last executing test programs: 3.035529032s ago: executing program 0 (id=239): r0 = socket(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'bridge0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x4, 0x0, 0x0, r2}, 0xc) setsockopt$MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x1, 0xd, r2, 0xfffffffc}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) flistxattr(r3, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000600)={'tunl0\x00', &(0x7f00000004c0)={'syztnl2\x00', r2, 0x80, 0x7800, 0x5, 0x3, {{0x3c, 0x4, 0x1, 0x24, 0xf0, 0x64, 0x0, 0x1, 0x2d, 0x0, @local, @remote, {[@rr={0x7, 0xf, 0x1a, [@broadcast, @broadcast, @rand_addr=0x64010101]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x21, 0xffffffffffffffff, [{0x2, 0xc, "96cd678369c48aa5e531"}, {0x2, 0xf, "c25c25e32284abac61e523c271"}]}, @timestamp_addr={0x44, 0x44, 0xb6, 0x1, 0x8, [{@multicast1, 0x31}, {@local, 0x7}, {@broadcast, 0x4}, {@rand_addr=0x64010102, 0x9}, {@local, 0x2}, {@multicast2, 0x5}, {@multicast1, 0x6}, {@empty}]}, @rr={0x7, 0x13, 0xdd, [@loopback, @private=0xa010102, @broadcast, @remote]}, @timestamp_prespec={0x44, 0xc, 0xfd, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x2d}, 0x2}]}, @ra={0x94, 0x4}, @noop, @lsrr={0x83, 0x13, 0x25, [@rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x24}, @empty]}, @timestamp_prespec={0x44, 0x2c, 0x87, 0x3, 0x0, [{@multicast1, 0x1}, {@rand_addr=0x64010102, 0x40}, {@empty, 0xf}, {@local, 0x400}, {@empty, 0xcf3}]}]}}}}}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000680)={0x2}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{0x1}, &(0x7f0000000780), &(0x7f00000007c0)='%+9llu \x00'}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f00000008c0)=@generic={&(0x7f0000000880)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e24, 0xc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, {0xa, 0x4e22, 0x6fe3, @mcast2, 0x393}, 0x0, {[0xbb7, 0x6, 0x7, 0x9, 0xbd, 0x7ff, 0xbb23, 0x400]}}, 0x5c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x45, 0x8, @buffer={0x0, 0x60, &(0x7f0000000100)=""/96}, &(0x7f0000000180)="40cee9b2750044fe1224b1e4f9307fb4fe521f4a948f27a72f3eb37a44133c029ab7cb6616422ce5977c4cc2edebec1faa49ebe978724e5f35bffb49adb551fb0a04d10d37", &(0x7f0000000280)=""/149, 0xfffffc01, 0x20, 0xffffffffffffffff, &(0x7f0000000200)}) 2.989844292s ago: executing program 0 (id=240): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$hiddev(0x0, 0xfffffffffffffff7, 0x8000) ioctl$HIDIOCGSTRING(r1, 0x81044804, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x18) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x500, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x100000, 0x0, {0x0, 0x6, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8}]}, 0x40}}, 0x0) 2.018853598s ago: executing program 0 (id=249): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={0x0, r0}, 0x18) r1 = syz_io_uring_setup(0x26b6, &(0x7f0000000200)={0x0, 0xf906, 0x800, 0x0, 0x308}, &(0x7f0000000080), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES2(r1, 0xd, &(0x7f00000008c0)={0xa, 0x0, 0x0, &(0x7f0000000740), &(0x7f0000000800)=[0x2, 0x4]}, 0x20) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) 2.018461398s ago: executing program 0 (id=250): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000)=0x85c, 0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xd192}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newlink={0x58, 0x10, 0x403, 0x300, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1e, 0x1f}}, @IFLA_VLAN_ID={0x6, 0x1, 0xffc}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x58}}, 0x8000) bind$packet(r0, &(0x7f0000000080)={0x11, 0x1a, 0x0, 0x1, 0x8, 0x6, @broadcast}, 0x14) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000001280)={0x0, 0x3c, &(0x7f0000001200)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e22, 0x5bb3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xbeb}, @in={0x2, 0x4e21, @local}]}, &(0x7f00000012c0)=0x10) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x89a1, &(0x7f0000000040)={'syzkaller0\x00'}) 1.959221668s ago: executing program 0 (id=252): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[@ANYRESDEC=0x0], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="15ae000001000000000031f12b000c7a2b9eb272", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000a80)=ANY=[@ANYBLOB="05000000020d0000ff01000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRESOCT=r2, @ANYBLOB="0000004001000000040000a03a010000aa3abe49d72ce87b3043c7e1303839726fec2c08393986d3aebf45272bb8ce9a19262b82c290bc780b42feac79779d57af00405066beceeb6d20b14c76e46f11731d77f85e91608b72f49822fe37453f38f1bfa7199855e7c7bd6d82569ef7607557fc3076d1f500165ebcb370ac382b998ac47f0a4e160eedaeb10bb7921adb61a116b16054ce057f1c33ef5a0f67f11f12025bf1321bfd21a3f9"], 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040000) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7c, 0x2, @perf_config_ext={0x1, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r6 = mq_open(&(0x7f0000000080)='$@\x00', 0x40, 0xb4, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$setlease(r6, 0x400, 0x0) mq_open(&(0x7f0000000140)='$@\x00', 0x2, 0x8, 0x0) 1.799233449s ago: executing program 2 (id=254): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x2, &(0x7f0000000380)) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000340)=0xfffffffffffffff9, 0x2) rmdir(&(0x7f0000000280)='./file0/../file0\x00') 1.780641069s ago: executing program 2 (id=255): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)={0x34, r3, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x8000) sendmsg$DEVLINK_CMD_SB_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r3, 0x1, 0x2, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xb}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0xc000) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x10) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a88000000070a0b040000000000000000020000055c000480580001800a000100696e6e65720000004800028008000240000000840800034000000007080004400000000f080001400000000024000580090001006d6574610000000014000280080001400000001108000240000000080900010073797a30000000000900020073797a3200000000140000001100010000000000000000000300000a"], 0xb0}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000003000000000000000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) time(0x0) r7 = syz_open_dev$sg(&(0x7f0000001600), 0x0, 0x22c01) setreuid(0x0, 0xee00) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) io_setup(0x2, &(0x7f0000000000)=0x0) r9 = eventfd(0x0) io_submit(r8, 0x2, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xc2, r9, 0x0, 0x0, 0x100}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x2, r9, 0x0, 0x0, 0x80000000, 0x0, 0x1, r9}]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) ioctl$FITHAW(r7, 0xc0045878) r10 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), 0xffffffffffffffff) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$nl802154(&(0x7f00000003c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r11, 0x8933, &(0x7f0000000000)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r11, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000240)={0x50, r12, 0x1, 0xfffffffd, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_SEC_DEVKEY={0x30, 0x2f, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}, @NL802154_DEVKEY_ATTR_ID={0x18, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0xc, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}]}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x50}}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r5, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r10, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r13}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x40804) 1.621682011s ago: executing program 1 (id=259): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000001a00000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ptp0(0xffffffffffffff9c, &(0x7f00000002c0), 0x80042, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x3) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001000010400000000000000ffff000000", @ANYBLOB="0380000000000000240012800c0001006d6163766c616e00140002800800010008000000060002000100000008", @ANYBLOB='\b\x00\n'], 0x54}, 0x1, 0x0, 0x0, 0x40814}, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x0) 1.557534391s ago: executing program 1 (id=260): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800fb02ffffc9db4c525362aab81918711589ab95da688c617e76cbffff070002", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x2080, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000340)={0x7fffffffffffffff, 0x200, 0x5, 0x0, 0x0, [{{r2}, 0x1ff}, {{r0}}, {{r0}, 0x81}, {{r1}, 0x6}, {{r2}, 0x2}]}) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFBRDADDR(r4, 0x8919, &(0x7f0000000240)={'wg0\x00', {0x2, 0x0, @loopback}}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe8, &(0x7f0000000580)=[{}, {}], 0x10, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x1d, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000700)=ANY=[], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r6, 0x0, 0x2}, 0x18) unshare(0x62040200) syz_usb_disconnect(0xffffffffffffffff) r7 = socket(0x10, 0x3, 0x0) write(r7, &(0x7f0000000000)="240000001a005f0214f9f407000904001f00000000000000000000000800040001000000", 0x24) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x50, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r8, {0xc, 0x2}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_head_drop={{}, {0x0, 0x2, 0x5}}, @TCA_RATE={0x6, 0x5, {0x6, 0x2}}]}, 0x50}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1, 0x3, 0x400, 0x0, 0x414, r2, 0x1, '\x00', r8, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x50) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080), 0x250000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@cache_fscache}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@loose}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@version_9p2000}, {@ignoreqv}, {@mmap}]}}) 1.128919083s ago: executing program 4 (id=262): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') writev(r1, &(0x7f0000000240)=[{&(0x7f0000000080)='=', 0x1}], 0x1) (fail_nth: 3) 826.142825ms ago: executing program 2 (id=265): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000040)={0x2a5c0, 0x1c1}, 0x18) openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000580)="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", 0xb}, 0x56) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) 811.089565ms ago: executing program 0 (id=266): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5}) r3 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @loopback}}, &(0x7f0000000080)=0x1c) accept4(r3, &(0x7f0000000180)=@rc, &(0x7f0000000100)=0x80, 0x81800) timer_settime(r2, 0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) bind$unix(r1, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = socket$unix(0x1, 0x1, 0x0) connect$unix(r4, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 766.646016ms ago: executing program 4 (id=267): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={&(0x7f0000000900)='kfree\x00', r0}, 0x18) r1 = syz_io_uring_setup(0x26b6, 0x0, &(0x7f0000000080), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES2(r1, 0xd, &(0x7f00000008c0)={0xa, 0x0, 0x0, &(0x7f0000000740), &(0x7f0000000800)=[0x2, 0x4]}, 0x20) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) 765.522836ms ago: executing program 4 (id=269): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ec0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x18) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x2a5c0, 0x1c1}, 0x18) chown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) 752.111456ms ago: executing program 4 (id=270): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000008000000850000001a00000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ptp0(0xffffffffffffff9c, &(0x7f00000002c0), 