last executing test programs: 56.440981879s ago: executing program 3 (id=2170): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x42, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='dlm_recv\x00', r1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000340012800e00010069703665727370616e0000002000028006000200300000001400060000000000000000000000ffff7f00000108000a00", @ANYRESOCT], 0x5c}}, 0x0) 56.350777318s ago: executing program 3 (id=2174): write$binfmt_aout(0xffffffffffffffff, 0x0, 0xc8) open_tree(0xffffffffffffff9c, 0x0, 0x89901) getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='kfree\x00', r0}, 0x18) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000400), 0x101201, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000600)=0x14) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000080)=0x14) socket$netlink(0x10, 0x3, 0x10) mount$tmpfs(0x0, &(0x7f0000000140)='.\x00', &(0x7f0000000180), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='size=M']) 56.087651765s ago: executing program 3 (id=2178): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) 56.083492435s ago: executing program 3 (id=2184): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f00000000c0)=0x8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x7, &(0x7f0000000680)=ANY=[], 0x0, 0x7}, 0x94) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) r1 = socket$inet6(0xa, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000180)='./file1\x00', 0x1218088, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x4a, 0x2d1, &(0x7f0000000c80)="$eJzs3U9rI2UcB/DfpOlk1ENy8CTCDrgHT4vdm3hJkV0Qe3LJYfWgxd0FaYKwCwX/YNyTVy8ePPgKBMGL72IvvgPBq+DNFRZGZjLTTGraJtpUbD+fS3995vnO8zzp0zQ55OkHL08O7uXx4PHnv0SWJdEZxjCeJjGITjS+jAXDrwMA+D97WhTxezGzTi6JiGxz0wIANmi1v//defnjhUwLANigO3fffXt3b+/WO1lkcXvy1eGofGdffp1d330QH8U47sdr0Y9nEdXrhPqNf1nfLopi2s1Lg7g+mR6OyuTk/Sf1/Xd/i6jyO9GPwVGserVR5d/au7VTxfNeKz8t5/F8Pf6wzN+Mfrx4FF7I35zl83Y+Rmm8+kpr/jeiHz9/GB/HOO5Vk5jnv9jJ8zeLb/747L1yemU+mR6OelW/uWLrIn8uAAAAAAAAAAAAAAAAAAAAAABcbjfy5vCd/Fpcn5RN9fk7W8/Suk/dZTBPlddnVdI0tc4HKk2L+G52pOD2wnjz83268VK3fbAgAAAAAAAAAAAAAAAAAAAAXF2PPvn0YH88vv/wXIrmNIBuRPx5J+Kf3mfYarkWp3fu1WPuj8edulzo8yRtt8RW0yeJOHUa5SLO6WE5q3guOzbnpvj+h3KB69wwa7W8vnyB22et627v3+6NZncd7CfLx+pF05LVm+TbNGLeJ40Vx0pPulREe/udteR06aX+2mtPX6iK6Yl9imTJFm0Vb/w6u163JHHslyitHtWlo2/XRSt+bG+stJ8jm8X//lyRVKd19DbxNAQAAAAAAAAAAAAAAAAAACx8xrv87qfFi49PjXYKHwUGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4JKY////NYppHV6hcxoPH/3HSwQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOAK+CsAAP//cutM2w==") chroot(&(0x7f0000000100)='./file1\x00') process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getpgid(r2) kcmp(r3, r2, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000300)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x1}, 0x4, 0x676c, 0xff, 0x0, 0x0, r2, 0x400}) mount$9p_unix(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0), 0x2000, &(0x7f0000000480)=ANY=[@ANYBLOB="7472616e733d756e69782c63616368653d7265616461686561642c646f6e745f686173682c61707072616973652c6d61736b3d4d41595f415050454e442c666f776e65723da85e4fa658d3ed88e7215ee78f8da946c655ef70354e48bade7823ed83f88a4551161f84fbfad7bf83d1f8dbfcfc6829433db8ccefebe5ca67b5df0351c49ef91b7643b121850e164bff20bf05e9251bbe4baf71be22b6af5ec49d445ca0e8a57025beecf3852d998866fa", @ANYRESDEC=0x0, @ANYBLOB=',subj_type=\\,dont_hash,\x00']) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000280)='./bus\x00', 0x3c9c9b, 0x0, 0x0, 0x0, &(0x7f00000000c0)) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="14"], &(0x7f0000000000), 0x0) mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x21, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x0) syz_io_uring_setup(0x3b, &(0x7f0000000180)={0x0, 0x0, 0x10100}, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x7, 0x4) r4 = dup(r1) bind$unix(r4, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) r5 = io_uring_setup(0x174, &(0x7f0000000180)={0x0, 0x18c1, 0x100, 0x0, 0x37e}) fgetxattr(r5, &(0x7f0000000040)=@known='com.apple.FinderInfo\x00', &(0x7f0000000200)=""/178, 0xb2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8924, &(0x7f0000000080)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000049c0)={0x3, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000300000000000000ff05000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 55.899419323s ago: executing program 3 (id=2188): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x2008c014) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="240000001b1401002abdd444d446df25080001000000000009"], 0x24}, 0x1, 0x0, 0x0, 0x4000801}, 0x40810) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095", @ANYRESDEC=r3], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, 0x0, 0x40000) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c000000100003052dbd70000007000000000000", @ANYRES32=0x0, @ANYBLOB="00000000001000001400128009000100626f6e64000000000400028008000a00", @ANYRES32=r6, @ANYBLOB="8742af2cccec5477b4ff1cb4a3bc0cc4b786a07577a258389b59c49f60cf7c980aa1cd8590bb28557642e90f97a4ae84eedec696aa6e2f83"], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0xc0b0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0xffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x20000004) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r8, @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c000380140001"], 0x110}}, 0x0) r10 = socket(0x10, 0x803, 0x8) sendmsg$IPVS_CMD_SET_INFO(r10, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x2d}, 0x1, 0x0, 0x0, 0x8801}, 0x8000) r11 = socket(0x10, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r12 = syz_open_dev$evdev(&(0x7f0000000180), 0x1, 0x1a1502) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000840)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRESOCT=r12, @ANYRESOCT=r4, @ANYRES32=r6, @ANYRES16=r4, @ANYRESDEC=r9, @ANYBLOB="08ed02ff0100000014000200"/28, @ANYRESDEC=r12, @ANYRESDEC=0x0, @ANYRES16=r0], 0x60}, 0x1, 0x0, 0x0, 0x880}, 0x4080) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000000c0)={'macvlan1\x00'}) 55.751323508s ago: executing program 3 (id=2191): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) prlimit64(0x0, 0xa, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000180)=0x7) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x4b301, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x3a) syz_clone(0x64087000, 0x0, 0xffffff59, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0xfffffffffffffdd0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd2e}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r4}, 0x10) r5 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'team0\x00'}) sendmsg$nl_route_sched(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000780)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x44080) ioctl$PIO_UNIMAPCLR(r0, 0x560c, 0x0) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x202000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r7, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 55.750305028s ago: executing program 32 (id=2191): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) prlimit64(0x0, 0xa, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000180)=0x7) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x4b301, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x3a) syz_clone(0x64087000, 0x0, 0xffffff59, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0xfffffffffffffdd0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd2e}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r4}, 0x10) r5 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'team0\x00'}) sendmsg$nl_route_sched(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000780)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x44080) ioctl$PIO_UNIMAPCLR(r0, 0x560c, 0x0) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x202000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r7, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 5.155048794s ago: executing program 1 (id=3051): write$binfmt_aout(0xffffffffffffffff, 0x0, 0xc8) open_tree(0xffffffffffffff9c, 0x0, 0x89901) getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000600)=0x14) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)=0x14) r0 = socket$netlink(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) close(0xffffffffffffffff) 4.455039413s ago: executing program 1 (id=3058): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x2008c014) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="240000001b1401002abdd444d446df25080001000000000009"], 0x24}, 0x1, 0x0, 0x0, 0x4000801}, 0x40810) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095", @ANYRESDEC=r3], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c0000001000850600000000ff6122314a000800", @ANYRES32=r6, @ANYBLOB="f5ff0f00252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x40000) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0xc0b0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0xffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x20000004) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r8, @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c000380140001"], 0x110}}, 0x0) r10 = socket(0x10, 0x803, 0x8) sendmsg$IPVS_CMD_SET_INFO(r10, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x2d}, 0x1, 0x0, 0x0, 0x8801}, 0x8000) r11 = socket(0x10, 0x803, 0x0) r12 = syz_open_dev$evdev(&(0x7f0000000180), 0x1, 0x1a1502) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000840)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRESOCT=r12, @ANYRESOCT=r4, @ANYRES32=r6, @ANYRES16=r4, @ANYRESDEC=r9, @ANYBLOB="08ed02ff0100000014000200"/28, @ANYRESDEC=r12, @ANYRESDEC=0x0, @ANYRES16=r0], 0x60}, 0x1, 0x0, 0x0, 0x880}, 0x4080) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000000c0)={'macvlan1\x00'}) 4.17800628s ago: executing program 1 (id=3061): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xff, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = epoll_create1(0x80000) epoll_pwait(r2, &(0x7f0000000280)=[{}], 0x1, 0x7, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xf, &(0x7f0000000340)=@ringbuf={{}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff59) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r3}, 0x10) time(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000001d711877000000000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) syz_usb_disconnect(r4) syz_usb_control_io(0xffffffffffffffff, &(0x7f00000005c0)={0x2c, &(0x7f0000000280)={0x0, 0x24, 0x4d, {0x4d, 0x5, "d52efec1a14a04299bfe7ece7fffb41c35a4d14d91b34fe14cc9f3a20c834fc93b6c317ae58582434d0deadf9590a1a0a70934e033476e8808b331e72ffe3fafb1c07e8ffd6b5a2ffac91b"}}, &(0x7f0000000300)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x2423ab9729dc9ca0}}, &(0x7f0000000f40)={0x0, 0xf, 0x106, {0x5, 0xf, 0x106, 0x5, [@wireless={0xb, 0x10, 0x1, 0x8, 0x18, 0x5, 0xf8, 0x4, 0x2}, @wireless={0xb, 0x10, 0x1, 0x4, 0x8, 0x4, 0xf2, 0x0, 0xd3}, @generic={0x66, 0x10, 0x1, "e18ffde76bff019a1e0f24a8aebd4e1494980854d240c77838c0078e85203e02c41061e493d00bab8ec8851738f554c309c463ae2d04dd72147f80f673eeade9a0f261a506e1f38abb10269fc20a1dc1a7ed524852283519dfa9fd59db30980260b9b8"}, @ss_container_id={0x14, 0x10, 0x4, 0x53, "ab61fbecf393e3ed47d89ad4a34aa324"}, @generic={0x71, 0x10, 0x4, "2d5dd3e3d894eda40fddad84982280ac56f70de694c9d3358bbbd66a1eadce9eafc8f74f74e062fa098b7e0898b547d89af4e8a1acba763842ea4f82fa4d243b027dd9bdf645a4875914267f60781cada3e9887d57cac25df9e100c7eeaa211f728597ada10fc4bc6e32346bf54e"}]}}, &(0x7f0000000400)={0x20, 0x29, 0xf, {0xf, 0x29, 0x5, 0x8, 0x0, 0x1, '\x00', "981b2a66"}}, &(0x7f0000000580)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x1, 0x4, 0x30, 0xb, 0x6, 0x8, 0x1}}}, &(0x7f0000000bc0)={0x84, &(0x7f0000000680)={0x0, 0x9, 0x46, "7de7aaa7ee222c5b6d420b6254766b33a2879e2a444b4b43ad79b3d992961aacc3da288fae9b0b4b53c24ce6248e1c9f1a9f85067823b94853e914497b070dc7f362ae07200d"}, &(0x7f0000000600)={0x0, 0xa, 0x1, 0xfb}, &(0x7f0000000700)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000740)={0x20, 0x0, 0x4, {0x2, 0x3}}, &(0x7f0000000780)={0x20, 0x0, 0x8, {0x800, 0x8, [0xee0f]}}, &(0x7f00000007c0)={0x40, 0x7, 0x2, 0xb}, &(0x7f0000000800)={0x40, 0x9, 0x1, 0x8}, &(0x7f0000000840)={0x40, 0xb, 0x2, "6ffe"}, &(0x7f0000000880)={0x40, 0xf, 0x2, 0x7}, &(0x7f00000008c0)={0x40, 0x13, 0x6, @remote}, &(0x7f0000000900)={0x40, 0x17, 0x6, @multicast}, &(0x7f0000000940)={0x40, 0x19, 0x2, "c097"}, &(0x7f0000000980)={0x40, 0x1a, 0x2, 0x2}, &(0x7f0000000a40)={0x40, 0x1c, 0x1, 0xb}, &(0x7f0000000a80)={0x40, 0x1e, 0x1, 0x81}, &(0x7f0000000ac0)={0x40, 0x21, 0x1, 0x81}}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) r6 = syz_open_dev$usbfs(&(0x7f0000000080), 0x77, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r6, 0xc0105500, &(0x7f0000000000)=ANY=[@ANYBLOB="a1"]) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r6}, './file0\x00'}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r7, 0x0, 0xd, &(0x7f0000000200)="de", 0x1) r8 = syz_open_dev$usbfs(&(0x7f0000000080), 0x76, 0x101301) ioctl$USBDEVFS_CLAIM_PORT(r8, 0x80045519, &(0x7f0000000480)=0x1) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000000)='%', 0x1) getsockopt$inet_opts(r7, 0x0, 0x9, &(0x7f0000005bc0)=""/23, &(0x7f0000005b80)=0x17) 3.308465926s ago: executing program 1 (id=3070): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) write$selinux_validatetrans(r0, 0x0, 0x79) 3.251954031s ago: executing program 1 (id=3072): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file2\x00', 0x8, &(0x7f0000000080)={[{@nodioread_nolock}, {@sb={'sb', 0x3d, 0x1}}]}, 0x4, 0x523, &(0x7f00000018c0)="$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") r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000a0db00000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='netlink_extack\x00', r1}, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000a40)="d8000000180081064e81f782db4cb904021d0800fd007c05e8fe55a10a0005000000000000000e41b0000900ac00060311000000040005000a0012060048035c3b61c102000000007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5e", 0x63}], 0x1}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r4, 0x0, 0xf7}, 0x18) fcntl$dupfd(r2, 0x406, r4) renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, &(0x7f00000007c0)='./file1\x00', 0x2) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(r5, 0x400455c8, 0x0) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) 3.010127785s ago: executing program 4 (id=3077): rseq(&(0x7f0000000540), 0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f00000001c0), 0x1, 0x4bc, &(0x7f0000000a40)="$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") bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000340)=0x8000, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x41) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x80042, 0x1ff) 3.008979375s ago: executing program 4 (id=3078): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0x1800, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x4}, 0x18) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848110000005e140602000000000e000a000f00000002800000", 0x2c}], 0x1}, 0x8000) 2.975824088s ago: executing program 4 (id=3079): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@newtfilter={0x64, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x0, 0xf}, {}, {0x7, 0x10}}, [@filter_kind_options=@f_flow={{0x9}, {0x34, 0x2, [@TCA_FLOW_EMATCHES={0x30, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7}}, @TCA_EMATCH_TREE_LIST={0x24, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x20, 0x1, 0x0, 0x0, {{0x8, 0x9, 0x40}, [@TCA_EM_IPT_HOOK={0x8, 0x1, 0x3}, @TCA_EM_IPT_MATCH_NAME={0xb}]}}]}]}]}}]}, 0x64}}, 0x2008c014) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="240000001b1401002abdd444d446df25080001000000000009"], 0x24}, 0x1, 0x0, 0x0, 0x4000801}, 0x40810) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095", @ANYRESDEC=r3], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYRES32=r6, @ANYBLOB="f5ff0f00252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x40000) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c000000100003052dbd70000007000000000000", @ANYRES32=0x0, @ANYBLOB="00000000001000001400128009000100626f6e64000000000400028008000a00", @ANYRES32=r6, @ANYBLOB="8742af2cccec5477b4ff1cb4a3bc0cc4b786a07577a258389b59c49f60cf7c980aa1cd8590bb28557642e90f97a4ae84eedec696aa6e2f83"], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0xc0b0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0xffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x20000004) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r8, @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c000380140001"], 0x110}}, 0x0) r10 = socket(0x10, 0x803, 0x8) sendmsg$IPVS_CMD_SET_INFO(r10, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x2d}, 0x1, 0x0, 0x0, 0x8801}, 0x8000) r11 = socket(0x10, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r12 = syz_open_dev$evdev(&(0x7f0000000180), 0x1, 0x1a1502) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000840)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRESOCT=r12, @ANYRESOCT=r4, @ANYRES32=r6, @ANYRES16=r4, @ANYRESDEC=r9, @ANYBLOB="08ed02ff0100000014000200"/28, @ANYRESDEC=r12, @ANYRESDEC=0x0, @ANYRES16=r0], 0x60}, 0x1, 0x0, 0x0, 0x880}, 0x4080) syz_usb_disconnect(r12) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000000c0)={'macvlan1\x00'}) 2.842530642s ago: executing program 5 (id=3082): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x18) r2 = socket(0xa, 0x3, 0x3a) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r4}, 0x10) symlink(&(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000cc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x510, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0xa, 0x20008, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x30e, &(0x7f0000000f00)="$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") lstat(&(0x7f0000000280)='./file2\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000fc0)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@block_validity}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4}}, {@nodelalloc}, {@grpquota}, {@mblk_io_submit}, {@nodiscard}, {@bh}, {@dioread_nolock}], [{@subj_type={'subj_type', 0x3d, 'data_err=abort'}}, {@fsname={'fsname', 0x3d, '/@'}}, {@measure}, {@uid_gt={'uid>', r5}}, {@dont_appraise}]}, 0x1, 0x553, &(0x7f0000000a40)="$eJzs3d9rW1UcAPDvTdv91nUwhopIYQ9O5tK19ccEH+aj6HCg7zO0d2U0WUaTjrUO3B7ciy8yBBEH4ru++zj8B/wrBjoYMoo++BK56U2XrUmbddnSmc8Hbjkn9ybnfnPv9/TcnBsSwNCayP4UIl6OiG+SiIMRkeTrRiNfObG23er9q7PZkkSj8elfSXO7rN56rdbz9ueVlyLit68ijhc2tltbXlkolcvpYl6frFcuTdaWV05cqJTm0/n04vTMzKm3Z6bfe/edvsX6xtl/vv/k9oenvj66+t0vdw/dTOJ0HMjXtcfxBK61VyZiIn9PxuL0IxtO9aGxnSQZ9A6wLSN5no9F1gccjJE864H/vy8jogEMqUT+w5BqjQNa1/Z9ug5+btz7YO0CaGP8o2ufjcSe5rXRvtXkoSuj7Hp3vA/tZ238+uetm9kS/fscAmBL165HxMnR0Y39X5L3f9t3sodtHm1D/wfPzu1s/PNmp/FPYX38Ex3GP/s75O52bJ3/hbt9aKarbPz3fsfx7/qk1fhIXnuhOeYbS85fKKdZ3/ZiRByLsd1ZfbP5nFOrdxrd1rWP/7Ila781Fsz34+7o7oefM1eql54k5nb3rke80nH8m6wf/6TD8c/ej7M9tnEkvfVat3Vbx/90NX6KeL3j8X8wo5VsPj852TwfJltnxUZ/3zjye7f2Bx1/dvz3bR7/eNI+X1t7/DZ+3PNv2m3dQ/FH7+f/ruSzZnlX/tiVUr2+OBWxK/l44+PTD57bqre2z+I/dnTz/q/T+b83Ij7vMf4bh39+taf4B3T85x7r+D9+4c5HX/zQrf3e+r+3mqVj+SO99H+97uCTvHcAAAAAAACw0xQi4kAkheJ6uVAoFtfu7zgc+wrlaq1+/Hx16eJcNL8rOx5jhdZM98G2+yGm8vthW/XpR+ozEXEoIr4d2dusF2er5blBBw8AAAAAAAAAAAAAAAAAAAA7xP4u3//P/DEy6L0Dnjo/+Q3Da8v878cvPQE7kv//MLzkPwwv+Q/DS/7D8JL/MLzkPwwv+Q/DS/4DAAAAAAAAAAAAAAAAAAAAAAAAAABAX509cyZbGqv3r85m9bnLy0sL1csn5tLaQrGyNFucrS5eKs5Xq/PltDhbrWz1euVq9dLUdCxdmayntfpkbXnlXKW6dLF+7kKlNJ+eS8eeSVQAAAAAAAAAAAAAAAAAAADwfKktryyUyuV0UUFhW4XRnbEbCn0uDLpnAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAH/gsAAP//6AY3sQ==") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x1000) syz_emit_ethernet(0x6a, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c2000003aaaaaaaaaaaa08004503005c00000000002f907000000000ffffffff0000883e00489078030000000300000090c7205b89c6ba79f201fb2a7ccdec3f092308bf4d1ae19911da928cceb7f2257669a73e935ab02244656cfe8638fefb94440b907850c38e"], 