last executing test programs: 16.557544948s ago: executing program 1 (id=1363): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, &(0x7f0000000c00), 0x1, 0xb80, &(0x7f0000000c40)="$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") r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000000)=0x9, 0x4) r2 = syz_open_dev$loop(&(0x7f0000000040), 0x3ed, 0x80000) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x0, 0xa, 0x10, 0x1, "0152ca44511e1553aed6378c52e3893cccf472385b664dc215b3529e59e1608b5b987ec01baf7dd0a3e03444f57dc2b1a7570f46b51d827323d658ff4a5adcbd", "8f7f2aba3d6ac29ff9ab8373f2821af85ed91d596ffc9c5124bfb7b31333e502", [0xc30, 0x9]}) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x7, 0x12, 0x3, 0x1, "9f8e07fef32ab283f4bf103054aa7e35aee27494a78120098c983341c55e989057bc452bb4746800bcc673198a0dd26ea01fc038540b6dce563175d67978d9d9", "3e155f36845acf948e0bdcf7bf79b8b81b22c4b8e08a5d6670d473ce4a4bf001", [0x6800000000]}) vmsplice(r1, &(0x7f0000001340)=[{0x0}, {&(0x7f0000001200)="9a1c27b2afa38ad120ef9745a38aa5866e49979bfbe8b4b4345dbb15fafffa0ee62f5d902b62e28acafc38ded42e7e78eadcc6f2a3ed86f90e4e27fead524b737281a36f86a1c5ed0169745fae20d70783415d2630892b4364b42201b767ad054288c1360019965f03711bdd6b99fb0ddbbd4ed2e782b7f5fc68", 0x7a}, {&(0x7f00000012c0)="c245d934b68043aa217bcec5861cccc3bf1f6b8ca53618a57a53f19d35464a2a197fe4ee0503bea6d9bff742d8bce5a048f5c21d2c9ed65a943e0456391f193e6f2613694f8e033ec545fb068cf2e11b6eacec9266d00f0d38128645b328793e9a2d306cf97702e04c142d1853916d10d0e359f69ec41f6c33", 0x79}], 0x3, 0x0) r3 = getpid() r4 = fsmount(0xffffffffffffffff, 0x1, 0x70) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000001380)=0x4, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000014c0)={r4, &(0x7f00000013c0)="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"}, 0x20) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000001580)={0x15, 0x52, &(0x7f0000001500)="74cb55cbdc60eb79966b2786bbef2c18631439e6cf976f7b1e9461990c76d75de19aca76f93b56cd24d1a9c1d862603f1ef9ef63d59b36a5c2638a985f5f61d2da1c542766496549417075b4e9ff77657196"}) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000001740)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001700)={&(0x7f0000001600)={0xf8, 0x2, 0x6, 0x5, 0x0, 0x0, {0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x48, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x9}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x8}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x3ff}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x30d}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x33}, @IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0xf0}, @IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0xe}]}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_DATA={0x3c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x3}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x28}, @IPSET_ATTR_MARKMASK={0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}]}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x72f}, @IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x1}, @IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x7}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x5e}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x1}, 0x800) connect$inet(r1, &(0x7f0000001780)={0x2, 0x4e24, @remote}, 0x10) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000017c0)={0x0, 0xfffffff3}, &(0x7f0000001800)=0x8) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001880), 0x4100, 0x0) fsconfig$FSCONFIG_SET_FD(r4, 0x5, &(0x7f0000001840)='\'*,\x00', 0x0, r6) sched_setscheduler(r3, 0x5, &(0x7f00000018c0)=0x8) ioctl$sock_inet_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000001900)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000001940)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000001980)=0x1c) r8 = syz_io_uring_setup(0x7246, &(0x7f00000019c0)={0x0, 0x2f1c, 0x4, 0x0, 0x344, 0x0, r4}, &(0x7f0000001a40), &(0x7f0000001a80)) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xa, 0x10, r8, 0x5a671000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000001ac0)={0x8, 0x2, 0x209, 0x9, 0x6, 0x6, 0x80000001, 0x4, r7}, &(0x7f0000001b00)=0x20) 16.497613153s ago: executing program 1 (id=1367): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000002c0)={0x3, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x2c}, {0x6}]}, 0x10) syz_emit_ethernet(0x52, &(0x7f00000005c0)={@broadcast, @empty, @void, {@ipv4={0x800, @tcp={{0xb, 0x4, 0x0, 0x9, 0x44, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @private=0xa010102, {[@noop, @timestamp_addr={0x44, 0x4}, @timestamp_addr={0x44, 0xc, 0x0, 0x1, 0x6, [{@remote, 0x5f196489}]}, @ra={0x94, 0x4, 0x1}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4}]}}}}}}}, 0x0) 16.474653815s ago: executing program 1 (id=1369): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xe, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b704000008"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000100)='\x103q}2[\xe0\x9a\xee\xaf\x03\x97\x9et\v\"|Ma\x86\xe7\xc0\x14\x9f\xb9h\xb1\x96\xe7=I\x860S6\xb5\xa8\xc2\x95Je%\xfeG\'e\xe5\x8f\xf8\xd2\x1c\xc0\xfb\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94k\xcd\t\x00\x90k\xd6\x05\xb6&\xd0\x9daA\xc5\x9c_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2Oc\xc0c\x03gB!\xb0\xb8n\x01\x9bT\x95\x10\x86\xe8$\x7f\r[\xf9\x0e1v\xb1\n\x88\v\x95uy\xb5:`\x8b\nC\x18A;\xaa%\xaf\xc7\xa3\xac\xa2D\xb5\xe2\xe1\xdc(\xfd\x05\x9fB\x84O\xfe@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\xa0\x17\xe3\xac\xe9\xc9\xa7\x8a\x1b\x03\"&\xac\xcap>\xccZ\x01\xbc\x18\xc1\xb9\xe9\v\x8b\x9c\xb4Q\xd4\x96EV<>\x99\xca\xb3\xe0\xc4tL\xed\xf5W\xbd#\xcf\x8a\x84\xed\x9f/\xd4\xbb\xea;-Dp\xf8\xd0F\x90\xf8\x92Ip6\xf4\x16\xe8\x14\xe0\x92!\x92-F\xe2\x14D\x91\xa8b\x04\xdd\x1d\a\xdc\xe0\x18\x85{\x80Q\xf6k\x96\xfaQ\x9fW\vO\xf0\xe4O\\\xceS\xf2\xde\x049d\x06#\x88\xc3\xdf\x85O\x1c\xc3\xad?r\xd7\x0e\x00\xd7\x83\xb0\x88\x9c\xf6Y-F\x98\xdd\x9c~\xfd\x95\xc3\xb6lC\xaa\"Y\xa2K\xecz\x84:*\xf5Y\xd1\x9b1\x91\x9b\x15\xd4\xec\x02o\x01&\xaa\x90w\xc4\xc7yn\xb5\x1ag\xab&?\xbe\xcb\xe8v\xa8\xe0\xa4\x81sW\xacf\x149\xd2}\xefCGa\x9a$4\x8c\xa5!p\x83\x05\x96%\x02%\xabj\n\b\xc8NC\x91}&y\xd3\xe1\xeep\'\xc5\xab\x19GsX5\x8c\n\x9fh\xee;4\xb1%V\xe0\xa9\x8e\xf30:\xd8\x18N~G\x139\xca', 0x2) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000007}) fcntl$addseals(r0, 0x409, 0xb) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getpid() openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) syz_emit_ethernet(0x9a, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaa01000000010000003500640600fe8000000000000000000000000000aafe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="90c2000090780000080a0000000000000000fe0202040000080a0000000000000000080a00000000000000001e102000000000000000000000000000fe0df9893d73178e8b53bee8ab1e0c1000"/88], 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) accept4$llc(r3, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x10, 0x800) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x18c}, 0x1, 0x0, 0x0, 0x8d1}, 0x4024080) 16.135447362s ago: executing program 1 (id=1387): socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r0, &(0x7f0000001300)="ac", 0x1, 0x0, &(0x7f0000000380)={0xa, 0x0, 0x0, @private1}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="dd", 0x1, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) shutdown(r0, 0x1) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x10, &(0x7f0000000680), 0xfe, 0x244, &(0x7f0000000400)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000006c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000700)={'#! ', './file0', [], 0xa, "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"}, 0x801) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x53) syz_open_procfs(0x0, &(0x7f0000000340)='net/vlan/vlan0\x00') perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0x1}, 0x62) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') setsockopt$MRT_ADD_VIF(r3, 0x0, 0xca, &(0x7f0000000180)={0x0, 0x1, 0x7, 0xd, @vifc_lcl_addr=@private, @rand_addr=0x64010101}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000000200)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x10, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r4, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00'}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800010009000000000000000a00000000000000080001000200000004000b"], 0x24}}, 0x0) 15.983865395s ago: executing program 1 (id=1395): setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_AUTHENTICATE(r0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) connect$netlink(r1, &(0x7f0000000280)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000020000f0000f901000000000002"], 0x1c}, 0x1, 0x0, 0x0, 0x2000}, 0x0) 15.925830379s ago: executing program 1 (id=1398): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x18}) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="e8000000000000000b210000ff3f7c081e0f315b91fcaec7bf495d5c618332756cbb1bb9ce6d12b9d976d1f33aca41e50a3342bcd67c311f7885a05c3fcf2ae21f1498ec481e7ca2c3ca4c7b3bf94448f62e111e5a79929b9182cc977ba6ae766ce37bdaac6da997fbc15f0c79f42155b99a280667b51fdc7902d7be5ef41f953fedb32aceeada13250626957e2013d5b12cc916541ccbeb0d4060a4dd89664eaba2f6b4ede0c9e3dc1c9446d9284ebe0e46eee7bc145ff0a2779c025553298812978ea53a8c60f254f23344a80a0aac7b141787bad6b0ba090000005f2f3158f0d200000000000070000000000000000701000040000000afbb30c2946e41ef3167d1f6ed47aa1f52bad114a89dbed741f74a23cd8d915e2dcc74a4932646b90f90a9d3956d5cadb642ac79fcb0aae3654482188263abd27e9d57cc28032453dc75f333e1f367ab38b7e7719805a454e79802d07ec60c00b0000000000000000100000001"], 0x208}, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000340)=""/160) sendmsg(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x208}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x288, 0x158, 0x0, 0x148, 0x0, 0x148, 0x1f0, 0x240, 0x240, 0x1f0, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'sit0\x00'}, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00'}}, @common=@inet=@dscp={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x158}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2e8) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000), 0xffffffffffffffff) socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="090200dc0500000000000f000000050030000000000008000300", @ANYRES32=r4, @ANYBLOB="05002f"], 0x2c}, 0x1, 0xa005}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000032c0)=""/4104, 0x1008}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001b00)=""/72, 0x48}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/224, 0xe0}}], 0x3, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r6, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket(0x11, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x4, 0x6, 0xbaa}, 0x48) r7 = socket$inet6(0xa, 0x80002, 0x88) setsockopt$inet6_udp_int(r7, 0x11, 0xa, &(0x7f0000000080)=0x6, 0x4) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x10010000004e20}, 0x1c) sendmmsg$inet(r7, &(0x7f0000000b00)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="c1", 0x1}], 0x1}}], 0x1, 0x0) pselect6(0x40, &(0x7f0000000900), 0x0, &(0x7f0000000680)={0xff}, 0x0, 0x0) 7.674469558s ago: executing program 0 (id=1450): open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x2000c12, &(0x7f0000000080)={[{@overriderock}, {}, {@map_normal}, {@nocompress}, {@check_relaxed}, {@overriderock}, {@block={'block', 0x3d, 0x800}}, {}, {@mode={'mode', 0x3d, 0x4}}, {@unhide}, {@utf8}, {@check_relaxed}, {@unhide}]}, 0x2, 0x9f5, &(0x7f0000000e40)="$eJzs3c1vHOd9B/Dv8EWiaUOSbdV1BdtayZVM2yxFUrVUQYdWIlcSXb4UJAVY6MFyLaoQxNat3QK2UaAyUPRUoQUa5JDcjJxyEuBLfAl8S27JKYcAgf8FIycFCMBgZpfUklxqSYUiafnzIXZ3Xn7zPL/ZmZ2Huzs7T/h2WTq4amxpqbptdby7Of7jnUiZvevi+Nef37tb3j67k33pzlvFT5K+JLWkJ8mLSe/Y+OzMVIeCbifXk3yVFEn2p/G4KddT/G+eeTD+VYoflvVuaN9mS6aTJb7Tdnv/AwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAvagYGx8eHin2ZWL66ju1hqS2ztj47EyRpaX1c5aXafiy6vW7+LJjvUlR3tLXt9zV94uHH8x+IUnteF5qjL1UdUievnz69AuHzj/f07W8/EbZ/FH2b77Yjz759PZ7i4sLHz6WRPa+y/XpibmZiakLl+u1ibmZ2rkzZ4ZPXbk0V7s0MVmfuzY3X5+qjc3WL8zPzNYGxl6vjZw7d7pWH7o2c3X68vjQZH154tm/GB0ePlN7e+jv6hdm52amT709NDd2ZWJycmL6chVTzi5jzpY74t9OzNfm6xemarWbtxYXTq/JqTtr9t8yaKTTmpRBo52CRodHR0dGRkdHPmv2nr0y4cxb5946OzzcM7xG1kU8pp2WveWpjTfz9h/E4RF1Ndr/ZDITmc7VvJNa27+xjGc2M5naYH7Tcvt/4lT9ofW2tv/NVr6nZfaR8u54XmmO9m3Q/m+Qy879fZRP8mlu570sZjEL+XDXM9rZv8upZzoTmctMJjKVC9WUWnNKLedyJmcynHdzJUczl1ouZSKTqWcu1zKX+dSrPWoss6nnQuYzk9nUMpCxvJ5aRnIu53I6tdQzlGuZydVM53LGc6Eq5WZuVc/76YfkuBI0spmg0ZaJ3WuC1jXmW27/62v/OeE7Z/sP4vCIlprt/77OoQNjO5EQAAAAsO3+7Oc5cPi5n/0mKfJy9bn8pYnJ+vBupwUAAABso+qb/5dSJL3l6MspvP8HAACAJ01R/cauSNKfo42h5V9C+RAAAAAAnhDV5XpeSXH0wQTv/wEAAOAJ0/ka+x0jisHly//WbjQebzQjGmNF/6WJyfrQ2Mzk+ZGcrK4yUP3SYF1p3UnRW/384I0ca0Qd62889j8osayzr4waGTo/kjdyvLkiA6+WD68OtIkcbUS+1oh8rTWyO6siTw+dd31OAJ58xx/SHm+2/X8jg42IwSNVk99zpE0bPFy2wQDAXrDSx87vml2atWn/mxGvbNT+/+VD3v+XEc/l5tHGKQVDeT8fZDE3MpjmGQdH25W63BtB4zSEwQ6fBvQ3T1n45dmuDK77PKBvZV1bYxcymsG2nwi0lFss53C6Edf9eLYBAOy04w9thzfX/g92eP/f75RCANhTVnqwf4wDu72OAMBqWmkAAAAAAAAAAAAAAAAAAAAAAAAAAADYfpu6gP8vTiaLiwvJDnQWsDLQt5UMHz7QlR3KedcHupPsVu1/nS0vVW7jvfLUGVg9sMsHJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHZEkXS3m96V7E8ynOTUzmf1+NzZ7QS2S+3RFivu534+zoHtTgcAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4Luuef3/rjQen25MSk9XciLJ9SR/v9s5bo9GNwf3dzuNXfNP1X3L9f+7kt4sFelpbPYUvWPjszNT5eYv9pfzv/783t3y1rns9b0qlAWUNazqXKJZQ8uU3tVLPVst1T++8NHtf/vgX2rjF6sd8+L8pcnxqcuzf/Mg8IXii0YXCK3dICzn+x8nfvp/LZP3NSv/olzT9tbWe6mqd3x9vX/abukN6t2EW4sLo2VN8/V35v/9n2993DLruRxLXh1IBlbX9I/lbYOajq19Plcrvin+uziQ7+d6tf3LZ6NYKspNdLBa/6du3lpcGHr/g8UbKzn956qcDuVokhtJ3+ZzOlodT9qq9rqu3rLW4SqovDvcobyHailxZIPn9dlql+nf0jrUNl6HSofnvZnR6bYZ/f+/Pp+TW97SJzvU2FbxTfHr4kp+lf9q6f+jq9z+J9L21dmmiCqyZU9pnbfq5dXViKzWfLR1xrvrytz6mvDI/if/kL9a2f5dLcf/5rbameNRS43tXxfJ1l8XPzq4rkV5oGqRDq9pkZpHn42WaeZ5uBG1QZ5/kjeTniNbOqK82Wmvf0yv/x8UA/lt7uj/BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2PuKpLvd9K7kRJJDSQ6W47VkaW3MnUeor6u/eJQ0t82j5PztU2y4osX93M/HObDTGQEAAAAAAADweFwc//rze3d/v3TvbvV9fHf+vKs5p5b0JDlUfK93bHx2ZqpDQb3J9eWv9Pu2lsP18u6ZB+NflWMvdlhod08fAIBvtT8EAAD//2pIbtE=") 7.673952768s ago: executing program 2 (id=1451): r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x202000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'netdevsim0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x40, 0x80, 0x4, 0x10000, {{0xa, 0x4, 0x1, 0x1c, 0x28, 0x7f, 0x0, 0x20, 0x2f, 0x0, @multicast2, @broadcast, {[@timestamp_addr={0x44, 0x14, 0x28, 0x1, 0x4, [{@dev={0xac, 0x14, 0x14, 0x3f}, 0x20}, {@rand_addr=0x64010101, 0x8000}]}]}}}}}) openat$cgroup_ro(r0, &(0x7f0000000140)='blkio.bfq.idle_time\x00', 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="c00000001900674c000000000000000000000000000000000000000000000000ffffffff00"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300002881da334ee0000000000000000000000000000800"], 0xc0}}, 0x24040080) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)=@updpolicy={0xb8, 0x19, 0xfd3649826d894c67, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r5 = socket(0x2, 0x2, 0x1) bind$unix(r5, &(0x7f0000000000)=@abs, 0x6e) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x10, 0x80, 0x7fff, 0x2, {{0x1f, 0x4, 0x0, 0x4, 0x7c, 0x67, 0x0, 0x6e, 0x4, 0x0, @empty, @local, {[@timestamp={0x44, 0x20, 0x94, 0x0, 0x1, [0x5, 0x0, 0x6, 0x1, 0xb, 0x133b, 0x80000000]}, @ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0x18, 0xef, 0x0, 0x6, [0x3, 0x8001, 0x9, 0x1, 0x0]}, @rr={0x7, 0x7, 0xfe, [@loopback]}, @timestamp_addr={0x44, 0xc, 0xdf, 0x1, 0x3, [{@private=0xa010100, 0x5}]}, @cipso={0x86, 0x17, 0x3, [{0x7, 0x5, "6442f0"}, {0x0, 0x2}, {0x5, 0x3, "13"}, {0x5, 0x7, "2be8740fcc"}]}]}}}}}) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0xc2c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x188}, {&(0x7f00000007c0)=""/154, 0x62c}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) socket(0x10, 0x803, 0x0) r7 = io_uring_setup(0x5751, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_EVENTFD(r7, 0x2, &(0x7f0000000200), 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000c4e82ff00000000000000008500000041000000850000000500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0), 0x48) syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x0, 0x100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r10, &(0x7f00000001c0)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r10, 0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) socket$nl_route(0x10, 0x3, 0x0) 7.673606188s ago: executing program 3 (id=1452): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x58, 0x16, 0xa, 0x203, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}]}]}]}], {0x14}}, 0x80}}, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x2000, 0x0, 0x0, 0x2f, 0x0, @remote, @dev}, @dest_unreach={0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @multicast2}}}}}}, 0x0) 7.672981718s ago: executing program 4 (id=1453): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001900010000000900000020001c140000fe00000100000000080001"], 0x24}}, 0x0) 6.311587148s ago: executing program 4 (id=1454): mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x2) r1 = socket$kcm(0x10, 0x2, 0x0) socket(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000300)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73772cc9f1ba1f848430000005e140602000000000e000a0010000000028000001294", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x3, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73772cc9f1ba1f848430000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) 6.311343128s ago: executing program 0 (id=1455): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 6.310897479s ago: executing program 2 (id=1456): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f00000002c0)=0x2, 0x4) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x20}, 'veth1_vlan\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x30}, 'syz_tun\x00'}}, 0x1e) close(r2) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) bind$can_raw(r1, &(0x7f00000000c0)={0x1d, r4}, 0x10) r5 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000100)={0x18000, 0x4a, 0x16}, 0x18) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x21081e, &(0x7f0000000200), 0x1, 0x4fa, &(0x7f00000005c0)="$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") r6 = fspick(r5, &(0x7f0000000280)='./file0/../file0\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r6, 