0x80042, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x3) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001000010400000000000000ffff000000", @ANYBLOB="0380000000000000240012800c0001006d6163766c616e00140002800800010008000000060002000100000008", @ANYBLOB='\b\x00\n'], 0x54}, 0x1, 0x0, 0x0, 0x40814}, 0x0) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x0) 745.591965ms ago: executing program 2 (id=271): r0 = socket(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'bridge0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x4, 0x0, 0x0, r2}, 0xc) setsockopt$MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x1, 0xd, r2, 0xfffffffc}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) flistxattr(r3, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000600)={'tunl0\x00', &(0x7f00000004c0)={'syztnl2\x00', r2, 0x80, 0x7800, 0x5, 0x3, {{0x3c, 0x4, 0x1, 0x24, 0xf0, 0x64, 0x0, 0x1, 0x2d, 0x0, @local, @remote, {[@rr={0x7, 0xf, 0x1a, [@broadcast, @broadcast, @rand_addr=0x64010101]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x21, 0xffffffffffffffff, [{0x2, 0xc, "96cd678369c48aa5e531"}, {0x2, 0xf, "c25c25e32284abac61e523c271"}]}, @timestamp_addr={0x44, 0x44, 0xb6, 0x1, 0x8, [{@multicast1, 0x31}, {@local, 0x7}, {@broadcast, 0x4}, {@rand_addr=0x64010102, 0x9}, {@local, 0x2}, {@multicast2, 0x5}, {@multicast1, 0x6}, {@empty}]}, @rr={0x7, 0x13, 0xdd, [@loopback, @private=0xa010102, @broadcast, @remote]}, @timestamp_prespec={0x44, 0xc, 0xfd, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x2d}, 0x2}]}, @ra={0x94, 0x4}, @noop, @lsrr={0x83, 0x13, 0x25, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x24}, @empty]}, @timestamp_prespec={0x44, 0x2c, 0x87, 0x3, 0x0, [{@multicast1, 0x1}, {@rand_addr=0x64010102, 0x40}, {@empty, 0xf}, {@local, 0x400}, {@empty, 0xcf3}]}]}}}}}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000680)={0x2}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{0x1}, &(0x7f0000000780), &(0x7f00000007c0)='%+9llu \x00'}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f00000008c0)=@generic={&(0x7f0000000880)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e24, 0xc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, {0xa, 0x4e22, 0x6fe3, @mcast2, 0x393}, 0x0, {[0xbb7, 0x6, 0x7, 0x9, 0xbd, 0x7ff, 0xbb23, 0x400]}}, 0x5c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x45, 0x8, @buffer={0x0, 0x60, &(0x7f0000000100)=""/96}, &(0x7f0000000180)="40cee9b2750044fe1224b1e4f9307fb4fe521f4a948f27a72f3eb37a44133c029ab7cb6616422ce5977c4cc2edebec1faa49ebe978724e5f35bffb49adb551fb0a04d10d37", &(0x7f0000000280)=""/149, 0xfffffc01, 0x20, 0xffffffffffffffff, &(0x7f0000000200)}) 684.439266ms ago: executing program 2 (id=273): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000003000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63, 0x0, &(0x7f00000000c0)='\x00', 0x0, 0x2}, 0x48) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_tracing={0x1a, 0x0, &(0x7f0000000080), &(0x7f0000000080)='syzkaller\x00', 0xe, 0x7d, &(0x7f0000000200)=""/125, 0x41100, 0x42, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x1, 0x3, 0x6784, 0x51}, 0x10, 0x2d9b4, 0xffffffffffffffff, 0x6, &(0x7f0000000280), &(0x7f00000002c0)=[{0x4, 0x3, 0x4, 0x5}, {0x2, 0x2, 0xc, 0x9}, {0x5, 0x5, 0x7, 0x6}, {0x3, 0x2, 0x2, 0x7}, {0x0, 0x3, 0xb, 0xe}, {0x4, 0x1, 0x10}], 0x10, 0xad68}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)=@o_path={&(0x7f0000000000)='./file0\x00', r2, 0x4000, r1}, 0x18) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f00000002c0)={'icmp6\x00'}, &(0x7f0000000340)=0x1e) 645.038127ms ago: executing program 4 (id=274): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) rmdir(&(0x7f0000000280)='./file0/../file0\x00') 644.806216ms ago: executing program 4 (id=275): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[@ANYRESDEC=0x0], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="15ae000001000000000031f12b000c7a2b9eb272", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000a80)=ANY=[@ANYBLOB="05000000020d0000ff01000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRESOCT=r2, @ANYBLOB="0000004001000000040000a03a010000aa3abe49d72ce87b3043c7e1303839726fec2c08393986d3aebf45272bb8ce9a19262b82c290bc780b42feac79779d57af00405066beceeb6d20b14c76e46f11731d77f85e91608b72f49822fe37453f38f1bfa7199855e7c7bd6d82569ef7607557fc3076d1f500165ebcb370ac382b998ac47f0a4e160eedaeb10bb7921adb61a116b16054ce057f1c33ef5a0f67f11f12025bf1321bfd21a3f9"], 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040000) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000d00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a090000000000000000000200fffd0900020073797a310000000008000440000000000900010073797a3000000000080003"], 0x98}}, 0x0) r5 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7c, 0x2, @perf_config_ext={0x1, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r7 = mq_open(&(0x7f0000000080)='$@\x00', 0x40, 0xb4, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$setlease(r7, 0x400, 0x0) mq_open(&(0x7f0000000140)='$@\x00', 0x2, 0x8, 0x0) getgroups(0x4, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0]) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) capset(&(0x7f0000000380)={0x20080522}, &(0x7f0000000040)={0x200000, 0x40200003, 0x0, 0x6, 0x7}) setrlimit(0x40000000000008, &(0x7f0000000080)={0x0, 0x6}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000780)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000000007"], 0x30}}], 0x1, 0x4000804) 638.810947ms ago: executing program 2 (id=276): r0 = socket$netlink(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x9, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r1}, 0x10) (async) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) (async) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) (async) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r3, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x6048800) r4 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000840)={0x58, r4, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r5}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffbfff9}}}]}}]}, 0x58}, 0x1, 0x1000000, 0x0, 0x24004000}, 0x24040840) 234.259459ms ago: executing program 1 (id=280): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000)=0x85c, 0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xd192}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newlink={0x58, 0x10, 0x403, 0x300, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1e, 0x1f}}, @IFLA_VLAN_ID={0x6, 0x1, 0xffc}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x58}}, 0x8000) bind$packet(r0, &(0x7f0000000080)={0x11, 0x1a, 0x0, 0x1, 0x8, 0x6, @broadcast}, 0x14) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000001280)={0x0, 0x4c, &(0x7f0000001200)=[@in={0x2, 0x4e23, @rand_addr=0x64010100}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e22, 0x5bb3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xbeb}, @in={0x2, 0x4e21, @local}]}, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x89a1, &(0x7f0000000040)={'syzkaller0\x00'}) 227.119149ms ago: executing program 3 (id=281): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={&(0x7f0000000900)='kfree\x00', r0}, 0x18) r1 = syz_io_uring_setup(0x26b6, &(0x7f0000000200)={0x0, 0xf906, 0x800, 0x0, 0x308}, 0x0, &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES2(r1, 0xd, &(0x7f00000008c0)={0xa, 0x0, 0x0, &(0x7f0000000740), &(0x7f0000000800)=[0x2, 0x4]}, 0x20) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) 150.749659ms ago: executing program 3 (id=282): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000001700000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/27], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x2, 0x300}, {0x6e, 0x0, 0xd}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x20000f19}, {0x3, 0x0, 0x6, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r3}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) tee(r5, r2, 0x7fffffffffffffff, 0x2) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000940)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWRULE={0x30, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_USERDATA={0x4}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x58}}, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000080), 0x0}, 0x20) socket(0x10, 0x3, 0x0) r6 = fsopen(0x0, 0x1) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) r7 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r7, &(0x7f0000000880)=[{&(0x7f0000000440)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000100)="03", 0x1}], 0x1}], 0x1, 0x0) sendmmsg$inet_sctp(r7, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000240)=[{0x0, 0x300}, {&(0x7f0000000300)="359cb6", 0x3}], 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c000400000000000200"/44, @ANYRES32=0x0], 0x30}], 0x1, 0x0) 150.480179ms ago: executing program 3 (id=283): r0 = socket(0x1e, 0x1, 0x0) connect$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) write$binfmt_misc(r0, &(0x7f0000000080), 0x2000011a) (fail_nth: 5) 86.85381ms ago: executing program 1 (id=284): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000008000000850000001a00000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ptp0(0xffffffffffffff9c, &(0x7f00000002c0), 0x80042, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x3) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001000010400000000000000ffff000000", @ANYBLOB="0380000000000000240012800c0001006d6163766c616e00140002800800010008000000060002000100000008", @ANYBLOB='\b\x00\n'], 0x54}, 0x1, 0x0, 0x0, 0x40814}, 0x0) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x0) 39.33568ms ago: executing program 3 (id=285): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="5c01000013000100"/19, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYBLOB="050027000000000008008500", @ANYRES32=0x0, @ANYBLOB="140003006d6163766c616e31000000000000000008000ac3", @ANYRES32=r0, @ANYBLOB="e8001a8048000a80140007"], 0x15c}}, 0x0) 38.74725ms ago: executing program 1 (id=286): r0 = socket(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'bridge0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x4, 0x0, 0x0, r2}, 0xc) setsockopt$MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x1, 0xd, r2, 0xfffffffc}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) flistxattr(r3, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000600)={'tunl0\x00', &(0x7f00000004c0)={'syztnl2\x00', r2, 0x80, 0x7800, 0x5, 0x3, {{0x3d, 0x4, 0x1, 0x24, 0xf4, 0x64, 0x0, 0x1, 0x2d, 0x0, @local, @remote, {[@rr={0x7, 0xf, 0x1a, [@broadcast, @broadcast, @rand_addr=0x64010101]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x21, 0xffffffffffffffff, [{0x2, 0xc, "96cd678369c48aa5e531"}, {0x2, 0xf, "c25c25e32284abac61e523c271"}]}, @timestamp_addr={0x44, 0x44, 0xb6, 0x1, 0x8, [{@multicast1, 0x31}, {@local, 0x7}, {@broadcast, 0x4}, {@rand_addr=0x64010102, 0x9}, {@local, 0x2}, {@multicast2, 0x5}, {@multicast1, 0x6}, {@empty}]}, @rr={0x7, 0x13, 0xdd, [@loopback, @private=0xa010102, @broadcast, @remote]}, @timestamp_prespec={0x44, 0xc, 0xfd, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x2d}, 0x2}]}, @ra={0x94, 0x4}, @lsrr={0x83, 0x17, 0x25, [@rand_addr=0x64010102, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x24}, @empty]}, @timestamp_prespec={0x44, 0x2c, 0x87, 0x3, 0x0, [{@multicast1, 0x1}, {@rand_addr=0x64010102, 0x40}, {@empty, 0xf}, {@local, 0x400}, {@empty, 0xcf3}]}]}}}}}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000680)={0x2}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{0x1}, &(0x7f0000000780), &(0x7f00000007c0)='%+9llu \x00'}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f00000008c0)=@generic={&(0x7f0000000880)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e24, 0xc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, {0xa, 0x4e22, 0x6fe3, @mcast2, 0x393}, 0x0, {[0xbb7, 0x6, 0x7, 0x9, 0xbd, 0x7ff, 0xbb23, 0x400]}}, 0x5c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000340)={0x0, 0xfffffffffffffffe, 0x45, 0x8, @buffer={0x0, 0x60, &(0x7f0000000100)=""/96}, &(0x7f0000000180)="40cee9b2750044fe1224b1e4f9307fb4fe521f4a948f27a72f3eb37a44133c029ab7cb6616422ce5977c4cc2edebec1faa49ebe978724e5f35bffb49adb551fb0a04d10d37", &(0x7f0000000280)=""/149, 