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r7 = fsopen(&(0x7f00000003c0)='bpf\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r7, 0x2, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r6, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x1018, 0xffffffffffffffff, {0x29}}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = gettid() process_vm_writev(r8, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) readlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000001200)=""/4096, 0x1000) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x1, 0x8, 0x0, 0x401}, 0xc) setsockopt$MRT6_FLUSH(r2, 0x29, 0xd4, &(0x7f0000000080)=0xc, 0x4) 2.581724847s ago: executing program 5 (id=3092): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x2008c014) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="240000001b1401002abdd444d446df25080001000000000009"], 0x24}, 0x1, 0x0, 0x0, 0x4000801}, 0x40810) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095", @ANYRESDEC=r3], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c0000001000850600000000ff6122314a000800", @ANYRES32=r6, @ANYBLOB="f5ff0f00252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x40000) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0xc0b0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0xffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x20000004) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r8, @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c000380140001"], 0x110}}, 0x0) r10 = socket(0x10, 0x803, 0x8) sendmsg$IPVS_CMD_SET_INFO(r10, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x2d}, 0x1, 0x0, 0x0, 0x8801}, 0x8000) r11 = socket(0x10, 0x803, 0x0) r12 = syz_open_dev$evdev(&(0x7f0000000180), 0x1, 0x1a1502) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000840)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRESOCT=r12, @ANYRESOCT=r4, @ANYRES32=r6, @ANYRES16=r4, @ANYRESDEC=r9, @ANYBLOB="08ed02ff0100000014000200"/28, @ANYRESDEC=r12, @ANYRESDEC=0x0, @ANYRES16=r0], 0x60}, 0x1, 0x0, 0x0, 0x880}, 0x4080) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000000c0)={'macvlan1\x00'}) 2.537592741s ago: executing program 0 (id=3094): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000200), &(0x7f0000000240)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)={0x2c, r3, 0xcd3a991b146a25f, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008804}, 0xa4) 2.504951204s ago: executing program 0 (id=3095): write$binfmt_aout(0xffffffffffffffff, 0x0, 0xc8) open_tree(0xffffffffffffff9c, 0x0, 0x89901) getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000400), 0x101201, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000600)=0x14) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0x14) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r2, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) close(r0) 2.496685806s ago: executing program 5 (id=3096): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095000000000000002f075b14e5af23b088f397dc870c8d2022e25a681b05f50e8e3e67d6e8bf875ca0ef1e2f58d3c591deae367bd1c14869ad525a8207b2661988806fc2f4f6451edcc566c264ffd74c8a2d4ddb0296267fa921977220ff0fca474a9901f2602fd0722ff8d7c7683c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r3, 0x0, 0x36}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_clone3(&(0x7f0000001e40)={0x100a00400, 0x0, 0x0, 0x0, {0x1c}, 0x0, 0x0, 0x0, &(0x7f0000001e00)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000a00)={0x0, 0xfffffffffffffe7f, &(0x7f00000009c0)={&(0x7f0000000640)={0x2c, r2, 0x1, 0x0, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x141}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 1.971417907s ago: executing program 4 (id=3097): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x39, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) writev(r1, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}], 0x1) 1.822936161s ago: executing program 0 (id=3098): mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000001, 0x6031, 0xffffffffffffffff, 0x4000) mremap(&(0x7f0000ceb000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f00002a4000/0x2000)=nil, 0x2000) munlock(&(0x7f0000daf000/0x1000)=nil, 0x1000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@multicast2, @in6=@initdev}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x88a, &(0x7f00000001c0)={[{@usrquota}, {@oldalloc, 0x22}, {@data_ordered}, {@noload}, {@grpid}, {@oldalloc, 0x22}, {@init_itable}, {@jqfmt_vfsold}, {@noblock_validity}]}, 0xfe, 0x44e, &(0x7f0000000900)="$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") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=ANY=[@ANYBLOB="140114012800010004000000fcdbdf250401f2800c00180008ac0f0000000100140001"], 0x114}], 0x1, 0x0, 0x0, 0x20000001}, 0x0) r4 = getgid() lchown(&(0x7f0000000040)='./file0\x00', r3, r4) r5 = getegid() statx(r0, &(0x7f00000003c0)='\x00', 0x6000, 0x8, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x9, &(0x7f0000000600)=[0xffffffffffffffff, 0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f0000000680)={{}, {0x1, 0x1}, [{0x2, 0x5, r1}], {0x4, 0x3}, [{0x8, 0x0, r4}, {0x8, 0x2, r5}, {0x8, 0x3, r6}, {0x8, 0x0, r7}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x1) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x810000, &(0x7f0000000700)={[{@session={'session', 0x3d, 0xe}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@unhide}, {@uid}, {@check_strict}, {@mode={'mode', 0x3d, 0x3ff}}]}, 0x1, 0x550, &(0x7f0000000d80)="$eJzs3d9u01YcwPGf+2dUYWPTNiFUFTiUTSpSCU4CQRFXnnOSGhw7sh3UXqGKpqgihYkyae3VuEGbtD0Et3uIPcLeBO0RmGwnbdrmD4Um6dj3E23nxD4+53dM5J/cxLYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAx7LJp5gxxHa+xqvqzy4FfG7C+09+NQ8WAcUWM+D+Zm5NL6aJL3x6svhj/b1EW0ncLMhcXc7J3/uJX976ZmepsPyCgsdjZ3Xu63mo1X5xko+nRxTNuVe05oe/UrKpWTuirUrFo3lqphKriuDpcCyNdU3agrcgP1JJ9Q+VKpYLS2TW/4VXLlqs7C+/ezJtmUd3P1rUVhL536342tFcc13W8atImXh23uRt/EB84kYq0VVNqc6vVLCilzg8KMm6UGzaTuFF+WKO8mc/ncvl8rnindOeuac4cW2AeIe0W74z0k2zOTP5Di8k6zcM38FGm2vlfXHHEk4asiur5sqUsgfhS67O+rZP/v7+l98f4rMe43fm/k+UvHayelyT/X0nfXemX//vEMr7XjuzKnjyVdWlJS5ryYuIRjfdVFS2eOBKKL47UxEqWqPYSJSUpSlFMeSQrUpFQlFTEEVe0hLImoUSik0+ULYFosSQSXwJRsiS23BAlOSlJSQqiREtW1sSXhnhSlbJYSS+bspXs90LP6PaljXIDJrLfU35Ao5Pk/3NxtjePb0L+/7875SM48OHedfJ/f7PjiwYAAAAAAIyCkfz13UhO8y8ntYrjanPSYQEAAAAAgFOUfPO/EBfJ1/yXxeD8HwAAAACAT42RXGNniEhGrqa1zpVQ/BEAAAAAAIBPRPL9/5W4yMS1q2Jw/g8AAAAAwKfm16H32A/r54y//pEgmDVe1Ve/M7atuJ21PZ1uN320x6gyb1xod5IUxZn2O1svGO27X+7fBPNtu9jsF8fnyVLDME4hAPldrqVtrm2k5UZnTTrbTMVxddb23Xs5sawLU5FejX56tvWzJNP/zatdMGRzq9XMPn7e2khieRX38mq7fQPFY/dRHBDLy+R+C8k1Fz33/GxyIUY6rvFLOq7ZPf+pdPOpE4z5WhbTNouZtMwcnv9cPGYu22/2mTSK3JGZ97x75MAorqdtri9dT4seUeT7RhEPt9Vq5ruj+KB98R5RFIbti0InitmD4U8SBQBMyuaQLGQcT/wfcJTrm907o5xKdn8tS2mbpfnkwDoz3+OIbg47opsfmdf/nD36DKR+OTYe948jWfVNvMGbvuOGbt6Id+H0y+0f5eLO7t7Nre31J80nzWf5fKFo3jbNO3mZTabRLsg9AIAehj9jZ2gL4/aQs+qv939SkJXH8lxasiHLydUGyS8OunutftnuNdP1M4TlIWetB21zsjzkrC7T9aCX929bGMO/BAAA47PYOw+fKP8vDznvPpzLB58dd+dyAAAwGjp4e69drT/KlUo5K1rRKvDtBypwylWtHC/Sgb1ieVWt6oEf+bbvxpWHTlmHKmzU634QqYofqLofOqvJk99V+9Hvoa5ZXuTYYd3VVqiV7XuRZUeq7IS2qjd+cJ1wRQfxxp1nDNpW5PieCv1GYOusUqHWXQ2dsvYip+LEVU/VA6dmBWvqoe82alqVdWgHTj3ykw73x3K8ih/UrMj5QrIT3M8AAJwlO7t7T9dbreaLEVYmPUcAAHAYWRoAAAAAAAAAAAAAAAAAAAAAgLNvHNf/Tb7yd/oUATkr8fwHK3NnI4wTVqZE5AyEMcKKMaqeJ31kAjBq/wYAAP//YbxJJw==") r8 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r8, 0x0, &(0x7f0000000080)='ro\x00', 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='jbd2_end_commit\x00', r10, 0x0, 0x1000000100000}, 0xfffffffffffffee5) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000040)={'\x00', 0x7, 0x2a4, 0x8, 0x2, 0x4000000000000005}) ioctl$SG_BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r8, 0x7, 0x0, 0x0, 0x0) munlockall() 1.822316501s ago: executing program 4 (id=3099): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r1, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r2 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x80, 0x2, 0x8b6}, &(0x7f0000000000)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r2, 0x0, 0x0, 0x64, 0x183000, 0x23456}) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0xa, 0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) creat(&(0x7f00000000c0)='./file0\x00', 0xc9028ba210c11f8b) 1.580826535s ago: executing program 5 (id=3101): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) write$selinux_validatetrans(r0, 0x0, 0x79) 1.526907021s ago: executing program 2 (id=3103): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x18) r2 = socket(0xa, 0x3, 0x3a) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r4}, 0x10) symlink(&(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000cc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x510, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0xa, 0x20008, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x30e, &(0x7f0000000f00)="$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") lstat(&(0x7f0000000280)='./file2\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000fc0)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@block_validity}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4}}, {@nodelalloc}, {@grpquota}, {@mblk_io_submit}, {@nodiscard}, {@bh}, {@dioread_nolock}], [{@subj_type={'subj_type', 0x3d, 'data_err=abort'}}, {@fsname={'fsname', 0x3d, '/@'}}, {@measure}, {@uid_gt={'uid>', r5}}, {@dont_appraise}]}, 0x1, 0x553, &(0x7f0000000a40)="$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") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x1000) syz_emit_ethernet(0x6a, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c2000003aaaaaaaaaaaa08004503005c00000000002f907000000000ffffffff0000883e00489078030000000300000090c7205b89c6ba79f201fb2a7ccdec3f092308bf4d1ae19911da928cceb7f2257669a73e935ab02244656cfe8638fefb94440b907850c38e"], 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r7 = fsopen(&(0x7f00000003c0)='bpf\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r7, 0x2, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r6, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x1018, 0xffffffffffffffff, {0x29}}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = gettid() process_vm_writev(r8, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) readlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000001200)=""/4096, 0x1000) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x1, 0x8, 0x0, 0x401}, 0xc) setsockopt$MRT6_FLUSH(r2, 0x29, 0xd4, &(0x7f0000000080)=0xc, 0x4) 1.520313351s ago: executing program 5 (id=3104): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000400)='kfree\x00', r1}, 0x18) write$selinux_validatetrans(r0, &(0x7f0000001cc0)=ANY=[@ANYBLOB], 0x79) 1.516610922s ago: executing program 4 (id=3105): r0 = socket$kcm(0x10, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) openat$cgroup_devices(r1, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe2$watch_queue(0x0, 0x80) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x4000) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) readv(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r4, 0x0, 0x7}, 0x18) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="2e00000011008188040f80ec59acbc0413a1810031000000000f000000028002002d1f00"/46, 0x2e}], 0x1}, 0x0) 1.411548592s ago: executing program 0 (id=3106): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000200), &(0x7f0000000240)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)={0x2c, r3, 0xcd3a991b146a25f, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008804}, 0xa4) 1.410849672s ago: executing program 5 (id=3107): r0 = epoll_create1(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x7c1042, 0xf7f00980ed360eae) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000100000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x3361, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x14) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'wg1\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=ANY=[@ANYBLOB="4000000010fb26bd70ecfddbdf25cf5408000000fb83ddc31bc20000000000009815575ccc587b560191654363232dbbb962f3990192069fc45a33a10a0f22220a8b0c50f304b31a1fd1d6c5146a64a002fdf7ddf1d36df3fd7568f5e82cb2bc472c25343fbb2612cc5dcc73e5d8e98137635e1245e3608ec428fd9d37d9ef0fa28a262062fd00a8c108", @ANYRES32=0x0, @ANYBLOB="3dc104007fff0000140012800c0001006d616376746170000400028008000500", @ANYRES32=r8, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r8, @ANYBLOB], 0x44}, 0x1, 0x0, 0x0, 0x68001}, 0x8000002) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000400)=ANY=[@ANYBLOB="180007000000e8a3474a802b43019a875333e5bda5c1c0885dee602dcfb0cc532ebc225c3e99ca36f07759654b62292ff93e208a5282a6b416a8d64b8d1225086c0ca61498614ae05a4f6ec86ae32c6b3e3159a2bc1426c369e4bc00131cf13072bcef434f", @ANYRES32=r6], 0x18}}, 0x0) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804180100aae8a7262500000000002020207b1af8ff00000000bfa108000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffff9}, 0x94) lchown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x0, 0xdc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r10}, 0x18) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r11) sendmsg$NLBL_MGMT_C_ADDDEF(r11, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="010000000000000000000400000008000700000000000800020005000000050008"], 0x34}}, 0x0) r13 = socket$nl_netfilter(0x10, 0x3, 0xc) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/12], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000340)='kmem_cache_free\x00', r14, 0x0, 0xffffffffffffffff}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_usb_connect(0x2, 0x0, 0x0, 0x0) r15 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r15, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x118}}, 0x4040014) sendmsg$NFT_BATCH(r13, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a31000000002c0003800800014000000000180003801400010076657468315f746f5f626f6e6400000008000240000000006c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a30000000004000038008000140000000002c0003801400010067656e657665300000000000000000001400010076657468315f746f5f626f6e64000000080002"], 0x10c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x6, 0x6, 0x2, 0x7ffcfffc}]}) get_robust_list(0x0, &(0x7f0000000300)=0x0, &(0x7f0000000800)) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000480), 0x84, &(0x7f0000000040)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="0806"]) 1.405943522s ago: executing program 0 (id=3108): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000780)=[{0x200000000006, 0xf, 0x6, 0x7ffc1ffb}]}) syz_read_part_table(0x5d6, &(0x7f0000000600)="$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") bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000003c0)='kfree\x00', r0}, 0x18) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000080)=ANY=[@ANYBLOB="16000000020000001d"], 0x0) 1.32172345s ago: executing program 0 (id=3109): write$binfmt_aout(0xffffffffffffffff, 0x0, 0xc8) open_tree(0xffffffffffffff9c, 0x0, 0x89901) getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000400), 0x101201, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000600)=0x14) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0x14) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r2, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) close(r0) 1.165945986s ago: executing program 2 (id=3110): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x2008c014) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="240000001b1401002abdd444d446df25080001000000000009"], 0x24}, 0x1, 0x0, 0x0, 0x4000801}, 0x40810) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095", @ANYRESDEC=r3], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c0000001000850600000000ff6122314a000800", @ANYRES32=r6, @ANYBLOB="f5ff0f00252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x40000) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0xc0b0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0xffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x20000004) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r8, @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c000380140001"], 0x110}}, 0x0) r10 = socket(0x10, 0x803, 0x8) sendmsg$IPVS_CMD_SET_INFO(r10, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x2d}, 0x1, 0x0, 0x0, 0x8801}, 0x8000) r11 = socket(0x10, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r12 = syz_open_dev$evdev(&(0x7f0000000180), 0x1, 0x1a1502) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000840)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRESOCT=r12, @ANYRESOCT=r4, @ANYRES32=r6, @ANYRES16=r4, @ANYRESDEC=r9, @ANYBLOB="08ed02ff0100000014000200"/28, @ANYRESDEC=r12, @ANYRESDEC=0x0, @ANYRES16=r0], 0x60}, 0x1, 0x0, 0x0, 0x880}, 0x4080) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000000c0)={'macvlan1\x00'}) 1.077860455s ago: executing program 2 (id=3111): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0x1800, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x4}, 0x18) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848110000005e140602000000000e000a000f0000000280000012", 0x2d}], 0x1}, 0x8000) 1.004546072s ago: executing program 2 (id=3112): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095000000000000002f075b14e5af23b088f397dc870c8d2022e25a681b05f50e8e3e67d6e8bf875ca0ef1e2f58d3c591deae367bd1c14869ad525a8207b2661988806fc2f4f6451edcc566c264ffd74c8a2d4ddb0296267fa921977220ff0fca474a9901f2602fd0722ff8d7c7683c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r3, 0x0, 0x36}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_clone3(&(0x7f0000001e40)={0x100a00400, 0x0, 0x0, 0x0, {0x1c}, 0x0, 0x0, 0x0, &(0x7f0000001e00)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000a00)={0x0, 0xfffffffffffffe7f, &(0x7f00000009c0)={&(0x7f0000000640)={0x2c, r2, 0x1, 0x0, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x141}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 1.002482222s ago: executing program 1 (id=3113): io_setup(0xffff, &(0x7f0000000200)) socket(0x400000000010, 0x3, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) ioctl$IMADDTIMER(r1, 0x80044940, 0x0) read(r1, &(0x7f00000019c0)=""/4097, 0x1001) socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={0xffffffffffffffff, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) io_setup(0x2, &(0x7f00000001c0)) 30.522137ms ago: executing program 2 (id=3114): rseq(&(0x7f0000000540), 0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f00000001c0), 0x1, 0x4bc, &(0x7f0000000a40)="$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") bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000340)=0x8000, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x41) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x80042, 0x1ff) 0s ago: executing program 2 (id=3115): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x39, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) writev(r1, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}], 0x1) kernel console output (not intermixed with test programs): 0016] RSP: 002b:00007fd104267038 EFLAGS: 00000246 ORIG_RAX: 0000000000000056 [ 154.258008][T10016] RAX: ffffffffffffffda RBX: 00007fd105a55fa0 RCX: 00007fd1057feec9 [ 154.258026][T10016] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000940 [ 154.258044][T10016] RBP: 00007fd104267090 R08: 0000000000000000 R09: 0000000000000000 [ 154.258062][T10016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.258080][T10016] R13: 00007fd105a56038 R14: 00007fd105a55fa0 R15: 00007ffe03c575a8 [ 154.258107][T10016] [ 154.345010][T10024] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10024 comm=syz.4.2544 [ 154.346476][T10012] bond38: (slave bond39): Enslaving as an active interface with an up link [ 154.511680][T10027] can: request_module (can-proto-0) failed. [ 154.590275][T10025] tipc: Enabling of bearer rejected, already enabled [ 154.801965][T10032] usb usb9: usbfs: process 10032 (syz.4.2549) did not claim interface 0 before use [ 154.957251][T10041] loop5: detected capacity change from 0 to 2048 [ 154.968724][T10042] netlink: 'syz.0.2553': attribute type 10 has an invalid length. [ 154.987841][T10042] bond0: (slave dummy0): Releasing backup interface [ 154.997315][T10042] team0: Failed to send options change via netlink (err -105) [ 155.004835][T10042] team0: Port device dummy0 added [ 155.011420][T10041] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 155.031633][T10041] ext4 filesystem being mounted at /48/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 155.031909][T10047] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 155.044548][T10041] 9pnet_fd: Insufficient options for proto=fd [ 155.063654][T10047] team0: Failed to send options change via netlink (err -105) [ 155.068085][T10041] netlink: 312 bytes leftover after parsing attributes in process `syz.5.2554'. [ 155.078511][T10047] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 155.094358][T10047] team0: Port device dummy0 removed [ 155.102047][T10047] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 155.156498][T10049] lo speed is unknown, defaulting to 1000 [ 155.163047][T10049] lo speed is unknown, defaulting to 1000 [ 155.358836][T10054] bridge0: port 1(bond0) entered blocking state [ 155.365266][T10054] bridge0: port 1(bond0) entered disabled state [ 155.371995][T10054] bond0: entered allmulticast mode [ 155.377168][T10054] dummy0: entered allmulticast mode [ 155.440998][ T9086] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 155.474176][T10054] bond0: entered promiscuous mode [ 155.492028][T10054] dummy0: entered promiscuous mode [ 155.512749][T10058] FAULT_INJECTION: forcing a failure. [ 155.512749][T10058] name failslab, interval 1, probability 0, space 0, times 0 [ 155.525499][T10058] CPU: 0 UID: 0 PID: 10058 Comm: syz.4.2558 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 155.525549][T10058] Tainted: [W]=WARN [ 155.525557][T10058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 155.525573][T10058] Call Trace: [ 155.525581][T10058] [ 155.525636][T10058] __dump_stack+0x1d/0x30 [ 155.525683][T10058] dump_stack_lvl+0xe8/0x140 [ 155.525709][T10058] dump_stack+0x15/0x1b [ 155.525730][T10058] should_fail_ex+0x265/0x280 [ 155.525850][T10058] should_failslab+0x8c/0xb0 [ 155.525894][T10058] kmem_cache_alloc_noprof+0x50/0x480 [ 155.526011][T10058] ? getname_flags+0x80/0x3b0 [ 155.526117][T10058] ? vfs_write+0x7e8/0x960 [ 155.526192][T10058] getname_flags+0x80/0x3b0 [ 155.526231][T10058] user_path_at+0x28/0x130 [ 155.526272][T10058] vfs_open_tree+0xef/0x530 [ 155.526304][T10058] __x64_sys_open_tree+0x45/0xc0 [ 155.526328][T10058] x64_sys_call+0x2a8b/0x3000 [ 155.526359][T10058] do_syscall_64+0xd2/0x200 [ 155.526390][T10058] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 155.526561][T10058] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 155.526594][T10058] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 155.526623][T10058] RIP: 0033:0x7fcc75aeeec9 [ 155.526639][T10058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 155.526661][T10058] RSP: 002b:00007fcc74557038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ac [ 155.526680][T10058] RAX: ffffffffffffffda RBX: 00007fcc75d45fa0 RCX: 00007fcc75aeeec9 [ 155.526697][T10058] RDX: 0000000000081000 RSI: 0000200000000640 RDI: ffffffffffffff9c [ 155.526715][T10058] RBP: 00007fcc74557090 R08: 0000000000000000 R09: 0000000000000000 [ 155.526731][T10058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.526823][T10058] R13: 00007fcc75d46038 R14: 00007fcc75d45fa0 R15: 00007ffca9577b28 [ 155.526848][T10058] [ 155.857420][T10076] hub 9-0:1.0: USB hub found [ 155.863276][T10076] hub 9-0:1.0: 8 ports detected [ 155.891864][T10080] bond0: (slave dummy0): Releasing backup interface [ 155.901570][T10080] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 155.937400][T10084] loop1: detected capacity change from 0 to 128 [ 155.961248][T10076] bond40: entered promiscuous mode [ 155.983276][T10089] netlink: 14 bytes leftover after parsing attributes in process `syz.2.2570'. [ 156.007918][T10076] 8021q: adding VLAN 0 to HW filter on device bond40 [ 156.045986][T10092] 8021q: adding VLAN 0 to HW filter on device bond41 [ 156.054843][T10092] bond41: entered promiscuous mode [ 156.060696][T10092] bond40: (slave bond41): Enslaving as an active interface with an up link [ 156.073116][T10099] FAULT_INJECTION: forcing a failure. [ 156.073116][T10099] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.086286][T10099] CPU: 0 UID: 0 PID: 10099 Comm: syz.2.2574 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 156.086334][T10099] Tainted: [W]=WARN [ 156.086342][T10099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 156.086358][T10099] Call Trace: [ 156.086366][T10099] [ 156.086375][T10099] __dump_stack+0x1d/0x30 [ 156.086462][T10099] dump_stack_lvl+0xe8/0x140 [ 156.086484][T10099] dump_stack+0x15/0x1b [ 156.086505][T10099] should_fail_ex+0x265/0x280 [ 156.086619][T10099] should_fail+0xb/0x20 [ 156.086718][T10099] should_fail_usercopy+0x1a/0x20 [ 156.086749][T10099] _copy_from_iter+0xd2/0xe80 [ 156.086777][T10099] ? __build_skb_around+0x1ab/0x200 [ 156.086858][T10099] ? __alloc_skb+0x223/0x320 [ 156.086963][T10099] netlink_sendmsg+0x471/0x6b0 [ 156.086999][T10099] ? __pfx_netlink_sendmsg+0x10/0x10 [ 156.087113][T10099] __sock_sendmsg+0x145/0x180 [ 156.087159][T10099] ____sys_sendmsg+0x31e/0x4e0 [ 156.087206][T10099] ___sys_sendmsg+0x17b/0x1d0 [ 156.087285][T10099] __x64_sys_sendmsg+0xd4/0x160 [ 156.087321][T10099] x64_sys_call+0x191e/0x3000 [ 156.087391][T10099] do_syscall_64+0xd2/0x200 [ 156.087417][T10099] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 156.087505][T10099] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 156.087528][T10099] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 156.087611][T10099] RIP: 0033:0x7fd1057feec9 [ 156.087627][T10099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.087679][T10099] RSP: 002b:00007fd104267038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 156.087701][T10099] RAX: ffffffffffffffda RBX: 00007fd105a55fa0 RCX: 00007fd1057feec9 [ 156.087714][T10099] RDX: 0000000000000000 RSI: 00002000000029c0 RDI: 0000000000000003 [ 156.087727][T10099] RBP: 00007fd104267090 R08: 0000000000000000 R09: 0000000000000000 [ 156.087740][T10099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.087753][T10099] R13: 00007fd105a56038 R14: 00007fd105a55fa0 R15: 00007ffe03c575a8 [ 156.087773][T10099] [ 156.094121][T10076] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10076 comm=syz.4.2565 [ 156.112844][T10084] pim6reg: entered allmulticast mode [ 156.314704][T10100] pim6reg: left allmulticast mode [ 156.353848][T10106] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2577'. [ 156.420290][T10114] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2581'. [ 156.429588][T10110] A link change request failed with some changes committed already. Interface vlan1 may have been left with an inconsistent configuration, please check. [ 156.512931][T10114] bond52 (unregistering): Released all slaves [ 156.538850][T10119] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12592 sclass=netlink_route_socket pid=10119 comm=syz.0.2581 [ 156.622599][T10128] loop1: detected capacity change from 0 to 512 [ 156.641803][T10128] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 156.659350][T10128] ext4 filesystem being mounted at /498/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 156.674443][T10136] tipc: Enabling of bearer rejected, already enabled [ 156.683495][T10135] hub 9-0:1.0: USB hub found [ 156.690437][T10135] hub 9-0:1.0: 8 ports detected [ 156.700004][T10126] loop5: detected capacity change from 0 to 512 [ 156.706800][T10126] ext4: Unknown parameter 'oldalloc"data' [ 156.715793][ T3319] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 156.720527][T10135] bond42: entered promiscuous mode [ 156.730358][T10135] 8021q: adding VLAN 0 to HW filter on device bond42 [ 156.732990][T10126] loop5: detected capacity change from 0 to 164 [ 156.743964][T10126] iso9660: Bad value for 'uid' [ 156.748814][T10126] iso9660: Bad value for 'uid' [ 156.756160][T10135] 8021q: adding VLAN 0 to HW filter on device bond43 [ 156.764629][T10135] bond43: entered promiscuous mode [ 156.770519][T10135] bond42: (slave bond43): Enslaving as an active interface with an up link [ 156.793176][T10135] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10135 comm=syz.4.2588 [ 156.821978][T10143] netlink: 232 bytes leftover after parsing attributes in process `syz.5.2590'. [ 156.834666][T10145] FAULT_INJECTION: forcing a failure. [ 156.834666][T10145] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.847829][T10145] CPU: 0 UID: 0 PID: 10145 Comm: syz.4.2592 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 156.847890][T10145] Tainted: [W]=WARN [ 156.847899][T10145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 156.847929][T10145] Call Trace: [ 156.847937][T10145] [ 156.847944][T10145] __dump_stack+0x1d/0x30 [ 156.847966][T10145] dump_stack_lvl+0xe8/0x140 [ 156.847985][T10145] dump_stack+0x15/0x1b [ 156.848002][T10145] should_fail_ex+0x265/0x280 [ 156.848098][T10145] should_fail+0xb/0x20 [ 156.848138][T10145] should_fail_usercopy+0x1a/0x20 [ 156.848165][T10145] _copy_from_user+0x1c/0xb0 [ 156.848239][T10145] ___sys_sendmsg+0xc1/0x1d0 [ 156.848298][T10145] __x64_sys_sendmsg+0xd4/0x160 [ 156.848343][T10145] x64_sys_call+0x191e/0x3000 [ 156.848384][T10145] do_syscall_64+0xd2/0x200 [ 156.848407][T10145] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 156.848448][T10145] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 156.848479][T10145] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 156.848508][T10145] RIP: 0033:0x7fcc75aeeec9 [ 156.848608][T10145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.848631][T10145] RSP: 002b:00007fcc74557038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 156.848650][T10145] RAX: ffffffffffffffda RBX: 00007fcc75d45fa0 RCX: 00007fcc75aeeec9 [ 156.848663][T10145] RDX: 0000000020000050 RSI: 00002000000002c0 RDI: 0000000000000003 [ 156.848676][T10145] RBP: 00007fcc74557090 R08: 0000000000000000 R09: 0000000000000000 [ 156.848689][T10145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.848701][T10145] R13: 00007fcc75d46038 R14: 00007fcc75d45fa0 R15: 00007ffca9577b28 [ 156.848753][T10145] [ 157.071350][T10149] loop5: detected capacity change from 0 to 128 [ 157.133298][T10151] pimreg: entered allmulticast mode [ 157.150026][T10149] pim6reg: entered allmulticast mode [ 157.159162][T10149] pim6reg: left allmulticast mode [ 157.175663][T10157] validate_nla: 4 callbacks suppressed [ 157.175758][T10157] netlink: 'syz.1.2596': attribute type 10 has an invalid length. [ 157.230772][T10163] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2598'. [ 157.332801][T10173] netlink: 14 bytes leftover after parsing attributes in process `syz.2.2603'. [ 157.366563][T10177] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2605'. [ 157.378031][T10177] FAULT_INJECTION: forcing a failure. [ 157.378031][T10177] name failslab, interval 1, probability 0, space 0, times 0 [ 157.386058][T10175] netlink: 'syz.4.2604': attribute type 13 has an invalid length. [ 157.390715][T10177] CPU: 1 UID: 0 PID: 10177 Comm: syz.5.2605 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 157.390807][T10177] Tainted: [W]=WARN [ 157.390817][T10177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 157.390840][T10177] Call Trace: [ 157.390848][T10177] [ 157.390859][T10177] __dump_stack+0x1d/0x30 [ 157.390889][T10177] dump_stack_lvl+0xe8/0x140 [ 157.390917][T10177] dump_stack+0x15/0x1b [ 157.390940][T10177] should_fail_ex+0x265/0x280 [ 157.391034][T10177] should_failslab+0x8c/0xb0 [ 157.391100][T10177] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 157.391145][T10177] ? sidtab_sid2str_get+0xa0/0x130 [ 157.391238][T10177] kmemdup_noprof+0x2b/0x70 [ 157.391407][T10177] sidtab_sid2str_get+0xa0/0x130 [ 157.391499][T10177] security_sid_to_context_core+0x1eb/0x2e0 [ 157.391541][T10177] security_sid_to_context+0x27/0x40 [ 157.391579][T10177] selinux_lsmprop_to_secctx+0x67/0xf0 [ 157.391669][T10177] security_lsmprop_to_secctx+0x1a3/0x1c0 [ 157.391721][T10177] audit_log_subj_ctx+0xa4/0x3e0 [ 157.391751][T10177] ? skb_put+0xa9/0xf0 [ 157.391797][T10177] audit_log_task_context+0x48/0x70 [ 157.391880][T10177] audit_log_task+0xf4/0x250 [ 157.391926][T10177] ? kstrtouint+0x76/0xc0 [ 157.392031][T10177] audit_seccomp+0x61/0x100 [ 157.392071][T10177] ? __seccomp_filter+0x82d/0x1250 [ 157.392097][T10177] __seccomp_filter+0x83e/0x1250 [ 157.392192][T10177] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 157.392279][T10177] ? vfs_write+0x7e8/0x960 [ 157.392310][T10177] ? __rcu_read_unlock+0x4f/0x70 [ 157.392346][T10177] ? __fget_files+0x184/0x1c0 [ 157.392448][T10177] __secure_computing+0x82/0x150 [ 157.392488][T10177] syscall_trace_enter+0xcf/0x1e0 [ 157.392529][T10177] do_syscall_64+0xac/0x200 [ 157.392564][T10177] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 157.392708][T10177] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 157.392743][T10177] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 157.392773][T10177] RIP: 0033:0x7fd25374eec9 [ 157.392795][T10177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 157.392847][T10177] RSP: 002b:00007fd2521af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 157.392877][T10177] RAX: ffffffffffffffda RBX: 00007fd2539a5fa0 RCX: 00007fd25374eec9 [ 157.392896][T10177] RDX: 0000000000000000 RSI: 0000000000005427 RDI: 0000000000000009 [ 157.392920][T10177] RBP: 00007fd2521af090 R08: 0000000000000000 R09: 0000000000000000 [ 157.392937][T10177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 157.392984][T10177] R13: 00007fd2539a6038 R14: 00007fd2539a5fa0 R15: 00007fff51f47c88 [ 157.393009][T10177] [ 157.410263][T10167] loop1: detected capacity change from 0 to 512 [ 157.473199][T10182] netlink: 'syz.0.2607': attribute type 10 has an invalid length. [ 157.474642][T10167] ext4: Unknown parameter 'oldalloc"data' [ 157.686117][T10167] loop1: detected capacity change from 0 to 164 [ 157.692793][T10167] iso9660: Bad value for 'uid' [ 157.698113][T10167] iso9660: Bad value for 'uid' [ 157.746470][T10187] pimreg: entered allmulticast mode [ 157.908330][T10207] loop1: detected capacity change from 0 to 128 [ 157.965624][T10207] pim6reg: entered allmulticast mode [ 157.979579][T10207] pim6reg: left allmulticast mode [ 158.017731][ T29] kauditd_printk_skb: 586 callbacks suppressed [ 158.017749][ T29] audit: type=1400 audit(1760239773.742:21495): avc: denied { write } for pid=10205 comm="syz.4.2617" name="mISDNtimer" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.047737][ T29] audit: type=1400 audit(1760239773.742:21496): avc: denied { ioctl } for pid=10205 comm="syz.4.2617" path="/dev/mISDNtimer" dev="devtmpfs" ino=250 ioctlcmd=0x4940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.082809][ T29] audit: type=1326 audit(1760239773.812:21497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10203 comm="syz.2.2616" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1057feec9 code=0x7ffc0000 [ 158.085187][T10204] usb usb9: usbfs: process 10204 (syz.2.2616) did not claim interface 0 before use [ 158.107012][ T29] audit: type=1326 audit(1760239773.812:21498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10203 comm="syz.2.2616" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1057feec9 code=0x7ffc0000 [ 158.139554][ T29] audit: type=1326 audit(1760239773.812:21499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10203 comm="syz.2.2616" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fd1057fd710 code=0x7ffc0000 [ 158.163435][ T29] audit: type=1326 audit(1760239773.812:21500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10203 comm="syz.2.2616" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fd1057feacb code=0x7ffc0000 [ 158.187056][ T29] audit: type=1326 audit(1760239773.812:21501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10203 comm="syz.2.2616" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1057feec9 code=0x7ffc0000 [ 158.210804][ T29] audit: type=1326 audit(1760239773.812:21502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10203 comm="syz.2.2616" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fd1057feacb code=0x7ffc0000 [ 158.234457][ T29] audit: type=1326 audit(1760239773.812:21503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10203 comm="syz.2.2616" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1057feec9 code=0x7ffc0000 [ 158.258167][ T29] audit: type=1326 audit(1760239773.812:21504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10203 comm="syz.2.2616" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fd1057feec9 code=0x7ffc0000 [ 158.491277][T10223] netlink: 'syz.0.2624': attribute type 1 has an invalid length. [ 158.509731][T10223] bond52: entered promiscuous mode [ 158.525541][T10223] 8021q: adding VLAN 0 to HW filter on device bond52 [ 158.569286][T10223] 8021q: adding VLAN 0 to HW filter on device bond53 [ 158.578421][T10223] bond53: entered promiscuous mode [ 158.584716][T10223] bond52: (slave bond53): Enslaving as an active interface with an up link [ 158.602826][T10223] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12592 sclass=netlink_route_socket pid=10223 comm=syz.0.2624 [ 158.683331][ T3374] IPVS: starting estimator thread 0... [ 158.694225][T10244] IPVS: ip_vs_add_dest(): lower threshold is higher than upper threshold [ 158.733638][T10244] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2632'. [ 158.780961][T10246] IPVS: using max 2352 ests per chain, 117600 per kthread [ 158.906221][T10267] netlink: 'syz.0.2641': attribute type 1 has an invalid length. [ 158.942203][T10267] bond54: entered promiscuous mode [ 158.947688][T10267] 8021q: adding VLAN 0 to HW filter on device bond54 [ 158.978471][T10267] 8021q: adding VLAN 0 to HW filter on device bond55 [ 159.048914][T10276] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12592 sclass=netlink_route_socket pid=10276 comm=syz.0.2641 [ 159.062570][T10267] bond55: entered promiscuous mode [ 