0x0, &(0x7f0000000080)='ro\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r6, 0x7, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r9, 0x0, r11, 0x0, 0x8000f28, 0x0) splice(r10, 0x0, r7, 0x0, 0x7f, 0xe) write(r8, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x4012831, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000cd8000/0x4000)=nil, 0x3) sendfile(r10, r7, 0x0, 0x8) quotactl$Q_SYNC(0xffffffff80000101, 0x0, 0x0, 0x0) 6.310394018s ago: executing program 3 (id=1457): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r0, 0x4004743b, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000840)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="93630100200501001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x4c}}, 0x0) 4.895484083s ago: executing program 0 (id=1458): prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x2000000000000143, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c000000100003050000fffffff0000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000f3002c00128009000100626f6e64000000001c00028008000300000202000800057200000000080004"], 0x4c}}, 0x0) 4.894899963s ago: executing program 2 (id=1459): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=@newneigh={0x30, 0x1c, 0x413, 0x0, 0x0, {0xa, 0x0, 0x0, r1}, [@NDA_DST_IPV6={0x14, 0x1, @private2}]}, 0x30}, 0x1, 0x0, 0x0, 0xfffc}, 0x0) 4.894248043s ago: executing program 3 (id=1460): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000003340)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@private2, @in6=@ipv4={'\x00', '\xff\xff', @multicast2}}, {@in, 0x0, 0x6c}, @in=@multicast2, {}, {}, {0x0, 0xa00}}}}, 0xf8}}, 0x0) 4.893918803s ago: executing program 4 (id=1461): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000040)={@val={0x1c, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x3d}, @mpls={[], @ipv4=@tcp={{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x84, 0x0, @empty=0x3fffffff, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x7, 0x10, 0x0, 0xfffc, 0x0, 0x0, {[@sack={0x5, 0x1a, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @timestamp={0x5, 0xa}, @generic={0x0, 0x5, "d58838"}]}}}}}}, 0x62) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x20, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000010000000000000000000000911202000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a300000000009000300"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000040)={0x0, 0x9, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) r3 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r3, &(0x7f0000000140)={0xa, 0x0, 0x8b, @mcast1, 0xffffffff, 0x1}, 0x20) setsockopt$MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000100), 0xfecc) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCGETS(r5, 0x5401, &(0x7f0000002640)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r4, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$MRT6_FLUSH(r6, 0x29, 0xd4, &(0x7f0000000240)=0x2, 0x4) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r7, &(0x7f0000001c40)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c, &(0x7f0000000080)=[{&(0x7f0000000140)="dc", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in], 0x10) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={r9, 0x20}, 0x8) 3.378722306s ago: executing program 0 (id=1462): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0)={[{@grpquota}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800}}, {@minixdf}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x107042, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x44) open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="01", 0x1}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x1cf2c2, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r2, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, 0x0}, 0x20000801) sched_setscheduler(0x0, 0x2, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)=ANY=[@ANYBLOB="c4000000", @ANYRES16=r3, @ANYBLOB="01000000000000000000010000002c000280060002004e2000000800090010000000060002004e210000080007000101000006000f000700000008000400ff7fffff1400028008000600020000000800090008000000080004000200000060000180080009005600000007000600666f00000c0007002000000002000000080008000100000008000b00736970000600010002000000080005"], 0xc4}, 0x1, 0x1500}, 0x0) 3.378463766s ago: executing program 2 (id=1463): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r0}, 0x10) set_mempolicy(0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0110002ac14"], 0x18) creat(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) preadv(r2, &(0x7f0000000180)=[{&(0x7f0000000100)=""/104, 0x68}], 0x1, 0x2500, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000600)="052593aa4789e50e9cee2b2af6f7ae96c59c62cdded4ec2776fc23bfd982533bcf020000000d000000679281daa06a1cb8cef3034637896ef35aa83b60c13fca92d22f88940cc3b03a2c01a77fef9d40ac5a719799bc7591f7941162eb92", 0x5e) tee(0xffffffffffffffff, r3, 0x5e, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffe, 0x4031, 0xffffffffffffffff, 0x0) gettid() arch_prctl$ARCH_GET_XCOMP_SUPP(0x1021, &(0x7f0000000140)) 3.378099446s ago: executing program 3 (id=1464): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'rose0\x00'}) r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x85, &(0x7f00000001c0)={r2, @in={{0x2, 0x0, @empty}}}, 0x90) 3.377363136s ago: executing program 4 (id=1465): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@updpolicy={0xb8, 0x13, 0xcb23c9c9931e99e9, 0x0, 0x0, {{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee01}}}, 0xb8}}, 0x0) socket(0x0, 0x800000003, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_setup(0x0, 0x0, 0x0, &(0x7f0000000100)) syz_io_uring_setup(0x0, 0x0, 0x0, &(0x7f0000000180)) open(0x0, 0x0, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000000)={@broadcast, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x0, 0x0, 0xe0, 0x0, 0xe000, {0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty=0xac1414aa, @empty, {[@lsrr={0x83, 0x3}]}}}}}}}, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x2, 0x238, [], 0x0, 0x0, 0x0}, 0x2b0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x40000) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) r4 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9990000000000000000e0000001000000000000000000000800e00000010000000000000000000000000000ffff00000000020000006c000000"], 0xb8}}, 0x0) 1.756156588s ago: executing program 0 (id=1466): perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x0, 0x0, 0x8000}, 0x48) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000f80)={'#! ', './file1', [], 0xa, "b26a45b1ba9f93e1b885d7ee0fa7c5c76f1c3fb93b37678f84fa85fce5d562792cbf969492b749b81ec1da89586802adfd6177b4caca"}, 0x41) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) socket$packet(0x11, 0xa, 0x300) r4 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0xfffffeffffff7f7e, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000540)="92", 0x1}], 0x1}, 0x0) sendmmsg$inet6(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="b2", 0x1}], 0x1}}], 0x1, 0x2000c801) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000006480)={&(0x7f0000c2b000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000005380)=""/231, 0x107f, 0x0, 0x0}, &(0x7f00000064c0)=0x40) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000380), 0x8) r5 = socket(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r5, 0x10d, 0xdf, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) pipe2$9p(0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x15) dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, 0x0) ioperm(0x0, 0x6, 0x1) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 1.755651508s ago: executing program 2 (id=1467): r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c}, {0x4}}]}]}, 0x48}}, 0x0) 1.755102788s ago: executing program 3 (id=1468): set_mempolicy(0x6, &(0x7f0000000000)=0x5, 0xff) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r3 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x26, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYRES64=r1, @ANYBLOB="e1e1915fae80dcd86c0851f73fe4692cb31de95055035f2d4d600e986daba8961aa1cf3d9eaabd38e0c87ef9c1c9ad8647168cecb5ba5d0717fa8fcf18d33e0ef62d3c59b6cd547146011547e94d8631fe62fa4a0db4776401784c69a9b283ee17d3ccb0e7c2a9425ed7c516c29afcd8b7e5c4af021c3a94bd0894e99d6b983312187eefde54ffeda5d87c1d1fddab28d69fd82a5d9e136b30e7ac1aa4071d074f97d764f3bf1ff749a6bbc3d7eed026378009107de6ebeace4aa32740471c7e163efa96c0e31e57e7", @ANYBLOB="0000000000000000b7020000f3ffffb01500000086000000956b3cd8727318f3b04964a1cdf447bcd8e1ae8876edddc2bcb48eb90f9cc0b937ee3d5383f52c2b0066fbba2e9794c7de16ab8a4b7d35f567f7c13d8a58ff"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000040), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xc881, &(0x7f0000000540)={0xa, 0x0, 0x9, @mcast2, 0x5}, 0x1c) r7 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25760355}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$USBDEVFS_FREE_STREAMS(r7, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="0200230310e707006000000002000020"]) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00'}) socket$kcm(0x2, 0x2, 0x2) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYRESOCT=r9, @ANYRES32=r10, @ANYBLOB="0000000000000000b7020000f3ffffb0150000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r11) sendmsg$NFT_BATCH(r8, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="140000001000010000000000000000520412533f4e7c7aed0084a920c8f7ca000100800000000000000008000240000000032c0800000000000012ed3cb8ee0000e6ff7b0a000002006e000d00010073697a30000000000900030073797a32000000917e5bc96ff6769dae73970000000003ff00"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[], 0x8c}}, 0xc000) close_range(r2, 0xffffffffffffffff, 0x0) 1.752487378s ago: executing program 4 (id=1469): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x3, 0x0, @loopback, 0xfeffffff}, 0x1c) 11.997399ms ago: executing program 4 (id=1470): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@private, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@mcast1, 0x0, 0x6c}, 0x0, @in=@multicast1}}, 0xe8) mknodat(0xffffffffffffff9c, &(0x7f0000000480)='./file2\x00', 0x1000, 0x400) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x3, &(0x7f0000000540)=[{0x6, 0x51, 0x1, 0xfc7}, {0x7, 0x0, 0xff, 0x770}, {0x1, 0x57, 0x4, 0x3}]}) rt_sigaction(0x19, &(0x7f0000000000)={0xfffffffffffffffc, 0x44000006, 0x0}, 0x0, 0x8, &(0x7f0000000440)) r5 = memfd_create(&(0x7f00000006c0)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\xf2\xed\x04\x00\x00\x00\xd4N\x12\x9b\x1f\t\xd1Z+\x86T\x16\xf8\x01\x00\x00\x00\x9f+\x8d!\x0fG\xab\xc2\xdc\xa3\xb3\xae8\x9f9?\xefo\xa4k\x01\xb2>\xa1\x9c\x86xm\xe6\x9bZ4\x91\x1a\xdb\xdd\x89\xb9\xc0LF;\xd6\x84\x195\x06\x00\x00\x00~\xf3S\x12\"p^\xc1jP\x8a\xc6[\xbd\xe7q]\xdd\r\x1aZS\x01*\x1b\xfd\xbcMA\xdcq\xa1\x00\xb3\xf9\x91r\x7f\xdc\xf1\xc3G,\xdb\xccS\x15\x95b\x17\xab\xe4?\x96\x95\xa4kP\x99YO\xb8V\xd5p\x90X\xaaf', 0x0) fallocate(r5, 0x0, 0x400000000000000, 0x7) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006}]}) syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x2, 0x2, 0x4, 0x5}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/308, @ANYRES32, @ANYRES8=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmsg$nl_generic(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="200000000300000a000100242a2fcd2b000000000000000000000000000000004e893d94555ed3789951a2919909f342b88d122bcd381a68157fc9bbf868eb9d99c097b51d159078e0cce6"], 0x20}}, 0x0) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f0000000080)) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97000288c19e9ace00000000000000002100000002ff020000000000000000000000000001"], 0x0) syz_clone(0x48209200, 0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) 9.137529ms ago: executing program 0 (id=1471): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r3, &(0x7f0000000500)=[{{&(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, 0x0, 0x70}}], 0x1, 0x2000c044) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001100010100"/20, @ANYRES32=r6], 0x20}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x7151, 0x0) 8.734159ms ago: executing program 2 (id=1472): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@private, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@mcast1, 0x0, 0x6c}, 0x0, @in=@multicast1}}, 0xe8) mknodat(0xffffffffffffff9c, &(0x7f0000000480)='./file2\x00', 0x1000, 0x400) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r3}, &(0x7f0000000800), &(0x7f0000000840)=r4}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x4, &(0x7f0000000540)=[{0x6, 0x51, 0x1, 0xfc7}, {0x7, 0x0, 0xff, 0x770}, {0xfff, 0x9, 0x5, 0x1}, {0x1, 0x57, 0x4, 0x3}]}) rt_sigaction(0x19, &(0x7f0000000000)={0xfffffffffffffffc, 0x44000006, 0x0}, 0x0, 0x8, &(0x7f0000000440)) memfd_create(&(0x7f00000006c0)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\xf2\xed\x04\x00\x00\x00\xd4N\x12\x9b\x1f\t\xd1Z+\x86T\x16\xf8\x01\x00\x00\x00\x9f+\x8d!\x0fG\xab\xc2\xdc\xa3\xb3\xae8\x9f9?\xefo\xa4k\x01\xb2>\xa1\x9c\x86xm\xe6\x9bZ4\x91\x1a\xdb\xdd\x89\xb9\xc0LF;\xd6\x84\x195\x06\x00\x00\x00~\xf3S\x12\"p^\xc1jP\x8a\xc6[\xbd\xe7q]\xdd\r\x1aZS\x01*\x1b\xfd\xbcMA\xdcq\xa1\x00\xb3\xf9\x91r\x7f\xdc\xf1\xc3G,\xdb\xccS\x15\x95b\x17\xab\xe4?\x96\x95\xa4kP\x99YO\xb8V\xd5p\x90X\xaaf', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x400000000000000, 0x7) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000580)=0x7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006}]}) syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x2, 0x2, 0x4, 0x5}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000deffffff0000000000181100007047067e22ac9229a08fc27223c5270310756fe1dad75a902514bcabac455d9f191b3ed2a771195b6889c3aa7c755492fe8532ef39e5a4df6f7a65740c07f218c7a45e1b5d2b64ecc1e512eacc509d399bc98f797f5590420a4f6248e017bf2b6781d85520df212bc2d550427bcdf31da8cafa14fcaf7523264a7cadcb0367400b88215a6f1df5be5dd55ec35455891b6c23c0d56a19d3a5d84f9483b070db746456e16aa1fb171b09e41b67230251ef035fb6608d61980dfc81ea5bbe9a00b7abb7780d6d4206fbeaf8043ef073b4ed580c4a09000000d0a6157bccee5233142342cc629763cf5b90f6d76d45363f792391941654baf8c98470505b7ffd5a53674a812318918a34911d8bfb620b1b07b10f00"/308, @ANYRES32=r6, @ANYRES8=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmsg$nl_generic(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="200000000300000a000100242a2fcd2b000000000000000000000000000000004e893d94555ed3789951a2919909f342b88d122bcd381a68157fc9bbf868eb9d99c097b51d159078e0cce6"], 0x20}}, 0x0) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f0000000080)) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97000288c19e9ace00000000000000002100000002ff020000000000000000000000000001"], 0x0) syz_clone(0x48209200, 0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) 0s ago: executing program 3 (id=1473): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x17, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x400}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={r2}, 0x4) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000002, 0x1c3050, r2, 0xfe948000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x2000000000000065, &(0x7f0000002600)=ANY=[@ANYRES16=r3], &(0x7f0000000240)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000000)={0x0, 0xff}, 0x8, 0x10, &(0x7f0000000200), 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000340)='xprtrdma_decode_seg\x00', r4}, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000003c0)={'ip_vti0\x00', &(0x7f0000000440)={'gre0\x00', 0x0, 0x0, 0x0, 0xfffffff8, 0x401, {{0x30, 0x4, 0x0, 0x0, 0xc0, 0x65, 0x0, 0x6f, 0x2f, 0x0, @local, @loopback, {[@timestamp={0x44, 0x1c, 0x8, 0x0, 0x7, [0x7, 0xffff8001, 0x3, 0x7fff, 0x4ab, 0x6]}, @rr={0x7, 0x17, 0x36, [@remote, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @multicast2]}, @lsrr={0x83, 0x13, 0xab, [@empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x2c}]}, @timestamp={0x44, 0x18, 0xb9, 0x0, 0x6, [0x1, 0x5, 0x1, 0x1, 0x400008]}, @end, @noop, @timestamp_addr={0x44, 0x4c, 0x88, 0x1, 0x8, [{@private=0xa010100, 0x8000}, {@broadcast, 0xffff6f37}, {@broadcast, 0xfffffffe}, {@multicast1, 0x7f}, {@rand_addr=0x64010100, 0x3}, {@dev={0xac, 0x14, 0x14, 0x18}, 0x8c07}, {@rand_addr=0x64010100, 0x4}, {@multicast2}, {@loopback, 0x401}]}]}}}}}) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x2, &(0x7f00000001c0)=[{0x6, 0x0, 0x4, 0x7fc00100}, {0x7, 0x5, 0x7, 0x2000}]}) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r7 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r8 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, r8, 0x0, 0x8, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x5, &(0x7f00000000c0)={0x0, 0x13, 0x1, @tid=r8}, &(0x7f0000000140)=0x0) timer_settime(r9, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000600)={@private0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty, 0x15f, 0x11, 0x45, 0x400, 0x9523, 0x10200, r10}) r11 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet_SIOCSARP(r11, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @multicast1}, {0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x44, {0x2, 0x0, @multicast1=0xe000cc02}}) socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f000000a800)=[{{0x0, 0x0, 0x0}, 0x1}], 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="040000000200fb06c63f0600"], 0xc) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001340), r0) kernel console output (not intermixed with test programs): performance. Setting the MTU to 1560 would solve the problem. [ 30.903688][ T3781] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.932627][ T3781] hsr_slave_0: entered promiscuous mode [ 30.942729][ T3781] hsr_slave_1: entered promiscuous mode [ 30.949196][ T3781] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.956867][ T3781] Cannot create hsr debugfs directory [ 30.993169][ T3808] capability: warning: `syz.4.105' uses 32-bit capabilities (legacy support in use) [ 31.030225][ T3808] loop4: detected capacity change from 0 to 1024 [ 31.158985][ T29] kauditd_printk_skb: 173 callbacks suppressed [ 31.158997][ T29] audit: type=1400 audit(1722186474.841:330): avc: denied { ioctl } for pid=3822 comm="syz.3.110" path="socket:[3992]" dev="sockfs" ino=3992 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 31.194374][ T29] audit: type=1400 audit(1722186474.841:331): avc: denied { write } for pid=3822 comm="syz.3.