0xfffffc01, 0x20, 0xffffffffffffffff, &(0x7f0000000200)}) 35.77333ms ago: executing program 3 (id=287): syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, 0x0, &(0x7f0000000040)=0x61) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x20000136, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mq_getsetattr(0xffffffffffffffff, 0x0, 0x0) 552.73µs ago: executing program 3 (id=288): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000004000)={0xf, {"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", 0xfffffffffffffe59}}, 0xfa) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000b00)='kmem_cache_free\x00', r2, 0x0, 0x1034}, 0x18) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0xffffffffffffffff, 0x9, 0x8}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, 0x0, 0xffffff6d) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000600)={'syztnl1\x00', 0x0, 0x4, 0x8, 0x44, 0xfff, 0x40, @remote, @private1={0xfc, 0x1, '\x00', 0x1}, 0x40, 0x80, 0x6, 0x7}}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0xa, &(0x7f00000002c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @map_val={0x18, 0x8, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @ldst={0x3, 0x1, 0x1, 0x2, 0x1, 0x80, 0x4}, @alu={0x4, 0x1, 0x7, 0xb, 0x9, 0x4, 0xfffffffffffffffc}, @generic={0xfe, 0x3, 0x9, 0x7, 0x9}], &(0x7f0000000400)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000000d80)=""/4096, 0x41000, 0x6b, '\x00', r6, 0x25, r1, 0x8, &(0x7f0000000680)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0xd, 0x8f, 0x9}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000700), &(0x7f0000000740)=[{0x0, 0x5, 0xf, 0x2}], 0x10, 0x3ff}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r1}, &(0x7f0000000040), &(0x7f0000000100)=r2}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x94) bind$vsock_stream(r1, &(0x7f0000000240)={0x28, 0x0, 0x0, @host}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) r9 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r9, 0x89f1, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x4, 0x7d, 0x3, 0x3, 0x0, @mcast1, @loopback={0xff00000000000000, 0x460c6}, 0x10, 0x20, 0xfffffffe, 0x20069d}}) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a05000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021940000000c0a01030000000000000000070000000900020073797a31000000000900010073797a3000000000680003806400dec6080003400000000258000b80200001800a00010071756f7461"], 0x118}}, 0x0) r11 = accept4$x25(r10, &(0x7f0000000180), &(0x7f0000000200)=0x12, 0x80800) ioctl$VFAT_IOCTL_READDIR_BOTH(r11, 0x82307201, &(0x7f0000000b40)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 0s ago: executing program 1 (id=289): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000003000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63, 0x0, &(0x7f00000000c0)='\x00', 0x0, 0x2}, 0x48) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_tracing={0x1a, 0x0, &(0x7f0000000080), &(0x7f0000000080)='syzkaller\x00', 0xe, 0x7d, &(0x7f0000000200)=""/125, 0x41100, 0x42, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x1, 0x3, 0x6784, 0x51}, 0x10, 0x2d9b4, 0xffffffffffffffff, 0x6, &(0x7f0000000280), &(0x7f00000002c0)=[{0x4, 0x3, 0x4, 0x5}, {0x2, 0x2, 0xc, 0x9}, {0x5, 0x5, 0x7, 0x6}, {0x3, 0x2, 0x2, 0x7}, {0x0, 0x3, 0xb, 0xe}, {0x4, 0x1, 0x10}], 0x10, 0xad68}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)=@o_path={&(0x7f0000000000)='./file0\x00', r2, 0x4000, r1}, 0x18) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f00000002c0)={'icmp6\x00'}, &(0x7f0000000340)=0x1e) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.209' (ED25519) to the list of known hosts. [ 27.949784][ T29] audit: type=1400 audit(1762617938.778:62): avc: denied { mounton } for pid=3298 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.972811][ T29] audit: type=1400 audit(1762617938.798:63): avc: denied { mount } for pid=3298 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.973746][ T3298] cgroup: Unknown subsys name 'net' [ 28.000591][ T29] audit: type=1400 audit(1762617938.828:64): avc: denied { unmount } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.194629][ T3298] cgroup: Unknown subsys name 'cpuset' [ 28.200963][ T3298] cgroup: Unknown subsys name 'rlimit' [ 28.372356][ T29] audit: type=1400 audit(1762617939.198:65): avc: denied { setattr } for pid=3298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.395786][ T29] audit: type=1400 audit(1762617939.198:66): avc: denied { create } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.416329][ T29] audit: type=1400 audit(1762617939.198:67): avc: denied { write } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.431441][ T3304] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.436720][ T29] audit: type=1400 audit(1762617939.208:68): avc: denied { read } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 28.465617][ T29] audit: type=1400 audit(1762617939.208:69): avc: denied { mounton } for pid=3298 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.477378][ T3298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.490421][ T29] audit: type=1400 audit(1762617939.208:70): avc: denied { mount } for pid=3298 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 28.522640][ T29] audit: type=1400 audit(1762617939.278:71): avc: denied { relabelto } for pid=3304 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.754875][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 29.787906][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 29.829101][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 29.880859][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.887982][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.895253][ T3311] bridge_slave_0: entered allmulticast mode [ 29.901719][ T3311] bridge_slave_0: entered promiscuous mode [ 29.910545][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.917642][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.924870][ T3311] bridge_slave_1: entered allmulticast mode [ 29.931325][ T3311] bridge_slave_1: entered promiscuous mode [ 29.951960][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 29.985928][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.993102][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.000356][ T3316] bridge_slave_0: entered allmulticast mode [ 30.007189][ T3316] bridge_slave_0: entered promiscuous mode [ 30.017235][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.024533][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.031778][ T3316] bridge_slave_1: entered allmulticast mode [ 30.038291][ T3316] bridge_slave_1: entered promiscuous mode [ 30.046034][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.072795][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.091902][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 30.109541][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.134482][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.148996][ T3311] team0: Port device team_slave_0 added [ 30.154783][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.161887][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.169100][ T3312] bridge_slave_0: entered allmulticast mode [ 30.175420][ T3312] bridge_slave_0: entered promiscuous mode [ 30.200523][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.207724][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.214990][ T3320] bridge_slave_0: entered allmulticast mode [ 30.221437][ T3320] bridge_slave_0: entered promiscuous mode [ 30.228616][ T3311] team0: Port device team_slave_1 added [ 30.239606][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.246782][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.254009][ T3312] bridge_slave_1: entered allmulticast mode [ 30.260523][ T3312] bridge_slave_1: entered promiscuous mode [ 30.271845][ T3316] team0: Port device team_slave_0 added [ 30.277625][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.284782][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.291923][ T3320] bridge_slave_1: entered allmulticast mode [ 30.298287][ T3320] bridge_slave_1: entered promiscuous mode [ 30.321651][ T3316] team0: Port device team_slave_1 added [ 30.332549][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.339612][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.365637][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.390347][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.405745][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.412724][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.438662][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.450648][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.463342][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.472764][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.479818][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.505728][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.519530][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.526572][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.552516][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.564385][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.589628][ T3320] team0: Port device team_slave_0 added [ 30.609411][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.616672][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.623905][ T3319] bridge_slave_0: entered allmulticast mode [ 30.630422][ T3319] bridge_slave_0: entered promiscuous mode [ 30.637424][ T3320] team0: Port device team_slave_1 added [ 30.643267][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.650345][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.657538][ T3319] bridge_slave_1: entered allmulticast mode [ 30.664025][ T3319] bridge_slave_1: entered promiscuous mode [ 30.701658][ T3312] team0: Port device team_slave_0 added [ 30.709391][ T3311] hsr_slave_0: entered promiscuous mode [ 30.715429][ T3311] hsr_slave_1: entered promiscuous mode [ 30.737251][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.747018][ T3312] team0: Port device team_slave_1 added [ 30.753655][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.763664][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.770661][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.796685][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.807938][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.815010][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.841040][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.854375][ T3316] hsr_slave_0: entered promiscuous mode [ 30.860678][ T3316] hsr_slave_1: entered promiscuous mode [ 30.866825][ T3316] debugfs: 'hsr0' already exists in 'hsr' [ 30.872578][ T3316] Cannot create hsr debugfs directory [ 30.917375][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.924386][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.950330][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.966701][ T3319] team0: Port device team_slave_0 added [ 30.984049][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.991098][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.017075][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.032338][ T3319] team0: Port device team_slave_1 added [ 31.045507][ T3320] hsr_slave_0: entered promiscuous mode [ 31.051550][ T3320] hsr_slave_1: entered promiscuous mode [ 31.057412][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 31.063155][ T3320] Cannot create hsr debugfs directory [ 31.086939][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.094008][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.119950][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.146483][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.153471][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.179418][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.202142][ T3312] hsr_slave_0: entered promiscuous mode [ 31.208232][ T3312] hsr_slave_1: entered promiscuous mode [ 31.214152][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 31.219986][ T3312] Cannot create hsr debugfs directory [ 31.286941][ T3319] hsr_slave_0: entered promiscuous mode [ 31.292909][ T3319] hsr_slave_1: entered promiscuous mode [ 31.298981][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 31.304764][ T3319] Cannot create hsr debugfs directory [ 31.429463][ T3311] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 31.440175][ T3311] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 31.453595][ T3311] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 31.462703][ T3311] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 31.489467][ T3316] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 31.498980][ T3316] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 31.508671][ T3316] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 31.519569][ T3316] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 31.549565][ T3312] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 31.564235][ T3312] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 31.573787][ T3312] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 31.589366][ T3312] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 31.621499][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.631701][ T3320] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 31.648268][ T3320] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 31.666670][ T3320] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 31.678319][ T3320] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 31.701177][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.712073][ T3319] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 31.721109][ T3319] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 31.730823][ T3319] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 31.740188][ T187] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.747264][ T187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.758695][ T3319] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 31.769096][ T187] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.776187][ T187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.795390][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.823341][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.836795][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.858806][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.865918][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.877824][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.891825][ T187] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.898979][ T187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.916904][ T3311] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.931934][ T187] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.939084][ T187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.962095][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.969209][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.010199][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.020486][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.033467][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.050729][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.057887][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.068552][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.079463][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.086610][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.101985][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.109116][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.119109][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.126392][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.140480][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.179083][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.204690][ T3320] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.221500][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.306267][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.383704][ T3311] veth0_vlan: entered promiscuous mode [ 32.396211][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.420496][ T3316] veth0_vlan: entered promiscuous mode [ 32.437191][ T3311] veth1_vlan: entered promiscuous mode [ 32.455687][ T3316] veth1_vlan: entered promiscuous mode [ 32.467838][ T3311] veth0_macvtap: entered promiscuous mode [ 32.475517][ T3312] veth0_vlan: entered promiscuous mode [ 32.502054][ T3316] veth0_macvtap: entered promiscuous mode [ 32.509218][ T3311] veth1_macvtap: entered promiscuous mode [ 32.519687][ T3312] veth1_vlan: entered promiscuous mode [ 32.526885][ T3316] veth1_macvtap: entered promiscuous mode [ 32.537950][ T3319] veth0_vlan: entered promiscuous mode [ 32.555574][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.566052][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.576658][ T3312] veth0_macvtap: entered promiscuous mode [ 32.588052][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.604670][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.612978][ T3312] veth1_macvtap: entered promiscuous mode [ 32.620712][ T3319] veth1_vlan: entered promiscuous mode [ 32.631544][ T31] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.641536][ T3320] veth0_vlan: entered promiscuous mode [ 32.650763][ T31] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.665365][ T31] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.679353][ T3320] veth1_vlan: entered promiscuous mode [ 32.689892][ T37] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.700262][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.725206][ T3319] veth0_macvtap: entered promiscuous mode [ 32.733503][ T3319] veth1_macvtap: entered promiscuous mode [ 32.741154][ T37] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.741420][ T3311] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 32.750463][ T37] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.776182][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.804369][ T37] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.820133][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.829700][ T3320] veth0_macvtap: entered promiscuous mode [ 32.839127][ T37] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.860682][ T3320] veth1_macvtap: entered promiscuous mode [ 32.875259][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.875359][ T37] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.875465][ T37] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.897547][ T37] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.897667][ T37] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.908613][ T3485] netlink: 'syz.4.5': attribute type 16 has an invalid length. [ 32.908629][ T3485] netlink: 'syz.4.5': attribute type 17 has an invalid length. [ 32.946736][ T3485] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 32.964085][ T57] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.965583][ T57] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.965867][ T57] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.966121][ T57] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.968400][ T3485] loop4: detected capacity change from 0 to 512 [ 32.970886][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.973666][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.988988][ T3485] ------------[ cut here ]------------ [ 32.989001][ T3485] EA inode 11 i_nlink=2 [ 32.989372][ T3485] WARNING: CPU: 1 PID: 3485 at fs/ext4/xattr.c:1058 ext4_xattr_inode_update_ref+0x36a/0x380 [ 32.989468][ T3485] Modules linked in: [ 32.989499][ T3485] CPU: 1 UID: 0 PID: 3485 Comm: syz.4.5 Not tainted syzkaller #0 PREEMPT(voluntary) [ 32.989541][ T3485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 32.989559][ T3485] RIP: 0010:ext4_xattr_inode_update_ref+0x36a/0x380 [ 32.989632][ T3485] Code: 90 49 8d 7e 40 e8 76 fd b8 ff 4d 8b 6e 40 4c 89 e7 e8 8a f8 b8 ff 41 8b 56 48 48 c7 c7 88 d1 55 86 4c 89 ee e8 f7 f9 67 ff 90 <0f> 0b 90 90 e9 ff fe ff ff e8 78 e7 b5 03 0f 1f 84 00 00 00 00 00 [ 32.989680][ T3485] RSP: 0018:ffffc90002d735a0 EFLAGS: 00010246 [ 32.989708][ T3485] RAX: 2c8b86deae1f2200 RBX: ffff8881071ca468 RCX: 0000000000080000 [ 32.989726][ T3485] RDX: ffffc9000374e000 RSI: 0000000000004744 RDI: 0000000000004745 [ 32.989743][ T3485] RBP: 0000000000000002 R08: 0001ffff868480ef R09: 0000000000000000 [ 32.989761][ T3485] R10: ffffc90002d73280 R11: 0001c90002d73280 R12: ffff8881071ca418 [ 32.989778][ T3485] R13: 000000000000000b R14: ffff8881071ca3d0 R15: 0000000000000001 [ 32.989802][ T3485] FS: 00007f2482d776c0(0000) GS:ffff8882aef13000(0000) knlGS:0000000000000000 [ 32.989825][ T3485] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 32.989843][ T3485] CR2: 00007fbab36d0000 CR3: 000000011ad0e000 CR4: 00000000003506f0 [ 32.989880][ T3485] Call Trace: [ 32.989888][ T3485] [ 32.989901][ T3485] ext4_xattr_set_entry+0x77f/0x1020 [ 32.989961][ T3485] ext4_xattr_ibody_set+0x184/0x3c0 [ 32.990023][ T3485] ext4_expand_extra_isize_ea+0xcbb/0x11f0 [ 32.990099][ T3485] __ext4_expand_extra_isize+0x246/0x280 [ 32.990139][ T3485] __ext4_mark_inode_dirty+0x29d/0x3f0 [ 32.990189][ T3485] ext4_evict_inode+0x80e/0xd90 [ 32.990235][ T3485] ? __pfx_ext4_evict_inode+0x10/0x10 [ 32.990315][ T3485] evict+0x2e3/0x550 [ 32.990341][ T3485] ? __dquot_initialize+0x146/0x7c0 [ 32.990395][ T3485] iput+0x4ed/0x650 [ 32.990429][ T3485] ext4_process_orphan+0x1a9/0x1c0 [ 32.990494][ T3485] ext4_orphan_cleanup+0x6a8/0xa00 [ 32.990533][ T3485] ext4_fill_super+0x3483/0x3810 [ 32.990569][ T3485] ? snprintf+0x86/0xb0 [ 32.990618][ T3485] ? set_blocksize+0x1a8/0x310 [ 32.990647][ T3485] ? sb_set_blocksize+0xe3/0x100 [ 32.990675][ T3485] ? setup_bdev_super+0x30e/0x370 [ 32.990773][ T3485] ? __pfx_ext4_fill_super+0x10/0x10 [ 32.990843][ T3485] get_tree_bdev_flags+0x291/0x300 [ 32.990935][ T3485] ? __pfx_ext4_fill_super+0x10/0x10 [ 32.990975][ T3485] get_tree_bdev+0x1f/0x30 [ 32.991048][ T3485] ext4_get_tree+0x1c/0x30 [ 32.991092][ T3485] vfs_get_tree+0x57/0x1d0 [ 32.991125][ T3485] do_new_mount+0x24d/0x660 [ 32.991162][ T3485] path_mount+0x4a5/0xb70 [ 32.991247][ T3485] ? user_path_at+0x109/0x130 [ 32.991268][ T3485] __se_sys_mount+0x28c/0x2e0 [ 32.991316][ T3485] __x64_sys_mount+0x67/0x80 [ 32.991350][ T3485] x64_sys_call+0x2b51/0x3000 [ 32.991414][ T3485] do_syscall_64+0xd2/0x200 [ 32.991436][ T3485] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 32.991477][ T3485] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 32.991571][ T3485] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 32.991600][ T3485] RIP: 0033:0x7f2484310e6a [ 32.991621][ T3485] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 32.991644][ T3485] RSP: 002b:00007f2482d76e68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 32.991710][ T3485] RAX: ffffffffffffffda RBX: 00007f2482d76ef0 RCX: 00007f2484310e6a [ 32.991754][ T3485] RDX: 0000200000000180 RSI: 00002000000001c0 RDI: 00007f2482d76eb0 [ 32.991768][ T3485] RBP: 0000200000000180 R08: 00007f2482d76ef0 R09: 0000000000800700 [ 32.991784][ T3485] R10: 0000000000800700 R11: 0000000000000246 R12: 00002000000001c0 [ 32.991802][ T3485] R13: 00007f2482d76eb0 R14: 000000000000046f R15: 000000000000002c [ 32.991826][ T3485] [ 32.991835][ T3485] ---[ end trace 0000000000000000 ]--- [ 32.991945][ T3485] EXT4-fs error (device loop4): ext4_xattr_inode_iget:441: inode #18: comm syz.4.5: iget: bad extra_isize 90 (inode size 256) [ 33.006632][ T37] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.060830][ T3485] EXT4-fs (loop4): Remounting filesystem read-only [ 33.082011][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 33.082030][ T29] audit: type=1400 audit(1762617943.908:110): avc: denied { read } for pid=3491 comm="syz.1.6" name="usbmon7" dev="devtmpfs" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 33.083885][ T3485] EXT4-fs warning (device loop4): ext4_evict_inode:274: xattr delete (err -30) [ 33.092305][ T29] audit: type=1400 audit(1762617943.908:111): avc: denied { open } for pid=3491 comm="syz.1.6" path="/dev/usbmon7" dev="devtmpfs" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 