159.068734][T10267] bond54: (slave bond55): Enslaving as an active interface with an up link [ 159.081395][T10275] pim6reg: entered allmulticast mode [ 159.087633][T10275] pim6reg: left allmulticast mode [ 159.486789][T10300] netlink: 'syz.0.2655': attribute type 10 has an invalid length. [ 159.508771][T10303] loop5: detected capacity change from 0 to 512 [ 159.539164][T10301] netlink: 332 bytes leftover after parsing attributes in process `syz.2.2654'. [ 159.548491][T10301] netlink: 'syz.2.2654': attribute type 9 has an invalid length. [ 159.556404][T10301] netlink: 108 bytes leftover after parsing attributes in process `syz.2.2654'. [ 159.559134][T10303] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 159.565547][T10301] netlink: 32 bytes leftover after parsing attributes in process `syz.2.2654'. [ 159.579045][T10303] ext4 filesystem being mounted at /63/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 159.686126][ T9086] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 159.790771][T10328] loop5: detected capacity change from 0 to 2048 [ 159.857499][T10328] FAT-fs (loop5): error, fat_get_cluster: detected the cluster chain loop (i_pos 1) [ 159.866973][T10328] FAT-fs (loop5): Filesystem has been set read-only [ 159.879354][T10328] FAULT_INJECTION: forcing a failure. [ 159.879354][T10328] name failslab, interval 1, probability 0, space 0, times 0 [ 159.892560][T10328] CPU: 0 UID: 0 PID: 10328 Comm: syz.5.2663 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 159.892623][T10328] Tainted: [W]=WARN [ 159.892631][T10328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 159.892699][T10328] Call Trace: [ 159.892708][T10328] [ 159.892718][T10328] __dump_stack+0x1d/0x30 [ 159.892778][T10328] dump_stack_lvl+0xe8/0x140 [ 159.892803][T10328] dump_stack+0x15/0x1b [ 159.892823][T10328] should_fail_ex+0x265/0x280 [ 159.893008][T10328] ? audit_log_d_path+0x8d/0x150 [ 159.893032][T10328] should_failslab+0x8c/0xb0 [ 159.893066][T10328] __kmalloc_cache_noprof+0x4c/0x4a0 [ 159.893106][T10328] audit_log_d_path+0x8d/0x150 [ 159.893301][T10328] audit_log_d_path_exe+0x42/0x70 [ 159.893328][T10328] audit_log_task+0x1e9/0x250 [ 159.893428][T10328] ? kstrtouint+0x76/0xc0 [ 159.893496][T10328] audit_seccomp+0x61/0x100 [ 159.893601][T10328] ? __seccomp_filter+0x82d/0x1250 [ 159.893630][T10328] __seccomp_filter+0x83e/0x1250 [ 159.893660][T10328] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 159.893693][T10328] ? vfs_write+0x7e8/0x960 [ 159.893788][T10328] ? __rcu_read_unlock+0x4f/0x70 [ 159.893816][T10328] ? __fget_files+0x184/0x1c0 [ 159.893900][T10328] __secure_computing+0x82/0x150 [ 159.893929][T10328] syscall_trace_enter+0xcf/0x1e0 [ 159.893978][T10328] do_syscall_64+0xac/0x200 [ 159.894005][T10328] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 159.894035][T10328] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 159.894109][T10328] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 159.894138][T10328] RIP: 0033:0x7fd25374eec9 [ 159.894188][T10328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 159.894210][T10328] RSP: 002b:00007fd2521af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 159.894233][T10328] RAX: ffffffffffffffda RBX: 00007fd2539a5fa0 RCX: 00007fd25374eec9 [ 159.894247][T10328] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 159.894262][T10328] RBP: 00007fd2521af090 R08: 0000000000000000 R09: 0000000000000000 [ 159.894277][T10328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 159.894292][T10328] R13: 00007fd2539a6038 R14: 00007fd2539a5fa0 R15: 00007fff51f47c88 [ 159.894376][T10328] [ 160.201061][T10352] FAULT_INJECTION: forcing a failure. [ 160.201061][T10352] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 160.214842][T10352] CPU: 0 UID: 0 PID: 10352 Comm: syz.4.2676 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 160.214887][T10352] Tainted: [W]=WARN [ 160.214896][T10352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 160.214913][T10352] Call Trace: [ 160.214953][T10352] [ 160.214960][T10352] __dump_stack+0x1d/0x30 [ 160.214987][T10352] dump_stack_lvl+0xe8/0x140 [ 160.215010][T10352] dump_stack+0x15/0x1b [ 160.215093][T10352] should_fail_ex+0x265/0x280 [ 160.215139][T10352] should_fail+0xb/0x20 [ 160.215172][T10352] should_fail_usercopy+0x1a/0x20 [ 160.215259][T10352] strncpy_from_user+0x25/0x230 [ 160.215291][T10352] __x64_sys_lgetxattr+0xa5/0x140 [ 160.215393][T10352] x64_sys_call+0x2fb3/0x3000 [ 160.215415][T10352] do_syscall_64+0xd2/0x200 [ 160.215450][T10352] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 160.215542][T10352] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 160.215573][T10352] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 160.215599][T10352] RIP: 0033:0x7fcc75aeeec9 [ 160.215614][T10352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 160.215633][T10352] RSP: 002b:00007fcc74557038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c0 [ 160.215693][T10352] RAX: ffffffffffffffda RBX: 00007fcc75d45fa0 RCX: 00007fcc75aeeec9 [ 160.215710][T10352] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000200000000000 [ 160.215726][T10352] RBP: 00007fcc74557090 R08: 0000000000000000 R09: 0000000000000000 [ 160.215743][T10352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 160.215777][T10352] R13: 00007fcc75d46038 R14: 00007fcc75d45fa0 R15: 00007ffca9577b28 [ 160.215797][T10352] [ 160.229883][T10357] netlink: 288 bytes leftover after parsing attributes in process `syz.0.2678'. [ 160.345088][T10360] netlink: 'syz.4.2679': attribute type 10 has an invalid length. [ 160.350446][T10361] veth0_to_bridge: entered promiscuous mode [ 160.427811][T10356] veth0_to_bridge: left promiscuous mode [ 160.444296][T10365] loop1: detected capacity change from 0 to 512 [ 160.463837][T10367] netlink: 'syz.0.2682': attribute type 10 has an invalid length. [ 160.473533][T10365] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 160.486464][T10365] ext4 filesystem being mounted at /512/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 160.497329][T10367] bond0: (slave dummy0): Releasing backup interface [ 160.505853][T10367] dummy0: left promiscuous mode [ 160.510990][T10367] dummy0: left allmulticast mode [ 160.517230][T10372] netlink: 'syz.0.2682': attribute type 10 has an invalid length. [ 160.526222][T10367] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 160.541841][ T1755] Bluetooth: hci0: Frame reassembly failed (-84) [ 160.548804][T10367] team0: Failed to send options change via netlink (err -105) [ 160.556363][T10367] team0: Port device dummy0 added [ 160.562742][T10372] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 160.594597][T10372] team0: Failed to send options change via netlink (err -105) [ 160.604107][T10372] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 160.613659][T10372] team0: Port device dummy0 removed [ 160.620997][T10372] dummy0: entered promiscuous mode [ 160.626294][T10372] dummy0: entered allmulticast mode [ 160.632500][T10372] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 160.661360][T10363] usb usb9: usbfs: process 10363 (syz.4.2680) did not claim interface 0 before use [ 160.875278][T10383] bond56: entered promiscuous mode [ 160.881084][T10383] 8021q: adding VLAN 0 to HW filter on device bond56 [ 160.923604][T10383] 8021q: adding VLAN 0 to HW filter on device bond57 [ 160.932602][T10383] bond57: entered promiscuous mode [ 160.938708][T10383] bond56: (slave bond57): Enslaving as an active interface with an up link [ 160.984444][T10383] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12592 sclass=netlink_route_socket pid=10383 comm=syz.0.2687 [ 161.087856][T10377] FAULT_INJECTION: forcing a failure. [ 161.087856][T10377] name failslab, interval 1, probability 0, space 0, times 0 [ 161.100627][T10377] CPU: 1 UID: 0 PID: 10377 Comm: syz.2.2683 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 161.100705][T10377] Tainted: [W]=WARN [ 161.100714][T10377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 161.100731][T10377] Call Trace: [ 161.100740][T10377] [ 161.100750][T10377] __dump_stack+0x1d/0x30 [ 161.100779][T10377] dump_stack_lvl+0xe8/0x140 [ 161.100805][T10377] dump_stack+0x15/0x1b [ 161.100830][T10377] should_fail_ex+0x265/0x280 [ 161.100956][T10377] ? kobject_uevent_env+0x1c0/0x570 [ 161.101132][T10377] should_failslab+0x8c/0xb0 [ 161.101250][T10377] __kmalloc_cache_noprof+0x4c/0x4a0 [ 161.101339][T10377] kobject_uevent_env+0x1c0/0x570 [ 161.101459][T10377] kobject_uevent+0x1d/0x30 [ 161.101500][T10377] device_del+0x710/0x790 [ 161.101526][T10377] ? __try_to_del_timer_sync+0x152/0x170 [ 161.101591][T10377] device_unregister+0x15/0x40 [ 161.101615][T10377] wakeup_source_sysfs_remove+0x25/0x30 [ 161.101644][T10377] wakeup_source_unregister+0xf0/0x330 [ 161.101718][T10377] __ep_remove+0x2f7/0x3c0 [ 161.101787][T10377] ep_clear_and_put+0x163/0x320 [ 161.101829][T10377] ? __pfx_ep_eventpoll_release+0x10/0x10 [ 161.101877][T10377] ep_eventpoll_release+0x2c/0x40 [ 161.101914][T10377] __fput+0x29b/0x650 [ 161.101954][T10377] fput_close_sync+0x6e/0x120 [ 161.102040][T10377] __x64_sys_close+0x56/0xf0 [ 161.102064][T10377] x64_sys_call+0x273c/0x3000 [ 161.102118][T10377] do_syscall_64+0xd2/0x200 [ 161.102155][T10377] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 161.102192][T10377] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 161.102230][T10377] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 161.102259][T10377] RIP: 0033:0x7fd1057feec9 [ 161.102274][T10377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.102297][T10377] RSP: 002b:00007fd104225038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 161.102317][T10377] RAX: ffffffffffffffda RBX: 00007fd105a56180 RCX: 00007fd1057feec9 [ 161.102334][T10377] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 161.102350][T10377] RBP: 00007fd104225090 R08: 0000000000000000 R09: 0000000000000000 [ 161.102367][T10377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 161.102386][T10377] R13: 00007fd105a56218 R14: 00007fd105a56180 R15: 00007ffe03c575a8 [ 161.102412][T10377] [ 161.360409][T10389] loop5: detected capacity change from 0 to 2048 [ 161.495483][T10397] loop5: detected capacity change from 0 to 512 [ 161.522853][T10397] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 161.535739][T10397] ext4 filesystem being mounted at /69/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 161.568686][ T12] Bluetooth: hci1: Frame reassembly failed (-84) [ 161.648755][T10409] pim6reg: entered allmulticast mode [ 161.654785][T10409] pim6reg: left allmulticast mode [ 161.928513][T10425] FAULT_INJECTION: forcing a failure. [ 161.928513][T10425] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 161.941682][T10425] CPU: 1 UID: 0 PID: 10425 Comm: syz.4.2705 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 161.941777][T10425] Tainted: [W]=WARN [ 161.941786][T10425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 161.941832][T10425] Call Trace: [ 161.941890][T10425] [ 161.941898][T10425] __dump_stack+0x1d/0x30 [ 161.941920][T10425] dump_stack_lvl+0xe8/0x140 [ 161.941946][T10425] dump_stack+0x15/0x1b [ 161.942021][T10425] should_fail_ex+0x265/0x280 [ 161.942063][T10425] should_fail+0xb/0x20 [ 161.942162][T10425] should_fail_usercopy+0x1a/0x20 [ 161.942187][T10425] _copy_from_user+0x1c/0xb0 [ 161.942226][T10425] vga_arb_write+0x98/0x13d0 [ 161.942279][T10425] ? avc_policy_seqno+0x15/0x30 [ 161.942323][T10425] ? __pfx_vga_arb_write+0x10/0x10 [ 161.942360][T10425] vfs_write+0x269/0x960 [ 161.942383][T10425] ? __rcu_read_unlock+0x4f/0x70 [ 161.942427][T10425] ? __fget_files+0x184/0x1c0 [ 161.942463][T10425] ksys_write+0xda/0x1a0 [ 161.942623][T10425] __x64_sys_write+0x40/0x50 [ 161.942648][T10425] x64_sys_call+0x2802/0x3000 [ 161.942677][T10425] do_syscall_64+0xd2/0x200 [ 161.942770][T10425] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 161.942863][T10425] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 161.942893][T10425] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 161.942919][T10425] RIP: 0033:0x7fcc75aeeec9 [ 161.942937][T10425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.942961][T10425] RSP: 002b:00007fcc74557038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 161.943002][T10425] RAX: ffffffffffffffda RBX: 00007fcc75d45fa0 RCX: 00007fcc75aeeec9 [ 161.943019][T10425] RDX: 000000000000000c RSI: 0000200000000340 RDI: 0000000000000003 [ 161.943034][T10425] RBP: 00007fcc74557090 R08: 0000000000000000 R09: 0000000000000000 [ 161.943047][T10425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 161.943067][T10425] R13: 00007fcc75d46038 R14: 00007fcc75d45fa0 R15: 00007ffca9577b28 [ 161.943086][T10425] [ 162.488074][T10436] netlink: 14 bytes leftover after parsing attributes in process `syz.4.2709'. [ 162.640411][T10439] pim6reg: entered allmulticast mode [ 162.664983][T10439] pim6reg: left allmulticast mode [ 162.748111][ T5698] Bluetooth: hci0: command 0x1003 tx timeout [ 162.754389][ T4316] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 162.785997][ T3319] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 162.876250][T10441] validate_nla: 2 callbacks suppressed [ 162.876275][T10441] netlink: 'syz.4.2712': attribute type 10 has an invalid length. [ 162.892856][T10442] tipc: Enabling of bearer rejected, already enabled [ 162.901375][T10441] bond0: (slave dummy0): Releasing backup interface [ 162.907333][T10444] netlink: 'syz.0.2713': attribute type 10 has an invalid length. [ 162.917340][T10441] dummy0: entered promiscuous mode [ 162.923368][T10441] team0: Failed to send options change via netlink (err -105) [ 162.925452][T10446] FAULT_INJECTION: forcing a failure. [ 162.925452][T10446] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 162.930945][T10441] team0: Port device dummy0 added [ 162.931764][T10447] netlink: 'syz.4.2712': attribute type 10 has an invalid length. [ 162.944226][T10446] CPU: 1 UID: 0 PID: 10446 Comm: syz.1.2711 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 162.944275][T10446] Tainted: [W]=WARN [ 162.944287][T10446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 162.944305][T10446] Call Trace: [ 162.944313][T10446] [ 162.944325][T10446] __dump_stack+0x1d/0x30 [ 162.944415][T10446] dump_stack_lvl+0xe8/0x140 [ 162.944442][T10446] dump_stack+0x15/0x1b [ 162.944502][T10446] should_fail_ex+0x265/0x280 [ 162.944599][T10446] should_fail+0xb/0x20 [ 162.944644][T10446] should_fail_usercopy+0x1a/0x20 [ 162.944675][T10446] _copy_from_user+0x1c/0xb0 [ 162.944712][T10446] ___sys_sendmsg+0xc1/0x1d0 [ 162.944829][T10446] __x64_sys_sendmsg+0xd4/0x160 [ 162.944877][T10446] x64_sys_call+0x191e/0x3000 [ 162.944950][T10446] do_syscall_64+0xd2/0x200 [ 162.944985][T10446] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 162.945035][T10446] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 162.945066][T10446] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 162.945155][T10446] RIP: 0033:0x7fb70171eec9 [ 162.945176][T10446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 162.945201][T10446] RSP: 002b:00007fb70017f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 162.945228][T10446] RAX: ffffffffffffffda RBX: 00007fb701975fa0 RCX: 00007fb70171eec9 [ 162.945246][T10446] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 162.945270][T10446] RBP: 00007fb70017f090 R08: 0000000000000000 R09: 0000000000000000 [ 162.945288][T10446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 162.945306][T10446] R13: 00007fb701976038 R14: 00007fb701975fa0 R15: 00007ffdca646db8 [ 162.945332][T10446] [ 163.082175][ T29] kauditd_printk_skb: 287 callbacks suppressed [ 163.082194][ T29] audit: type=1400 audit(1760239778.732:21792): avc: denied { read } for pid=10448 comm="syz.1.2715" dev="nsfs" ino=4026532515 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 163.082260][ T29] audit: type=1400 audit(1760239778.732:21793): avc: denied { open } for pid=10448 comm="syz.1.2715" path="net:[4026532515]" dev="nsfs" ino=4026532515 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 163.082291][ T29] audit: type=1400 audit(1760239778.732:21794): avc: denied { write } for pid=10448 comm="syz.1.2715" name="raw6" dev="proc" ino=4026532741 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 163.091611][T10447] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 163.218516][T10453] loop1: detected capacity change from 0 to 128 [ 163.219223][T10447] dummy0: left promiscuous mode [ 163.230419][ T29] audit: type=1400 audit(1760239778.952:21795): avc: denied { mounton } for pid=10451 comm="syz.1.2716" path="/515/file0" dev="tmpfs" ino=2722 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 163.253329][ T29] audit: type=1400 audit(1760239778.962:21796): avc: denied { mount } for pid=10451 comm="syz.1.2716" name="/" dev="loop1" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 163.275753][T10447] team0: Failed to send options change via netlink (err -105) [ 163.283492][T10447] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 163.292809][T10447] team0: Port device dummy0 removed [ 163.300127][T10447] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 163.341467][T10452] pim6reg: entered allmulticast mode [ 163.344091][T10452] pim6reg: left allmulticast mode [ 163.347238][ T29] audit: type=1400 audit(1760239779.062:21797): avc: denied { read write } for pid=10456 comm="syz.4.2717" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 163.375409][ T29] audit: type=1400 audit(1760239779.062:21798): avc: denied { open } for pid=10456 comm="syz.4.2717" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 163.375518][ T29] audit: type=1400 audit(1760239779.062:21799): avc: denied { ioctl } for pid=10456 comm="syz.4.2717" path="/dev/ppp" dev="devtmpfs" ino=140 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 163.441816][ T29] audit: type=1400 audit(1760239779.142:21800): avc: denied { block_suspend } for pid=10450 comm="syz.0.2714" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 163.490452][T10462] netlink: 14 bytes leftover after parsing attributes in process `syz.2.2718'. [ 163.549616][ T29] audit: type=1400 audit(1760239779.272:21801): avc: denied { create } for pid=10464 comm="syz.2.2719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 163.578792][T10465] hub 9-0:1.0: USB hub found [ 163.578910][T10465] hub 9-0:1.0: 8 ports detected [ 163.585276][ T3557] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 163.587288][T10465] netlink: 'syz.2.2719': attribute type 1 has an invalid length. [ 163.599940][T10465] bond39: entered promiscuous mode [ 163.600084][T10465] 8021q: adding VLAN 0 to HW filter on device bond39 [ 163.705366][T10465] 8021q: adding VLAN 0 to HW filter on device bond40 [ 163.706616][T10465] bond40: entered promiscuous mode [ 163.707518][T10465] bond39: (slave bond40): Enslaving as an active interface with an up link [ 163.709646][T10465] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10465 comm=syz.2.2719 [ 163.710229][ T9086] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 163.876866][ T9] IPVS: starting estimator thread 0... [ 163.897268][T10488] IPVS: ip_vs_add_dest(): lower threshold is higher than upper threshold [ 163.920766][T10488] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2725'. [ 163.980914][T10489] IPVS: using max 2352 ests per chain, 117600 per kthread [ 164.004747][T10494] hub 9-0:1.0: USB hub found [ 164.009582][T10494] hub 9-0:1.0: 8 ports