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 31.223537][ T29] audit: type=1326 audit(1722186474.901:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3817 comm="syz.2.108" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fbb75467299 code=0x0 [ 31.251233][ T3433] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 31.271420][ T3834] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=3834 comm=syz.2.108 [ 31.271849][ T29] audit: type=1326 audit(1722186474.951:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3830 comm="syz.3.113" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd415237299 code=0x0 [ 31.330243][ T3433] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 31.360479][ T3840] loop1: detected capacity change from 0 to 1024 [ 31.380375][ T3840] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 31.399876][ T3433] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 31.411246][ T3261] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 31.483174][ T3433] bridge_slave_1: left allmulticast mode [ 31.489046][ T3433] bridge_slave_1: left promiscuous mode [ 31.494809][ T3433] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.505227][ T3848] loop1: detected capacity change from 0 to 128 [ 31.513476][ T3433] bridge_slave_0: left allmulticast mode [ 31.519348][ T3433] bridge_slave_0: left promiscuous mode [ 31.525343][ T3433] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.534566][ T3848] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 31.547176][ T3848] ext4 filesystem being mounted at /23/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 31.621040][ T29] audit: type=1400 audit(1722186475.301:334): avc: denied { create } for pid=3847 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.666211][ T29] audit: type=1400 audit(1722186475.351:335): avc: denied { write } for pid=3847 comm="syz.1.117" name="sg0" dev="devtmpfs" ino=111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 31.708866][ T3261] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 31.741775][ T3433] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 31.758062][ T3433] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 31.770689][ T3433] bond0 (unregistering): Released all slaves [ 31.784153][ T3855] netlink: 'syz.1.119': attribute type 21 has an invalid length. [ 31.798267][ T29] audit: type=1400 audit(1722186475.481:336): avc: denied { search } for pid=2999 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 31.856170][ T29] audit: type=1400 audit(1722186475.481:337): avc: denied { read } for pid=2999 comm="dhcpcd" name="n25" dev="tmpfs" ino=1021 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 31.877874][ T29] audit: type=1400 audit(1722186475.481:338): avc: denied { open } for pid=2999 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=1021 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 31.900922][ T29] audit: type=1400 audit(1722186475.481:339): avc: denied { getattr } for pid=2999 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=1021 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 31.953963][ T3433] hsr_slave_0: left promiscuous mode [ 31.969886][ T3433] hsr_slave_1: left promiscuous mode [ 31.985078][ T3433] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 31.992529][ T3433] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 32.015166][ T3433] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 32.022665][ T3433] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 32.034702][ T3433] veth1_macvtap: left promiscuous mode [ 32.040342][ T3433] veth0_macvtap: left promiscuous mode [ 32.046043][ T3433] veth1_vlan: left promiscuous mode [ 32.051328][ T3433] veth0_vlan: left promiscuous mode [ 32.071355][ T3877] loop1: detected capacity change from 0 to 1764 [ 32.146150][ T3886] loop1: detected capacity change from 0 to 128 [ 32.243571][ T3433] team0 (unregistering): Port device team_slave_1 removed [ 32.254706][ T3433] team0 (unregistering): Port device team_slave_0 removed [ 32.431510][ T3909] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=3909 comm=syz.1.128 [ 32.485774][ T3781] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 32.509335][ T3781] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 32.520911][ T3922] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=3922 comm=syz.2.133 [ 32.552878][ T3781] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 32.602586][ T3781] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 32.669175][ T3942] loop4: detected capacity change from 0 to 128 [ 32.692131][ T3942] EXT4-fs (loop4): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 32.708613][ T3942] ext4 filesystem being mounted at /32/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 32.719310][ T3781] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.727492][ T3942] EXT4-fs warning (device loop4): ext4_dirblock_csum_verify:406: inode #2: comm syz.4.136: No space for directory leaf checksum. Please run e2fsck -D. [ 32.735689][ T3781] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.743002][ T3942] EXT4-fs error (device loop4): __ext4_find_entry:1652: inode #2: comm syz.4.136: checksumming directory block 0 [ 32.764795][ T3335] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.771974][ T3335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.782227][ T3335] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.789489][ T3335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.810675][ T3258] EXT4-fs (loop4): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 32.952559][ T3781] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.068997][ T3781] veth0_vlan: entered promiscuous mode [ 33.078709][ T3781] veth1_vlan: entered promiscuous mode [ 33.099808][ T3781] veth0_macvtap: entered promiscuous mode [ 33.108635][ T3781] veth1_macvtap: entered promiscuous mode [ 33.124144][ T3781] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.134749][ T3781] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.144808][ T3781] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.155420][ T3781] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.165375][ T3781] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.175851][ T3781] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.189786][ T3781] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.218228][ T3982] loop4: detected capacity change from 0 to 1024 [ 33.231754][ T3781] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.242472][ T3781] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.252370][ T3781] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.262825][ T3781] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.272776][ T3781] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.283546][ T3781] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.298613][ T3781] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.307867][ T3781] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.316765][ T3781] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.325809][ T3781] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.334676][ T3781] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.347073][ T4003] netlink: 'syz.1.145': attribute type 2 has an invalid length. [ 33.347283][ T3982] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 33.354745][ T4003] netlink: 'syz.1.145': attribute type 9 has an invalid length. [ 33.374523][ T4003] __nla_validate_parse: 6 callbacks suppressed [ 33.374535][ T4003] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.145'. [ 33.392679][ T4006] loop2: detected capacity change from 0 to 512 [ 33.400368][ T4006] ======================================================= [ 33.400368][ T4006] WARNING: The mand mount option has been deprecated and [ 33.400368][ T4006] and is ignored by this kernel. Remove the mand [ 33.400368][ T4006] option from the mount to silence this warning. [ 33.400368][ T4006] ======================================================= [ 33.402724][ T4000] ip6gretap0: entered promiscuous mode [ 33.440301][ T4006] EXT4-fs: Ignoring removed oldalloc option [ 33.448318][ T4006] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 33.458075][ T4000] batadv_slave_0: entered promiscuous mode [ 33.478121][ T4006] loop2: detected capacity change from 0 to 764 [ 33.484768][ T4006] iso9660: Unknown parameter 'ext3' [ 33.492020][ T4000] ip6gretap0: left promiscuous mode [ 33.498361][ T4000] batadv_slave_0: left promiscuous mode [ 33.525246][ T4006] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 33.551999][ T3258] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 33.637638][ T4015] @ÿ: renamed from veth0_vlan (while UP) [ 33.724040][ T4031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4031 comm=syz.2.152 [ 33.743800][ T4029] netlink: 'syz.2.152': attribute type 1 has an invalid length. [ 33.757916][ T4029] 8021q: adding VLAN 0 to HW filter on device bond1 [ 33.822432][ T4040] loop2: detected capacity change from 0 to 1024 [ 33.829518][ T4040] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 33.833726][ T4042] netlink: 28 bytes leftover after parsing attributes in process `syz.0.156'. [ 33.840806][ T4040] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 33.849736][ T4042] netlink: 28 bytes leftover after parsing attributes in process `syz.0.156'. [ 33.882978][ T4042] ip6gretap0: entered promiscuous mode [ 33.884371][ T4040] jbd2_journal_init_inode: Cannot locate journal superblock [ 33.896074][ T4040] EXT4-fs (loop2): Could not load journal inode [ 33.904002][ T4042] batadv_slave_0: entered promiscuous mode [ 33.931720][ T2113] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 33.989263][ T2113] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 34.049314][ T2113] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 34.064576][ T4060] loop0: detected capacity change from 0 to 2048 [ 34.076555][ T4060] EXT4-fs: Ignoring removed mblk_io_submit option [ 34.091969][ T2113] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 34.127617][ T4060] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 34.161206][ T3781] EXT4-fs error (device loop0): ext4_readdir:260: inode #2: block 16: comm syz-executor: path /9/file0: bad entry in directory: rec_len is smaller than minimal - offset=60, inode=117440527, rec_len=0, size=2048 fake=0 [ 34.187103][ T3781] EXT4-fs error (device loop0): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 281 free clusters [ 34.217049][ T3781] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.255862][ T2113] bridge_slave_1: left allmulticast mode [ 34.261656][ T2113] bridge_slave_1: left promiscuous mode [ 34.267503][ T2113] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.296799][ T2113] bridge_slave_0: left allmulticast mode [ 34.302473][ T2113] bridge_slave_0: left promiscuous mode [ 34.308234][ T2113] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.339639][ T4076] loop0: detected capacity change from 0 to 2048 [ 34.374190][ T4079] loop2: detected capacity change from 0 to 512 [ 34.437565][ T4079] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 34.450750][ T4079] ext4 filesystem being mounted at /31/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 34.458203][ T4083] loop0: detected capacity change from 0 to 128 [ 34.480017][ T2113] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 34.506485][ T4083] FAT-fs (loop0): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 34.532288][ T2113] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 34.553141][ T2113] bond0 (unregistering): Released all slaves [ 34.566540][ T4044] chnl_net:caif_netlink_parms(): no params data found [ 34.663267][ T2113] hsr_slave_0: left promiscuous mode [ 34.670813][ T2113] hsr_slave_1: left promiscuous mode [ 34.681174][ T2113] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 34.688816][ T2113] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 34.706207][ T3263] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.706301][ T2113] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 34.723173][ T2113] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 34.753745][ T2113] veth1_macvtap: left promiscuous mode [ 34.759338][ T2113] veth0_macvtap: left promiscuous mode [ 34.765157][ T2113] veth1_vlan: left promiscuous mode [ 34.770407][ T2113] veth0_vlan: left promiscuous mode [ 34.779589][ T4109] loop4: detected capacity change from 0 to 512 [ 34.792788][ T4109] EXT4-fs error (device loop4): ext4_orphan_get:1391: inode #17: comm syz.4.180: iget: bogus i_mode (0) [ 34.805211][ T4109] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.180: couldn't read orphan inode 17 (err -117) [ 34.817851][ T4109] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 34.888017][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 34.926406][ T2113] team0 (unregistering): Port device team_slave_1 removed [ 34.936445][ T2113] team0 (unregistering): Port device team_slave_0 removed [ 34.975564][ T4113] netlink: 8 bytes leftover after parsing attributes in process `syz.2.179'. [ 34.985296][ T4113] vlan0: entered promiscuous mode [ 34.990486][ T4113] vlan0: entered allmulticast mode [ 35.029619][ T4133] loop2: detected capacity change from 0 to 512 [ 35.044536][ T4044] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.051872][ T4044] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.061323][ T4044] bridge_slave_0: entered allmulticast mode [ 35.068452][ T4044] bridge_slave_0: entered promiscuous mode [ 35.070337][ T4133] EXT4-fs error (device loop2): ext4_xattr_ibody_find:2240: inode #12: comm syz.2.181: corrupted in-inode xattr: invalid ea_ino [ 35.088230][ T4133] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.181: couldn't read orphan inode 12 (err -117) [ 35.100756][ T4133] EXT4-fs (loop2): mounted filesystem 00000005-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.116447][ T4044] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.123531][ T4044] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.132786][ T4044] bridge_slave_1: entered allmulticast mode [ 35.139391][ T4044] bridge_slave_1: entered promiscuous mode [ 35.149525][ T3263] EXT4-fs (loop2): unmounting filesystem 00000005-0000-0000-0000-000000000000. [ 35.173477][ T4139] loop2: detected capacity change from 0 to 128 [ 35.180424][ T4139] FAT-fs (loop2): Invalid FSINFO signature: 0x41615252, 0x614101ff (sector = 1) [ 35.192002][ T4044] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.218372][ T4044] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.219491][ T4139] netlink: 56 bytes leftover after parsing attributes in process `syz.2.182'. [ 35.246623][ T4044] team0: Port device team_slave_0 added [ 35.253258][ T4044] team0: Port device team_slave_1 added [ 35.285739][ T4044] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.292782][ T4044] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.318941][ T4044] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.330981][ T4044] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.338240][ T4044] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.364545][ T4044] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.394702][ T4044] hsr_slave_0: entered promiscuous mode [ 35.400975][ T4044] hsr_slave_1: entered promiscuous mode [ 35.484891][ T4162] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=4162 comm=syz.3.184 [ 35.617896][ T3258] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.632598][ T4185] loop2: detected capacity change from 0 to 512 [ 35.657956][ T4185] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.672048][ T4190] netlink: 'syz.4.188': attribute type 64 has an invalid length. [ 35.679973][ T4185] ext4 filesystem being mounted at /38/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 35.682754][ T4190] A link change request failed with some changes committed already. Interface macsec0 may have been left with an inconsistent configuration, please check. [ 35.717736][ T4185] syz.2.189 (4185) used greatest stack depth: 10800 bytes left [ 35.745926][ T4044] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 35.754760][ T4044] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 35.762997][ T3263] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.783308][ T4044] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 35.800711][ T4044] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 35.812965][ T4198] loop2: detected capacity change from 0 to 1024 [ 35.830361][ T4044] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.837599][ T4044] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.851650][ T4198] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.878690][ T3263] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.885854][ T4044] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.907750][ T3323] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.928889][ T4044] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.941507][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.948716][ T3323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.967426][ T4219] vlan2: entered allmulticast mode [ 35.972736][ T4219] netdevsim netdevsim2 netdevsim0: entered allmulticast mode [ 35.984227][ T4219] netdevsim netdevsim2 netdevsim0: left allmulticast mode [ 36.008016][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.015123][ T3323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.107554][ T4044] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.131672][ T4240] loop2: detected capacity change from 0 to 512 [ 36.150312][ T4240] EXT4-fs error (device loop2): ext4_orphan_get:1391: inode #17: comm syz.2.198: iget: bogus i_mode (0) [ 36.163184][ T4248] netlink: 100 bytes leftover after parsing attributes in process `syz.3.199'. [ 36.166020][ T4240] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.198: couldn't read orphan inode 17 (err -117) [ 36.172467][ T4248] netlink: 100 bytes leftover after parsing attributes in process `syz.3.199'. [ 36.199588][ T4240] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 36.260988][ T4044] veth0_vlan: entered promiscuous mode [ 36.279200][ T4044] veth1_vlan: entered promiscuous mode [ 36.279546][ T4267] loop3: detected capacity change from 0 to 512 [ 36.292139][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 36.293627][ T4267] EXT4-fs: Ignoring removed bh option [ 36.308597][ T4267] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 36.320635][ T4267] EXT4-fs (loop3): 1 truncate cleaned up [ 36.323339][ T4044] veth0_macvtap: entered promiscuous mode [ 36.335253][ T4267] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 36.349169][ T4044] veth1_macvtap: entered promiscuous mode [ 36.359548][ T4044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.370046][ T4044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.379893][ T4044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.390408][ T4044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.400241][ T4044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.410765][ T4044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.424798][ T4044] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.435986][ T4044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.446707][ T4044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.456728][ T4044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.467213][ T4044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.477079][ T4044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.487645][ T4044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.498958][ T4044] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.508927][ T4044] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.517813][ T4044] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.526605][ T4044] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.535396][ T4044] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.556219][ T29] kauditd_printk_skb: 96 callbacks suppressed [ 36.556233][ T29] audit: type=1400 audit(1722186480.241:436): avc: denied { mount } for pid=4044 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 36.586999][ T4267] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.637038][ T4297] loop1: detected capacity change from 0 to 512 [ 36.655239][ T4297] EXT4-fs (loop1): Cannot turn on journaled quota: type 0: error -2 [ 36.663672][ T4297] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -2 [ 36.673177][ T4297] EXT4-fs (loop1): 1 truncate cleaned up [ 36.680862][ T4297] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.712242][ T29] audit: type=1400 audit(1722186480.391:437): avc: denied { write } for pid=4300 comm="syz.4.204" path="socket:[6802]" dev="sockfs" ino=6802 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 36.736952][ T29] audit: type=1400 audit(1722186480.421:438): avc: denied { ioctl } for pid=4300 comm="syz.4.204" path="socket:[6802]" dev="sockfs" ino=6802 ioctlcmd=0x581f scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 37.587619][ T3727] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 227 vs 220 free clusters [ 37.605426][ T29] audit: type=1400 audit(1722186481.271:439): avc: denied { create } for pid=4300 comm="syz.4.