33.096470][ T3485] EXT4-fs (loop4): 1 orphan inode deleted [ 33.119644][ T29] audit: type=1400 audit(1762617943.948:112): avc: denied { ioctl } for pid=3491 comm="syz.1.6" path="/dev/usbmon7" dev="devtmpfs" ino=163 ioctlcmd=0x9207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 33.123508][ T3485] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 33.609892][ T29] audit: type=1400 audit(1762617944.428:113): avc: denied { mount } for pid=3483 comm="syz.4.5" name="/" dev="loop4" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 33.631437][ T37] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.631451][ T3485] syz.4.5 (3485) used greatest stack depth: 10680 bytes left [ 33.634720][ T2662] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.664720][ T3316] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 33.706897][ T2662] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.720326][ T29] audit: type=1400 audit(1762617944.538:114): avc: denied { read write } for pid=3497 comm="syz.2.8" name="ptp0" dev="devtmpfs" ino=246 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 33.743584][ T29] audit: type=1400 audit(1762617944.538:115): avc: denied { open } for pid=3497 comm="syz.2.8" path="/dev/ptp0" dev="devtmpfs" ino=246 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 33.766697][ T29] audit: type=1400 audit(1762617944.538:116): avc: denied { ioctl } for pid=3497 comm="syz.2.8" path="/dev/ptp0" dev="devtmpfs" ino=246 ioctlcmd=0x3d0c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 33.841064][ T3503] loop3: detected capacity change from 0 to 256 [ 33.918373][ T29] audit: type=1400 audit(1762617944.688:117): avc: denied { create } for pid=3504 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 33.938811][ T29] audit: type=1400 audit(1762617944.698:118): avc: denied { mount } for pid=3501 comm="syz.3.4" name="/" dev="loop3" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 33.960498][ T29] audit: type=1400 audit(1762617944.738:119): avc: denied { write } for pid=3504 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 34.032338][ T3511] Cannot find add_set index 0 as target [ 34.047297][ T3511] xt_l2tp: missing protocol rule (udp|l2tpip) [ 34.247279][ T3529] netem: incorrect gi model size [ 34.252262][ T3529] netem: change failed [ 34.261887][ T3531] loop3: detected capacity change from 0 to 128 [ 34.286323][ T3529] netlink: 'syz.1.16': attribute type 3 has an invalid length. [ 34.726269][ T3554] loop0: detected capacity change from 0 to 512 [ 34.744158][ T3554] ======================================================= [ 34.744158][ T3554] WARNING: The mand mount option has been deprecated and [ 34.744158][ T3554] and is ignored by this kernel. Remove the mand [ 34.744158][ T3554] option from the mount to silence this warning. [ 34.744158][ T3554] ======================================================= [ 34.796976][ T3554] EXT4-fs: Ignoring removed oldalloc option [ 34.811271][ T3554] EXT4-fs error (device loop0): ext4_xattr_inode_iget:437: comm syz.0.26: Parent and EA inode have the same ino 15 [ 34.825092][ T3554] EXT4-fs warning (device loop0): ext4_expand_extra_isize_ea:2853: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 34.848330][ T3554] EXT4-fs error (device loop0): ext4_xattr_inode_iget:437: comm syz.0.26: Parent and EA inode have the same ino 15 [ 34.861159][ T3554] EXT4-fs (loop0): 1 orphan inode deleted [ 34.867468][ T3554] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 34.917004][ T3319] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.944972][ T3562] loop0: detected capacity change from 0 to 128 [ 35.089917][ T3569] loop2: detected capacity change from 0 to 128 [ 35.116074][ T12] kworker/u8:0: attempt to access beyond end of device [ 35.116074][ T12] loop3: rw=1, sector=145, nr_sectors = 16 limit=128 [ 35.130624][ T12] kworker/u8:0: attempt to access beyond end of device [ 35.130624][ T12] loop3: rw=1, sector=169, nr_sectors = 8 limit=128 [ 35.144073][ T12] kworker/u8:0: attempt to access beyond end of device [ 35.144073][ T12] loop3: rw=1, sector=185, nr_sectors = 8 limit=128 [ 35.158241][ T12] kworker/u8:0: attempt to access beyond end of device [ 35.158241][ T12] loop3: rw=1, sector=201, nr_sectors = 8 limit=128 [ 35.171675][ T12] kworker/u8:0: attempt to access beyond end of device [ 35.171675][ T12] loop3: rw=1, sector=217, nr_sectors = 8 limit=128 [ 35.185103][ T12] kworker/u8:0: attempt to access beyond end of device [ 35.185103][ T12] loop3: rw=1, sector=233, nr_sectors = 8 limit=128 [ 35.198496][ T12] kworker/u8:0: attempt to access beyond end of device [ 35.198496][ T12] loop3: rw=1, sector=249, nr_sectors = 8 limit=128 [ 35.212033][ T12] kworker/u8:0: attempt to access beyond end of device [ 35.212033][ T12] loop3: rw=1, sector=265, nr_sectors = 8 limit=128 [ 35.225675][ T12] kworker/u8:0: attempt to access beyond end of device [ 35.225675][ T12] loop3: rw=1, sector=281, nr_sectors = 8 limit=128 [ 35.240212][ T12] kworker/u8:0: attempt to access beyond end of device [ 35.240212][ T12] loop3: rw=1, sector=297, nr_sectors = 8 limit=128 [ 35.271497][ T3572] netlink: 'syz.3.30': attribute type 16 has an invalid length. [ 35.279219][ T3572] netlink: 'syz.3.30': attribute type 17 has an invalid length. [ 35.316225][ T3572] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 35.334988][ T3574] loop3: detected capacity change from 0 to 512 [ 35.341461][ T3575] loop1: detected capacity change from 0 to 128 [ 35.355113][ T3574] EXT4-fs error (device loop3): ext4_xattr_inode_iget:441: inode #18: comm syz.3.30: iget: bad extra_isize 90 (inode size 256) [ 35.369249][ T3574] EXT4-fs (loop3): Remounting filesystem read-only [ 35.376312][ T3574] EXT4-fs warning (device loop3): ext4_evict_inode:274: xattr delete (err -30) [ 35.385484][ T3574] EXT4-fs (loop3): 1 orphan inode deleted [ 35.391706][ T3574] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.432420][ T3320] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.506016][ T3581] loop3: detected capacity change from 0 to 512 [ 35.516675][ T3581] ext2: Unknown parameter 'uid' [ 35.526814][ T3581] netlink: 180 bytes leftover after parsing attributes in process `syz.3.33'. [ 35.537561][ T3581] netlink: 180 bytes leftover after parsing attributes in process `syz.3.33'. [ 35.844993][ T3586] Zero length message leads to an empty skb [ 36.033023][ T3601] netlink: 'syz.4.41': attribute type 16 has an invalid length. [ 36.040891][ T3601] netlink: 'syz.4.41': attribute type 17 has an invalid length. [ 36.064474][ T3601] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 36.092769][ T3601] loop4: detected capacity change from 0 to 512 [ 36.110963][ T3601] EXT4-fs error (device loop4): ext4_xattr_inode_iget:441: inode #18: comm syz.4.41: iget: bad extra_isize 90 (inode size 256) [ 36.130689][ T3601] EXT4-fs (loop4): Remounting filesystem read-only [ 36.137899][ T3601] EXT4-fs warning (device loop4): ext4_evict_inode:274: xattr delete (err -30) [ 36.146926][ T3601] EXT4-fs (loop4): 1 orphan inode deleted [ 36.153319][ T3601] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 36.180240][ T3316] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.206682][ T3610] netlink: 316 bytes leftover after parsing attributes in process `syz.2.47'. [ 36.220954][ T3612] netlink: 'syz.1.46': attribute type 12 has an invalid length. [ 36.228784][ T3612] netlink: 132 bytes leftover after parsing attributes in process `syz.1.46'. [ 36.371121][ T3628] vlan2: entered promiscuous mode [ 36.376365][ T3628] vlan2: entered allmulticast mode [ 36.381605][ T3628] hsr_slave_1: entered allmulticast mode [ 36.388222][ T3630] tipc: Started in network mode [ 36.393140][ T3630] tipc: Node identity 4, cluster identity 4711 [ 36.399427][ T3630] tipc: Node number set to 4 [ 36.415751][ T3628] netlink: 4 bytes leftover after parsing attributes in process `syz.4.53'. [ 36.457566][ T3633] IPv6: Can't replace route, no match found [ 36.643464][ T3647] netlink: 316 bytes leftover after parsing attributes in process `syz.4.60'. [ 36.835715][ T3657] netlink: 83992 bytes leftover after parsing attributes in process `syz.4.64'. [ 36.847273][ T3657] netlink: zone id is out of range [ 36.852440][ T3657] netlink: zone id is out of range [ 36.868308][ T3657] netlink: set zone limit has 8 unknown bytes [ 37.174802][ T3671] lo speed is unknown, defaulting to 1000 [ 37.181731][ T3671] lo speed is unknown, defaulting to 1000 [ 37.187643][ T3674] netlink: 316 bytes leftover after parsing attributes in process `syz.1.72'. [ 37.214174][ T3671] lo speed is unknown, defaulting to 1000 [ 37.224734][ T36] kernel read not supported for file /54/net/netfilter (pid: 36 comm: kworker/1:1) [ 37.236802][ T3675] netlink: 4 bytes leftover after parsing attributes in process `syz.4.71'. [ 37.285488][ T3671] infiniband sz1: set active [ 37.290240][ T3671] infiniband sz1: added lo [ 37.311307][ T3671] RDS/IB: sz1: added [ 37.317808][ T3671] smc: adding ib device sz1 with port count 1 [ 37.330085][ T3671] smc: ib device sz1 port 1 has no pnetid [ 37.365388][ T10] lo speed is unknown, defaulting to 1000 [ 37.371234][ T3393] lo speed is unknown, defaulting to 1000 [ 37.377042][ T3671] lo speed is unknown, defaulting to 1000 [ 37.471704][ T3671] lo speed is unknown, defaulting to 1000 [ 37.539251][ T3698] netlink: 316 bytes leftover after parsing attributes in process `syz.1.83'. [ 37.543713][ T3699] bridge0: entered allmulticast mode [ 37.567457][ T3699] pim6reg: entered allmulticast mode [ 37.602262][ T3704] netlink: 'syz.1.84': attribute type 1 has an invalid length. [ 37.629360][ T3671] lo speed is unknown, defaulting to 1000 [ 37.728689][ T3711] loop1: detected capacity change from 0 to 512 [ 37.772652][ T3704] bond0: (slave bond_slave_1): Releasing backup interface [ 37.784389][ T3711] EXT4-fs error (device loop1): ext4_xattr_inode_iget:441: inode #18: comm syz.1.84: iget: bad extra_isize 90 (inode size 256) [ 37.831833][ T3711] EXT4-fs (loop1): Remounting filesystem read-only [ 37.853393][ T3719] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 37.866663][ T3719] FAULT_INJECTION: forcing a failure. [ 37.866663][ T3719] name failslab, interval 1, probability 0, space 0, times 1 [ 37.879732][ T3719] CPU: 1 UID: 0 PID: 3719 Comm: syz.3.86 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 37.879817][ T3719] Tainted: [W]=WARN [ 37.879824][ T3719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 37.879836][ T3719] Call Trace: [ 37.879841][ T3719] [ 37.879848][ T3719] __dump_stack+0x1d/0x30 [ 37.879870][ T3719] dump_stack_lvl+0xe8/0x140 [ 37.879909][ T3719] dump_stack+0x15/0x1b [ 37.879933][ T3719] should_fail_ex+0x265/0x280 [ 37.879995][ T3719] should_failslab+0x8c/0xb0 [ 37.880056][ T3719] kmem_cache_alloc_noprof+0x50/0x480 [ 37.880160][ T3719] ? skb_clone+0x151/0x1f0 [ 37.880180][ T3719] skb_clone+0x151/0x1f0 [ 37.880204][ T3719] __netlink_deliver_tap+0x2c9/0x500 [ 37.880282][ T3719] netlink_unicast+0x66b/0x690 [ 37.880386][ T3719] netlink_sendmsg+0x58b/0x6b0 [ 37.880415][ T3719] ? __pfx_netlink_sendmsg+0x10/0x10 [ 37.880509][ T3719] __sock_sendmsg+0x145/0x180 [ 37.880542][ T3719] ____sys_sendmsg+0x31e/0x4e0 [ 37.880582][ T3719] ___sys_sendmsg+0x17b/0x1d0 [ 37.880624][ T3719] __x64_sys_sendmsg+0xd4/0x160 [ 37.880726][ T3719] x64_sys_call+0x191e/0x3000 [ 37.880757][ T3719] do_syscall_64+0xd2/0x200 [ 37.880824][ T3719] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 37.880902][ T3719] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 37.880979][ T3719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.881000][ T3719] RIP: 0033:0x7f976384f6c9 [ 37.881018][ T3719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 37.881042][ T3719] RSP: 002b:00007f976226d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 37.881068][ T3719] RAX: ffffffffffffffda RBX: 00007f9763aa6180 RCX: 00007f976384f6c9 [ 37.881085][ T3719] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 000000000000000a [ 37.881101][ T3719] RBP: 00007f976226d090 R08: 0000000000000000 R09: 0000000000000000 [ 37.881201][ T3719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.881297][ T3719] R13: 00007f9763aa6218 R14: 00007f9763aa6180 R15: 00007ffcb9ce0848 [ 37.881323][ T3719] [ 38.154685][ T3719] wireguard0: entered promiscuous mode [ 38.160220][ T3719] wireguard0: entered allmulticast mode [ 38.170550][ T3671] lo speed is unknown, defaulting to 1000 [ 38.184751][ T3711] EXT4-fs warning (device loop1): ext4_evict_inode:274: xattr delete (err -30) [ 38.210870][ T29] kauditd_printk_skb: 250 callbacks suppressed [ 38.210888][ T29] audit: type=1400 audit(1762617949.038:370): avc: denied { write } for pid=3705 comm="syz.2.