detected [ 164.020236][T10494] netlink: 'syz.2.2728': attribute type 1 has an invalid length. [ 164.035871][T10494] bond41: entered promiscuous mode [ 164.041278][T10494] 8021q: adding VLAN 0 to HW filter on device bond41 [ 164.063916][T10494] 8021q: adding VLAN 0 to HW filter on device bond42 [ 164.072231][T10494] bond42: entered promiscuous mode [ 164.078382][T10494] bond41: (slave bond42): Enslaving as an active interface with an up link [ 164.100232][T10494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10494 comm=syz.2.2728 [ 164.160326][T10492] usb usb9: usbfs: process 10492 (syz.4.2727) did not claim interface 0 before use [ 164.623566][T10509] lo speed is unknown, defaulting to 1000 [ 164.640504][T10509] lo speed is unknown, defaulting to 1000 [ 164.666086][T10525] netlink: 'syz.2.2737': attribute type 10 has an invalid length. [ 164.675101][T10524] netlink: 'syz.1.2738': attribute type 10 has an invalid length. [ 164.685937][T10525] bond0: (slave dummy0): Releasing backup interface [ 164.694157][T10525] dummy0: left allmulticast mode [ 164.700366][T10525] dummy0: entered promiscuous mode [ 164.705943][T10525] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 164.714843][T10525] team0: Failed to send options change via netlink (err -105) [ 164.722573][T10525] team0: Port device dummy0 added [ 164.729524][T10525] netlink: 'syz.2.2737': attribute type 10 has an invalid length. [ 164.753470][T10525] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 164.770567][T10525] dummy0: left promiscuous mode [ 164.776820][T10525] team0: Failed to send options change via netlink (err -105) [ 164.784556][T10525] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 164.793825][T10525] team0: Port device dummy0 removed [ 164.801678][T10525] dummy0: entered allmulticast mode [ 164.807841][T10525] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 164.911134][T10509] chnl_net:caif_netlink_parms(): no params data found [ 165.095391][T10556] netlink: 'syz.2.2750': attribute type 10 has an invalid length. [ 165.106941][T10545] pim6reg: entered allmulticast mode [ 165.113109][T10509] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.120235][T10509] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.129965][T10509] bridge_slave_0: entered allmulticast mode [ 165.136909][T10509] bridge_slave_0: entered promiscuous mode [ 165.146350][T10545] pim6reg: left allmulticast mode [ 165.155596][T10509] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.162773][T10509] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.170247][T10509] bridge_slave_1: entered allmulticast mode [ 165.177234][T10509] bridge_slave_1: entered promiscuous mode [ 165.201415][T10509] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 165.212415][T10509] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.234552][T10509] team0: Port device team_slave_0 added [ 165.245587][T10547] usb usb9: usbfs: process 10547 (syz.1.2748) did not claim interface 0 before use [ 165.255748][T10509] team0: Port device team_slave_1 added [ 165.283965][T10509] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 165.291059][T10509] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 165.317270][T10509] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 165.344936][ T1755] bond0: left allmulticast mode [ 165.354772][ T1755] dummy0: left allmulticast mode [ 165.359819][ T1755] bond0: left promiscuous mode [ 165.365048][ T1755] dummy0: left promiscuous mode [ 165.370175][ T1755] bridge0: port 1(bond0) entered disabled state [ 165.376404][T10566] hub 9-0:1.0: USB hub found [ 165.393218][T10566] hub 9-0:1.0: 8 ports detected [ 165.413781][T10566] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2754'. [ 165.442845][ T1755] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 165.451459][ T1755] bond0 (unregistering): Released all slaves [ 165.459846][ T1755] bond1 (unregistering): Released all slaves [ 165.468652][ T1755] bond2 (unregistering): Released all slaves [ 165.477777][ T1755] bond3 (unregistering): Released all slaves [ 165.486304][ T1755] bond4 (unregistering): Released all slaves [ 165.495161][ T1755] bond5 (unregistering): Released all slaves [ 165.505589][ T1755] bond6 (unregistering): Released all slaves [ 165.514799][ T1755] bond7 (unregistering): Released all slaves [ 165.524142][ T1755] bond8 (unregistering): Released all slaves [ 165.527814][T10571] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10571 comm=syz.4.2754 [ 165.534451][ T1755] bond9 (unregistering): Released all slaves [ 165.552337][ T1755] bond10 (unregistering): Released all slaves [ 165.561592][ T1755] bond11 (unregistering): Released all slaves [ 165.570718][ T1755] bond12 (unregistering): Released all slaves [ 165.581081][ T1755] bond13 (unregistering): Released all slaves [ 165.589576][ T1755] bond14 (unregistering): Released all slaves [ 165.598677][ T1755] bond15 (unregistering): Released all slaves [ 165.607841][ T1755] bond16 (unregistering): Released all slaves [ 165.617105][ T1755] bond17 (unregistering): Released all slaves [ 165.626906][ T1755] bond18 (unregistering): Released all slaves [ 165.636303][ T1755] bond19 (unregistering): Released all slaves [ 165.645551][ T1755] bond20 (unregistering): Released all slaves [ 165.654348][ T1755] bond21 (unregistering): Released all slaves [ 165.663678][ T1755] bond22 (unregistering): Released all slaves [ 165.672811][ T1755] bond23 (unregistering): Released all slaves [ 165.682148][ T1755] bond24 (unregistering): Released all slaves [ 165.691781][ T1755] bond25 (unregistering): Released all slaves [ 165.700574][ T1755] bond26 (unregistering): Released all slaves [ 165.710463][ T1755] bond27 (unregistering): Released all slaves [ 165.719484][ T1755] bond28 (unregistering): Released all slaves [ 165.728541][ T1755] bond29 (unregistering): Released all slaves [ 165.737820][ T1755] bond30 (unregistering): Released all slaves [ 165.746920][ T1755] bond31 (unregistering): Released all slaves [ 165.756473][ T1755] bond32 (unregistering): (slave bond33): Releasing backup interface [ 165.765146][ T1755] bond33 (unregistering): left promiscuous mode [ 165.772366][ T1755] bond32 (unregistering): Released all slaves [ 165.781375][ T1755] bond33 (unregistering): Released all slaves [ 165.791087][ T1755] bond34 (unregistering): (slave bond35): Releasing backup interface [ 165.799245][ T1755] bond35 (unregistering): left promiscuous mode [ 165.805998][ T1755] bond34 (unregistering): Released all slaves [ 165.815025][ T1755] bond35 (unregistering): Released all slaves [ 165.826549][ T1755] bond36 (unregistering): (slave bond37): Releasing backup interface [ 165.835792][ T1755] bond37 (unregistering): left promiscuous mode [ 165.842876][ T1755] bond36 (unregistering): Released all slaves [ 165.852842][ T1755] bond37 (unregistering): Released all slaves [ 165.863094][ T1755] bond38 (unregistering): (slave bond39): Releasing backup interface [ 165.871536][ T1755] bond39 (unregistering): left promiscuous mode [ 165.878479][ T1755] bond38 (unregistering): Released all slaves [ 165.889360][ T1755] bond39 (unregistering): Released all slaves [ 165.899088][ T1755] bond40 (unregistering): (slave bond41): Releasing backup interface [ 165.907228][ T1755] bond41 (unregistering): left promiscuous mode [ 165.914117][ T1755] bond40 (unregistering): Released all slaves [ 165.922892][ T1755] bond41 (unregistering): Released all slaves [ 165.932559][ T1755] bond42 (unregistering): (slave bond43): Releasing backup interface [ 165.940670][ T1755] bond43 (unregistering): left promiscuous mode [ 165.947934][ T1755] bond42 (unregistering): Released all slaves [ 165.956822][ T1755] bond43 (unregistering): Released all slaves [ 165.966958][ T1755] bond44 (unregistering): (slave bond45): Releasing backup interface [ 165.975538][ T1755] bond45 (unregistering): left promiscuous mode [ 165.982559][ T1755] bond44 (unregistering): Released all slaves [ 165.991512][ T1755] bond45 (unregistering): Released all slaves [ 166.001614][ T1755] bond46 (unregistering): (slave bond47): Releasing backup interface [ 166.009732][ T1755] bond47 (unregistering): left promiscuous mode [ 166.017615][ T1755] bond46 (unregistering): Released all slaves [ 166.026765][ T1755] bond47 (unregistering): Released all slaves [ 166.037606][ T1755] bond48 (unregistering): (slave bond49): Releasing backup interface [ 166.045923][ T1755] bond49 (unregistering): left promiscuous mode [ 166.052969][ T1755] bond48 (unregistering): Released all slaves [ 166.062803][ T1755] bond49 (unregistering): Released all slaves [ 166.072526][ T1755] bond50 (unregistering): (slave bond51): Releasing backup interface [ 166.080636][ T1755] bond51 (unregistering): left promiscuous mode [ 166.087564][ T1755] bond50 (unregistering): Released all slaves [ 166.096177][ T1755] bond51 (unregistering): Released all slaves [ 166.105065][ T1755] bond52 (unregistering): (slave bond53): Releasing backup interface [ 166.113469][ T1755] bond53 (unregistering): left promiscuous mode [ 166.119897][ T1755] bond52 (unregistering): Released all slaves [ 166.128427][ T1755] bond53 (unregistering): Released all slaves [ 166.137729][ T1755] bond54 (unregistering): (slave bond55): Releasing backup interface [ 166.146391][ T1755] bond55 (unregistering): left promiscuous mode [ 166.153804][ T1755] bond54 (unregistering): Released all slaves [ 166.162708][ T1755] bond55 (unregistering): Released all slaves [ 166.171993][ T1755] bond56 (unregistering): (slave bond57): Releasing backup interface [ 166.180448][ T1755] bond57 (unregistering): left promiscuous mode [ 166.187086][ T1755] bond56 (unregistering): Released all slaves [ 166.197130][ T1755] bond57 (unregistering): Released all slaves [ 166.197897][T10584] netlink: 'syz.2.2760': attribute type 10 has an invalid length. [ 166.212323][T10509] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 166.219303][T10509] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 166.245259][T10509] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 166.259313][T10569] workqueue: Failed to create a rescuer kthread for wq "bond44": -EINTR [ 166.312859][T10509] hsr_slave_0: entered promiscuous mode [ 166.336898][T10509] hsr_slave_1: entered promiscuous mode [ 166.351728][T10589] loop1: detected capacity change from 0 to 2048 [ 166.375031][ T1755] tipc: Disabling bearer [ 166.380293][ T1755] tipc: Left network mode [ 166.389543][T10589] ext3: Unknown parameter 'smackfsdef' [ 166.418237][T10597] loop5: detected capacity change from 0 to 512 [ 166.471869][T10597] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 166.485074][T10597] ext4 filesystem being mounted at /78/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 166.540035][ T9086] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 166.766335][T10611] usb usb9: usbfs: process 10611 (syz.2.2770) did not claim interface 0 before use [ 166.813826][T10616] lo speed is unknown, defaulting to 1000 [ 166.820354][T10616] lo speed is unknown, defaulting to 1000 [ 167.160402][T10509] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 167.170629][T10509] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 167.204485][T10509] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 167.213668][T10509] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 167.256774][ T1755] IPVS: stop unused estimator thread 0... [ 167.343601][T10509] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.375761][T10509] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.398064][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.405190][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.423210][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.430321][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.449401][T10509] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 167.459854][T10509] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 167.524590][T10646] bond0: (slave dummy0): Releasing backup interface [ 167.560691][T10646] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 167.581669][T10646] team0: Failed to send options change via netlink (err -105) [ 167.589197][T10646] team0: Port device dummy0 added [ 167.605304][T10652] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 167.621811][T10652] team0: Failed to send options change via netlink (err -105) [ 167.629402][T10652] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 167.638572][T10652] team0: Port device dummy0 removed [ 167.645744][T10652] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 167.659540][T10509] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.723759][T10659] netlink: 14 bytes leftover after parsing attributes in process `syz.5.2784'. [ 167.825302][T10509] veth0_vlan: entered promiscuous mode [ 167.833983][T10509] veth1_vlan: entered promiscuous mode [ 167.853206][T10509] veth0_macvtap: entered promiscuous mode [ 167.860921][T10509] veth1_macvtap: entered promiscuous mode [ 167.874892][T10509] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 167.887379][T10509] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 167.898935][ T997] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.908027][ T997] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.923105][ T997] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.944875][ T997] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.962806][T10675] hub 9-0:1.0: USB hub found [ 167.967641][T10675] hub 9-0:1.0: 8 ports detected [ 167.992104][T10675] bond1 (unregistering): Released all slaves [ 168.030688][T10681] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10681 comm=syz.5.2789 [ 168.090995][ T29] kauditd_printk_skb: 551 callbacks suppressed [ 168.091010][ T29] audit: type=1326 audit(1760239783.812:22353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10684 comm="syz.5.2791" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 168.122998][ T29] audit: type=1326 audit(1760239783.852:22354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10684 comm="syz.5.2791" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 168.146952][ T29] audit: type=1326 audit(1760239783.852:22355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10684 comm="syz.5.2791" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 168.171080][ T29] audit: type=1326 audit(1760239783.852:22356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10684 comm="syz.5.2791" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 168.194894][ T29] audit: type=1326 audit(1760239783.852:22357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10684 comm="syz.5.2791" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 168.218605][ T29] audit: type=1326 audit(1760239783.852:22358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10684 comm="syz.5.2791" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 168.242269][ T29] audit: type=1326 audit(1760239783.852:22359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10684 comm="syz.5.2791" exe="/root/syz-executor" sig=0 arch=c000003e syscall=291 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 168.265883][ T29] audit: type=1326 audit(1760239783.852:22360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10684 comm="syz.5.2791" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 168.289627][ T29] audit: type=1326 audit(1760239783.852:22361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10684 comm="syz.5.2791" exe="/root/syz-executor" sig=0 arch=c000003e syscall=281 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 168.316635][ T29] audit: type=1326 audit(1760239783.902:22362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10684 comm="syz.5.2791" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 168.543401][T10685] usb usb9: usbfs: process 10685 (syz.5.2791) did not claim interface 0 before use [ 168.688324][T10692] validate_nla: 2 callbacks suppressed [ 168.688344][T10692] netlink: 'syz.2.2794': attribute type 10 has an invalid length. [ 168.720223][T10692] bond0: (slave dummy0): Releasing backup interface [ 168.733982][T10692] dummy0: left allmulticast mode [ 168.739202][T10693] netlink: 'syz.2.2794': attribute type 10 has an invalid length. [ 168.751470][T10692] dummy0: entered promiscuous mode [ 168.769091][T10692] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 168.801328][T10692] team0: Failed to send options change via netlink (err -105) [ 168.808882][T10692] team0: Port device dummy0 added [ 168.835188][T10693] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 168.856231][T10693] dummy0: left promiscuous mode [ 168.871771][T10693] team0: Failed to send options change via netlink (err -105) [ 168.879395][T10693] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 168.909993][T10693] team0: Port device dummy0 removed [ 168.917648][T10693] dummy0: entered allmulticast mode [ 168.931714][T10693] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 169.270109][T10708] block device autoloading is deprecated and will be removed. [ 169.307779][T10709] pim6reg: entered allmulticast mode [ 169.325331][T10707] pim6reg: left allmulticast mode [ 169.442441][T10716] netlink: 14 bytes leftover after parsing attributes in process `syz.0.2797'. [ 169.452428][T10716] hsr_slave_0: left promiscuous mode [ 169.461637][T10716] hsr_slave_1: left promiscuous mode [ 169.499834][T10722] loop1: detected capacity change from 0 to 128 [ 169.560086][T10727] pim6reg: entered allmulticast mode [ 169.617592][T10732] pim6reg: entered allmulticast mode [ 169.642004][T10734] loop5: detected capacity change from 0 to 2048 [ 169.648676][T10734] ext3: Unknown parameter 'smackfsdef' [ 169.659954][T10720] pim6reg: left allmulticast mode [ 169.687730][T10722] pim6reg: left allmulticast mode [ 169.798537][T10745] hub 9-0:1.0: USB hub found [ 169.803504][T10745] hub 9-0:1.0: 8 ports detected [ 169.817926][T10745] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2817'. [ 169.843877][T10745] bond43 (unregistering): Released all slaves [ 169.875988][T10743] pim6reg: entered allmulticast mode [ 169.885955][T10751] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10751 comm=syz.2.2817 [ 169.895200][T10753] loop1: detected capacity change from 0 to 512 [ 169.900059][T10743] pim6reg: left allmulticast mode [ 169.923114][T10753] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 169.936420][T10753] ext4 filesystem being mounted at /530/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 169.964528][ T3319] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 169.988039][T10741] usb usb9: usbfs: process 10741 (syz.5.2815) did not claim interface 0 before use [ 170.085340][T10766] netlink: 'syz.1.2824': attribute type 10 has an invalid length. [ 170.094084][T10766] bond0: (slave dummy0): Releasing backup interface [ 170.102208][T10766] netlink: 'syz.1.2824': attribute type 10 has an invalid length. [ 170.111856][T10766] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 170.234480][T10762] lo speed is unknown, defaulting to 1000 [ 170.240595][T10762] lo speed is unknown, defaulting to 1000 [ 170.413948][ T1755] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 170.422376][ T1755] dummy0: left allmulticast mode [ 170.428056][ T1755] bond0 (unregistering): Released all slaves [ 170.436625][ T1755] bond1 (unregistering): Released all slaves [ 170.445005][ T1755] bond2 (unregistering): Released all slaves [ 170.453546][ T1755] bond3 (unregistering): Released all slaves [ 170.462026][ T1755] bond4 (unregistering): Released all slaves [ 170.470369][ T1755] bond5 (unregistering): Released all slaves [ 170.479016][ T1755] bond6 (unregistering): Released all slaves [ 170.487688][ T1755] bond7 (unregistering): Released all slaves [ 170.496321][ T1755] bond8 (unregistering): Released all slaves [ 170.504828][ T1755] bond9 (unregistering): Released all slaves [ 170.513299][ T1755] bond10 (unregistering): Released all slaves [ 170.521847][ T1755] bond11 (unregistering): Released all slaves [ 170.530627][ T1755] bond12 (unregistering): Released all slaves [ 170.539382][ T1755] bond13 (unregistering): Released all slaves [ 170.548433][ T1755] bond14 (unregistering): Released all slaves [ 170.557018][ T1755] bond15 (unregistering): Released all slaves [ 170.565967][ T1755] bond16 (unregistering): Released all slaves [ 170.574787][ T1755] bond17 (unregistering): Released all slaves [ 170.583598][ T1755] bond18 (unregistering): Released all slaves [ 170.593045][ T1755] bond19 (unregistering): Released all slaves [ 170.602608][ T1755] bond20 (unregistering): Released all slaves [ 170.612335][ T1755] bond21 (unregistering): Released all slaves [ 170.621752][ T1755] bond22 (unregistering): Released all slaves [ 170.630479][ T1755] bond23 (unregistering): Released all slaves [ 170.639190][ T1755] bond24 (unregistering): Released all slaves [ 170.647823][ T1755] bond25 (unregistering): Released all slaves [ 170.657283][ T1755] bond26 (unregistering): Released all slaves [ 170.667386][ T1755] bond27 (unregistering): Released all slaves [ 170.676392][ T1755] bond28 (unregistering): Released all slaves [ 170.685318][ T1755] bond29 (unregistering): (slave bond30): Releasing backup interface [ 170.693563][ T1755] bond30 (unregistering): left promiscuous mode [ 170.700498][ T1755] bond29 (unregistering): Released all slaves [ 170.709172][ T1755] bond30 (unregistering): Released all slaves [ 170.718142][ T1755] bond31 (unregistering): (slave bond32): Releasing backup interface [ 170.726499][ T1755] bond32 (unregistering): left promiscuous mode [ 170.735004][ T1755] bond31 (unregistering): Released all slaves [ 170.738580][T10792] loop5: detected capacity change from 0 to 2048 [ 170.744388][ T1755] bond32 (unregistering): Released all slaves [ 170.748119][T10792] ext3: Unknown parameter 'smackfsdef' [ 170.761241][ T1755] bond33 (unregistering): (slave bond34): Releasing backup interface [ 170.769341][ T1755] bond34 (unregistering): left promiscuous mode [ 170.778185][ T1755] bond33 (unregistering): Released all slaves [ 170.786816][ T1755] bond34 (unregistering): Released all slaves [ 170.796054][ T1755] bond35 (unregistering): (slave bond36): Releasing backup interface [ 170.804353][ T1755] bond36 (unregistering): left promiscuous mode [ 170.811195][ T1755] bond35 (unregistering): Released all slaves [ 170.819636][ T1755] bond36 (unregistering): Released all slaves [ 170.828810][ T1755] bond37 (unregistering): (slave bond38): Releasing backup interface [ 170.837493][ T1755] bond38 (unregistering): left promiscuous mode [ 170.844338][ T1755] bond37 (unregistering): Released all slaves [ 170.853187][ T1755] bond38 (unregistering): Released all slaves [ 170.862061][ T1755] bond39 (unregistering): (slave bond40): Releasing backup interface [ 170.870529][ T1755] bond40 (unregistering): left promiscuous mode [ 170.877261][ T1755] bond39 (unregistering): Released all slaves [ 170.885968][ T1755] bond40 (unregistering): Released all slaves [ 170.895346][ T1755] bond41 (unregistering): (slave bond42): Releasing backup interface [ 170.904419][ T1755] bond42 (unregistering): left promiscuous mode [ 170.910931][ T1755] bond41 (unregistering): Released all slaves [ 170.919485][ T1755] bond42 (unregistering): Released all slaves [ 170.930230][T10786] tipc: Enabling of bearer rejected, already enabled [ 170.941284][T10762] chnl_net:caif_netlink_parms(): no params data found [ 170.972556][ T1755] tipc: Disabling bearer [ 170.977808][ T1755] tipc: Left network mode [ 171.013610][T10798] hub 9-0:1.0: USB hub found [ 171.018354][T10798] hub 9-0:1.0: 8 ports detected [ 171.018667][T10762] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.027171][T10798] netlink: 28 bytes leftover after parsing attributes in process `syz.5.2831'. [ 171.030360][T10762] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.047055][T10762] bridge_slave_0: entered allmulticast mode [ 171.054390][T10762] bridge_slave_0: entered promiscuous mode [ 171.069740][T10798] bond1 (unregistering): Released all slaves [ 171.106876][ T1755] pimreg (unregistering): left allmulticast mode [ 171.117799][T10800] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10800 comm=syz.5.2831 [ 171.181813][T10762] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.188970][T10762] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.197031][T10762] bridge_slave_1: entered allmulticast mode [ 171.203773][T10762] bridge_slave_1: entered promiscuous mode [ 171.221143][T10804] loop5: detected capacity change from 0 to 2048 [ 171.227913][T10804] ext3: Unknown parameter 'smackfsdef' [ 171.248497][T10762] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.261025][T10762] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 171.284098][T10762] team0: Port device team_slave_0 added [ 171.291511][T10762] team0: Port device team_slave_1 added [ 171.310160][T10808] netlink: 'syz.1.2835': attribute type 10 has an invalid length. [ 171.321527][T10808] bond0: (slave dummy0): Releasing backup interface [ 171.332090][T10762] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 171.339216][T10762] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 171.365323][T10762] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 171.399126][T10814] loop5: detected capacity change from 0 to 512 [ 171.429666][T10762] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 171.436754][T10762] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 171.462945][T10762] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 171.475659][T10814] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 171.488584][T10814] ext4 filesystem being mounted at /101/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 171.503345][T10813] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 171.509191][T10820] hub 9-0:1.0: USB hub found [ 171.518337][T10820] hub 9-0:1.0: 8 ports detected [ 171.542480][T10762] hsr_slave_0: entered promiscuous mode [ 171.548721][T10762] hsr_slave_1: entered promiscuous mode [ 171.555279][ T9086] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 171.565105][T10820] bond41 (unregistering): Released all slaves [ 171.582295][T10813] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 171.609734][T10825] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10825 comm=syz.1.2840 [ 171.647372][T10830] hub 9-0:1.0: USB hub found [ 171.652847][T10830] hub 9-0:1.0: 8 ports detected [ 171.660703][T10830] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2843'. [ 171.700648][T10830] bond44 (unregistering): Released all slaves [ 171.718738][T10813] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 171.732819][T10832] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10832 comm=syz.4.2843 [ 171.805043][T10813] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 171.823730][T10833] tipc: Started in network mode [ 171.828663][T10833] tipc: Node identity ac1414aa, cluster identity 4711 [ 171.828913][T10835] loop1: detected capacity change from 0 to 256 [ 171.835762][T10833] tipc: Enabled bearer , priority 10 [ 171.844680][T10835] FAT-fs (loop1): bogus number of FAT sectors [ 171.854314][T10835] FAT-fs (loop1): Can't find a valid FAT filesystem [ 171.882224][T10839] netlink: 14 bytes leftover after parsing attributes in process `syz.1.2845'. [ 171.896588][ T997] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 171.907502][ T997] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 171.919031][ T997] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 171.930307][ T997] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 171.990584][T10844] loop1: detected capacity change from 0 to 2048 [ 172.150516][T10856] hub 9-0:1.0: USB hub found [ 172.155382][T10856] hub 9-0:1.0: 8 ports detected [ 172.163281][T10856] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2854'. [ 172.180325][T10856] bond41 (unregistering): Released all slaves [ 172.194596][T10762] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 172.208957][T10762] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 172.218980][T10762] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 172.230977][T10856] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10856 comm=syz.1.2854 [ 172.246943][T10762] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 172.333033][T10762] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.347872][T10762] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.358983][ T997] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.366174][ T997] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.382464][ T997] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.389894][ T997] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.479510][T10762] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.605697][T10881] netlink: 14 bytes leftover after parsing attributes in process `syz.5.2857'. [ 172.616985][T10762] veth0_vlan: entered promiscuous mode [ 172.655944][T10762] veth1_vlan: entered promiscuous mode [ 172.696581][T10762] veth0_macvtap: entered promiscuous mode [ 172.715327][T10762] veth1_macvtap: entered promiscuous mode [ 172.737702][T10762] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 172.748979][T10762] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 172.780730][ T52] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.810050][ T52] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.832310][ T1457] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.841945][ T3482] tipc: Node number set to 2886997162 [ 172.857067][ T1457] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.161926][T10901] netlink: 'syz.5.2864': attribute type 10 has an invalid length. [ 173.171036][T10901] bond0: (slave dummy0): Releasing backup interface [ 173.179851][T10901] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 173.189783][T10901] team0: Failed to send options change via netlink (err -105) [ 173.197392][T10901] team0: Port device dummy0 added [ 173.204726][T10901] netlink: 'syz.5.2864': attribute type 10 has an invalid length. [ 173.213281][T10901] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 173.223439][T10901] team0: Failed to send options change via netlink (err -105) [ 173.231065][T10901] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 173.242270][T10901] team0: Port device dummy0 removed [ 173.249208][T10901] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 173.299695][ T29] kauditd_printk_skb: 371 callbacks suppressed [ 173.299713][ T29] audit: type=1326 audit(1760239789.022:22734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10902 comm="syz.5.2865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 173.350196][ T29] audit: type=1326 audit(1760239789.062:22735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10902 comm="syz.5.2865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 173.373858][ T29] audit: type=1326 audit(1760239789.062:22736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10902 comm="syz.5.2865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 173.386305][T10907] netlink: 'syz.5.2867': attribute type 10 has an invalid length. [ 173.397559][ T29] audit: type=1326 audit(1760239789.062:22737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10902 comm="syz.5.2865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 173.429049][ T29] audit: type=1326 audit(1760239789.062:22738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10902 comm="syz.5.2865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 173.452592][ T29] audit: type=1326 audit(1760239789.062:22739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10902 comm="syz.5.2865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd25374eec9 code=0x7ffc0000 [ 173.454644][T10909] netlink: 'syz.5.2867': attribute type 10 has an invalid length. [ 173.484901][ T3557] Bluetooth: hci0: sending frame failed (-49) [ 173.491059][ T4316] Bluetooth: hci0: Opcode 0x1003 failed: -49 [ 173.499026][T10907] bond0: (slave dummy0): Releasing backup interface [ 173.511224][T10907] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 173.538193][T10907] team0: Failed to send options change via netlink (err -105) [ 173.545870][T10907] team0: Port device dummy0 added [ 173.583714][T10909] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 173.644342][T10909] team0: Failed to send options change via netlink (err -105) [ 173.657614][T10909] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 173.671471][T10909] team0: Port device dummy0 removed [ 173.683395][T10909] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 173.801056][ T29] audit: type=1400 audit(1760239789.532:22740): avc: denied { create } for pid=10926 comm="syz.5.2874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 173.841031][ T29] audit: type=1400 audit(1760239789.552:22741): avc: denied { setopt } for pid=10926 comm="syz.5.2874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 173.887043][T10929] netlink: 'syz.5.2875': attribute type 10 has an invalid length. [ 173.896839][T10929] bond0: (slave dummy0): Releasing backup interface [ 173.908740][T10931] hub 9-0:1.0: USB hub found [ 173.913495][T10931] hub 9-0:1.0: 8 ports detected [ 173.922880][T10931] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2876'. [ 173.933842][T10929] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 173.943308][T10929] team0: Failed to send options change via netlink (err -105) [ 173.946398][T10932] netlink: 'syz.5.2875': attribute type 10 has an invalid length. [ 173.950921][T10929] team0: Port device dummy0 added [ 173.981693][T10932] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 174.001623][T10932] team0: Failed to send options change via netlink (err -105) [ 174.009200][T10932] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 174.020613][T10932] team0: Port device dummy0 removed [ 174.027823][T10932] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 174.069885][T10933] bond44 (unregistering): Released all slaves [ 174.098551][T10931] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10931 comm=syz.4.2876 [ 174.208585][T10935] loop1: detected capacity change from 0 to 512 [ 174.215844][T10935] ext4: Unknown parameter 'oldalloc"data' [ 174.226239][T10935] loop1: detected capacity change from 0 to 164 [ 174.233275][T10935] iso9660: Bad value for 'uid' [ 174.238335][T10935] iso9660: Bad value for 'uid' [ 174.480687][ T29] audit: type=1400 audit(1760239790.202:22742): avc: denied { prog_load } for pid=10950 comm="syz.1.2884" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 174.542970][ T29] audit: type=1400 audit(1760239790.202:22743): avc: denied { bpf } for pid=10950 comm="syz.1.2884" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 174.645697][T10965] hub 9-0:1.0: USB hub found [ 174.650544][T10965] hub 9-0:1.0: 8 ports detected [ 174.659668][T10965] netlink: 8 bytes leftover after parsing attributes in process `syz.5.2890'. [ 174.695122][T10965] bond1 (unregistering): Released all slaves [ 174.710201][T10961] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 174.734600][T10968] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10968 comm=syz.5.2890 [ 174.761875][T10972] hub 9-0:1.0: USB hub found [ 174.766683][T10972] hub 9-0:1.0: 8 ports detected [ 174.774158][T10958] usb usb9: usbfs: process 10958 (syz.4.2887) did not claim interface 0 before use [ 174.786800][T10972] netlink: 'syz.0.2892': attribute type 1 has an invalid length. [ 174.801296][T10972] batman_adv: batadv0: Adding interface: bond1 [ 174.807532][T10972] batman_adv: batadv0: The MTU of interface bond1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 174.832751][T10972] batman_adv: batadv0: Not using interface bond1 (retrying later): interface not active [ 174.847000][T10972] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10972 comm=syz.0.2892 [ 174.878851][T10978] netlink: 'syz.5.2894': attribute type 10 has an invalid length. [ 174.887687][T10978] bond0: (slave dummy0): Releasing backup interface [ 174.896065][T10978] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 174.905000][T10978] team0: Failed to send options change via netlink (err -105) [ 174.912504][T10978] team0: Port device dummy0 added [ 174.993379][T10980] loop5: detected capacity change from 0 to 512 [ 175.000319][T10980] ext4: Unknown parameter 'oldalloc"data' [ 175.010377][T10980] loop5: detected capacity change from 0 to 164 [ 175.017010][T10980] iso9660: Bad value for 'uid' [ 175.021876][T10980] iso9660: Bad value for 'uid' [ 175.075581][T10982] loop5: detected capacity change from 0 to 2048 [ 175.082414][T10982] ext3: Unknown parameter 'smackfsdef' [ 175.142188][T10986] loop5: detected capacity change from 0 to 512 [ 175.152668][T10986] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 175.165547][T10986] ext4 filesystem being mounted at /122/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 175.182120][ T37] Bluetooth: hci0: Frame reassembly failed (-84) [ 175.382550][T10994] hub 9-0:1.0: USB hub found [ 175.387327][T10994] hub 9-0:1.0: 8 ports detected [ 175.395554][T10994] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2900'. [ 175.412355][T10994] bond44 (unregistering): Released all slaves [ 175.461966][T10994] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=10994 comm=syz.4.2900 [ 175.720435][T11006] loop1: detected capacity change from 0 to 128 [ 176.018912][T11006] pim6reg: entered allmulticast mode [ 176.071105][T11006] pim6reg: left allmulticast mode [ 176.542616][T11010] loop1: detected capacity change from 0 to 512 [ 176.549260][T11010] ext4: Unknown parameter 'oldalloc"data' [ 176.558566][T11010] loop1: detected capacity change from 0 to 164 [ 176.565352][T11010] iso9660: Bad value for 'uid' [ 176.570164][T11010] iso9660: Bad value for 'uid' [ 176.637344][T11017] loop1: detected capacity change from 0 to 2048 [ 176.644225][T11017] ext3: Unknown parameter 'smackfsdef' [ 177.069084][T11028] netlink: 'syz.1.2913': attribute type 1 has an invalid length. [ 177.076990][T11028] netlink: 'syz.1.2913': attribute type 4 has an invalid length. [ 177.084767][T11028] netlink: 9462 bytes leftover after parsing attributes in process `syz.1.2913'. [ 177.117951][T11028] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2913'. [ 177.150114][T11031] hub 9-0:1.0: USB hub found [ 177.155166][T11031] hub 9-0:1.0: 8 ports detected [ 177.162916][T11031] netlink: 'syz.1.2914': attribute type 1 has an invalid length. [ 177.176679][T11031] bond41: entered promiscuous mode [ 177.182320][T11031] 8021q: adding VLAN 0 to HW filter on device bond41 [ 177.198010][T11031] 8021q: adding VLAN 0 to HW filter on device bond42 [ 177.206225][T11031] bond42: entered promiscuous mode [ 177.212191][T11031] bond41: (slave bond42): Enslaving as an active interface with an up link [ 177.228052][T11031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=11031 