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 37.625302][ T29] audit: type=1400 audit(1722186481.271:440): avc: denied { ioctl } for pid=4300 comm="syz.4.204" path="socket:[7201]" dev="sockfs" ino=7201 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 37.627643][ T3727] EXT4-fs (loop1): Remounting filesystem read-only [ 37.651741][ T4304] netlink: 4 bytes leftover after parsing attributes in process `syz.4.204'. [ 37.658821][ T3727] EXT4-fs error (device loop2): ext4_validate_block_bitmap:432: comm ext4lazyinit: bg 0: block 7: invalid block bitmap [ 37.696116][ T4044] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.716096][ T3263] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.760897][ T4310] loop1: detected capacity change from 0 to 128 [ 37.773396][ T29] audit: type=1400 audit(1722186481.461:441): avc: denied { create } for pid=4311 comm="syz.2.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 37.821013][ T29] audit: type=1326 audit(1722186481.501:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4311 comm="syz.2.207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbb75467299 code=0x7ffc0000 [ 37.844467][ T29] audit: type=1326 audit(1722186481.501:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4311 comm="syz.2.207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=137 compat=0 ip=0x7fbb75467299 code=0x7ffc0000 [ 37.867839][ T29] audit: type=1326 audit(1722186481.501:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4311 comm="syz.2.207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbb75467299 code=0x7ffc0000 [ 37.887359][ T4318] SELinux: Context k is not valid (left unmapped). [ 37.891358][ T29] audit: type=1326 audit(1722186481.501:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4311 comm="syz.2.207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbb75467299 code=0x7ffc0000 [ 38.028926][ T4329] syzkaller0: entered promiscuous mode [ 38.045322][ T4329] syzkaller0 (unregistering): left promiscuous mode [ 38.056120][ T4331] usb usb7: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 38.063517][ T4331] vhci_hcd: SetHubDepth req not supported for USB 2.0 roothub [ 38.072240][ T4331] dccp_invalid_packet: P.Data Offset(0) too small [ 38.116118][ T4335] loop2: detected capacity change from 0 to 512 [ 38.124521][ T4335] EXT4-fs error (device loop2): ext4_orphan_get:1391: inode #17: comm syz.2.217: iget: bogus i_mode (0) [ 38.136798][ T4335] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.217: couldn't read orphan inode 17 (err -117) [ 38.149658][ T4335] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.234009][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 38.314445][ T4340] loop1: detected capacity change from 0 to 512 [ 38.324654][ T4340] EXT4-fs error (device loop1): ext4_free_branches:1030: inode #11: comm syz.1.218: invalid indirect mapped block 256 (level 2) [ 38.339569][ T4340] EXT4-fs (loop1): 2 truncates cleaned up [ 38.349860][ T4340] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 38.429057][ T50] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.613090][ T4348] chnl_net:caif_netlink_parms(): no params data found [ 38.653459][ T4348] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.660597][ T4348] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.669048][ T4348] bridge_slave_0: entered allmulticast mode [ 38.675770][ T4348] bridge_slave_0: entered promiscuous mode [ 38.694365][ T4348] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.701484][ T4348] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.708685][ T4348] bridge_slave_1: entered allmulticast mode [ 38.715162][ T4348] bridge_slave_1: entered promiscuous mode [ 38.736698][ T4348] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.748138][ T4348] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.768887][ C1] eth0: bad gso: type: 1, size: 1408 [ 38.777634][ T4348] team0: Port device team_slave_0 added [ 38.785234][ C0] hrtimer: interrupt took 29407 ns [ 38.785964][ T4348] team0: Port device team_slave_1 added [ 38.810590][ T4348] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.817733][ T4348] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.819415][ T4371] loop3: detected capacity change from 0 to 512 [ 38.843783][ T4348] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.862496][ T4348] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.869478][ T4348] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.878433][ T4371] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 38.895432][ T4348] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.920271][ T4371] ext4 filesystem being mounted at /50/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 38.935478][ T4348] hsr_slave_0: entered promiscuous mode [ 38.941751][ T4348] hsr_slave_1: entered promiscuous mode [ 38.955937][ T4348] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 38.963710][ T4348] Cannot create hsr debugfs directory [ 38.963953][ T3267] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.980952][ T3263] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.061008][ T4400] loop2: detected capacity change from 0 to 512 [ 39.069885][ T4399] loop3: detected capacity change from 0 to 128 [ 39.078118][ T4399] vfat: Unknown parameter '/proc/keys' [ 39.084391][ T4399] netlink: 8 bytes leftover after parsing attributes in process `syz.3.233'. [ 39.090177][ T4403] ip6_tunnel: non-ECT from 0000:0000:0000:0000:0000:ffff:7f00:0001 with DS=0xb [ 39.105108][ T4400] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 39.117844][ T4400] ext4 filesystem being mounted at /52/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 39.118281][ T4044] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.175074][ T4409] loop1: detected capacity change from 0 to 512 [ 39.192199][ T4409] EXT4-fs error (device loop1): ext4_clear_blocks:883: inode #13: comm syz.1.236: attempt to clear invalid blocks 2 len 1 [ 39.209652][ T4409] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 218 vs 220 free clusters [ 39.226361][ T4409] EXT4-fs error (device loop1): ext4_free_branches:1030: inode #13: comm syz.1.236: invalid indirect mapped block 1819239214 (level 0) [ 39.241438][ T4409] EXT4-fs error (device loop1): ext4_free_branches:1030: inode #13: comm syz.1.236: invalid indirect mapped block 1819239214 (level 1) [ 39.241706][ T4418] loop3: detected capacity change from 0 to 128 [ 39.256738][ T4409] EXT4-fs (loop1): 1 truncate cleaned up [ 39.265283][ T4418] netlink: 'syz.3.240': attribute type 1 has an invalid length. [ 39.267626][ T4409] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.291715][ T4409] EXT4-fs warning (device loop1): dx_probe:833: inode #2: comm syz.1.236: Unrecognised inode hash code 20 [ 39.303087][ T4409] EXT4-fs warning (device loop1): dx_probe:966: inode #2: comm syz.1.236: Corrupt directory, running e2fsck is recommended [ 39.316186][ T4409] EXT4-fs warning (device loop1): dx_probe:833: inode #2: comm syz.1.236: Unrecognised inode hash code 20 [ 39.327611][ T4409] EXT4-fs warning (device loop1): dx_probe:966: inode #2: comm syz.1.236: Corrupt directory, running e2fsck is recommended [ 39.341027][ T4409] EXT4-fs error (device loop1): ext4_find_dest_de:2067: inode #2: block 13: comm syz.1.236: bad entry in directory: rec_len % 4 != 0 - offset=108, inode=4294901777, rec_len=65535, size=1024 fake=0 [ 39.347698][ T4403] syz.4.235 (4403) used greatest stack depth: 10696 bytes left [ 39.374215][ T4409] EXT4-fs error (device loop1): htree_dirblock_to_tree:1112: inode #2: block 13: comm syz.1.236: bad entry in directory: rec_len % 4 != 0 - offset=108, inode=4294901777, rec_len=65535, size=1024 fake=0 [ 39.406443][ T3263] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.423275][ T4044] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.446079][ T4424] loop1: detected capacity change from 0 to 128 [ 39.453075][ T4424] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x614101ff (sector = 1) [ 39.520029][ T4435] bio_check_eod: 33 callbacks suppressed [ 39.520046][ T4435] syz.1.243: attempt to access beyond end of device [ 39.520046][ T4435] loop1: rw=2049, sector=529, nr_sectors = 16 limit=128 [ 39.539853][ T4435] syz.1.243: attempt to access beyond end of device [ 39.539853][ T4435] loop1: rw=2049, sector=553, nr_sectors = 8 limit=128 [ 39.553556][ T4435] syz.1.243: attempt to access beyond end of device [ 39.553556][ T4435] loop1: rw=2049, sector=569, nr_sectors = 8 limit=128 [ 39.556065][ T4424] syz.1.243: attempt to access beyond end of device [ 39.556065][ T4424] loop1: rw=2049, sector=545, nr_sectors = 8 limit=128 [ 39.567348][ T4435] syz.1.243: attempt to access beyond end of device [ 39.567348][ T4435] loop1: rw=2049, sector=593, nr_sectors = 8 limit=128 [ 39.593609][ T4424] syz.1.243: attempt to access beyond end of device [ 39.593609][ T4424] loop1: rw=2049, sector=561, nr_sectors = 8 limit=128 [ 39.609586][ T4435] syz.1.243: attempt to access beyond end of device [ 39.609586][ T4435] loop1: rw=2049, sector=609, nr_sectors = 8 limit=128 [ 39.615006][ T4424] syz.1.243: attempt to access beyond end of device [ 39.615006][ T4424] loop1: rw=2049, sector=577, nr_sectors = 16 limit=128 [ 39.636395][ T4435] syz.1.243: attempt to access beyond end of device [ 39.636395][ T4435] loop1: rw=2049, sector=625, nr_sectors = 8 limit=128 [ 39.636434][ T4435] syz.1.243: attempt to access beyond end of device [ 39.636434][ T4435] loop1: rw=2049, sector=641, nr_sectors = 9 limit=128 [ 39.737860][ T4451] (unnamed net_device) (uninitialized): option updelay: invalid value (18446744073709551615) [ 39.748305][ T4451] (unnamed net_device) (uninitialized): option updelay: allowed values 0 - 2147483647 [ 39.763645][ T4449] netlink: 48 bytes leftover after parsing attributes in process `syz.3.250'. [ 39.776340][ T2113] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x614101ff (sector = 1) [ 39.831299][ T4458] netlink: 'syz.2.254': attribute type 10 has an invalid length. [ 39.834499][ T4463] loop3: detected capacity change from 0 to 512 [ 39.841914][ T4467] loop4: detected capacity change from 0 to 1024 [ 39.854049][ T4467] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 39.865087][ T4467] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 39.875985][ T4467] jbd2_journal_init_inode: Cannot locate journal superblock [ 39.883322][ T4467] EXT4-fs (loop4): Could not load journal inode [ 39.884467][ T4463] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 39.903231][ T4463] ext4 filesystem being mounted at /60/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 39.952460][ T3267] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.981854][ T4483] loop3: detected capacity change from 0 to 512 [ 39.986550][ T4475] 9pnet_fd: p9_fd_create_unix (4475): address too long: ./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 39.988897][ T4483] EXT4-fs: Ignoring removed mblk_io_submit option [ 40.089923][ T4483] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 40.103008][ T4483] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 40.116161][ T50] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.121266][ T4483] EXT4-fs error (device loop3): ext4_xattr_ibody_find:2240: inode #15: comm syz.3.259: corrupted in-inode xattr: e_value out of bounds [ 40.143449][ T4483] EXT4-fs error (device loop3): ext4_orphan_get:1396: comm syz.3.259: couldn't read orphan inode 15 (err -117) [ 40.147541][ T4489] loop2: detected capacity change from 0 to 512 [ 40.157149][ T4483] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.174286][ T4489] ext4: Unknown parameter 'nouser_xattr' [ 40.198562][ T50] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.240435][ T50] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.256880][ T3451] tipc: Subscription rejected, illegal request [ 40.265397][ T3267] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.310239][ T50] bridge_slave_1: left allmulticast mode [ 40.315965][ T50] bridge_slave_1: left promiscuous mode [ 40.321669][ T50] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.329771][ T50] bridge_slave_0: left allmulticast mode [ 40.335469][ T50] bridge_slave_0: left promiscuous mode [ 40.341157][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.361221][ T4521] FAULT_INJECTION: forcing a failure. [ 40.361221][ T4521] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 40.374527][ T4521] CPU: 1 UID: 0 PID: 4521 Comm: syz.2.273 Not tainted 6.10.0-syzkaller-12888-g5437f30d3458 #0 [ 40.384760][ T4521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 40.394820][ T4521] Call Trace: [ 40.398160][ T4521] [ 40.401079][ T4521] dump_stack_lvl+0xf2/0x150 [ 40.405727][ T4521] dump_stack+0x15/0x20 [ 40.409918][ T4521] should_fail_ex+0x229/0x230 [ 40.414764][ T4521] should_fail+0xb/0x10 [ 40.419068][ T4521] should_fail_usercopy+0x1a/0x20 [ 40.424175][ T4521] _copy_from_iter+0xd3/0xb00 [ 40.428914][ T4521] ? kmalloc_reserve+0x16e/0x190 [ 40.433894][ T4521] ? __build_skb_around+0x196/0x1f0 [ 40.439150][ T4521] ? __alloc_skb+0x21f/0x310 [ 40.443733][ T4521] ? __virt_addr_valid+0x1ed/0x250 [ 40.448833][ T4521] ? __check_object_size+0x35b/0x510 [ 40.454123][ T4521] netlink_sendmsg+0x460/0x6e0 [ 40.458880][ T4521] ? __pfx_netlink_sendmsg+0x10/0x10 [ 40.464156][ T4521] __sock_sendmsg+0x140/0x180 [ 40.468889][ T4521] ____sys_sendmsg+0x312/0x410 [ 40.473708][ T4521] __sys_sendmsg+0x1e9/0x280 [ 40.478564][ T4521] __x64_sys_sendmsg+0x46/0x50 [ 40.483835][ T4521] x64_sys_call+0x26f8/0x2e00 [ 40.488836][ T4521] do_syscall_64+0xc9/0x1c0 [ 40.493395][ T4521] ? clear_bhb_loop+0x55/0xb0 [ 40.498065][ T4521] ? clear_bhb_loop+0x55/0xb0 [ 40.502745][ T4521] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 40.508801][ T4521] RIP: 0033:0x7fbb75467299 [ 40.513323][ T4521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.532949][ T4521] RSP: 002b:00007fbb740e7048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 40.541361][ T4521] RAX: ffffffffffffffda RBX: 00007fbb755f5f80 RCX: 00007fbb75467299 [ 40.549404][ T4521] RDX: 0000000000000000 RSI: 0000000020000a00 RDI: 0000000000000003 [ 40.557784][ T4521] RBP: 00007fbb740e70a0 R08: 0000000000000000 R09: 0000000000000000 [ 40.565929][ T4521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 40.574151][ T4521] R13: 000000000000004d R14: 00007fbb755f5f80 R15: 00007ffdcbce63a8 [ 40.582366][ T4521] [ 40.645610][ T50] ip6gretap0 (unregistering): left promiscuous mode [ 40.689211][ T50] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 40.699968][ T50] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 40.710160][ T50] bond0 (unregistering): Released all slaves [ 40.722315][ T4531] netlink: 8 bytes leftover after parsing attributes in process `syz.1.277'. [ 40.733034][ T4531] vlan0: entered promiscuous mode [ 40.738177][ T4531] vlan0: entered allmulticast mode [ 40.753363][ T4534] loop2: detected capacity change from 0 to 1024 [ 40.769012][ T4534] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.816837][ T3263] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.865779][ T50] batadv_slave_0: left promiscuous mode [ 40.873401][ T50] hsr_slave_0: left promiscuous mode [ 40.880191][ T50] hsr_slave_1: left promiscuous mode [ 40.887101][ T50] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 40.894571][ T50] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 40.902314][ T50] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 40.909918][ T50] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 40.919386][ T50] veth1_macvtap: left promiscuous mode [ 40.924893][ T50] veth0_macvtap: left promiscuous mode [ 40.930785][ T50] veth1_vlan: left promiscuous mode [ 40.936122][ T50] veth0_vlan: left promiscuous mode [ 40.989890][ T4559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=4559 comm=syz.1.283 [ 41.034857][ T50] team0 (unregistering): Port device team_slave_1 removed [ 41.045646][ T50] team0 (unregistering): Port device team_slave_0 removed [ 41.159789][ T4570] loop3: detected capacity change from 0 to 128 [ 41.232326][ T4348] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 41.246941][ T4348] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 41.261752][ T4348] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 41.274735][ T4348] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 41.292249][ T4577] netlink: 8 bytes leftover after parsing attributes in process `syz.4.292'. [ 41.342866][ T4589] loop4: detected capacity change from 0 to 128 [ 41.363184][ T4589] FAT-fs (loop4): bogus number of reserved sectors [ 41.369932][ T4589] FAT-fs (loop4): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 41.381152][ T4589] FAT-fs (loop4): Can't find a valid FAT filesystem [ 41.389688][ T4348] 8021q: adding VLAN 0 to HW filter on device bond0 [ 41.403892][ T4348] 8021q: adding VLAN 0 to HW filter on device team0 [ 41.417044][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.424131][ T3323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.433931][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.441283][ T3323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.492541][ T4611] loop4: detected capacity change from 0 to 1024 [ 41.508218][ T4611] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 41.520686][ T4611] ext4 filesystem being mounted at /73/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 41.600624][ T4348] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.610854][ T3258] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.641011][ T29] kauditd_printk_skb: 51 callbacks suppressed [ 41.641023][ T29] audit: type=1400 audit(1722186485.321:497): avc: denied { bind } for pid=4632 comm="syz.4.