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 38.294031][ T3711] EXT4-fs (loop1): 1 orphan inode deleted [ 38.354601][ T3711] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.441351][ T29] audit: type=1326 audit(1762617949.068:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3714 comm="syz.4.87" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248430f6c9 code=0x7ffc0000 [ 38.464644][ T29] audit: type=1326 audit(1762617949.068:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3714 comm="syz.4.87" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248430f6c9 code=0x7ffc0000 [ 38.487855][ T29] audit: type=1326 audit(1762617949.068:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3714 comm="syz.4.87" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f248430f6c9 code=0x7ffc0000 [ 38.511203][ T29] audit: type=1326 audit(1762617949.068:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3714 comm="syz.4.87" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248430f6c9 code=0x7ffc0000 [ 38.534622][ T29] audit: type=1326 audit(1762617949.068:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3714 comm="syz.4.87" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248430f6c9 code=0x7ffc0000 [ 38.557993][ T29] audit: type=1326 audit(1762617949.068:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3714 comm="syz.4.87" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f248430f6c9 code=0x7ffc0000 [ 38.581213][ T29] audit: type=1326 audit(1762617949.068:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3714 comm="syz.4.87" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248430f6c9 code=0x7ffc0000 [ 38.604654][ T29] audit: type=1326 audit(1762617949.068:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3714 comm="syz.4.87" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f248430f6c9 code=0x7ffc0000 [ 38.627993][ T29] audit: type=1326 audit(1762617949.068:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3714 comm="syz.4.87" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f248430f6c9 code=0x7ffc0000 [ 38.664076][ T3312] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.675633][ T3671] lo speed is unknown, defaulting to 1000 [ 38.756131][ T3730] loop3: detected capacity change from 0 to 256 [ 38.816952][ T3732] 9pnet_fd: Insufficient options for proto=fd [ 38.818627][ T3736] loop2: detected capacity change from 0 to 256 [ 38.872916][ T3671] syz.0.69 (3671) used greatest stack depth: 9984 bytes left [ 38.875521][ T3732] : renamed from vlan1 (while UP) [ 38.904989][ T3738] bridge0: entered allmulticast mode [ 38.931925][ T3738] pim6reg: entered allmulticast mode [ 38.953677][ T3740] loop1: detected capacity change from 0 to 256 [ 39.141238][ T3750] netlink: 'syz.2.102': attribute type 2 has an invalid length. [ 39.156310][ T3753] loop4: detected capacity change from 0 to 512 [ 39.192405][ T3753] EXT4-fs: dax option not supported [ 39.294053][ T3758] wireguard1: entered promiscuous mode [ 39.299579][ T3758] wireguard1: entered allmulticast mode [ 39.411130][ T3763] netem: incorrect gi model size [ 39.416194][ T3763] netem: change failed [ 39.606412][ T3770] FAULT_INJECTION: forcing a failure. [ 39.606412][ T3770] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 39.619558][ T3770] CPU: 1 UID: 0 PID: 3770 Comm: syz.2.110 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 39.619600][ T3770] Tainted: [W]=WARN [ 39.619608][ T3770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 39.619624][ T3770] Call Trace: [ 39.619633][ T3770] [ 39.619698][ T3770] __dump_stack+0x1d/0x30 [ 39.619720][ T3770] dump_stack_lvl+0xe8/0x140 [ 39.619746][ T3770] dump_stack+0x15/0x1b [ 39.619846][ T3770] should_fail_ex+0x265/0x280 [ 39.619865][ T3770] should_fail+0xb/0x20 [ 39.619884][ T3770] should_fail_usercopy+0x1a/0x20 [ 39.619913][ T3770] strncpy_from_user+0x25/0x230 [ 39.619950][ T3770] ? __kmalloc_cache_noprof+0x249/0x4a0 [ 39.620047][ T3770] __se_sys_memfd_create+0x1ff/0x590 [ 39.620075][ T3770] __x64_sys_memfd_create+0x31/0x40 [ 39.620102][ T3770] x64_sys_call+0x2ac2/0x3000 [ 39.620133][ T3770] do_syscall_64+0xd2/0x200 [ 39.620221][ T3770] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 39.620303][ T3770] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 39.620347][ T3770] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.620419][ T3770] RIP: 0033:0x7f1628a2f6c9 [ 39.620433][ T3770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.620450][ T3770] RSP: 002b:00007f162748ed68 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 39.620469][ T3770] RAX: ffffffffffffffda RBX: 0000000000001058 RCX: 00007f1628a2f6c9 [ 39.620482][ T3770] RDX: 00007f162748edec RSI: 0000000000000000 RDI: 00007f1628ab2960 [ 39.620497][ T3770] RBP: 0000200000001080 R08: 00007f162748eb07 R09: 0000000000000000 [ 39.620514][ T3770] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000001 [ 39.620563][ T3770] R13: 00007f162748edec R14: 00007f162748edf0 R15: 00007ffdb0d7b7a8 [ 39.620586][ T3770] [ 39.815561][ T3772] loop4: detected capacity change from 0 to 512 [ 39.822539][ T3772] ext2: Unknown parameter 'uid' [ 39.871597][ T3775] loop1: detected capacity change from 0 to 256 [ 39.887743][ T3777] FAULT_INJECTION: forcing a failure. [ 39.887743][ T3777] name failslab, interval 1, probability 0, space 0, times 0 [ 39.900552][ T3777] CPU: 1 UID: 0 PID: 3777 Comm: syz.0.112 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 39.900587][ T3777] Tainted: [W]=WARN [ 39.900595][ T3777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 39.900610][ T3777] Call Trace: [ 39.900681][ T3777] [ 39.900690][ T3777] __dump_stack+0x1d/0x30 [ 39.900717][ T3777] dump_stack_lvl+0xe8/0x140 [ 39.900754][ T3777] dump_stack+0x15/0x1b [ 39.900845][ T3777] should_fail_ex+0x265/0x280 [ 39.900871][ T3777] should_failslab+0x8c/0xb0 [ 39.900906][ T3777] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 39.900948][ T3777] ? __alloc_skb+0x101/0x320 [ 39.901067][ T3777] __alloc_skb+0x101/0x320 [ 39.901109][ T3777] netlink_alloc_large_skb+0xbf/0xf0 [ 39.901141][ T3777] netlink_sendmsg+0x3cf/0x6b0 [ 39.901162][ T3777] ? __pfx_netlink_sendmsg+0x10/0x10 [ 39.901184][ T3777] __sock_sendmsg+0x145/0x180 [ 39.901218][ T3777] ____sys_sendmsg+0x31e/0x4e0 [ 39.901304][ T3777] ___sys_sendmsg+0x17b/0x1d0 [ 39.901334][ T3777] __x64_sys_sendmsg+0xd4/0x160 [ 39.901357][ T3777] x64_sys_call+0x191e/0x3000 [ 39.901442][ T3777] do_syscall_64+0xd2/0x200 [ 39.901464][ T3777] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 39.901503][ T3777] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 39.901550][ T3777] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.901579][ T3777] RIP: 0033:0x7f326e68f6c9 [ 39.901655][ T3777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.901675][ T3777] RSP: 002b:00007f326d0f7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 39.901694][ T3777] RAX: ffffffffffffffda RBX: 00007f326e8e5fa0 RCX: 00007f326e68f6c9 [ 39.901706][ T3777] RDX: 0000000020040000 RSI: 0000200000000480 RDI: 0000000000000007 [ 39.901798][ T3777] RBP: 00007f326d0f7090 R08: 0000000000000000 R09: 0000000000000000 [ 39.901811][ T3777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 39.901828][ T3777] R13: 00007f326e8e6038 R14: 00007f326e8e5fa0 R15: 00007ffdc81934d8 [ 39.901852][ T3777] [ 40.230965][ T3782] vhci_hcd: invalid port number 96 [ 40.236229][ T3782] vhci_hcd: default hub control req: 2000 vfffc i0060 l7 [ 40.440822][ T3816] syz.3.127 uses obsolete (PF_INET,SOCK_PACKET) [ 40.582065][ T3828] __nla_validate_parse: 5 callbacks suppressed [ 40.582085][ T3828] netlink: 316 bytes leftover after parsing attributes in process `syz.2.132'. [ 40.636539][ T3831] loop3: detected capacity change from 0 to 1024 [ 40.643237][ T3831] EXT4-fs: Ignoring removed bh option [ 40.663988][ T3831] EXT4-fs: inline encryption not supported [ 40.673589][ T3831] EXT4-fs (loop3): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 40.703699][ T3831] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=c84ce018, mo2=0000] [ 40.718180][ T3831] EXT4-fs error (device loop3): ext4_map_blocks:778: inode #3: block 2: comm syz.3.134: lblock 2 mapped to illegal pblock 2 (length 1) [ 40.735635][ T3831] EXT4-fs error (device loop3): ext4_map_blocks:778: inode #3: block 48: comm syz.3.134: lblock 0 mapped to illegal pblock 48 (length 1) [ 40.817360][ T3831] EXT4-fs error (device loop3): ext4_acquire_dquot:6945: comm syz.3.134: Failed to acquire dquot type 0 [ 40.842824][ T3831] EXT4-fs error (device loop3) in ext4_reserve_inode_write:6313: Corrupt filesystem [ 40.855673][ T3831] EXT4-fs error (device loop3): ext4_evict_inode:254: inode #11: comm syz.3.134: mark_inode_dirty error [ 40.867574][ T3831] EXT4-fs warning (device loop3): ext4_evict_inode:257: couldn't mark inode dirty (err -117) [ 40.878299][ T3831] EXT4-fs (loop3): 1 orphan inode deleted [ 40.884814][ T3831] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.904003][ T31] EXT4-fs error (device loop3): ext4_map_blocks:778: inode #3: block 1: comm kworker/u8:1: lblock 1 mapped to illegal pblock 1 (length 1) [ 40.934054][ T31] EXT4-fs error (device loop3): ext4_release_dquot:6981: comm kworker/u8:1: Failed to release dquot type 0 [ 40.955085][ T3857] loop4: detected capacity change from 0 to 256 [ 41.062986][ T3866] EXT4-fs (loop3): re-mounted 00000000-0000-0000-0000-000000000000. [ 41.146670][ T3874] loop4: detected capacity change from 0 to 512 [ 41.158294][ T3874] ext2: Unknown parameter 'uid' [ 41.191147][ T3874] netlink: 180 bytes leftover after parsing attributes in process `syz.4.150'. [ 41.214367][ T3874] netlink: 180 bytes leftover after parsing attributes in process `syz.4.150'. [ 41.308862][ T3886] tipc: Started in network mode [ 41.313960][ T3886] tipc: Node identity 4, cluster identity 4711 [ 41.320160][ T3886] tipc: Node number set to 4 [ 41.328492][ T3888] loop1: detected capacity change from 0 to 256 [ 41.463025][ T3320] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.474866][ T3320] EXT4-fs error (device loop3): __ext4_get_inode_loc:4832: comm syz-executor: Invalid inode table block 1 in block_group 0 [ 41.488022][ T3320] EXT4-fs error (device loop3) in ext4_reserve_inode_write:6313: Corrupt filesystem [ 41.497872][ T3320] EXT4-fs error (device loop3): ext4_quota_off:7229: inode #3: comm syz-executor: mark_inode_dirty error [ 41.526627][ T3900] loop3: detected capacity change from 0 to 128 [ 41.537295][ T3900] FAT-fs (loop3): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 41.550884][ T3900] FAT-fs (loop3): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 41.589342][ T12] FAT-fs (loop3): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 41.610453][ T3902] netlink: 316 bytes leftover after parsing attributes in process `syz.3.161'. [ 41.814424][ T3910] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 41.939467][ T3916] netlink: 'syz.3.168': attribute type 1 has an invalid length. [ 41.955364][ T3916] 8021q: adding VLAN 0 to HW filter on device bond1 [ 42.044808][ T3922] netlink: 316 bytes leftover after parsing attributes in process `syz.4.172'. [ 42.540134][ T3960] netlink: 316 bytes leftover after parsing attributes in process `syz.2.185'. [ 42.804680][ T3966] bridge0: entered allmulticast mode [ 42.813430][ T3966] pim6reg: entered allmulticast mode [ 43.112676][ T3978] loop4: detected capacity change from 0 to 512 [ 43.265495][ T29] kauditd_printk_skb: 537 callbacks suppressed [ 43.265510][ T29] audit: type=1326 audit(1762617954.098:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3982 