comm=syz.1.2914 [ 177.254588][T10961] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 177.261033][ T3557] Bluetooth: hci0: command 0x1003 tx timeout [ 177.266468][ T4316] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 177.287752][ T9086] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 177.372108][T11042] loop5: detected capacity change from 0 to 512 [ 177.379079][T11042] ext4: Unknown parameter 'oldalloc"data' [ 177.389703][T11042] loop5: detected capacity change from 0 to 164 [ 177.396686][T11042] iso9660: Bad value for 'uid' [ 177.401545][T11042] iso9660: Bad value for 'uid' [ 177.567931][T11049] loop5: detected capacity change from 0 to 1024 [ 177.583979][T10961] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 177.617592][T11049] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 177.635090][T10961] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 177.661664][ T9086] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 177.747145][ T1457] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.757378][ T1457] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.766991][ T1457] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.775320][ T1457] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.849878][T11052] usb usb9: usbfs: process 11052 (syz.0.2921) did not claim interface 0 before use [ 177.987791][T11066] netlink: 'syz.1.2927': attribute type 10 has an invalid length. [ 178.069813][T11066] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 178.357799][T11068] hub 9-0:1.0: USB hub found [ 178.374050][T11068] hub 9-0:1.0: 8 ports detected [ 178.385698][T11068] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2928'. [ 178.432375][ T29] kauditd_printk_skb: 305 callbacks suppressed [ 178.432395][ T29] audit: type=1400 audit(1760239794.162:23049): avc: denied { create } for pid=11069 comm="syz.5.2929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 178.477916][T11068] bond43 (unregistering): Released all slaves [ 178.496696][T11074] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=11074 comm=syz.1.2928 [ 178.518644][ T29] audit: type=1400 audit(1760239794.202:23050): avc: denied { read } for pid=11072 comm="syz.4.2930" name="usbmon7" dev="devtmpfs" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 178.542396][ T29] audit: type=1400 audit(1760239794.202:23051): avc: denied { open } for pid=11072 comm="syz.4.2930" path="/dev/usbmon7" dev="devtmpfs" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 178.566446][ T29] audit: type=1400 audit(1760239794.202:23052): avc: denied { ioctl } for pid=11072 comm="syz.4.2930" path="/dev/usbmon7" dev="devtmpfs" ino=163 ioctlcmd=0x920a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 178.627535][ T29] audit: type=1326 audit(1760239794.322:23053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11072 comm="syz.4.2930" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc75aeeec9 code=0x7ffc0000 [ 178.651198][ T29] audit: type=1326 audit(1760239794.322:23054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11072 comm="syz.4.2930" exe="/root/syz-executor" sig=0 arch=c000003e syscall=425 compat=0 ip=0x7fcc75aeeec9 code=0x7ffc0000 [ 178.674810][ T29] audit: type=1326 audit(1760239794.322:23055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11072 comm="syz.4.2930" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fcc75aeef03 code=0x7ffc0000 [ 178.698426][ T29] audit: type=1326 audit(1760239794.322:23056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11072 comm="syz.4.2930" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fcc75aeef03 code=0x7ffc0000 [ 178.721932][ T29] audit: type=1326 audit(1760239794.322:23057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11072 comm="syz.4.2930" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc75aeeec9 code=0x7ffc0000 [ 178.745724][ T29] audit: type=1326 audit(1760239794.322:23058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11072 comm="syz.4.2930" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fcc75aeeec9 code=0x7ffc0000 [ 178.772418][T11078] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 178.787313][T11079] tipc: Enabling of bearer rejected, already enabled [ 178.926174][T11078] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 178.985391][T11078] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 179.114860][T11078] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 179.228779][ T997] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 179.246485][ T997] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 179.270061][ T997] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 179.318839][ T52] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 179.380492][T11096] hub 9-0:1.0: USB hub found [ 179.391379][T11096] hub 9-0:1.0: 8 ports detected [ 179.399393][T11096] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2938'. [ 179.409521][T11094] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2937'. [ 179.426395][T11096] bond44 (unregistering): Released all slaves [ 179.435924][T11090] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 179.435924][T11090] The task syz.0.2935 (11090) triggered the difference, watch for misbehavior. [ 179.463169][T11102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=11102 comm=syz.4.2938 [ 179.485714][T11094] bond43 (unregistering): Released all slaves [ 179.549627][T11108] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=11108 comm=syz.1.2937 [ 179.589983][T11098] usb usb9: usbfs: process 11098 (syz.5.2939) did not claim interface 0 before use [ 179.605821][T11111] hub 9-0:1.0: USB hub found [ 179.610576][T11111] hub 9-0:1.0: 8 ports detected [ 179.618037][T11111] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2942'. [ 179.634687][T11111] bond2 (unregistering): Released all slaves [ 179.681686][T11113] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=11113 comm=syz.0.2942 [ 179.848172][T11117] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 179.891902][T11121] can0: slcan on ttyS3. [ 179.897186][T11117] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 179.942575][T11117] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 179.960776][T11124] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 179.969384][T11124] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 179.970993][T11121] can0 (unregistered): slcan off ttyS3. [ 180.002513][T11117] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 180.133457][T11128] can0: slcan on ttyS3. [ 180.183162][T11130] loop5: detected capacity change from 0 to 512 [ 180.203395][T11130] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 180.216043][T11130] ext4 filesystem being mounted at /130/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 180.251785][ T9086] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 180.764287][T11143] FAULT_INJECTION: forcing a failure. [ 180.764287][T11143] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 180.777596][T11143] CPU: 1 UID: 0 PID: 11143 Comm: syz.5.2952 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 180.777637][T11143] Tainted: [W]=WARN [ 180.777644][T11143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 180.777657][T11143] Call Trace: [ 180.777664][T11143] [ 180.777671][T11143] __dump_stack+0x1d/0x30 [ 180.777696][T11143] dump_stack_lvl+0xe8/0x140 [ 180.777722][T11143] dump_stack+0x15/0x1b [ 180.777817][T11143] should_fail_ex+0x265/0x280 [ 180.777902][T11143] should_fail+0xb/0x20 [ 180.777940][T11143] should_fail_usercopy+0x1a/0x20 [ 180.777968][T11143] _copy_to_user+0x20/0xa0 [ 180.778001][T11143] simple_read_from_buffer+0xb5/0x130 [ 180.778033][T11143] proc_fail_nth_read+0x10e/0x150 [ 180.778105][T11143] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 180.778196][T11143] vfs_read+0x1a8/0x770 [ 180.778220][T11143] ? __cond_resched+0x4e/0x90 [ 180.778339][T11143] ksys_read+0xda/0x1a0 [ 180.778417][T11143] __x64_sys_read+0x40/0x50 [ 180.778440][T11143] x64_sys_call+0x27c0/0x3000 [ 180.778462][T11143] do_syscall_64+0xd2/0x200 [ 180.778490][T11143] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 180.778542][T11143] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 180.778571][T11143] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 180.778600][T11143] RIP: 0033:0x7fd25374d8dc [ 180.778679][T11143] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 180.778705][T11143] RSP: 002b:00007fd2521af030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 180.778730][T11143] RAX: ffffffffffffffda RBX: 00007fd2539a5fa0 RCX: 00007fd25374d8dc [ 180.778748][T11143] RDX: 000000000000000f RSI: 00007fd2521af0a0 RDI: 0000000000000006 [ 180.778764][T11143] RBP: 00007fd2521af090 R08: 0000000000000000 R09: 0000000000000000 [ 180.778781][T11143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 180.778797][T11143] R13: 00007fd2539a6038 R14: 00007fd2539a5fa0 R15: 00007fff51f47c88 [ 180.778819][T11143] [ 181.219080][T11147] netlink: 'syz.1.2954': attribute type 10 has an invalid length. [ 181.274529][T11155] netlink: 'syz.1.2954': attribute type 10 has an invalid length. [ 181.282877][T11147] bond0: (slave dummy0): Releasing backup interface [ 181.292323][T11141] tipc: Started in network mode [ 181.297245][T11141] tipc: Node identity ac1414aa, cluster identity 4711 [ 181.304807][T11141] tipc: Enabled bearer , priority 10 [ 181.313506][T11155] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 181.322549][T11125] can0 (unregistered): slcan off ttyS3. [ 181.338672][T11157] loop5: detected capacity change from 0 to 2048 [ 181.345969][T11157] ext3: Unknown parameter 'smackfsdef' [ 181.376610][T11163] netlink: 'syz.5.2961': attribute type 10 has an invalid length. [ 181.386275][T11161] loop1: detected capacity change from 0 to 2048 [ 181.409468][T11165] loop5: detected capacity change from 0 to 128 [ 181.420457][T11165] syz.5.2962: attempt to access beyond end of device [ 181.420457][T11165] loop5: rw=1, sector=138, nr_sectors = 2 limit=128 [ 181.433743][T11165] Buffer I/O error on dev loop5, logical block 69, lost async page write [ 181.483898][T11169] netlink: 14 bytes leftover after parsing attributes in process `syz.1.2964'. [ 181.572713][T11165] syz.5.2962: attempt to access beyond end of device [ 181.572713][T11165] loop5: rw=2049, sector=138, nr_sectors = 2 limit=128 [ 181.586439][T11165] Buffer I/O error on dev loop5, logical block 69, lost async page write [ 181.869211][T11180] usb usb9: usbfs: process 11180 (syz.1.2969) did not claim interface 0 before use [ 181.913751][T11183] loop5: detected capacity change from 0 to 2048 [ 181.921637][T11183] ext3: Unknown parameter 'smackfsdef' [ 182.131562][T11187] netlink: 'syz.5.2972': attribute type 10 has an invalid length. [ 182.188626][T11189] FAULT_INJECTION: forcing a failure. [ 182.188626][T11189] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 182.201979][T11189] CPU: 1 UID: 0 PID: 11189 Comm: syz.5.2973 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 182.202022][T11189] Tainted: [W]=WARN [ 182.202029][T11189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 182.202049][T11189] Call Trace: [ 182.202057][T11189] [ 182.202066][T11189] __dump_stack+0x1d/0x30 [ 182.202107][T11189] dump_stack_lvl+0xe8/0x140 [ 182.202126][T11189] dump_stack+0x15/0x1b [ 182.202142][T11189] should_fail_ex+0x265/0x280 [ 182.202189][T11189] should_fail+0xb/0x20 [ 182.202298][T11189] should_fail_usercopy+0x1a/0x20 [ 182.202327][T11189] _copy_from_user+0x1c/0xb0 [ 182.202356][T11189] ucma_query_route+0x7b/0x620 [ 182.202379][T11189] ? __xa_store+0x2a8/0x300 [ 182.202430][T11189] ? _raw_spin_unlock+0x26/0x50 [ 182.202471][T11189] ? xa_store+0x3e/0x50 [ 182.202495][T11189] ? ucma_finish_ctx+0xa2/0xc0 [ 182.202523][T11189] ? should_fail_ex+0xdb/0x280 [ 182.202598][T11189] ucma_write+0x1b3/0x250 [ 182.202628][T11189] vfs_writev+0x406/0x8b0 [ 182.202667][T11189] ? __pfx_ucma_write+0x10/0x10 [ 182.202697][T11189] do_writev+0xe7/0x210 [ 182.202758][T11189] __x64_sys_writev+0x45/0x50 [ 182.202792][T11189] x64_sys_call+0x1e9a/0x3000 [ 182.202821][T11189] do_syscall_64+0xd2/0x200 [ 182.202849][T11189] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 182.202897][T11189] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 182.202976][T11189] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 182.203076][T11189] RIP: 0033:0x7fd25374eec9 [ 182.203096][T11189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 182.203121][T11189] RSP: 002b:00007fd2521af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 182.203173][T11189] RAX: ffffffffffffffda RBX: 00007fd2539a5fa0 RCX: 00007fd25374eec9 [ 182.203189][T11189] RDX: 0000000000000003 RSI: 0000200000000000 RDI: 0000000000000004 [ 182.203205][T11189] RBP: 00007fd2521af090 R08: 0000000000000000 R09: 0000000000000000 [ 182.203219][T11189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 182.203231][T11189] R13: 00007fd2539a6038 R14: 00007fd2539a5fa0 R15: 00007fff51f47c88 [ 182.203249][T11189] [ 182.426785][T11126] tipc: Node number set to 2886997162 [ 182.447782][T11191] loop5: detected capacity change from 0 to 512 [ 182.463402][T11191] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 182.476351][T11191] ext4 filesystem being mounted at /144/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 182.505746][ T9086] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 182.525883][T11197] netlink: 32 bytes leftover after parsing attributes in process `syz.5.2976'. [ 182.551797][T11198] lo speed is unknown, defaulting to 1000 [ 182.571393][T11200] netlink: 14 bytes leftover after parsing attributes in process `syz.2.2977'. [ 182.581986][T11200] hsr_slave_0: left promiscuous mode [ 182.587920][T11200] hsr_slave_1: left promiscuous mode [ 182.600697][T11197] lo speed is unknown, defaulting to 1000 [ 182.875689][T11221] lo speed is unknown, defaulting to 1000 [ 183.021228][T11091] Bluetooth: hci0: Frame reassembly failed (-84) [ 183.245321][T11227] FAULT_INJECTION: forcing a failure. [ 183.245321][T11227] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 183.258576][T11227] CPU: 1 UID: 0 PID: 11227 Comm: syz.2.2985 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 183.258620][T11227] Tainted: [W]=WARN [ 183.258629][T11227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 183.258694][T11227] Call Trace: [ 183.258701][T11227] [ 183.258709][T11227] __dump_stack+0x1d/0x30 [ 183.258736][T11227] dump_stack_lvl+0xe8/0x140 [ 183.258834][T11227] dump_stack+0x15/0x1b [ 183.258935][T11227] should_fail_ex+0x265/0x280 [ 183.258981][T11227] should_fail+0xb/0x20 [ 183.259019][T11227] should_fail_usercopy+0x1a/0x20 [ 183.259040][T11227] _copy_to_user+0x20/0xa0 [ 183.259068][T11227] simple_read_from_buffer+0xb5/0x130 [ 183.259091][T11227] proc_fail_nth_read+0x10e/0x150 [ 183.259204][T11227] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 183.259240][T11227] vfs_read+0x1a8/0x770 [ 183.259266][T11227] ? kern_path+0x106/0x130 [ 183.259353][T11227] ? __rcu_read_unlock+0x4f/0x70 [ 183.259384][T11227] ? __fget_files+0x184/0x1c0 [ 183.259412][T11227] ksys_read+0xda/0x1a0 [ 183.259440][T11227] __x64_sys_read+0x40/0x50 [ 183.259477][T11227] x64_sys_call+0x27c0/0x3000 [ 183.259506][T11227] do_syscall_64+0xd2/0x200 [ 183.259613][T11227] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 183.259645][T11227] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 183.259672][T11227] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 183.259701][T11227] RIP: 0033:0x7fe1d745d8dc [ 183.259737][T11227] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 183.259760][T11227] RSP: 002b:00007fe1d5ec7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 183.259779][T11227] RAX: ffffffffffffffda RBX: 00007fe1d76b5fa0 RCX: 00007fe1d745d8dc [ 183.259796][T11227] RDX: 000000000000000f RSI: 00007fe1d5ec70a0 RDI: 0000000000000003 [ 183.259812][T11227] RBP: 00007fe1d5ec7090 R08: 0000000000000000 R09: 0000000000000000 [ 183.259961][T11227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 183.259978][T11227] R13: 00007fe1d76b6038 R14: 00007fe1d76b5fa0 R15: 00007fffa63796a8 [ 183.260003][T11227] [ 183.579264][ T29] kauditd_printk_skb: 426 callbacks suppressed [ 183.579281][ T29] audit: type=1400 audit(1760239799.302:23485): avc: denied { allowed } for pid=11232 comm="syz.2.2988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 183.618854][T11233] netlink: 'syz.2.2988': attribute type 1 has an invalid length. [ 183.626703][T11233] netlink: 'syz.2.2988': attribute type 4 has an invalid length. [ 183.634473][T11233] netlink: 9462 bytes leftover after parsing attributes in process `syz.2.2988'. [ 183.643855][ T29] audit: type=1400 audit(1760239799.332:23486): avc: denied { create } for pid=11232 comm="syz.2.2988" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 183.665442][ T29] audit: type=1400 audit(1760239799.332:23487): avc: denied { map } for pid=11232 comm="syz.2.2988" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=39510 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 183.690142][ T29] audit: type=1400 audit(1760239799.332:23488): avc: denied { read write } for pid=11232 comm="syz.2.2988" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=39510 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 183.716459][T11233] netlink: 'syz.2.2988': attribute type 1 has an invalid length. [ 183.724486][T11233] netlink: 'syz.2.2988': attribute type 4 has an invalid length. [ 183.725802][ T29] audit: type=1400 audit(1760239799.452:23489): avc: denied { ioctl } for pid=11234 comm="syz.4.2989" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 183.732357][T11233] netlink: 9462 bytes leftover after parsing attributes in process `syz.2.2988'. [ 183.803385][T11235] pim6reg: entered allmulticast mode [ 183.811620][T11235] pim6reg: left allmulticast mode [ 183.941241][T11244] pim6reg: entered allmulticast mode [ 183.949006][T11244] pim6reg: left allmulticast mode [ 183.949665][ T29] audit: type=1326 audit(1760239799.672:23490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11247 comm="syz.4.2995" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc75aeeec9 code=0x7ffc0000 [ 183.977889][ T29] audit: type=1326 audit(1760239799.682:23491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11247 comm="syz.4.2995" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc75aeeec9 code=0x7ffc0000 [ 184.001697][ T29] audit: type=1326 audit(1760239799.682:23492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11247 comm="syz.4.2995" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc75aeeec9 code=0x7ffc0000 [ 184.025410][ T29] audit: type=1326 audit(1760239799.682:23493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11247 comm="syz.4.2995" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc75aeeec9 code=0x7ffc0000 [ 184.049123][ T29] audit: type=1326 audit(1760239799.682:23494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11247 comm="syz.4.2995" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcc75aeeec9 code=0x7ffc0000 [ 184.182776][T11248] usb usb9: usbfs: process 11248 (syz.4.2995) did not claim interface 0 before use [ 184.282159][T11258] netlink: 132 bytes leftover after parsing attributes in process `syz.2.3000'. [ 184.375185][T11261] pim6reg: entered allmulticast mode [ 184.382711][T11261] pim6reg: left allmulticast mode [ 184.470999][T11263] FAULT_INJECTION: forcing a failure. [ 184.470999][T11263] name failslab, interval 1, probability 