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 41.679424][ T29] audit: type=1400 audit(1722186485.321:498): avc: denied { name_bind } for pid=4632 comm="syz.4.296" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 [ 41.702961][ T29] audit: type=1400 audit(1722186485.321:499): avc: denied { node_bind } for pid=4632 comm="syz.4.296" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=dccp_socket permissive=1 [ 41.723890][ T29] audit: type=1400 audit(1722186485.321:500): avc: denied { listen } for pid=4632 comm="syz.4.296" lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 41.742959][ T4348] veth0_vlan: entered promiscuous mode [ 41.745037][ T29] audit: type=1400 audit(1722186485.321:501): avc: denied { write } for pid=4632 comm="syz.4.296" laddr=::1 lport=56778 faddr=::1 fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 41.759526][ T4348] veth1_vlan: entered promiscuous mode [ 41.794224][ T29] audit: type=1400 audit(1722186485.461:502): avc: denied { connect } for pid=4637 comm="syz.4.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 41.813993][ T29] audit: type=1400 audit(1722186485.471:503): avc: denied { read } for pid=4637 comm="syz.4.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 41.836524][ T4645] vlan3: entered allmulticast mode [ 41.841687][ T4645] netdevsim netdevsim1 netdevsim0: entered allmulticast mode [ 41.868713][ T4645] netdevsim netdevsim1 netdevsim0: left allmulticast mode [ 41.890359][ T4655] loop2: detected capacity change from 0 to 256 [ 41.892388][ T4348] veth0_macvtap: entered promiscuous mode [ 41.897863][ T4655] msdos: Unknown parameter '0xffffffffffffffff' [ 41.909547][ T4348] veth1_macvtap: entered promiscuous mode [ 41.912677][ T4655] loop2: detected capacity change from 0 to 256 [ 41.923733][ T4655] vfat: Unknown parameter '017777777777777777777770xffffffffffffffffÿÿÿÿÿÿÿÿ00000000000000000000ÿÿÿ18446744073709551615ÿÿ' [ 41.936043][ T4348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 41.947079][ T4348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.956949][ T4348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 41.957786][ T29] audit: type=1400 audit(1722186485.641:504): avc: denied { create } for pid=4646 comm="syz.2.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 41.967389][ T4348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.967413][ T4348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 41.967426][ T4348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.969114][ T4348] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.037895][ T4348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.048423][ T4348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.058472][ T4348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.068946][ T4348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.078980][ T4348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 42.089445][ T4348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.110703][ T4348] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.120673][ T4348] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.129523][ T4348] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.138511][ T4348] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.147552][ T4348] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.169466][ T4679] loop2: detected capacity change from 0 to 512 [ 42.270243][ T4679] EXT4-fs: Ignoring removed bh option [ 42.318633][ T4679] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 42.359610][ T29] audit: type=1326 audit(1722186486.041:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4730 comm="syz.3.307" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd415237299 code=0x0 [ 42.389250][ T4679] EXT4-fs (loop2): 1 truncate cleaned up [ 42.395271][ T4679] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 42.428079][ T4748] netlink: 152 bytes leftover after parsing attributes in process `syz.1.309'. [ 42.440775][ T29] audit: type=1326 audit(1722186486.131:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4741 comm="syz.0.221" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fbefb5e7299 code=0x0 [ 42.464740][ T4753] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=4753 comm=syz.3.307 [ 42.489156][ T4752] netlink: 'syz.1.310': attribute type 32 has an invalid length. [ 42.524899][ T4679] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.537144][ T4755] loop1: detected capacity change from 0 to 1024 [ 42.545911][ T4757] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=4757 comm=syz.0.221 [ 42.561970][ T4755] EXT4-fs (loop1): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 42.578512][ T4761] loop2: detected capacity change from 0 to 512 [ 42.588170][ T4755] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 42.597013][ T4755] EXT4-fs (loop1): orphan cleanup on readonly fs [ 42.599686][ T4761] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 42.603658][ T4755] EXT4-fs error (device loop1): ext4_free_blocks:6590: comm syz.1.311: Freeing blocks not in datazone - block = 0, count = 4096 [ 42.616066][ T4761] ext4 filesystem being mounted at /72/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 42.632079][ T4755] EXT4-fs (loop1): Remounting filesystem read-only [ 42.646858][ T4755] EXT4-fs (loop1): 1 truncate cleaned up [ 42.656724][ T4755] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 42.669314][ T4755] SELinux: (dev loop1, type ext4) getxattr errno 5 [ 42.669963][ T3263] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.676177][ T4755] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.716350][ T4755] loop1: detected capacity change from 0 to 1024 [ 42.723158][ T4755] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (62631!=20869) [ 42.733263][ T4755] EXT4-fs (loop1): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 42.744411][ T4755] jbd2_journal_init_inode: Cannot locate journal superblock [ 42.751914][ T4755] EXT4-fs (loop1): Could not load journal inode [ 43.165831][ T4809] netlink: 8 bytes leftover after parsing attributes in process `syz.3.329'. [ 43.188638][ T4811] bond0: (slave vlan2): Opening slave failed [ 43.232503][ T4815] netlink: 16 bytes leftover after parsing attributes in process `syz.4.332'. [ 43.241512][ T4815] netlink: 12 bytes leftover after parsing attributes in process `syz.4.332'. [ 43.318892][ T4823] loop3: detected capacity change from 0 to 128 [ 43.326340][ T4823] FAT-fs (loop3): invalid media value (0x00) [ 43.332382][ T4823] FAT-fs (loop3): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 43.341839][ T4823] FAT-fs (loop3): Can't find a valid FAT filesystem [ 43.461599][ T4836] xt_CT: You must specify a L4 protocol and not use inversions on it [ 43.468445][ T4838] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 43.488007][ T4841] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=4841 comm=syz.4.339 [ 43.651114][ T4846] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=4846 comm=syz.3.342 [ 43.856463][ T4853] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4853 comm=syz.2.345 [ 43.872384][ T4852] bond_slave_0: entered promiscuous mode [ 43.878119][ T4852] bond_slave_1: entered promiscuous mode [ 43.884787][ T4852] bond_slave_0: left promiscuous mode [ 43.890499][ T4852] bond_slave_1: left promiscuous mode [ 43.903268][ T4852] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 43.917025][ T4852] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 43.931512][ T4852] bond0 (unregistering): Released all slaves [ 43.943541][ T4854] netlink: 8 bytes leftover after parsing attributes in process `syz.2.345'. [ 43.952803][ T4854] netlink: 32 bytes leftover after parsing attributes in process `syz.2.345'. [ 44.013659][ T4857] loop1: detected capacity change from 0 to 128 [ 44.089645][ T4861] netlink: 4 bytes leftover after parsing attributes in process `syz.1.348'. [ 44.215148][ T4878] loop0: detected capacity change from 0 to 4096 [ 44.221947][ T4878] EXT4-fs: Ignoring removed nobh option [ 44.229724][ T4878] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 44.252936][ T4878] EXT4-fs: Remounting file system with no journal so ignoring journalled data option [ 44.262576][ T4878] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 44.271577][ T4878] EXT4-fs error (device loop0): __ext4_remount:6491: comm syz.0.351: Abort forced by user [ 44.285441][ T4878] EXT4-fs (loop0): Remounting filesystem read-only [ 44.294461][ T4878] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop0 ino=12 [ 44.303716][ T4878] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop0 ino=12 [ 44.313806][ T4878] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop0 ino=12 [ 44.322696][ T4878] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop0 ino=12 [ 44.333572][ T4878] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop0 ino=12 [ 44.361636][ T4348] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.364473][ T4888] loop3: detected capacity change from 0 to 128 [ 44.378063][ T4888] FAT-fs (loop3): Invalid FSINFO signature: 0x41615252, 0x614101ff (sector = 1) [ 44.462058][ T4889] cannot load conntrack support for proto=3 [ 44.497273][ T2167] FAT-fs (loop3): Invalid FSINFO signature: 0x41615252, 0x614101ff (sector = 1) [ 44.531524][ T4891] FAULT_INJECTION: forcing a failure. [ 44.531524][ T4891] name failslab, interval 1, probability 0, space 0, times 0 [ 44.544434][ T4891] CPU: 1 UID: 0 PID: 4891 Comm: syz.3.356 Not tainted 6.10.0-syzkaller-12888-g5437f30d3458 #0 [ 44.554763][ T4891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 44.564895][ T4891] Call Trace: [ 44.568168][ T4891] [ 44.571096][ T4891] dump_stack_lvl+0xf2/0x150 [ 44.575725][ T4891] dump_stack+0x15/0x20 [ 44.579903][ T4891] should_fail_ex+0x229/0x230 [ 44.584585][ T4891] ? hashtab_duplicate+0x10f/0x370 [ 44.589706][ T4891] should_failslab+0x8f/0xb0 [ 44.594393][ T4891] kmem_cache_alloc_noprof+0x4c/0x290 [ 44.600038][ T4891] hashtab_duplicate+0x10f/0x370 [ 44.605046][ T4891] ? __pfx_cond_bools_copy+0x10/0x10 [ 44.610333][ T4891] ? __pfx_cond_bools_destroy+0x10/0x10 [ 44.616083][ T4891] cond_policydb_dup+0xdb/0x710 [ 44.620943][ T4891] ? __kmalloc_node_track_caller_noprof+0x17e/0x380 [ 44.627595][ T4891] security_set_bools+0xa8/0x350 [ 44.632551][ T4891] ? sel_commit_bools_write+0x16a/0x260 [ 44.638165][ T4891] sel_commit_bools_write+0x1e4/0x260 [ 44.643618][ T4891] vfs_writev+0x402/0x880 [ 44.648093][ T4891] ? __pfx_sel_commit_bools_write+0x10/0x10 [ 44.653995][ T4891] ? mutex_lock+0xd/0x40 [ 44.658248][ T4891] do_writev+0xf8/0x220 [ 44.662592][ T4891] __x64_sys_writev+0x45/0x50 [ 44.667359][ T4891] x64_sys_call+0x1d63/0x2e00 [ 44.672080][ T4891] do_syscall_64+0xc9/0x1c0 [ 44.676627][ T4891] ? clear_bhb_loop+0x55/0xb0 [ 44.681391][ T4891] ? clear_bhb_loop+0x55/0xb0 [ 44.686089][ T4891] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 44.691987][ T4891] RIP: 0033:0x7fd415237299 [ 44.696512][ T4891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.716223][ T4891] RSP: 002b:00007fd413eb7048 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 44.724787][ T4891] RAX: ffffffffffffffda RBX: 00007fd4153c5f80 RCX: 00007fd415237299 [ 44.732792][ T4891] RDX: 0000000000000001 RSI: 00000000200025c0 RDI: 0000000000000005 [ 44.740760][ T4891] RBP: 00007fd413eb70a0 R08: 0000000000000000 R09: 0000000000000000 [ 44.748806][ T4891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 44.756824][ T4891] R13: 000000000000000b R14: 00007fd4153c5f80 R15: 00007ffd19dfd668 [ 44.764880][ T4891] [ 44.807315][ T4894] loop2: detected capacity change from 0 to 2048 [ 44.841025][ T4902] loop3: detected capacity change from 0 to 2048 [ 44.847796][ T4894] loop2: p1 < > p4 [ 44.852401][ T4894] loop2: p4 size 8388608 extends beyond EOD, truncated [ 44.860778][ T4902] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 44.861658][ T4894] loop0: detected capacity change from 0 to 16384 [ 44.889849][ T3267] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.941022][ T4909] loop3: detected capacity change from 0 to 2048 [ 44.967810][ T4909] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 45.135637][ T4920] EXT4-fs error (device loop3): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 45.146315][ T4922] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=4922 comm=syz.0.365 [ 45.153421][ T4925] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=4925 comm=syz.2.363 [ 45.191483][ T3450] EXT4-fs (loop3): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 2048 with error 28 [ 45.204339][ T3450] EXT4-fs (loop3): This should not happen!! Data will be lost [ 45.204339][ T3450] [ 45.214031][ T3450] EXT4-fs (loop3): Total free blocks count 0 [ 45.220053][ T3450] EXT4-fs (loop3): Free/Dirty block details [ 45.226063][ T3450] EXT4-fs (loop3): free_blocks=2415919104 [ 45.233241][ T3450] EXT4-fs (loop3): dirty_blocks=8192 [ 45.238732][ T3450] EXT4-fs (loop3): Block reservation details [ 45.244830][ T3450] EXT4-fs (loop3): i_reserved_data_blocks=512 [ 45.340233][ T3448] EXT4-fs (loop3): Delayed block allocation failed for inode 18 at logical offset 2050 with max blocks 2048 with error 28 [ 45.554846][ T4954] loop3: detected capacity change from 0 to 512 [ 45.561652][ T4954] EXT4-fs: user quota file already specified [ 45.634737][ T4942] chnl_net:caif_netlink_parms(): no params data found [ 45.669423][ T4942] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.676622][ T4942] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.683819][ T4942] bridge_slave_0: entered allmulticast mode [ 45.690676][ T4942] bridge_slave_0: entered promiscuous mode [ 45.697787][ T4942] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.705260][ T4942] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.713446][ T4942] bridge_slave_1: entered allmulticast mode [ 45.719971][ T4942] bridge_slave_1: entered promiscuous mode [ 45.734008][ T4966] loop3: detected capacity change from 0 to 1024 [ 45.745688][ T4966] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 45.760987][ T4942] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 45.772093][ T4942] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 45.798955][ T4942] team0: Port device team_slave_0 added [ 45.800162][ T4969] loop2: detected capacity change from 0 to 512 [ 45.805723][ T4942] team0: Port device team_slave_1 added [ 45.817925][ T4969] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a846e01c, mo2=0002] [ 45.825883][ T4969] System zones: 1-12 [ 45.830058][ T4969] EXT4-fs error (device loop2): dx_probe:823: inode #2: comm syz.2.377: Directory hole found for htree index block 0 [ 45.842927][ T4969] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -117 [ 45.844637][ T2167] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 45.851178][ T4969] EXT4-fs error (device loop2): dx_probe:823: inode #2: comm syz.2.377: Directory hole found for htree index block 0 [ 45.874076][ T4969] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -117 [ 45.882923][ T4969] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 45.901702][ T4942] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 45.908755][ T4942] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.934870][ T4942] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 45.949658][ T2167] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 45.961163][ T4942] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 45.968171][ T4942] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 45.994599][ T4942] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 46.011757][ T4974] EXT4-fs error (device loop2): dx_probe:823: inode #2: comm syz.2.377: Directory hole found for htree index block 0 [ 46.032318][ T4974] EXT4-fs (loop2): re-mounted 00000000-0000-0000-0000-000000000000 r/w. Quota mode: writeback. [ 46.034058][ T4973] netlink: 4 bytes leftover after parsing attributes in process `syz.0.378'. [ 46.066602][ T3263] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.080397][ T2167] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 46.097458][ T4942] hsr_slave_0: entered promiscuous mode [ 46.103907][ T4942] hsr_slave_1: entered promiscuous mode [ 46.111642][ T4942] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 46.120643][ T4942] Cannot create hsr debugfs directory [ 46.129683][ T2167] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 46.158956][ T4990] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(7) [ 46.165578][ T4990] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 46.173295][ T4990] vhci_hcd vhci_hcd.0: Device attached [ 46.190149][ T4990] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 46.202322][ T4991] vhci_hcd: connection closed [ 46.202428][ T3429] vhci_hcd: stop threads [ 46.211490][ T3429] vhci_hcd: release socket [ 46.216016][ T3429] vhci_hcd: disconnect device [ 46.222511][ T2167] bridge_slave_1: left allmulticast mode [ 46.228237][ T2167] bridge_slave_1: left promiscuous mode [ 46.233972][ T2167] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.241835][ T2167] bridge_slave_0: left allmulticast mode [ 46.247581][ T2167] bridge_slave_0: left promiscuous mode [ 46.253218][ T2167] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.290099][ T4994] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=4994 comm=syz.0.383 [ 46.486985][ T2167] hsr_slave_0: left promiscuous mode [ 46.492638][ T2167] hsr_slave_1: left promiscuous mode [ 46.498296][ T2167] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 46.505713][ T2167] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 46.514064][ T2167] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 46.521530][ T2167] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 46.530363][ T2167] veth1_vlan: left promiscuous mode [ 46.535673][ T2167] veth0_vlan: left promiscuous mode [ 46.562266][ T3267] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.612129][ T2167] team0 (unregistering): Port device team_slave_1 removed [ 46.623330][ T2167] team0 (unregistering): Port device team_slave_0 removed [ 46.787098][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 46.787112][ T29] audit: type=1326 audit(1722186490.471:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5001 comm="syz.2.386" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fbb75467299 code=0x0 [ 46.837323][ T4942] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 46.846370][ T4942] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 46.855318][ T4942] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 46.864012][ T4942] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 46.888070][ T5004] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=5004 comm=syz.2.386 [ 46.899857][ T4942] 8021q: adding VLAN 0 to HW filter on device bond0 [ 46.939671][ T4942] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.958337][ T3618] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.965450][ T3618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.978250][ T3618] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.985325][ T3618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.998428][ T29] audit: type=1326 audit(1722186490.681:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5005 comm="syz.4.387" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fdb7a5a7299 code=0x0 [ 47.006496][ T4942] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 47.031762][ T4942] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 47.063427][ T5010] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=5010 comm=syz.4.387 [ 47.132045][ T5023] loop0: detected capacity change from 0 to 128 [ 47.140057][ T4942] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.141925][ T5023] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 47.178285][ T5023] ext4 filesystem being mounted at /14/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 47.232489][ T4942] veth0_vlan: entered promiscuous mode [ 47.241308][ T4942] veth1_vlan: entered promiscuous mode [ 47.249879][ T4348] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 47.259978][ T4942] veth0_macvtap: entered promiscuous mode [ 47.268804][ T4942] veth1_macvtap: entered promiscuous mode [ 47.280038][ T4942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 47.283452][ T5035] loop0: detected capacity change from 0 to 2048 [ 47.290666][ T4942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.290677][ T4942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 47.290690][ T4942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.290704][ T4942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 47.290716][ T4942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.348822][ T4942] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 47.361991][ T4942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 47.372516][ T4942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.382426][ T4942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 47.392965][ T4942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.402796][ T4942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 47.413258][ T4942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.425211][ T4942] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 47.432797][ T5037] loop3: detected capacity change from 0 to 1024 [ 47.433952][ T4942] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.443385][ T5035] dccp_invalid_packet: P.Data Offset(0) too small [ 47.448337][ T4942] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.463544][ T4942] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.472289][ T4942] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 47.486414][ T5037] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 47.486706][ T5035] netlink: 8 bytes leftover after parsing attributes in process `syz.0.391'. [ 47.515312][ T29] audit: type=1400 audit(1722186491.201:532): avc: denied { setopt } for pid=5034 comm="syz.0.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 47.563753][ T5035] netlink: 48 bytes leftover after parsing attributes in process `syz.0.391'. [ 47.578675][ T29] audit: type=1400 audit(1722186491.241:533): avc: denied { remount } for pid=5034 comm="syz.0.391" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 47.607880][ T3267] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 47.689253][ T29] audit: type=1400 audit(1722186491.371:534): avc: denied { accept } for pid=5053 comm="syz.2.397" lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 47.716265][ T5048] netlink: 12 bytes leftover after parsing attributes in process `syz.3.393'. [ 47.736441][ T5059] loop0: detected capacity change from 0 to 2048 [ 47.789150][ T5059] loop0: detected capacity change from 0 to 164 [ 47.809013][ T29] audit: type=1404 audit(1722186491.491:535): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 47.828308][ T29] audit: type=1400 audit(1722186491.511:536): avc: denied { read write } for pid=5064 comm="syz.4.401" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.833919][ T5066] audit: audit_backlog=65 > audit_backlog_limit=64 [ 47.852487][ T29] audit: type=1400 audit(1722186491.511:537): avc: denied { read } for pid=5064 comm="syz.4.401" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=0 [ 47.858787][ T5066] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 48.595188][ T5104] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 48.829397][ C1] eth0: bad gso: type: 1, size: 1408 [ 49.019829][ T5217] block device autoloading is deprecated and will be removed. [ 49.027786][ T5217] bio_check_eod: 5 callbacks suppressed [ 49.027798][ T5217] syz.0.456: attempt to access beyond end of device [ 49.027798][ T5217] md102: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 49.594273][ C1] eth0: bad gso: type: 1, size: 1408 [ 49.655476][ T5241] can0: slcan on pts1. [ 49.715759][ T5241] can0 (unregistered): slcan off pts1. [ 49.883061][ T5257] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=5257 comm=syz.2.467 [ 50.237893][ T5321] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 50.237893][ T5321] The task syz.3.491 (5321) triggered the difference, watch for misbehavior. [ 50.943928][ T5395] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5395 comm=syz.4.517 [ 51.130152][ T5407] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=5407 comm=syz.4.519 [ 51.194177][ T5409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=5409 comm=syz.3.521 [ 51.418985][ T5427] FAULT_INJECTION: forcing a failure. [ 51.418985][ T5427] name failslab, interval 1, probability 0, space 0, times 0 [ 51.431734][ T5427] CPU: 0 UID: 0 PID: 5427 Comm: syz.1.528 Not tainted 6.10.0-syzkaller-12888-g5437f30d3458 #0 [ 51.442068][ T5427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 51.452113][ T5427] Call Trace: [ 51.455377][ T5427] [ 51.458365][ T5427] dump_stack_lvl+0xf2/0x150 [ 51.462956][ T5427] dump_stack+0x15/0x20 [ 51.467106][ T5427] should_fail_ex+0x229/0x230 [ 51.471817][ T5427] ? hashtab_duplicate+0x10f/0x370 [ 51.476988][ T5427] should_failslab+0x8f/0xb0 [ 51.481646][ T5427] kmem_cache_alloc_noprof+0x4c/0x290 [ 51.487012][ T5427] hashtab_duplicate+0x10f/0x370 [ 51.491961][ T5427] ? __pfx_cond_bools_copy+0x10/0x10 [ 51.497308][ T5427] ? __pfx_cond_bools_destroy+0x10/0x10 [ 51.502966][ T5427] cond_policydb_dup+0xdb/0x710 [ 51.507807][ T5427] ? __kmalloc_node_track_caller_noprof+0x17e/0x380 [ 51.514426][ T5427] security_set_bools+0xa8/0x350 [ 51.519394][ T5427] ? sel_commit_bools_write+0x16a/0x260 [ 51.524932][ T5427] sel_commit_bools_write+0x1e4/0x260 [ 51.530355][ T5427] vfs_writev+0x402/0x880 [ 51.534682][ T5427] ? __pfx_sel_commit_bools_write+0x10/0x10 [ 51.540578][ T5427] ? mutex_lock+0xd/0x40 [ 51.544865][ T5427] do_writev+0xf8/0x220 [ 51.549166][ T5427] __x64_sys_writev+0x45/0x50 [ 51.554090][ T5427] x64_sys_call+0x1d63/0x2e00 [ 51.558759][ T5427] do_syscall_64+0xc9/0x1c0 [ 51.563258][ T5427] ? clear_bhb_loop+0x55/0xb0 [ 51.567947][ T5427] ? clear_bhb_loop+0x55/0xb0 [ 51.572613][ T5427] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 51.578568][ T5427] RIP: 0033:0x7fc124de7299 [ 51.582996][ T5427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 51.602595][ T5427] RSP: 002b:00007fc123a67048 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 51.610998][ T5427] RAX: ffffffffffffffda RBX: 00007fc124f75f80 RCX: 00007fc124de7299 [ 51.619039][ T5427] RDX: 0000000000000001 RSI: 00000000200025c0 RDI: 0000000000000003 [ 51.626997][ T5427] RBP: 00007fc123a670a0 R08: 0000000000000000 R09: 0000000000000000 [ 51.634956][ T5427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 51.642997][ T5427] R13: 000000000000000b R14: 00007fc124f75f80 R15: 00007ffea6c249b8 [ 51.650960][ T5427] [ 51.735913][ T5443] netlink: 15743 bytes leftover after parsing attributes in process `syz.2.533'. [ 51.802030][ T29] kauditd_printk_skb: 851 callbacks suppressed [ 51.802042][ T29] audit: type=1400 audit(1722186495.481:1388): avc: denied { read write } for pid=4348 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.833952][ T29] audit: type=1400 audit(1722186495.511:1389): avc: denied { prog_load } for pid=5448 comm="syz.2.537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 51.859468][ T29] audit: type=1400 audit(1722186495.511:1390): avc: denied { execute } for pid=5448 comm="syz.2.537" path=2F6D656D66643A2327256E6F642576202864656C6574656429 dev="tmpfs" ino=1139 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 51.885846][ T29] audit: type=1400 audit(1722186495.541:1391): avc: denied { prog_load } for pid=5441 comm="syz.1.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 51.904866][ T29] audit: type=1400 audit(1722186495.541:1392): avc: denied { read write } for pid=3258 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.942014][ T29] audit: type=1400 audit(1722186495.541:1393): avc: denied { prog_load } for pid=5459 comm="syz.0.542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 51.961385][ T29] audit: type=1400 audit(1722186495.571:1394): avc: denied { read write } for pid=3267 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 51.985652][ T29] audit: type=1400 audit(1722186495.571:1395): avc: denied { read write } for pid=5459 comm="syz.0.542" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.010055][ T29] audit: type=1400 audit(1722186495.571:1396): avc: denied { create } for pid=5459 comm="syz.0.542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 52.029890][ T29] audit: type=1400 audit(1722186495.571:1397): avc: denied { prog_load } for pid=5459 comm="syz.0.542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 52.249124][ T5491] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=5491 comm=syz.0.553 [ 52.566337][ T5503] FAULT_INJECTION: forcing a failure. [ 52.566337][ T5503] name failslab, interval 1, probability 0, space 0, times 0 [ 52.579236][ T5503] CPU: 1 UID: 0 PID: 5503 Comm: syz.1.557 Not tainted 6.10.0-syzkaller-12888-g5437f30d3458 #0 [ 52.589571][ T5503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 52.599995][ T5503] Call Trace: [ 52.603331][ T5503] [ 52.606265][ T5503] dump_stack_lvl+0xf2/0x150 [ 52.610997][ T5503] dump_stack+0x15/0x20 [ 52.615157][ T5503] should_fail_ex+0x229/0x230 [ 52.619895][ T5503] ? sidtab_sid2str_get+0xb8/0x140 [ 52.625043][ T5503] should_failslab+0x8f/0xb0 [ 52.629637][ T5503] __kmalloc_node_track_caller_noprof+0xa6/0x380 [ 52.635959][ T5503] kmemdup_noprof+0x2a/0x60 [ 52.640496][ T5503] sidtab_sid2str_get+0xb8/0x140 [ 52.645479][ T5503] security_sid_to_context_core+0x1eb/0x2f0 [ 52.651373][ T5503] security_sid_to_context+0x27/0x30 [ 52.656761][ T5503] avc_audit_post_callback+0x10d/0x530 [ 52.662225][ T5503] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 52.668208][ T5503] common_lsm_audit+0x7d3/0xfc0 [ 52.673078][ T5503] ? _parse_integer+0x27/0x30 [ 52.677841][ T5503] slow_avc_audit+0xf9/0x140 [ 52.682451][ T5503] avc_has_perm+0x129/0x160 [ 52.686959][ T5503] selinux_bpf+0xa1/0xc0 [ 52.691269][ T5503] security_bpf+0x4a/0x80 [ 52.695596][ T5503] __sys_bpf+0x19f/0x7a0 [ 52.699836][ T5503] __x64_sys_bpf+0x43/0x50 [ 52.704337][ T5503] x64_sys_call+0x23d5/0x2e00 [ 52.709010][ T5503] do_syscall_64+0xc9/0x1c0 [ 52.713511][ T5503] ? clear_bhb_loop+0x55/0xb0 [ 52.718256][ T5503] ? clear_bhb_loop+0x55/0xb0 [ 52.722927][ T5503] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 52.728871][ T5503] RIP: 0033:0x7fc124de7299 [ 52.733297][ T5503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.753034][ T5503] RSP: 002b:00007fc123a67048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 52.761467][ T5503] RAX: ffffffffffffffda RBX: 00007fc124f75f80 RCX: 00007fc124de7299 [ 52.769447][ T5503] RDX: 0000000000000090 RSI: 00000000200007c0 RDI: 0000000000000005 [ 52.777407][ T5503] RBP: 00007fc123a670a0 R08: 0000000000000000 R09: 0000000000000000 [ 52.785453][ T5503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 52.793471][ T5503] R13: 000000000000000b R14: 00007fc124f75f80 R15: 00007ffea6c249b8 [ 52.801442][ T5503] [ 53.180361][ T5561] FAULT_INJECTION: forcing a failure. [ 53.180361][ T5561] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 53.193492][ T5561] CPU: 0 UID: 0 PID: 5561 Comm: syz.4.580 Not tainted 6.10.0-syzkaller-12888-g5437f30d3458 #0 [ 53.203786][ T5561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 53.213920][ T5561] Call Trace: [ 53.217215][ T5561] [ 53.220144][ T5561] dump_stack_lvl+0xf2/0x150 [ 53.224800][ T5561] dump_stack+0x15/0x20 [ 53.229025][ T5561] should_fail_ex+0x229/0x230 [ 53.233780][ T5561] should_fail+0xb/0x10 [ 53.238043][ T5561] should_fail_usercopy+0x1a/0x20 [ 53.243150][ T5561] _copy_from_user+0x1e/0xd0 [ 53.247745][ T5561] __sys_bpf+0x14e/0x7a0 [ 53.251985][ T5561] __x64_sys_bpf+0x43/0x50 [ 53.256396][ T5561] x64_sys_call+0x23d5/0x2e00 [ 53.261079][ T5561] do_syscall_64+0xc9/0x1c0 [ 53.265586][ T5561] ? clear_bhb_loop+0x55/0xb0 [ 53.270253][ T5561] ? clear_bhb_loop+0x55/0xb0 [ 53.274916][ T5561] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 53.280877][ T5561] RIP: 0033:0x7fdb7a5a7299 [ 53.285278][ T5561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.304916][ T5561] RSP: 002b:00007fdb79227048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 53.313346][ T5561] RAX: ffffffffffffffda RBX: 00007fdb7a735f80 RCX: 00007fdb7a5a7299 [ 53.321304][ T5561] RDX: 0000000000000050 RSI: 0000000020000080 RDI: 000000000000000a [ 53.329271][ T5561] RBP: 00007fdb792270a0 R08: 0000000000000000 R09: 0000000000000000 [ 53.337378][ T5561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 53.345331][ T5561] R13: 000000000000000b R14: 00007fdb7a735f80 R15: 00007ffd013fdd98 [ 53.353377][ T5561] [ 53.841029][ T5588] FAULT_INJECTION: forcing a failure. [ 53.841029][ T5588] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 53.854188][ T5588] CPU: 0 UID: 0 PID: 5588 Comm: syz.2.590 Not tainted 6.10.0-syzkaller-12888-g5437f30d3458 #0 [ 53.864430][ T5588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 53.874521][ T5588] Call Trace: [ 53.877788][ T5588] [ 53.880706][ T5588] dump_stack_lvl+0xf2/0x150 [ 53.885426][ T5588] dump_stack+0x15/0x20 [ 53.889618][ T5588] should_fail_ex+0x229/0x230 [ 53.894390][ T5588] should_fail+0xb/0x10 [ 53.898562][ T5588] should_fail_usercopy+0x1a/0x20 [ 53.903645][ T5588] strncpy_from_user+0x25/0x270 [ 53.908618][ T5588] ? kmem_cache_alloc_noprof+0x10c/0x290 [ 53.914244][ T5588] getname_flags+0xb0/0x3b0 [ 53.918779][ T5588] getname+0x17/0x20 [ 53.922829][ T5588] __se_sys_quotactl+0x15b/0x660 [ 53.927848][ T5588] __x64_sys_quotactl+0x55/0x70 [ 53.932720][ T5588] x64_sys_call+0x2662/0x2e00 [ 53.937400][ T5588] do_syscall_64+0xc9/0x1c0 [ 53.942026][ T5588] ? clear_bhb_loop+0x55/0xb0 [ 53.946774][ T5588] ? clear_bhb_loop+0x55/0xb0 [ 53.951453][ T5588] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 53.957553][ T5588] RIP: 0033:0x7fbb75467299 [ 53.961960][ T5588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.981613][ T5588] RSP: 002b:00007fbb740e7048 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 53.990724][ T5588] RAX: ffffffffffffffda RBX: 00007fbb755f5f80 RCX: 00007fbb75467299 [ 53.998832][ T5588] RDX: 0000000000000000 RSI: 0000000020000140 RDI: ffffffff80000102 [ 54.006802][ T5588] RBP: 00007fbb740e70a0 R08: 0000000000000000 R09: 0000000000000000 [ 54.015284][ T5588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.024386][ T5588] R13: 000000000000004d R14: 00007fbb755f5f80 R15: 00007ffdcbce63a8 [ 54.032538][ T5588] [ 54.371349][ C1] eth0: bad gso: type: 1, size: 1408 [ 54.377151][ C1] eth0: bad gso: type: 1, size: 1408 [ 54.469695][ T5686] syz.3.630 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 55.006043][ T5746] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=5746 comm=syz.2.652 [ 56.386305][ T5820] cannot load conntrack support for proto=3 [ 56.781157][ T5871] FAULT_INJECTION: forcing a failure. [ 56.781157][ T5871] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 56.794341][ T5871] CPU: 1 UID: 0 PID: 5871 Comm: syz.3.707 Not tainted 6.10.0-syzkaller-12888-g5437f30d3458 #0 [ 56.804645][ T5871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 56.814809][ T5871] Call Trace: [ 56.818085][ T5871] [ 56.821018][ T5871] dump_stack_lvl+0xf2/0x150 [ 56.825742][ T5871] dump_stack+0x15/0x20 [ 56.829920][ T5871] should_fail_ex+0x229/0x230 [ 56.834625][ T5871] should_fail+0xb/0x10 [ 56.838799][ T5871] should_fail_usercopy+0x1a/0x20 [ 56.843848][ T5871] _copy_to_user+0x1e/0xa0 [ 56.848271][ T5871] simple_read_from_buffer+0xa0/0x110 [ 56.849624][ T29] kauditd_printk_skb: 1204 callbacks suppressed [ 56.849675][ T29] audit: type=1400 audit(1722186500.531:2602): avc: denied { create } for pid=5882 comm="syz.0.714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 56.853692][ T5871] proc_fail_nth_read+0xfc/0x140 [ 56.870279][ T29] audit: type=1400 audit(1722186500.531:2603): avc: denied { create } for pid=5882 comm="syz.0.714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 56.879345][ T5871] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 56.879378][ T5871] vfs_read+0x1a2/0x6e0 [ 56.884305][ T29] audit: type=1400 audit(1722186500.531:2604): avc: denied { read } for pid=5882 comm="syz.0.714" name="sg0" dev="devtmpfs" ino=111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 56.903923][ T5871] ? __rcu_read_unlock+0x4e/0x70 [ 56.903951][ T5871] ? __fget_files+0x1da/0x210 [ 56.909545][ T29] audit: type=1400 audit(1722186500.531:2605): avc: denied { read write } for pid=5882 comm="syz.0.714" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 56.913598][ T5871] ksys_read+0xeb/0x1b0 [ 56.937016][ T29] audit: type=1400 audit(1722186500.531:2606): avc: denied { create } for pid=5882 comm="syz.0.714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 56.941906][ T5871] __x64_sys_read+0x42/0x50 [ 56.946572][ T29] audit: type=1400 audit(1722186500.531:2607): avc: denied { prog_load } for pid=5882 comm="syz.0.714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 56.970386][ T5871] x64_sys_call+0x2a36/0x2e00 [ 56.974553][ T29] audit: type=1400 audit(1722186500.531:2608): avc: denied { prog_load } for pid=5882 comm="syz.0.714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 56.994947][ T5871] do_syscall_64+0xc9/0x1c0 [ 56.994981][ T5871] ? clear_bhb_loop+0x55/0xb0 [ 56.999463][ T29] audit: type=1400 audit(1722186500.531:2609): avc: denied { read write } for pid=5882 comm="syz.0.714" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.020308][ T29] audit: type=1400 audit(1722186500.691:2610): avc: denied { read write } for pid=4942 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.023137][ T5871] ? clear_bhb_loop+0x55/0xb0 [ 57.042069][ T29] audit: type=1400 audit(1722186500.691:2611): avc: denied { read write } for pid=4348 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.046558][ T5871] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 57.134225][ T5871] RIP: 0033:0x7fd415235d7c [ 57.138620][ T5871] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 57.158215][ T5871] RSP: 002b:00007fd413eb7040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 57.166669][ T5871] RAX: ffffffffffffffda RBX: 00007fd4153c5f80 RCX: 00007fd415235d7c [ 57.174660][ T5871] RDX: 000000000000000f RSI: 00007fd413eb70b0 RDI: 0000000000000004 [ 57.182937][ T5871] RBP: 00007fd413eb70a0 R08: 0000000000000000 R09: 0000000000000000 [ 57.190949][ T5871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 57.198912][ T5871] R13: 000000000000000b R14: 00007fd4153c5f80 R15: 00007ffd19dfd668 [ 57.206873][ T5871] [ 57.424167][ T5944] ip6_tunnel: non-ECT from 0000:0000:0000:0000:0000:ffff:7f00:0001 with DS=0xb [ 58.500451][ T5989] FAULT_INJECTION: forcing a failure. [ 58.500451][ T5989] name fail_futex, interval 1, probability 0, space 0, times 1 [ 58.513363][ T5989] CPU: 0 UID: 0 PID: 5989 Comm: syz.1.757 Not tainted 6.10.0-syzkaller-12888-g5437f30d3458 #0 [ 58.523637][ T5989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 58.533865][ T5989] Call Trace: [ 58.537143][ T5989] [ 58.540154][ T5989] dump_stack_lvl+0xf2/0x150 [ 58.544845][ T5989] dump_stack+0x15/0x20 [ 58.549173][ T5989] should_fail_ex+0x229/0x230 [ 58.553859][ T5989] should_fail+0xb/0x10 [ 58.558062][ T5989] get_futex_key+0xf4/0x710 [ 58.562640][ T5989] futex_wake+0x7d/0x330 [ 58.566891][ T5989] do_futex+0x2ab/0x370 [ 58.571101][ T5989] mm_release+0xb7/0x1e0 [ 58.575420][ T5989] exit_mm_release+0x25/0x30 [ 58.580060][ T5989] exit_mm+0x38/0x190 [ 58.584053][ T5989] do_exit+0x55e/0x1720 [ 58.588314][ T5989] do_group_exit+0x102/0x150 [ 58.593068][ T5989] ? get_signal+0xf27/0x1080 [ 58.597667][ T5989] get_signal+0xf2f/0x1080 [ 58.602097][ T5989] ? do_sigtimedwait+0x3b4/0x420 [ 58.607081][ T5989] arch_do_signal_or_restart+0x95/0x4b0 [ 58.612631][ T5989] syscall_exit_to_user_mode+0x59/0x130 [ 58.618266][ T5989] do_syscall_64+0xd6/0x1c0 [ 58.622951][ T5989] ? clear_bhb_loop+0x55/0xb0 [ 58.627652][ T5989] ? clear_bhb_loop+0x55/0xb0 [ 58.632338][ T5989] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 58.638248][ T5989] RIP: 0033:0x7fc124de7299 [ 58.642658][ T5989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 58.662292][ T5989] RSP: 002b:00007fc123a67048 EFLAGS: 00000246 ORIG_RAX: 0000000000000080 [ 58.670748][ T5989] RAX: fffffffffffffffc RBX: 00007fc124f75f80 RCX: 00007fc124de7299 [ 58.678796][ T5989] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 58.686774][ T5989] RBP: 00007fc123a670a0 R08: 0000000000000000 R09: 0000000000000000 [ 58.694791][ T5989] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 58.702770][ T5989] R13: 000000000000000b R14: 00007fc124f75f80 R15: 00007ffea6c249b8 [ 58.710802][ T5989] [ 58.757765][ T6058] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9505 sclass=netlink_route_socket pid=6058 comm=syz.1.785 [ 58.772415][ T6053] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 58.907667][ C1] eth0: bad gso: type: 1, size: 1408 [ 58.913844][ C1] eth0: bad gso: type: 1, size: 1408 [ 58.972262][ T6089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=6089 comm=syz.1.790 [ 59.961208][ T6182] netlink: 'syz.3.838': attribute type 13 has an invalid length. [ 60.615173][ T6236] FAULT_INJECTION: forcing a failure. [ 60.615173][ T6236] name failslab, interval 1, probability 0, space 0, times 0 [ 60.627899][ T6236] CPU: 0 UID: 0 PID: 6236 Comm: syz.0.861 Not tainted 6.10.0-syzkaller-12888-g5437f30d3458 #0 [ 60.638175][ T6236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 60.648236][ T6236] Call Trace: [ 60.651587][ T6236] [ 60.654511][ T6236] dump_stack_lvl+0xf2/0x150 [ 60.659132][ T6236] dump_stack+0x15/0x20 [ 60.663317][ T6236] should_fail_ex+0x229/0x230 [ 60.668011][ T6236] ? hashtab_duplicate+0x10f/0x370 [ 60.673188][ T6236] should_failslab+0x8f/0xb0 [ 60.677901][ T6236] kmem_cache_alloc_noprof+0x4c/0x290 [ 60.683291][ T6236] hashtab_duplicate+0x10f/0x370 [ 60.688334][ T6236] ? __pfx_cond_bools_copy+0x10/0x10 [ 60.693612][ T6236] ? __pfx_cond_bools_destroy+0x10/0x10 [ 60.699179][ T6236] cond_policydb_dup+0xdb/0x710 [ 60.704061][ T6236] ? __kmalloc_node_track_caller_noprof+0x17e/0x380 [ 60.710663][ T6236] security_set_bools+0xa8/0x350 [ 60.715623][ T6236] ? sel_commit_bools_write+0x16a/0x260 [ 60.721166][ T6236] sel_commit_bools_write+0x1e4/0x260 [ 60.726624][ T6236] vfs_writev+0x402/0x880 [ 60.730961][ T6236] ? __pfx_sel_commit_bools_write+0x10/0x10 [ 60.736862][ T6236] ? mutex_lock+0xd/0x40 [ 60.741104][ T6236] do_writev+0xf8/0x220 [ 60.745323][ T6236] __x64_sys_writev+0x45/0x50 [ 60.750064][ T6236] x64_sys_call+0x1d63/0x2e00 [ 60.754759][ T6236] do_syscall_64+0xc9/0x1c0 [ 60.759295][ T6236] ? clear_bhb_loop+0x55/0xb0 [ 60.763983][ T6236] ? clear_bhb_loop+0x55/0xb0 [ 60.768660][ T6236] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 60.774686][ T6236] RIP: 0033:0x7fbefb5e7299 [ 60.779188][ T6236] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.799160][ T6236] RSP: 002b:00007fbefa267048 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 60.807576][ T6236] RAX: ffffffffffffffda RBX: 00007fbefb775f80 RCX: 00007fbefb5e7299 [ 60.815636][ T6236] RDX: 0000000000000001 RSI: 00000000200025c0 RDI: 0000000000000003 [ 60.823721][ T6236] RBP: 00007fbefa2670a0 R08: 0000000000000000 R09: 0000000000000000 [ 60.831706][ T6236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 60.839680][ T6236] R13: 000000000000000b R14: 00007fbefb775f80 R15: 00007ffdc6c001c8 [ 60.847749][ T6236] [ 61.219611][ T6278] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=6278 comm=syz.4.870 [ 61.860260][ T29] kauditd_printk_skb: 1102 callbacks suppressed [ 61.860272][ T29] audit: type=1400 audit(1722186761.542:3714): avc: denied { prog_load } for pid=6329 comm="syz.0.896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 61.914432][ T29] audit: type=1400 audit(1722186761.572:3715): avc: denied { map_create } for pid=6329 comm="syz.0.896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 61.933521][ T29] audit: type=1400 audit(1722186761.572:3716): avc: denied { prog_load } for pid=6329 comm="syz.0.896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 61.952534][ T29] audit: type=1400 audit(1722186761.572:3717): avc: denied { prog_load } for pid=6329 comm="syz.0.896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 61.971527][ T29] audit: type=1400 audit(1722186761.572:3718): avc: denied { prog_load } for pid=6329 comm="syz.0.896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 61.990502][ T29] audit: type=1400 audit(1722186761.572:3719): avc: denied { read write } for pid=4348 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 62.014862][ T29] audit: type=1400 audit(1722186761.582:3720): avc: denied { create } for pid=6331 comm="syz.0.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 62.034715][ T29] audit: type=1400 audit(1722186761.582:3721): avc: denied { create } for pid=6331 comm="syz.0.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 62.054283][ T29] audit: type=1400 audit(1722186761.582:3722): avc: denied { create } for pid=6331 comm="syz.0.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 62.074835][ T29] audit: type=1400 audit(1722186761.582:3723): avc: denied { create } for pid=6331 comm="syz.0.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 62.542082][ T6380] xt_CT: You must specify a L4 protocol and not use inversions on it [ 62.639862][ C1] eth0: bad gso: type: 1, size: 1408 [ 62.649618][ C1] eth0: bad gso: type: 1, size: 1408 [ 62.742601][ T6423] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11553 sclass=netlink_route_socket pid=6423 comm=syz.2.934 [ 62.773766][ T6425] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 63.529101][ T6545] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6545 comm=syz.3.984 [ 63.895038][ T6613] netlink: 'syz.1.1010': attribute type 13 has an invalid length. [ 63.997987][ T6649] FAULT_INJECTION: forcing a failure. [ 63.997987][ T6649] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 64.011098][ T6649] CPU: 0 UID: 0 PID: 6649 Comm: syz.1.1024 Not tainted 6.10.0-syzkaller-12888-g5437f30d3458 #0 [ 64.021517][ T6649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 64.031924][ T6649] Call Trace: [ 64.035391][ T6649] [ 64.038663][ T6649] dump_stack_lvl+0xf2/0x150 [ 64.043273][ T6649] dump_stack+0x15/0x20 [ 64.047454][ T6649] should_fail_ex+0x229/0x230 [ 64.052152][ T6649] should_fail+0xb/0x10 [ 64.056371][ T6649] should_fail_usercopy+0x1a/0x20 [ 64.061678][ T6649] _copy_to_user+0x1e/0xa0 [ 64.066240][ T6649] simple_read_from_buffer+0xa0/0x110 [ 64.071668][ T6649] proc_fail_nth_read+0xfc/0x140 [ 64.076711][ T6649] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 64.082376][ T6649] vfs_read+0x1a2/0x6e0 [ 64.086624][ T6649] ? __rcu_read_unlock+0x4e/0x70 [ 64.091648][ T6649] ? __fget_files+0x1da/0x210 [ 64.096335][ T6649] ksys_read+0xeb/0x1b0 [ 64.100550][ T6649] __x64_sys_read+0x42/0x50 [ 64.105177][ T6649] x64_sys_call+0x2a36/0x2e00 [ 64.109873][ T6649] do_syscall_64+0xc9/0x1c0 [ 64.114394][ T6649] ? clear_bhb_loop+0x55/0xb0 [ 64.119104][ T6649] ? clear_bhb_loop+0x55/0xb0 [ 64.124511][ T6649] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 64.131000][ T6649] RIP: 0033:0x7fc124de5d7c [ 64.135487][ T6649] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 64.155386][ T6649] RSP: 002b:00007fc123a67040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 64.163941][ T6649] RAX: ffffffffffffffda RBX: 00007fc124f75f80 RCX: 00007fc124de5d7c [ 64.171921][ T6649] RDX: 000000000000000f RSI: 00007fc123a670b0 RDI: 0000000000000003 [ 64.180023][ T6649] RBP: 00007fc123a670a0 R08: 0000000000000000 R09: 0000000000000000 [ 64.188042][ T6649] R10: 000000000000001b R11: 0000000000000246 R12: 0000000000000001 [ 64.196195][ T6649] R13: 000000000000000b R14: 00007fc124f75f80 R15: 00007ffea6c249b8 [ 64.204236][ T6649] [ 65.001418][ T6741] FAULT_INJECTION: forcing a failure. [ 65.001418][ T6741] name failslab, interval 1, probability 0, space 0, times 0 [ 65.014332][ T6741] CPU: 1 UID: 0 PID: 6741 Comm: syz.1.1059 Not tainted 6.10.0-syzkaller-12888-g5437f30d3458 #0 [ 65.024844][ T6741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 65.034896][ T6741] Call Trace: [ 65.038180][ T6741] [ 65.041130][ T6741] dump_stack_lvl+0xf2/0x150 [ 65.045736][ T6741] dump_stack+0x15/0x20 [ 65.049896][ T6741] should_fail_ex+0x229/0x230 [ 65.054720][ T6741] ? cond_bools_copy+0x30/0x80 [ 65.059580][ T6741] should_failslab+0x8f/0xb0 [ 65.064210][ T6741] __kmalloc_node_track_caller_noprof+0xa6/0x380 [ 65.070561][ T6741] kmemdup_noprof+0x2a/0x60 [ 65.075183][ T6741] cond_bools_copy+0x30/0x80 [ 65.079796][ T6741] hashtab_duplicate+0x12c/0x370 [ 65.084843][ T6741] ? __pfx_cond_bools_copy+0x10/0x10 [ 65.090211][ T6741] ? __pfx_cond_bools_destroy+0x10/0x10 [ 65.095773][ T6741] cond_policydb_dup+0xdb/0x710 [ 65.100640][ T6741] ? __kmalloc_node_track_caller_noprof+0x17e/0x380 [ 65.107492][ T6741] security_set_bools+0xa8/0x350 [ 65.112520][ T6741] ? sel_commit_bools_write+0x16a/0x260 [ 65.118431][ T6741] sel_commit_bools_write+0x1e4/0x260 [ 65.124609][ T6741] vfs_writev+0x402/0x880 [ 65.128953][ T6741] ? __pfx_sel_commit_bools_write+0x10/0x10 [ 65.134986][ T6741] ? mutex_lock+0xd/0x40 [ 65.139337][ T6741] do_writev+0xf8/0x220 [ 65.143557][ T6741] __x64_sys_writev+0x45/0x50 [ 65.148308][ T6741] x64_sys_call+0x1d63/0x2e00 [ 65.153086][ T6741] do_syscall_64+0xc9/0x1c0 [ 65.157624][ T6741] ? clear_bhb_loop+0x55/0xb0 [ 65.162320][ T6741] ? clear_bhb_loop+0x55/0xb0 [ 65.167076][ T6741] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 65.173149][ T6741] RIP: 0033:0x7fc124de7299 [ 65.178585][ T6741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 65.198527][ T6741] RSP: 002b:00007fc123a67048 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 65.207038][ T6741] RAX: ffffffffffffffda RBX: 00007fc124f75f80 RCX: 00007fc124de7299 [ 65.215003][ T6741] RDX: 0000000000000001 RSI: 00000000200025c0 RDI: 0000000000000003 [ 65.222981][ T6741] RBP: 00007fc123a670a0 R08: 0000000000000000 R09: 0000000000000000 [ 65.231040][ T6741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 65.239067][ T6741] R13: 000000000000000b R14: 00007fc124f75f80 R15: 00007ffea6c249b8 [ 65.247319][ T6741] [ 65.426962][ C1] eth0: bad gso: type: 1, size: 1408 [ 65.884323][ T6856] ip6_tunnel: non-ECT from 0000:0000:0000:0000:0000:ffff:7f00:0001 with DS=0xb [ 65.965478][ T6865] cannot load conntrack support for proto=3 [ 66.870586][ T29] kauditd_printk_skb: 1703 callbacks suppressed [ 66.870601][ T29] audit: type=1400 audit(1722186766.552:5427): avc: denied { read write } for pid=3263 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 66.902043][ T29] audit: type=1400 audit(1722186766.552:5428): avc: denied { prog_load } for pid=6946 comm="syz.2.1143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 66.921300][ T29] audit: type=1400 audit(1722186766.552:5429): avc: denied { prog_load } for pid=6946 comm="syz.2.1143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 66.940798][ T29] audit: type=1400 audit(1722186766.562:5430): avc: denied { read write } for pid=3263 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 66.965007][ T29] audit: type=1400 audit(1722186766.562:5431): avc: denied { create } for pid=6948 comm="syz.2.1144" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 66.986627][ T29] audit: type=1400 audit(1722186766.562:5432): avc: denied { prog_load } for pid=6948 comm="syz.2.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 67.005841][ T29] audit: type=1400 audit(1722186766.562:5433): avc: denied { create } for pid=6948 comm="syz.2.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 67.026534][ T29] audit: type=1400 audit(1722186766.562:5434): avc: denied { create } for pid=6948 comm="syz.2.