comm="syz.1.194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8d3a0f6c9 code=0x7ffc0000 [ 43.474578][ T3978] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 43.498183][ T29] audit: type=1326 audit(1762617954.128:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3982 comm="syz.1.194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8d3a0f6c9 code=0x7ffc0000 [ 43.521582][ T29] audit: type=1326 audit(1762617954.128:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3982 comm="syz.1.194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb8d3a0f6c9 code=0x7ffc0000 [ 43.544833][ T29] audit: type=1326 audit(1762617954.128:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3982 comm="syz.1.194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8d3a0f6c9 code=0x7ffc0000 [ 43.568200][ T29] audit: type=1326 audit(1762617954.128:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3982 comm="syz.1.194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb8d3a0f6c9 code=0x7ffc0000 [ 43.591475][ T29] audit: type=1326 audit(1762617954.128:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3982 comm="syz.1.194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8d3a0f6c9 code=0x7ffc0000 [ 43.614733][ T29] audit: type=1326 audit(1762617954.128:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3982 comm="syz.1.194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb8d3a0f6c9 code=0x7ffc0000 [ 43.638200][ T29] audit: type=1326 audit(1762617954.128:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3982 comm="syz.1.194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8d3a0f6c9 code=0x7ffc0000 [ 43.661507][ T29] audit: type=1326 audit(1762617954.128:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3982 comm="syz.1.194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8d3a0f6c9 code=0x7ffc0000 [ 43.684977][ T29] audit: type=1326 audit(1762617954.128:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3982 comm="syz.1.194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb8d3a0f6c9 code=0x7ffc0000 [ 43.710295][ T3978] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 43.718648][ T3978] EXT4-fs (loop4): orphan cleanup on readonly fs [ 43.734649][ T3978] EXT4-fs error (device loop4): ext4_do_update_inode:5632: inode #16: comm +}[@: corrupted inode contents [ 43.746261][ T3978] EXT4-fs (loop4): Remounting filesystem read-only [ 43.753091][ T3978] EXT4-fs (loop4): 1 truncate cleaned up [ 43.759791][ T187] EXT4-fs (loop4): Quota write (off=5120, len=1024) cancelled because transaction is not started [ 43.770399][ T187] EXT4-fs (loop4): Quota write (off=5120, len=1024) cancelled because transaction is not started [ 43.781461][ T187] EXT4-fs (loop4): Quota write (off=8, len=24) cancelled because transaction is not started [ 43.792567][ T3978] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 43.805566][ T3978] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.867842][ T3971] lo speed is unknown, defaulting to 1000 [ 43.892038][ T4009] FAULT_INJECTION: forcing a failure. [ 43.892038][ T4009] name failslab, interval 1, probability 0, space 0, times 0 [ 43.904805][ T4009] CPU: 1 UID: 0 PID: 4009 Comm: syz.1.202 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 43.904847][ T4009] Tainted: [W]=WARN [ 43.904856][ T4009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 43.904872][ T4009] Call Trace: [ 43.904881][ T4009] [ 43.904890][ T4009] __dump_stack+0x1d/0x30 [ 43.904987][ T4009] dump_stack_lvl+0xe8/0x140 [ 43.905084][ T4009] dump_stack+0x15/0x1b [ 43.905108][ T4009] should_fail_ex+0x265/0x280 [ 43.905134][ T4009] should_failslab+0x8c/0xb0 [ 43.905170][ T4009] kmem_cache_alloc_noprof+0x50/0x480 [ 43.905204][ T4009] ? audit_log_start+0x342/0x720 [ 43.905234][ T4009] audit_log_start+0x342/0x720 [ 43.905277][ T4009] ? kstrtouint+0x76/0xc0 [ 43.905310][ T4009] audit_seccomp+0x48/0x100 [ 43.905353][ T4009] ? __seccomp_filter+0x82d/0x1250 [ 43.905421][ T4009] __seccomp_filter+0x83e/0x1250 [ 43.905453][ T4009] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 43.905500][ T4009] ? vfs_write+0x7e8/0x960 [ 43.905538][ T4009] __secure_computing+0x82/0x150 [ 43.905566][ T4009] syscall_trace_enter+0xcf/0x1e0 [ 43.905682][ T4009] do_syscall_64+0xac/0x200 [ 43.905709][ T4009] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 43.905747][ T4009] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 43.905793][ T4009] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.905895][ T4009] RIP: 0033:0x7fb8d3a0f6c9 [ 43.905952][ T4009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.905976][ T4009] RSP: 002b:00007fb8d246f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 43.906067][ T4009] RAX: ffffffffffffffda RBX: 00007fb8d3c65fa0 RCX: 00007fb8d3a0f6c9 [ 43.906080][ T4009] RDX: 0000000000000005 RSI: 000000000000011b RDI: 0000000000000006 [ 43.906092][ T4009] RBP: 00007fb8d246f090 R08: 0000000000000004 R09: 0000000000000000 [ 43.906127][ T4009] R10: 0000200000000140 R11: 0000000000000246 R12: 0000000000000001 [ 43.906143][ T4009] R13: 00007fb8d3c66038 R14: 00007fb8d3c65fa0 R15: 00007fffd4cb06a8 [ 43.906167][ T4009] [ 44.121909][ T4012] netlink: 'syz.4.186': attribute type 13 has an invalid length. [ 44.189209][ T4012] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 44.219072][ T4020] loop2: detected capacity change from 0 to 512 [ 44.226003][ T4020] ext2: Unknown parameter 'uid' [ 44.253800][ T4020] netlink: 180 bytes leftover after parsing attributes in process `syz.2.206'. [ 44.265282][ T4020] netlink: 180 bytes leftover after parsing attributes in process `syz.2.206'. [ 44.347556][ T4024] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.415014][ T4028] loop3: detected capacity change from 0 to 512 [ 44.421800][ T4028] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 44.454902][ T4033] 9pnet_fd: Insufficient options for proto=fd [ 44.565103][ T4024] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.646076][ T4024] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.975062][ T4043] lo speed is unknown, defaulting to 1000 [ 45.095995][ T4024] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 45.124447][ T4048] xt_hashlimit: max too large, truncated to 1048576 [ 45.201748][ T2662] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.210154][ T4054] bridge0: entered allmulticast mode [ 45.235252][ T4054] pim6reg: entered allmulticast mode [ 45.330149][ T2662] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.381811][ T4052] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 45.401697][ T3393] lo speed is unknown, defaulting to 1000 [ 45.407542][ T2662] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.424821][ T2662] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 45.467657][ T4066] loop4: detected capacity change from 0 to 128 [ 45.480448][ T4066] netlink: 8 bytes leftover after parsing attributes in process `syz.4.221'. [ 45.491685][ T4066] bio_check_eod: 323 callbacks suppressed [ 45.491705][ T4066] syz.4.221: attempt to access beyond end of device [ 45.491705][ T4066] loop4: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 45.510830][ T4066] Buffer I/O error on dev loop4, logical block 2078, async page read [ 45.527738][ T4066] syz.4.221: attempt to access beyond end of device [ 45.527738][ T4066] loop4: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 45.534478][ T4070] 9pnet_fd: Insufficient options for proto=fd [ 45.541101][ T4066] Buffer I/O error on dev loop4, logical block 2078, async page read [ 45.560126][ T4066] syz.4.221: attempt to access beyond end of device [ 45.560126][ T4066] loop4: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 45.572853][ T4070] : renamed from vlan1 (while UP) [ 45.573433][ T4066] Buffer I/O error on dev loop4, logical block 2078, async page read [ 45.589253][ T4066] syz.4.221: attempt to access beyond end of device [ 45.589253][ T4066] loop4: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 45.602524][ T4066] Buffer I/O error on dev loop4, logical block 2078, async page read [ 45.611043][ T4066] syz.4.221: attempt to access beyond end of device [ 45.611043][ T4066] loop4: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 45.624296][ T4066] Buffer I/O error on dev loop4, logical block 2078, async page read [ 45.632441][ T4066] syz.4.221: attempt to access beyond end of device [ 45.632441][ T4066] loop4: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 45.635132][ T4073] pim6reg: left allmulticast mode [ 45.645672][ T4066] Buffer I/O error on dev loop4, logical block 2078, async page read [ 45.646061][ T4066] syz.4.221: attempt to access beyond end of device [ 45.646061][ T4066] loop4: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 45.660136][ T4073] bridge0: left allmulticast mode [ 45.672180][ T4066] Buffer I/O error on dev loop4, logical block 2078, async page read [ 45.685888][ T4066] syz.4.221: attempt to access beyond end of device [ 45.685888][ T4066] loop4: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 45.699186][ T4066] Buffer I/O error on dev loop4, logical block 2078, async page read [ 45.701546][ T4075] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1551 sclass=netlink_xfrm_socket pid=4075 comm=syz.0.224 [ 45.707793][ T4066] syz.4.221: attempt to access beyond end of device [ 45.707793][ T4066] loop4: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 45.722050][ T4075] ref_tracker: memory allocation failure, unreliable refcount tracker. [ 45.732986][ T4066] Buffer I/O error on dev loop4, logical block 2078, async page read [ 45.733794][ T4066] syz.4.221: attempt to access beyond end of device [ 45.733794][ T4066] loop4: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 45.762758][ T4066] Buffer I/O error on dev loop4, logical block 2078, async page read [ 45.828938][ T4082] bridge0: entered allmulticast mode [ 45.838201][ T4082] pim6reg: entered allmulticast mode [ 45.863217][ T4084] netlink: 316 bytes leftover after parsing attributes in process `syz.1.228'. [ 46.343608][ T44] Bluetooth: hci0: sending frame failed (-49) [ 46.349974][ T3560] Bluetooth: hci0: Opcode 0x1003 failed: -49 [ 46.464334][ T4105] loop2: detected capacity change from 0 to 512 [ 46.471298][ T4105] ext2: Unknown parameter 'uid' [ 46.478727][ T4105] netlink: 180 bytes leftover after parsing attributes in process `syz.2.236'. [ 46.488615][ T4105] netlink: 180 bytes leftover after parsing attributes in process `syz.2.236'. [ 46.545250][ T37] Bluetooth: hci0: Frame reassembly failed (-84) [ 46.734874][ T4113] bridge0: entered allmulticast mode [ 46.746668][ T4113] pim6reg: entered allmulticast mode [ 46.794391][ T4114] FAULT_INJECTION: forcing a failure. [ 46.794391][ T4114] name failslab, interval 1, probability 0, space 0, times 0 [ 46.807099][ T4114] CPU: 1 UID: 0 PID: 4114 Comm: syz.4.238 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 46.807139][ T4114] Tainted: [W]=WARN [ 46.807213][ T4114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 46.807226][ T4114] Call Trace: [ 46.807231][ T4114] [ 46.807238][ T4114] __dump_stack+0x1d/0x30 [ 46.807266][ T4114] dump_stack_lvl+0xe8/0x140 [ 46.807293][ T4114] dump_stack+0x15/0x1b [ 46.807324][ T4114] should_fail_ex+0x265/0x280 [ 46.807344][ T4114] should_failslab+0x8c/0xb0 [ 46.807372][ T4114] kmem_cache_alloc_noprof+0x50/0x480 [ 46.807466][ T4114] ? skb_clone+0x151/0x1f0 [ 46.807486][ T4114] skb_clone+0x151/0x1f0 [ 46.807509][ T4114] __netlink_deliver_tap+0x2c9/0x500 [ 46.807597][ T4114] netlink_unicast+0x66b/0x690 [ 46.807709][ T4114] netlink_sendmsg+0x58b/0x6b0 [ 46.807840][ T4114] ? __pfx_netlink_sendmsg+0x10/0x10 [ 46.807867][ T4114] __sock_sendmsg+0x145/0x180 [ 46.807901][ T4114] ____sys_sendmsg+0x31e/0x4e0 [ 46.807951][ T4114] ___sys_sendmsg+0x17b/0x1d0 [ 46.808081][ T4114] __x64_sys_sendmsg+0xd4/0x160 [ 46.808111][ T4114] x64_sys_call+0x191e/0x3000 [ 46.808212][ T4114] do_syscall_64+0xd2/0x200 [ 46.808301][ T4114] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 46.808339][ T4114] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 46.808374][ T4114] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 