0, space 0, times 0 [ 184.484036][T11263] CPU: 0 UID: 0 PID: 11263 Comm: syz.2.3002 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 184.484078][T11263] Tainted: [W]=WARN [ 184.484084][T11263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 184.484095][T11263] Call Trace: [ 184.484100][T11263] [ 184.484107][T11263] __dump_stack+0x1d/0x30 [ 184.484128][T11263] dump_stack_lvl+0xe8/0x140 [ 184.484145][T11263] dump_stack+0x15/0x1b [ 184.484160][T11263] should_fail_ex+0x265/0x280 [ 184.484263][T11263] should_failslab+0x8c/0xb0 [ 184.484288][T11263] kmem_cache_alloc_noprof+0x50/0x480 [ 184.484325][T11263] ? copy_net_ns+0x10f/0x3b0 [ 184.484364][T11263] copy_net_ns+0x10f/0x3b0 [ 184.484382][T11263] create_new_namespaces+0x20e/0x3d0 [ 184.484490][T11263] unshare_nsproxy_namespaces+0xe8/0x120 [ 184.484602][T11263] ksys_unshare+0x3d0/0x6d0 [ 184.484632][T11263] ? ksys_write+0x192/0x1a0 [ 184.484674][T11263] __x64_sys_unshare+0x1f/0x30 [ 184.484707][T11263] x64_sys_call+0x2915/0x3000 [ 184.484728][T11263] do_syscall_64+0xd2/0x200 [ 184.484750][T11263] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 184.484775][T11263] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 184.484838][T11263] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 184.484858][T11263] RIP: 0033:0x7fe1d745eec9 [ 184.484872][T11263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 184.484888][T11263] RSP: 002b:00007fe1d5ec7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 184.484971][T11263] RAX: ffffffffffffffda RBX: 00007fe1d76b5fa0 RCX: 00007fe1d745eec9 [ 184.484982][T11263] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000062000000 [ 184.484993][T11263] RBP: 00007fe1d5ec7090 R08: 0000000000000000 R09: 0000000000000000 [ 184.485005][T11263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 184.485016][T11263] R13: 00007fe1d76b6038 R14: 00007fe1d76b5fa0 R15: 00007fffa63796a8 [ 184.485034][T11263] [ 184.758501][ T52] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.767190][ T52] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.776205][ T52] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.785643][ T52] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.799035][T11270] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3005'. [ 185.032242][ T4316] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 185.183984][T11287] netlink: 'syz.4.3012': attribute type 10 has an invalid length. [ 185.192750][T11287] bond0: (slave dummy0): Releasing backup interface [ 185.201579][T11287] dummy0: entered promiscuous mode [ 185.207158][T11287] team0: Failed to send options change via netlink (err -105) [ 185.214697][T11287] team0: Port device dummy0 added [ 185.215047][T11285] loop1: detected capacity change from 0 to 2048 [ 185.472360][T11289] usb usb9: usbfs: process 11289 (syz.4.3013) did not claim interface 0 before use [ 185.572376][T11291] usb usb9: usbfs: process 11291 (syz.1.3014) did not claim interface 0 before use [ 185.946195][T11297] usb usb9: usbfs: process 11297 (syz.0.3017) did not claim interface 0 before use [ 186.032074][T11312] netlink: 'syz.4.3023': attribute type 10 has an invalid length. [ 186.180692][T11325] loop1: detected capacity change from 0 to 512 [ 186.213207][T11325] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 186.227762][T11325] ext4 filesystem being mounted at /580/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 186.258593][ T3319] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 186.308262][T11330] lo speed is unknown, defaulting to 1000 [ 186.400548][T11330] chnl_net:caif_netlink_parms(): no params data found [ 186.439184][T11330] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.446358][T11330] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.453758][T11330] bridge_slave_0: entered allmulticast mode [ 186.460497][T11330] bridge_slave_0: entered promiscuous mode [ 186.467923][T11330] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.475083][T11330] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.482971][T11330] bridge_slave_1: entered allmulticast mode [ 186.490778][T11330] bridge_slave_1: entered promiscuous mode [ 186.512703][T11330] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.545140][T11330] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.576163][T11330] team0: Port device team_slave_0 added [ 186.590197][T11330] team0: Port device team_slave_1 added [ 186.609501][T11330] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 186.616653][T11330] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 186.642829][T11330] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 186.655186][T11330] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 186.662388][T11330] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 186.688524][T11330] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 186.721711][T11330] hsr_slave_0: entered promiscuous mode [ 186.728410][T11330] hsr_slave_1: entered promiscuous mode [ 186.798113][T11352] usb usb9: usbfs: process 11352 (syz.1.3033) did not claim interface 0 before use [ 186.933661][T11367] netlink: 14 bytes leftover after parsing attributes in process `syz.2.3040'. [ 186.962683][T11369] hub 9-0:1.0: USB hub found [ 186.967446][T11369] hub 9-0:1.0: 8 ports detected [ 186.975706][T11369] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3041'. [ 186.996676][T11369] bond1 (unregistering): Released all slaves [ 187.028890][T11330] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 187.038804][T11330] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 187.047486][T11363] usb usb9: usbfs: process 11363 (syz.0.3038) did not claim interface 0 before use [ 187.064441][T11330] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 187.074548][T11371] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=11371 comm=syz.2.3041 [ 187.075421][T11330] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 187.106693][T11330] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.113855][T11330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.121324][T11330] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.128383][T11330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.169525][T11330] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.183757][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.192407][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.202387][T11383] hub 9-0:1.0: USB hub found [ 187.207231][T11383] hub 9-0:1.0: 8 ports detected [ 187.216530][T11383] netlink: 'syz.5.3044': attribute type 1 has an invalid length. [ 187.236935][T11383] bond1: entered promiscuous mode [ 187.242857][T11383] 8021q: adding VLAN 0 to HW filter on device bond1 [ 187.252085][T11330] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.266021][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.273219][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.285219][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.292378][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.303592][T11383] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=11383 comm=syz.5.3044 [ 187.326234][T11330] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 187.336943][T11330] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 187.402064][T11391] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 187.402363][T11396] netlink: 'syz.1.3048': attribute type 10 has an invalid length. [ 187.410648][T11391] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 187.426558][T11396] bond0: (slave dummy0): Releasing backup interface [ 187.479087][T11330] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.508758][T11400] sctp: [Deprecated]: syz.1.3049 (pid 11400) Use of int in max_burst socket option. [ 187.508758][T11400] Use struct sctp_assoc_value instead [ 187.536846][T11403] netlink: 'syz.2.3050': attribute type 10 has an invalid length. [ 187.545002][T11403] ipvlan0: entered allmulticast mode [ 187.550395][T11403] veth0_vlan: entered allmulticast mode [ 187.558201][T11403] team0: Device ipvlan0 failed to register rx_handler [ 187.569545][T11403] netlink: 52 bytes leftover after parsing attributes in process `syz.2.3050'. [ 187.776633][T11424] netlink: 'syz.2.3054': attribute type 10 has an invalid length. [ 187.791253][T11424] team0: Port device dummy0 added [ 187.799598][T11424] netlink: 'syz.2.3054': attribute type 10 has an invalid length. [ 187.811826][T11424] team0: Port device dummy0 removed [ 187.819989][T11424] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 187.941151][T11330] veth0_vlan: entered promiscuous mode [ 187.949803][T11330] veth1_vlan: entered promiscuous mode [ 187.974721][T11330] veth0_macvtap: entered promiscuous mode [ 187.983711][T11330] veth1_macvtap: entered promiscuous mode [ 187.996700][T11330] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 188.026455][T11330] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 188.044561][ T1457] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.054242][ T1457] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.073690][ T1457] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.105735][ T1457] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.399657][T11444] hub 9-0:1.0: USB hub found [ 188.440290][T11444] hub 9-0:1.0: 8 ports detected [ 188.458621][T11445] loop5: detected capacity change from 0 to 128 [ 188.475048][T11444] netlink: 'syz.1.3058': attribute type 1 has an invalid length. [ 188.497961][T11452] hub 9-0:1.0: USB hub found [ 188.502980][T11452] hub 9-0:1.0: 8 ports detected [ 188.505384][T11444] bond43: entered promiscuous mode [ 188.512027][T11452] netlink: 'syz.4.3060': attribute type 1 has an invalid length. [ 188.513689][T11444] 8021q: adding VLAN 0 to HW filter on device bond43 [ 188.538509][T11444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=11444 comm=syz.1.3058 [ 188.574202][T11452] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=11452 comm=syz.4.3060 [ 188.606079][ T29] kauditd_printk_skb: 681 callbacks suppressed [ 188.606098][ T29] audit: type=1326 audit(1760239804.332:24176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11454 comm="syz.1.3061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb70171eec9 code=0x7ffc0000 [ 188.635860][T11456] pim6reg: entered allmulticast mode [ 188.652157][ T29] audit: type=1326 audit(1760239804.332:24177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11454 comm="syz.1.3061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb70171eec9 code=0x7ffc0000 [ 188.676047][ T29] audit: type=1326 audit(1760239804.332:24178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11454 comm="syz.1.3061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb70171eec9 code=0x7ffc0000 [ 188.700354][ T29] audit: type=1326 audit(1760239804.332:24179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11454 comm="syz.1.3061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb70171eec9 code=0x7ffc0000 [ 188.724182][ T29] audit: type=1326 audit(1760239804.332:24180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11454 comm="syz.1.3061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb70171eec9 code=0x7ffc0000 [ 188.748052][ T29] audit: type=1326 audit(1760239804.332:24181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11454 comm="syz.1.3061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb70171eec9 code=0x7ffc0000 [ 188.771683][ T29] audit: type=1326 audit(1760239804.332:24182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11454 comm="syz.1.3061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb70171eec9 code=0x7ffc0000 [ 188.795604][ T29] audit: type=1326 audit(1760239804.332:24183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11454 comm="syz.1.3061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb70171eec9 code=0x7ffc0000 [ 188.819385][ T29] audit: type=1326 audit(1760239804.332:24184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11454 comm="syz.1.3061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb70171eec9 code=0x7ffc0000 [ 188.843289][ T29] audit: type=1326 audit(1760239804.332:24185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11454 comm="syz.1.3061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb70171eec9 code=0x7ffc0000 [ 188.867536][T11457] pim6reg: left allmulticast mode [ 188.877277][T11455] usb usb9: usbfs: process 11455 (syz.1.3061) did not claim interface 0 before use [ 188.892361][T11459] hub 9-0:1.0: USB hub found [ 188.903944][T11459] hub 9-0:1.0: 8 ports detected [ 188.982622][T11459] netlink: 'syz.4.3062': attribute type 1 has an invalid length. [ 189.007279][T11459] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=11459 comm=syz.4.3062 [ 189.192480][T11465] netlink: 'syz.5.3065': attribute type 10 has an invalid length. [ 189.224111][T11465] team0: Port device dummy0 removed [ 189.242183][T11465] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 189.330417][T11469] pim6reg: entered allmulticast mode [ 189.347200][T11469] pim6reg: left allmulticast mode [ 189.510577][T11476] hub 9-0:1.0: USB hub found [ 189.524152][T11476] hub 9-0:1.0: 8 ports detected [ 189.547889][T11482] loop1: detected capacity change from 0 to 512 [ 189.549635][T11476] netlink: 'syz.2.3069': attribute type 1 has an invalid length. [ 189.588542][T11487] hub 9-0:1.0: USB hub found [ 189.593537][T11487] hub 9-0:1.0: 8 ports detected [ 189.602595][T11476] bond1: entered promiscuous mode [ 189.608425][T11482] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 189.625446][T11476] 8021q: adding VLAN 0 to HW filter on device bond1 [ 189.634423][T11482] ext4 filesystem being mounted at /589/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 189.672815][ T52] Bluetooth: hci0: Frame reassembly failed (-84) [ 189.673617][T11487] bond2: entered promiscuous mode [ 189.679452][T11476] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=11476 comm=syz.2.3069 [ 189.686090][T11487] 8021q: adding VLAN 0 to HW filter on device bond2 [ 189.747880][T11492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=11492 comm=syz.0.3074 [ 189.777069][T11501] team0: Port device dummy0 added [ 189.809763][T11503] hub 9-0:1.0: USB hub found [ 189.814808][T11503] hub 9-0:1.0: 8 ports detected [ 189.824244][T11503] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65525 sclass=netlink_route_socket pid=11503 comm=syz.4.3079 [ 189.832010][T11504] IPv6: NLM_F_CREATE should be specified when creating new route [ 189.863128][T11503] bond1 (unregistering): Released all slaves [ 189.892721][T11508] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=11508 comm=syz.4.3079 [ 189.923377][T11510] loop5: detected capacity change from 0 to 128 [ 190.002655][T11518] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 190.014275][T11519] pim6reg: entered allmulticast mode [ 190.031242][T11510] pim6reg: left allmulticast mode [ 190.204991][T11534] hub 9-0:1.0: USB hub found [ 190.209803][T11534] hub 9-0:1.0: 8 ports detected [ 190.230797][T11534] bond2: entered promiscuous mode [ 190.236779][T11534] 8021q: adding VLAN 0 to HW filter on device bond2 [ 190.251232][T11534] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=11534 comm=syz.5.3092 [ 190.386953][T11541] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 190.391375][T11532] usb usb9: usbfs: process 11532 (syz.2.3091) did not claim interface 0 before use [ 190.442767][T11541] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 190.503881][T11541] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 190.613593][T11541] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 190.726904][T11091] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.770814][T11091] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.842889][T11091] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.909538][T11091] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.271734][T11565] netlink: 14 bytes leftover after parsing attributes in process `syz.4.3105'. [ 191.311025][T11565] hsr_slave_0: left promiscuous mode [ 191.317480][T11565] hsr_slave_1: left promiscuous mode [ 191.346094][T11566] pim6reg: entered allmulticast mode [ 191.352006][T11570] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3107'. [ 191.353268][T11566] pim6reg: left allmulticast mode [ 191.569350][T11587] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 191.622800][T11587] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 191.634619][T11610] hub 9-0:1.0: USB hub found [ 191.639463][T11610] hub 9-0:1.0: 8 ports detected [ 191.656145][T11610] bond2: entered promiscuous mode [ 191.661836][T11610] 8021q: adding VLAN 0 to HW filter on device bond2 [ 191.707387][T11625] bond0: (slave dummy0): Releasing backup interface [ 191.717143][T11625] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 191.726085][T11625] team0: Failed to send options change via netlink (err -105) [ 191.733605][T11625] team0: Port device dummy0 added [ 191.741104][ T4316] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 191.741338][T11587] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 191.771588][ T3319] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 191.861323][T11587] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 192.781851][T11698] ================================================================== [ 192.789997][T11698] BUG: KCSAN: data-race in avc_policy_seqno / avc_ss_reset [ 192.797259][T11698] [ 192.799936][T11698] write to 0xffffffff88e8bc28 of 4 bytes by task 11696 on cpu 1: [ 192.807668][T11698] avc_ss_reset+0x20c/0x240 [ 192.812463][T11698] security_set_bools+0x301/0x340 [ 192.817516][T11698] sel_commit_bools_write+0x1ea/0x270 [ 192.822926][T11698] vfs_writev+0x406/0x8b0 [ 192.827292][T11698] do_writev+0xe7/0x210 [ 192.831597][T11698] __x64_sys_writev+0x45/0x50 [ 192.836311][T11698] x64_sys_call+0x1e9a/0x3000 [ 192.841018][T11698] do_syscall_64+0xd2/0x200 [ 192.845746][T11698] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 192.851670][T11698] [ 192.854030][T11698] read to 0xffffffff88e8bc28 of 4 bytes by task 11698 on cpu 0: [ 192.861686][T11698] avc_policy_seqno+0x15/0x30 [ 192.866457][T11698] selinux_file_open+0x10e/0x330 [ 192.871428][T11698] security_file_open+0x36/0x70 [ 192.876313][T11698] do_dentry_open+0x204/0xa20 [ 192.881025][T11698] vfs_open+0x37/0x1e0 [ 192.885124][T11698] path_openat+0x1c5e/0x2170 [ 192.889727][T11698] do_filp_open+0x109/0x230 [ 192.894258][T11698] do_sys_openat2+0xa6/0x110 [ 192.898879][T11698] __x64_sys_openat+0xf2/0x120 [ 192.903681][T11698] x64_sys_call+0x2eab/0x3000 [ 192.908385][T11698] do_syscall_64+0xd2/0x200 [ 192.912948][T11698] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 192.918865][T11698] [ 192.921197][T11698] value changed: 0x00000027 -> 0x00000028 [ 192.926923][T11698] [ 192.929254][T11698] Reported by Kernel Concurrency Sanitizer on: [ 192.935502][T11698] CPU: 0 UID: 0 PID: 11698 Comm: modprobe Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 192.946763][T11698] Tainted: [W]=WARN [ 192.950595][T11698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 192.960662][T11698] ================================================================== [ 195.436792][ T997] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 195.447559][T11091] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 195.458556][T11091] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 195.469500][T11091] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0