_vlan: entered promiscuous mode [ 34.067488][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.094491][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.103790][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.131453][ T3312] veth0_macvtap: entered promiscuous mode [ 34.141792][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.150366][ T3312] veth1_macvtap: entered promiscuous mode [ 34.162019][ T3319] veth0_macvtap: entered promiscuous mode [ 34.172460][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.185103][ T3319] veth1_macvtap: entered promiscuous mode [ 34.186229][ T3488] netlink: 'syz.2.6': attribute type 4 has an invalid length. [ 34.209973][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.229918][ T12] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.255344][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.269637][ T12] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.281073][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.307090][ T12] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.343510][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.365331][ T12] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.405437][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.434748][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.456255][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.475556][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.508309][ T12] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.558961][ T12] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.618509][ T12] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.646977][ T12] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.941215][ T3523] syz.2.16 uses obsolete (PF_INET,SOCK_PACKET) [ 35.207964][ T3545] loop1: detected capacity change from 0 to 2048 [ 35.227567][ T3545] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.239966][ T3545] ext4 filesystem being mounted at /5/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 35.263551][ T3314] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.476635][ T3557] loop0: detected capacity change from 0 to 512 [ 35.496773][ T3557] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.509695][ T3557] ext4 filesystem being mounted at /2/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 35.535533][ T3312] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.026104][ T3423] kernel write not supported for file bpf-prog (pid: 3423 comm: kworker/0:5) [ 36.097505][ T3597] Zero length message leads to an empty skb [ 36.427326][ C1] hrtimer: interrupt took 56981 ns [ 36.528697][ T3616] process 'syz.1.54' launched './file0' with NULL argv: empty string added [ 36.585113][ T3620] loop1: detected capacity change from 0 to 512 [ 36.599308][ T3620] EXT4-fs error (device loop1): ext4_orphan_get:1391: inode #15: comm syz.1.56: iget: bad i_size value: 38620345925642 [ 36.622088][ T3620] EXT4-fs error (device loop1): ext4_orphan_get:1396: comm syz.1.56: couldn't read orphan inode 15 (err -117) [ 36.636106][ T3620] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.697508][ T3620] EXT4-fs error (device loop1): ext4_validate_block_bitmap:432: comm syz.1.56: bg 0: block 5: invalid block bitmap [ 36.710967][ T3620] EXT4-fs (loop1): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 36.723244][ T3620] EXT4-fs (loop1): This should not happen!! Data will be lost [ 36.723244][ T3620] [ 36.733037][ T3620] EXT4-fs (loop1): Total free blocks count 0 [ 36.739166][ T3620] EXT4-fs (loop1): Free/Dirty block details [ 36.745126][ T3620] EXT4-fs (loop1): free_blocks=0 [ 36.750093][ T3620] EXT4-fs (loop1): dirty_blocks=1 [ 36.755208][ T3620] EXT4-fs (loop1): Block reservation details [ 36.761238][ T3620] EXT4-fs (loop1): i_reserved_data_blocks=1 [ 36.767758][ T3625] loop2: detected capacity change from 0 to 1024 [ 36.775126][ T3625] ======================================================= [ 36.775126][ T3625] WARNING: The mand mount option has been deprecated and [ 36.775126][ T3625] and is ignored by this kernel. Remove the mand [ 36.775126][ T3625] option from the mount to silence this warning. [ 36.775126][ T3625] ======================================================= [ 36.806874][ T3620] syz.1.56 (3620) used greatest stack depth: 9568 bytes left [ 36.827792][ T3625] EXT4-fs: Ignoring removed bh option [ 36.834979][ T3314] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.856844][ T3625] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.893170][ T2964] ================================================================== [ 36.901319][ T2964] BUG: KCSAN: data-race in kick_pool / wq_worker_running [ 36.908353][ T2964] [ 36.910687][ T2964] read-write to 0xffff888237c2a524 of 4 bytes by task 10 on cpu 0: [ 36.918572][ T2964] wq_worker_running+0x95/0x120 [ 36.923426][ T2964] schedule_timeout+0xca/0x180 [ 36.928194][ T2964] msleep+0x4f/0x90 [ 36.932007][ T2964] nsim_fib_event+0x491d/0x4d70 [ 36.936866][ T2964] nsim_fib_event_work+0x13d/0x210 [ 36.941988][ T2964] process_scheduled_works+0x4cd/0x9d0 [ 36.947446][ T2964] worker_thread+0x6bc/0x8b0 [ 36.952036][ T2964] kthread+0x488/0x510 [ 36.956126][ T2964] ret_from_fork+0x148/0x280 [ 36.960724][ T2964] ret_from_fork_asm+0x1a/0x30 [ 36.965507][ T2964] [ 36.967824][ T2964] read to 0xffff888237c2a524 of 4 bytes by task 2964 on cpu 1: [ 36.975363][ T2964] kick_pool+0x49/0x2d0 [ 36.979535][ T2964] __queue_work+0x896/0xad0 [ 36.984125][ T2964] queue_work_on+0xa9/0x140 [ 36.988634][ T2964] process_srcu+0xa56/0xdc0 [ 36.993136][ T2964] process_scheduled_works+0x4cd/0x9d0 [ 36.998597][ T2964] worker_thread+0x6bc/0x8b0 [ 37.003190][ T2964] kthread+0x488/0x510 [ 37.007277][ T2964] ret_from_fork+0x148/0x280 [ 37.011871][ T2964] ret_from_fork_asm+0x1a/0x30 [ 37.016647][ T2964] [ 37.018972][ T2964] value changed: 0x00000000 -> 0x00000001 [ 37.024680][ T2964] [ 37.026996][ T2964] Reported by Kernel Concurrency Sanitizer on: [ 37.033150][ T2964] CPU: 1 UID: 0 PID: 2964 Comm: kworker/1:2 Not tainted syzkaller #0 PREEMPT(voluntary) [ 37.042964][ T2964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 37.053026][ T2964] Workqueue: rcu_gp process_srcu [ 37.057972][ T2964] ================================================================== [ 37.120796][ T3315] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.253103][ T3543] Bluetooth: hci0: command 0x1003 tx timeout [ 37.253232][ T3506] Bluetooth: hci0: Opcode 0x1003 failed: -110