46.808418][ T4114] RIP: 0033:0x7f248430f6c9 [ 46.808438][ T4114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.808462][ T4114] RSP: 002b:00007f2482d35038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 46.808487][ T4114] RAX: ffffffffffffffda RBX: 00007f2484566180 RCX: 00007f248430f6c9 [ 46.808503][ T4114] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 000000000000000a [ 46.808515][ T4114] RBP: 00007f2482d35090 R08: 0000000000000000 R09: 0000000000000000 [ 46.808526][ T4114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 46.808597][ T4114] R13: 00007f2484566218 R14: 00007f2484566180 R15: 00007ffebbb6f948 [ 46.808623][ T4114] [ 47.067777][ T4114] wireguard0: entered promiscuous mode [ 47.073305][ T4114] wireguard0: entered allmulticast mode [ 47.248617][ T4121] wireguard0: entered promiscuous mode [ 47.254148][ T4121] wireguard0: entered allmulticast mode [ 47.575960][ T4131] netlink: 316 bytes leftover after parsing attributes in process `syz.4.245'. [ 47.716029][ T4138] netlink: 'syz.2.248': attribute type 10 has an invalid length. [ 47.723861][ T4138] netlink: 40 bytes leftover after parsing attributes in process `syz.2.248'. [ 47.998606][ T4153] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 48.074376][ T4153] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 48.158027][ T4153] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 48.222807][ T4153] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 48.256637][ T4166] lo speed is unknown, defaulting to 1000 [ 48.277044][ T29] kauditd_printk_skb: 592 callbacks suppressed [ 48.277059][ T29] audit: type=1326 audit(1762617959.108:1508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4143 comm="syz.4.251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2484306567 code=0x7ffc0000 [ 48.306560][ T29] audit: type=1326 audit(1762617959.108:1509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4143 comm="syz.4.251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f24842ab779 code=0x7ffc0000 [ 48.329822][ T29] audit: type=1326 audit(1762617959.108:1510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4143 comm="syz.4.251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f248430f6c9 code=0x7ffc0000 [ 48.353797][ T29] audit: type=1326 audit(1762617959.158:1511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4152 comm="syz.2.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f1628a2f6c9 code=0x7ffc0000 [ 48.377183][ T29] audit: type=1400 audit(1762617959.158:1512): avc: denied { ioctl } for pid=4152 comm="syz.2.255" path="/dev/sg0" dev="devtmpfs" ino=135 ioctlcmd=0x5878 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 48.402543][ T29] audit: type=1326 audit(1762617959.158:1513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4152 comm="syz.2.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1628a2f6c9 code=0x7ffc0000 [ 48.425856][ T29] audit: type=1326 audit(1762617959.158:1514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4152 comm="syz.2.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1628a2f6c9 code=0x7ffc0000 [ 48.449344][ T29] audit: type=1326 audit(1762617959.158:1515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4152 comm="syz.2.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f1628a315e7 code=0x7ffc0000 [ 48.472723][ T29] audit: type=1326 audit(1762617959.158:1516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4152 comm="syz.2.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7f1628a3155c code=0x7ffc0000 [ 48.495965][ T29] audit: type=1326 audit(1762617959.158:1517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4152 comm="syz.2.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7f1628a31494 code=0x7ffc0000 [ 48.525599][ T2662] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.537201][ T2662] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.548657][ T2662] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.563471][ T2662] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 48.572458][ T4166] netlink: 44 bytes leftover after parsing attributes in process `syz.1.260'. [ 48.593875][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 48.603333][ T3560] Bluetooth: hci0: command 0x1003 tx timeout [ 48.641099][ T4171] FAULT_INJECTION: forcing a failure. [ 48.641099][ T4171] name failslab, interval 1, probability 0, space 0, times 0 [ 48.654299][ T4171] CPU: 1 UID: 0 PID: 4171 Comm: syz.4.262 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 48.654350][ T4171] Tainted: [W]=WARN [ 48.654356][ T4171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 48.654369][ T4171] Call Trace: [ 48.654376][ T4171] [ 48.654418][ T4171] __dump_stack+0x1d/0x30 [ 48.654448][ T4171] dump_stack_lvl+0xe8/0x140 [ 48.654511][ T4171] dump_stack+0x15/0x1b [ 48.654592][ T4171] should_fail_ex+0x265/0x280 [ 48.654612][ T4171] should_failslab+0x8c/0xb0 [ 48.654642][ T4171] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 48.654730][ T4171] ? security_context_to_sid_core+0x69/0x3b0 [ 48.654764][ T4171] kmemdup_nul+0x36/0xc0 [ 48.654803][ T4171] security_context_to_sid_core+0x69/0x3b0 [ 48.654851][ T4171] ? avc_has_perm_noaudit+0x1b1/0x200 [ 48.654875][ T4171] security_context_to_sid+0x2e/0x40 [ 48.654905][ T4171] selinux_lsm_setattr+0x2dc/0x660 [ 48.654940][ T4171] selinux_setprocattr+0x4f/0x70 [ 48.655017][ T4171] security_setprocattr+0x1a7/0x1d0 [ 48.655040][ T4171] proc_pid_attr_write+0x1eb/0x220 [ 48.655071][ T4171] vfs_writev+0x406/0x8b0 [ 48.655182][ T4171] ? __pfx_proc_pid_attr_write+0x10/0x10 [ 48.655220][ T4171] ? mutex_lock+0xd/0x30 [ 48.655302][ T4171] do_writev+0xe7/0x210 [ 48.655336][ T4171] __x64_sys_writev+0x45/0x50 [ 48.655405][ T4171] x64_sys_call+0x1e9a/0x3000 [ 48.655429][ T4171] do_syscall_64+0xd2/0x200 [ 48.655486][ T4171] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 48.655516][ T4171] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 48.655551][ T4171] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 48.655572][ T4171] RIP: 0033:0x7f248430f6c9 [ 48.655657][ T4171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.655717][ T4171] RSP: 002b:00007f2482d77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 48.655737][ T4171] RAX: ffffffffffffffda RBX: 00007f2484565fa0 RCX: 00007f248430f6c9 [ 48.655749][ T4171] RDX: 0000000000000001 RSI: 0000200000000240 RDI: 0000000000000003 [ 48.655762][ T4171] RBP: 00007f2482d77090 R08: 0000000000000000 R09: 0000000000000000 [ 48.655774][ T4171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 48.655786][ T4171] R13: 00007f2484566038 R14: 00007f2484565fa0 R15: 00007ffebbb6f948 [ 48.655804][ T4171] [ 49.029428][ T4193] loop4: detected capacity change from 0 to 7 [ 49.035885][ T4193] loop4: unable to read partition table [ 49.044294][ T4193] loop_reread_partitions: partition scan of loop4 (Sj̖P=ý?}X %`ր5) failed (rc=-5) [ 49.065976][ T4193] pim6reg: left allmulticast mode [ 49.071340][ T4193] bridge0: left allmulticast mode [ 49.084772][ T3003] loop4: unable to read partition table [ 49.116894][ T3003] loop4: unable to read partition table [ 49.145343][ T4205] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 49.195934][ T4212] loop3: detected capacity change from 0 to 764 [ 49.219830][ T4205] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 49.268883][ T4215] FAULT_INJECTION: forcing a failure. [ 49.268883][ T4215] name failslab, interval 1, probability 0, space 0, times 0 [ 49.281599][ T4215] CPU: 1 UID: 0 PID: 4215 Comm: syz.3.279 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 49.281668][ T4215] Tainted: [W]=WARN [ 49.281675][ T4215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 49.281686][ T4215] Call Trace: [ 49.281692][ T4215] [ 49.281699][ T4215] __dump_stack+0x1d/0x30 [ 49.281755][ T4215] dump_stack_lvl+0xe8/0x140 [ 49.281774][ T4215] dump_stack+0x15/0x1b [ 49.281790][ T4215] should_fail_ex+0x265/0x280 [ 49.281817][ T4215] ? audit_log_d_path+0x8d/0x150 [ 49.281922][ T4215] should_failslab+0x8c/0xb0 [ 49.281950][ T4215] __kmalloc_cache_noprof+0x4c/0x4a0 [ 49.281981][ T4215] audit_log_d_path+0x8d/0x150 [ 49.282001][ T4215] audit_log_d_path_exe+0x42/0x70 [ 49.282022][ T4215] audit_log_task+0x1e9/0x250 [ 49.282113][ T4215] ? kstrtouint+0x76/0xc0 [ 49.282148][ T4215] audit_seccomp+0x61/0x100 [ 49.282276][ T4215] ? __seccomp_filter+0x82d/0x1250 [ 49.282302][ T4215] __seccomp_filter+0x83e/0x1250 [ 49.282395][ T4215] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 49.282424][ T4215] ? vfs_write+0x7e8/0x960 [ 49.282446][ T4215] ? __rcu_read_unlock+0x4f/0x70 [ 49.282470][ T4215] ? __fget_files+0x184/0x1c0 [ 49.282570][ T4215] __secure_computing+0x82/0x150 [ 49.282640][ T4215] syscall_trace_enter+0xcf/0x1e0 [ 49.282666][ T4215] do_syscall_64+0xac/0x200 [ 49.282685][ T4215] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 49.282710][ T4215] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 49.282792][ T4215] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 49.282811][ T4215] RIP: 0033:0x7f976384f6c9 [ 49.282825][ T4215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.282899][ T4215] RSP: 002b:00007f97622af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000033 [ 49.282926][ T4215] RAX: ffffffffffffffda RBX: 00007f9763aa5fa0 RCX: 00007f976384f6c9 [ 49.282955][ T4215] RDX: 0000000000000000 RSI: 00002000000002c0 RDI: ffffffffffffffff [ 49.282973][ T4215] RBP: 00007f97622af090 R08: 0000000000000000 R09: 0000000000000000 [ 49.282984][ T4215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 49.282995][ T4215] R13: 00007f9763aa6038 R14: 00007f9763aa5fa0 R15: 00007ffcb9ce0848 [ 49.283012][ T4215] [ 49.514713][ T4205] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 49.560767][ T4205] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 49.706078][ T4229] netlink: 316 bytes leftover after parsing attributes in process `syz.3.285'. [ 49.767173][ T3003] ================================================================== [ 49.775300][ T3003] BUG: KCSAN: data-race in d_delete / lookup_fast [ 49.781741][ T3003] [ 49.784072][ T3003] read-write to 0xffff8881072c6180 of 4 bytes by task 3305 on cpu 0: [ 49.792152][ T3003] d_delete+0x15a/0x180 [ 49.796316][ T3003] d_delete_notify+0x32/0x100 [ 49.801010][ T3003] vfs_unlink+0x30b/0x420 [ 49.805356][ T3003] do_unlinkat+0x24e/0x480 [ 49.809784][ T3003] __x64_sys_unlink+0x2e/0x40 [ 49.814474][ T3003] x64_sys_call+0x2dcf/0x3000 [ 49.819179][ T3003] do_syscall_64+0xd2/0x200 [ 49.823695][ T3003] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 49.829597][ T3003] [ 49.831921][ T3003] read to 0xffff8881072c6180 of 4 bytes by task 3003 on cpu 1: [ 49.839470][ T3003] lookup_fast+0xf0/0x320 [ 49.843818][ T3003] walk_component+0x3f/0x220 [ 49.848429][ T3003] path_lookupat+0xfe/0x2a0 [ 49.852949][ T3003] filename_lookup+0x147/0x340 [ 49.857737][ T3003] do_readlinkat+0x7d/0x320 [ 49.862249][ T3003] __x64_sys_readlink+0x47/0x60 [ 49.867101][ T3003] x64_sys_call+0x28de/0x3000 [ 49.871791][ T3003] do_syscall_64+0xd2/0x200 [ 49.876300][ T3003] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 49.882199][ T3003] [ 49.884519][ T3003] value changed: 0x00300180 -> 0x00004080 [ 49.890233][ T3003] [ 49.892556][ T3003] Reported by Kernel Concurrency Sanitizer on: [ 49.898708][ T3003] CPU: 1 UID: 0 PID: 3003 Comm: udevd Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 49.909567][ T3003] Tainted: [W]=WARN [ 49.913368][ T3003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 49.923434][ T3003] ================================================================== [ 49.994427][ T4238] netlink: 8 bytes leftover after parsing attributes in process `syz.3.288'. [ 50.003301][ T4238] netlink: 8 bytes leftover after parsing attributes in process `syz.3.288'. [ 50.012181][ T4238] netlink: 8 bytes leftover after parsing attributes in process `syz.3.288'. [ 52.868826][ T2662] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.880315][ T2662] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.891650][ T2662] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.902963][ T2662] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0