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 67.046969][ T29] audit: type=1400 audit(1722186766.562:5435): avc: denied { read write } for pid=3263 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 67.071167][ T29] audit: type=1400 audit(1722186766.562:5436): avc: denied { open } for pid=6950 comm="syz.2.1145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 67.357476][ T6988] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 67.531977][ T6994] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=6994 comm=syz.0.1161 [ 67.645045][ C1] eth0: bad gso: type: 1, size: 1408 [ 68.724847][ T7095] serio: Serial port pts0 [ 68.865060][ T7099] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=7099 comm=syz.3.1201 Jul 28 17:12:48 syzkaller daemon.err dhcpcd[7116]: ps_bpf_start_bpf: bpf_open: Invalid argument Jul 28 17:12:48 syzkaller daemon.err dhcpcd[7116]: ps_root_recvmsg: Invalid argument Jul 28 17:12:49 syzkaller daemon.err dhcpcd[7122]: ps_bpf_start_bpf: bpf_open: Invalid argument Jul 28 17:12:49 syzkaller daemon.err dhcpcd[7122]: ps_root_recvmsg: Invalid argument Jul 28 17:12:49 syzkaller daemon.err dhcpcd[7180]: ps_bpf_start_bpf: bpf_open: Invalid argument Jul 28 17:12:49 syzkaller daemon.err dhcpcd[7180]: ps_root_recvmsg: Invalid argument [ 70.361418][ T7234] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=512 sclass=netlink_route_socket pid=7234 comm=syz.2.1256 [ 70.374112][ C1] eth0: bad gso: type: 1, size: 1408 [ 70.379997][ C1] eth0: bad gso: type: 1, size: 1408 [ 70.419611][ T7248] FAULT_INJECTION: forcing a failure. [ 70.419611][ T7248] name failslab, interval 1, probability 0, space 0, times 0 [ 70.432686][ T7248] CPU: 1 UID: 0 PID: 7248 Comm: syz.2.1262 Not tainted 6.10.0-syzkaller-12888-g5437f30d3458 #0 [ 70.443411][ T7248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 70.453565][ T7248] Call Trace: [ 70.456932][ T7248] [ 70.459911][ T7248] dump_stack_lvl+0xf2/0x150 [ 70.464608][ T7248] dump_stack+0x15/0x20 [ 70.468796][ T7248] should_fail_ex+0x229/0x230 [ 70.473512][ T7248] ? hashtab_duplicate+0x10f/0x370 [ 70.478634][ T7248] should_failslab+0x8f/0xb0 [ 70.483239][ T7248] kmem_cache_alloc_noprof+0x4c/0x290 [ 70.488671][ T7248] hashtab_duplicate+0x10f/0x370 [ 70.493616][ T7248] ? __pfx_cond_bools_copy+0x10/0x10 [ 70.498955][ T7248] ? __pfx_cond_bools_destroy+0x10/0x10 [ 70.504598][ T7248] cond_policydb_dup+0xdb/0x710 [ 70.509635][ T7248] ? __kmalloc_node_track_caller_noprof+0x17e/0x380 [ 70.516281][ T7248] security_set_bools+0xa8/0x350 [ 70.521408][ T7248] ? sel_commit_bools_write+0x16a/0x260 [ 70.526992][ T7248] sel_commit_bools_write+0x1e4/0x260 [ 70.532479][ T7248] vfs_writev+0x402/0x880 [ 70.536979][ T7248] ? __pfx_sel_commit_bools_write+0x10/0x10 [ 70.543100][ T7248] ? mutex_lock+0xd/0x40 [ 70.547549][ T7248] do_writev+0xf8/0x220 [ 70.552298][ T7248] __x64_sys_writev+0x45/0x50 [ 70.557843][ T7248] x64_sys_call+0x1d63/0x2e00 [ 70.563198][ T7248] do_syscall_64+0xc9/0x1c0 [ 70.567878][ T7248] ? clear_bhb_loop+0x55/0xb0 [ 70.572859][ T7248] ? clear_bhb_loop+0x55/0xb0 [ 70.577784][ T7248] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 70.583940][ T7248] RIP: 0033:0x7fbb75467299 [ 70.588976][ T7248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 70.609795][ T7248] RSP: 002b:00007fbb740e7048 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 70.618282][ T7248] RAX: ffffffffffffffda RBX: 00007fbb755f5f80 RCX: 00007fbb75467299 [ 70.626236][ T7248] RDX: 0000000000000001 RSI: 00000000200025c0 RDI: 0000000000000003 [ 70.634282][ T7248] RBP: 00007fbb740e70a0 R08: 0000000000000000 R09: 0000000000000000 [ 70.642242][ T7248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 70.650223][ T7248] R13: 000000000000004d R14: 00007fbb755f5f80 R15: 00007ffdcbce63a8 [ 70.658242][ T7248] [ 70.979122][ T7277] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=7277 comm=syz.2.1271 Jul 28 17:12:50 syzkaller daemon.err dhcpcd[7282]: ps_bpf_start_bpf: bpf_open: Invalid argument Jul 28 17:12:50 syzkaller daemon.err dhcpcd[7282]: ps_root_recvmsg: Invalid argument [ 71.327339][ C1] eth0: bad gso: type: 1, size: 1408 [ 71.445027][ T7328] TCP: TCP_TX_DELAY enabled [ 71.887190][ T29] kauditd_printk_skb: 1500 callbacks suppressed [ 71.887205][ T29] audit: type=1400 audit(1722186771.549:6937): avc: denied { name_bind } for pid=7372 comm="syz.2.1313" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 71.924192][ T29] audit: type=1400 audit(1722186771.559:6938): avc: denied { read write } for pid=7372 comm="syz.2.1313" name="ppp" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 71.947771][ T29] audit: type=1400 audit(1722186771.559:6939): avc: denied { open } for pid=7374 comm="syz.0.1314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 71.967217][ T29] audit: type=1400 audit(1722186771.559:6940): avc: denied { read write } for pid=4348 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 71.992130][ T29] audit: type=1400 audit(1722186771.559:6941): avc: denied { open } for pid=7376 comm="syz.0.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 72.011587][ T29] audit: type=1400 audit(1722186771.559:6942): avc: denied { create } for pid=7376 comm="syz.0.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 72.035710][ T29] audit: type=1400 audit(1722186771.559:6943): avc: denied { open } for pid=7376 comm="syz.0.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 72.056085][ T29] audit: type=1400 audit(1722186771.559:6944): avc: denied { create } for pid=7376 comm="syz.0.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 72.076036][ T29] audit: type=1400 audit(1722186771.589:6945): avc: denied { read write } for pid=3267 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.101113][ T29] audit: type=1400 audit(1722186771.589:6946): avc: denied { execute } for pid=7376 comm="syz.0.1315" path="/228/blkio.bfq.io_serviced_recursive" dev="tmpfs" ino=1245 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 72.203692][ T7422] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 72.240875][ T7427] x_tables: ip_tables: REDIRECT target: used from hooks INPUT, but only usable from PREROUTING/OUTPUT [ 72.318344][ C1] eth0: bad gso: type: 1, size: 1408 [ 73.304114][ T7491] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25377 sclass=netlink_route_socket pid=7491 comm=syz.1.1361 [ 73.635949][ C1] eth0: bad gso: type: 1, size: 1408 [ 73.645363][ C1] eth0: bad gso: type: 1, size: 1408 [ 75.058159][ T3429] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 75.117164][ T3429] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 75.178554][ T3429] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 75.252389][ T3429] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 75.326528][ T3429] bridge_slave_1: left allmulticast mode [ 75.332218][ T3429] bridge_slave_1: left promiscuous mode [ 75.337888][ T3429] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.353734][ T3429] bridge_slave_0: left allmulticast mode [ 75.360019][ T3429] bridge_slave_0: left promiscuous mode [ 75.365918][ T3429] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.487207][ T3429] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 75.497834][ T3429] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 75.508611][ T3429] bond0 (unregistering): Released all slaves [ 75.597351][ T3429] hsr_slave_0: left promiscuous mode [ 75.604343][ T3429] hsr_slave_1: left promiscuous mode [ 75.610532][ T3429] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 75.617978][ T3429] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 75.625515][ T3429] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 75.632911][ T3429] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 75.642061][ T3429] veth1_macvtap: left promiscuous mode [ 75.647648][ T3429] veth0_macvtap: left promiscuous mode [ 75.653145][ T3429] veth1_vlan: left promiscuous mode [ 75.658357][ T3429] veth0_vlan: left promiscuous mode [ 75.739597][ T3429] team0 (unregistering): Port device team_slave_1 removed [ 75.749159][ T3429] team0 (unregistering): Port device team_slave_0 removed [ 75.757791][ C1] eth0: bad gso: type: 1, size: 1408 [ 77.130211][ T29] kauditd_printk_skb: 653 callbacks suppressed [ 77.130289][ T29] audit: type=1400 audit(1722186776.761:7600): avc: denied { execmem } for pid=7655 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 77.157109][ T29] audit: type=1400 audit(1722186776.761:7601): avc: denied { create } for pid=7658 comm="syz.3.1432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 77.176809][ T29] audit: type=1400 audit(1722186776.761:7602): avc: denied { create } for pid=7658 comm="syz.3.1432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 77.196810][ T29] audit: type=1400 audit(1722186776.761:7603): avc: denied { create } for pid=7658 comm="syz.3.1432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 77.216724][ T29] audit: type=1400 audit(1722186776.761:7604): avc: denied { create } for pid=7658 comm="syz.3.1432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 77.236835][ T29] audit: type=1400 audit(1722186776.761:7605): avc: denied { prog_load } for pid=7658 comm="syz.3.1432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 77.255978][ T29] audit: type=1400 audit(1722186776.761:7606): avc: denied { create } for pid=7658 comm="syz.3.1432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 77.279056][ T29] audit: type=1400 audit(1722186776.771:7607): avc: denied { read write } for pid=3267 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.303883][ T29] audit: type=1400 audit(1722186776.771:7608): avc: denied { create } for pid=7656 comm="syz.0.1431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 77.325580][ T29] audit: type=1400 audit(1722186776.771:7609): avc: denied { open } for pid=7656 comm="syz.0.1431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 77.956753][ T7672] dccp_invalid_packet: P.Data Offset(0) too small [ 82.222584][ T29] kauditd_printk_skb: 99 callbacks suppressed [ 82.222597][ T29] audit: type=1400 audit(1722186781.826:7709): avc: denied { execmem } for pid=7710 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 82.282767][ T29] audit: type=1400 audit(1722186781.826:7710): avc: denied { prog_load } for pid=7712 comm="syz.4.1453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 82.301908][ T29] audit: type=1400 audit(1722186781.826:7711): avc: denied { create } for pid=7711 comm="syz.2.1451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 82.322468][ T29] audit: type=1400 audit(1722186781.856:7712): avc: denied { create } for pid=7713 comm="syz.3.1452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 82.343215][ T29] audit: type=1400 audit(1722186781.856:7713): avc: denied { prog_load } for pid=7711 comm="syz.2.1451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 82.362671][ T29] audit: type=1400 audit(1722186781.856:7714): avc: denied { create } for pid=7711 comm="syz.2.1451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 82.383040][ T29] audit: type=1400 audit(1722186781.856:7715): avc: denied { create } for pid=7711 comm="syz.2.1451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 82.403186][ T29] audit: type=1400 audit(1722186781.856:7716): avc: denied { create } for pid=7711 comm="syz.2.1451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 82.423403][ T29] audit: type=1400 audit(1722186781.856:7717): avc: denied { create } for pid=7711 comm="syz.2.1451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 82.442918][ T29] audit: type=1400 audit(1722186781.866:7718): avc: denied { read write } for pid=7714 comm="syz.0.1450" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 88.139672][ T29] kauditd_printk_skb: 67 callbacks suppressed [ 88.139684][ T29] audit: type=1400 audit(1722186787.699:7786): avc: denied { execmem } for pid=7748 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 88.171505][ T29] audit: type=1400 audit(1722186787.709:7787): avc: denied { open } for pid=7749 comm="syz.0.1466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 88.190954][ T29] audit: type=1400 audit(1722186787.709:7788): avc: denied { map_create } for pid=7749 comm="syz.0.1466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 88.210075][ T29] audit: type=1400 audit(1722186787.709:7789): avc: denied { create } for pid=7749 comm="syz.0.1466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 88.231067][ T29] audit: type=1400 audit(1722186787.709:7790): avc: denied { open } for pid=7749 comm="syz.0.1466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 88.250318][ T29] audit: type=1400 audit(1722186787.709:7791): avc: denied { create } for pid=7749 comm="syz.0.1466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 88.269960][ T29] audit: type=1400 audit(1722186787.709:7792): avc: denied { create } for pid=7749 comm="syz.0.1466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 88.289669][ T29] audit: type=1400 audit(1722186787.709:7793): avc: denied { create } for pid=7749 comm="syz.0.1466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=0 [ 88.309626][ T29] audit: type=1400 audit(1722186787.709:7794): avc: denied { prog_load } for pid=7749 comm="syz.0.1466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 88.328758][ T29] audit: type=1400 audit(1722186787.709:7795): avc: denied { prog_load } for pid=7749 comm="syz.0.1466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 90.015814][ T7771] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=7771 comm=syz.4.1470 [ 90.066386][ T7773] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=7773 comm=syz.2.1472 [ 91.537315][ T0] ================================================================== [ 91.545405][ T0] BUG: KCSAN: data-race in __tmigr_cpu_activate / tmigr_update_events [ 91.553540][ T0] [ 91.556104][ T0] write to 0xffff888237c205e4 of 1 bytes by task 0 on cpu 0: [ 91.564061][ T0] __tmigr_cpu_activate+0x55/0x200 [ 91.569152][ T0] tmigr_cpu_activate+0x8a/0xc0 [ 91.573984][ T0] timer_clear_idle+0x28/0x100 [ 91.578728][ T0] tick_nohz_restart_sched_tick+0x22/0x110 [ 91.584522][ T0] tick_nohz_idle_exit+0xfe/0x1d0 [ 91.589531][ T0] do_idle+0x1ee/0x230 [ 91.593580][ T0] cpu_startup_entry+0x25/0x30 [ 91.598412][ T0] rest_init+0xef/0xf0 [ 91.602466][ T0] start_kernel+0x581/0x5e0 [ 91.606957][ T0] x86_64_start_reservations+0x2a/0x30 [ 91.612390][ T0] x86_64_start_kernel+0x9a/0xa0 [ 91.617305][ T0] common_startup_64+0x12c/0x137 [ 91.622250][ T0] [ 91.624551][ T0] read to 0xffff888237c205e4 of 1 bytes by task 0 on cpu 1: [ 91.631814][ T0] tmigr_update_events+0x41d/0x5d0 [ 91.636906][ T0] __tmigr_cpu_deactivate+0x2b1/0x410 [ 91.642255][ T0] tmigr_cpu_deactivate+0x66/0x180 [ 91.647345][ T0] __get_next_timer_interrupt+0x137/0x530 [ 91.653072][ T0] timer_base_try_to_set_idle+0x54/0x60 [ 91.658615][ T0] tick_nohz_idle_stop_tick+0x15b/0x650 [ 91.664158][ T0] do_idle+0x178/0x230 [ 91.668217][ T0] cpu_startup_entry+0x25/0x30 [ 91.672964][ T0] start_secondary+0x94/0xa0 [ 91.677607][ T0] common_startup_64+0x12c/0x137 [ 91.682535][ T0] [ 91.684835][ T0] value changed: 0x00 -> 0x01 [ 91.689496][ T0] [ 91.691803][ T0] Reported by Kernel Concurrency Sanitizer on: [ 91.697942][ T0] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.10.0-syzkaller-12888-g5437f30d3458 #0 [ 91.707902][ T0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 91.717940][ T0] ================================================================== Jul 28 17:13:11 syzkaller auth.info sshd[3228]: Received disconnect from 10.128.0.163 port 40684:11: disconnected by user Jul 28 17:13:11 syzkaller auth.info sshd[3228]: Disconnected from user root 10.128.0.163 port 40684 [ 91.844396][ T3442] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 91.942610][ T3442] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 92.033178][ T3442] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 92.132825][ T3442] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 92.181421][ T3442] bridge_slave_1: left allmulticast mode [ 92.187268][ T3442] bridge_slave_1: left promiscuous mode [ 92.192999][ T3442] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.200723][ T3442] bridge_slave_0: left allmulticast mode [ 92.206428][ T3442] bridge_slave_0: left promiscuous mode [ 92.212107][ T3442] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.333887][ T3442] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 92.344136][ T3442] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 92.353856][ T3442] bond0 (unregistering): Released all slaves [ 92.362262][ T3442] bond1 (unregistering): Released all slaves [ 92.474888][ T3442] hsr_slave_0: left promiscuous mode [ 92.480500][ T3442] hsr_slave_1: left promiscuous mode [ 92.486379][ T3442] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 92.493823][ T3442] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 92.501256][ T3442] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 92.508712][ T3442] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 92.517394][ T3442] veth1_macvtap: left promiscuous mode [ 92.522973][ T3442] veth0_macvtap: left promiscuous mode [ 92.528473][ T3442] veth1_vlan: left promiscuous mode [ 92.533787][ T3442] @ÿ: left promiscuous mode [ 92.600616][ T3442] team0 (unregistering): Port device team_slave_1 removed [ 92.610278][ T3442] team0 (unregistering): Port device team_slave_0 removed [ 92.938818][ T3442] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 92.987641][ T3442] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.048529][ T3442] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.089016][ T3442] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.179017][ T3442] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.218911][ T3442] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.270216][ T3442] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.359872][ T3442] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.427843][ T3442] bridge_slave_1: left allmulticast mode [ 93.433561][ T3442] bridge_slave_1: left promiscuous mode [ 93.439404][ T3442] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.447025][ T3442] bridge_slave_0: left allmulticast mode [ 93.452760][ T3442] bridge_slave_0: left promiscuous mode [ 93.458520][ T3442] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.466667][ T3442] bridge_slave_1: left allmulticast mode [ 93.472320][ T3442] bridge_slave_1: left promiscuous mode [ 93.478028][ T3442] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.485673][ T3442] bridge_slave_0: left allmulticast mode [ 93.491315][ T3442] bridge_slave_0: left promiscuous mode [ 93.496888][ T3442] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.731208][ T3442] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 93.741334][ T3442] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 93.751318][ T3442] bond0 (unregistering): Released all slaves [ 93.760513][ T3442] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 93.770813][ T3442] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 93.780826][ T3442] bond0 (unregistering): Released all slaves [ 93.932541][ T3442] hsr_slave_0: left promiscuous mode [ 93.938096][ T3442] hsr_slave_1: left promiscuous mode [ 93.943920][ T3442] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 93.951333][ T3442] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 93.958850][ T3442] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 93.966259][ T3442] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 93.974654][ T3442] hsr_slave_0: left promiscuous mode [ 93.980238][ T3442] hsr_slave_1: left promiscuous mode [ 93.986077][ T3442] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 93.993500][ T3442] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 94.003495][ T3442] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 94.010940][ T3442] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 94.020575][ T3442] veth1_macvtap: left promiscuous mode [ 94.026164][ T3442] veth0_macvtap: left promiscuous mode [ 94.031716][ T3442] veth1_vlan: left promiscuous mode [ 94.036930][ T3442] veth0_vlan: left promiscuous mode [ 94.042883][ T3442] veth1_vlan: left promiscuous mode [ 94.048073][ T3442] veth0_vlan: left promiscuous mode [ 94.141476][ T3442] team0 (unregistering): Port device team_slave_1 removed [ 94.151329][ T3442] team0 (unregistering): Port device team_slave_0 removed [ 94.203635][ T3442] team0 (unregistering): Port device team_slave_1 removed [ 94.213009][ T3442] team0 (unregistering): Port device team_slave_0 removed