last executing test programs: 4m23.445954167s ago: executing program 3 (id=1179): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv', 0x2) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) (fail_nth: 9) 4m22.588373998s ago: executing program 3 (id=1190): prlimit64(0x0, 0x7, &(0x7f0000000040)={0x0, 0x100}, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x10, &(0x7f0000000600), 0x1, 0x587, &(0x7f00000045c0)="$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") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) sendmmsg$inet(r1, &(0x7f0000000740), 0x0, 0x2000c044) sendto$inet(r1, &(0x7f0000000c80)="e8", 0x6200, 0x12000000, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000240)=ANY=[], 0x10) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r5 = openat$cgroup_devices(r4, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000140)=ANY=[@ANYBLOB="62a02a3a34096d72"], 0xa) r6 = getpid() r7 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r3, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0xbf34}) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x20, 0x10012, r0, 0x0) setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, &(0x7f0000000000), 0x4) 4m22.588125908s ago: executing program 3 (id=1191): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x2000000) 4m22.55908508s ago: executing program 3 (id=1192): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x46bf832fb3d0390f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x2000000, 0xe, 0x7500, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) 4m22.368905071s ago: executing program 3 (id=1196): mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000)=0xc, 0xfffffffffffffd84) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) fcntl$lock(r1, 0x410, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0xfffe}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, r1, 0xa9525000) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000080), 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) fcntl$lock(r3, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d1, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r2, 0x1, &(0x7f0000000040), 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000200)=0x439a, 0x4) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040)=0xc, 0x4) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f0000000d00)={[{@noauto_da_alloc}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x4c4, &(0x7f0000000d40)="$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") r4 = openat(r3, &(0x7f0000000040)='./file1\x00', 0x343042, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fallocate(r4, 0x0, 0x10, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000002, &(0x7f0000000180)={0xa, 0x4e20, 0xffffffff, @loopback, 0xbf}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000f40)=0x6c, 0x4) recvmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000fc0)=""/4094, 0xffe}, 0x7ffffffe}], 0x1, 0x40002000, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000200)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$inet_tcp_int(r5, 0x6, 0x2, &(0x7f0000000040)=0xce, 0x4) r6 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) ptrace$peekuser(0x3, r6, 0x370) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 4m20.667517511s ago: executing program 3 (id=1217): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xa0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) rt_sigqueueinfo(0xffffffffffffffff, 0x37, &(0x7f0000000640)={0x33, 0x8, 0x738}) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73772cc9f1ba1f848430000005e140602000000040e000a000d000000028000001294", 0x2e}], 0x1, 0x0, 0x0, 0x2400}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000080)={0x0, 0x800}, 0x8) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f00000035c0)={0x0, 0x0, &(0x7f0000003580)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000000f543ca23d1efd2222f5506a9d43b6091cfef1ed939a4621e43ef5c68b159f59e6e6e47bb", @ANYRES16=r3, @ANYBLOB="010000000000000000000c000000180001801400020067656e657665310000000000000000001400038008000200060000000400010004000400"], 0x40}}, 0x4004) 3m48.958340826s ago: executing program 32 (id=1217): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xa0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) rt_sigqueueinfo(0xffffffffffffffff, 0x37, &(0x7f0000000640)={0x33, 0x8, 0x738}) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73772cc9f1ba1f848430000005e140602000000040e000a000d000000028000001294", 0x2e}], 0x1, 0x0, 0x0, 0x2400}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000080)={0x0, 0x800}, 0x8) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f00000035c0)={0x0, 0x0, &(0x7f0000003580)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000000f543ca23d1efd2222f5506a9d43b6091cfef1ed939a4621e43ef5c68b159f59e6e6e47bb", @ANYRES16=r3, @ANYBLOB="010000000000000000000c000000180001801400020067656e657665310000000000000000001400038008000200060000000400010004000400"], 0x40}}, 0x4004) 10.590645753s ago: executing program 2 (id=3135): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000300020400bf050005001201", 0x2e}], 0x1, 0x0, 0x0, 0x20}, 0x0) 9.377948204s ago: executing program 2 (id=3146): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast2, 0x300, 0x0, 0x2, 0x9, 0x0, 0x4}, 0x20) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0xe}, 0x300, 0x0, 0x2, 0x9, 0x0, 0x4}, 0x20) (fail_nth: 4) 8.92817257s ago: executing program 2 (id=3151): r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x1, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x20, 0x2}, {0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x1}}, 0xb8}}, 0x0) sendmmsg$inet(r4, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000}}], 0x300, 0xf1c) write(r1, 0x0, 0x0) write(r1, 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) msync(&(0x7f00004d7000/0x3000)=nil, 0x3000, 0x5) open(&(0x7f0000000200)='./bus\x00', 0x14507e, 0x1) r6 = open(&(0x7f0000000400)='./bus\x00', 0xc40, 0x0) ioctl$BLKROSET(r6, 0x125d, &(0x7f0000000080)=0x3f) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000d00)="8c", 0x1}], 0x1) sendto$inet6(r1, &(0x7f0000000200)='x', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x44) 8.904597051s ago: executing program 2 (id=3154): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000001c40)=""/4096, 0x8ec0}], 0x1, 0x0, 0x0, 0xc08e}, 0x0) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x22fe0}], 0x1}, 0x0) 8.740199751s ago: executing program 2 (id=3157): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@newlink={0x5c, 0x10, 0x403, 0x300, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1e, 0x1f}}, @IFLA_VLAN_ID={0x6, 0x1, 0xffc}]}}}, @IFLA_ALT_IFNAME={0x14, 0x35, 'vlan0\x00'}]}, 0x5c}}, 0x8000) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000003c0)=0x20) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.idle_time\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000240)=r4, 0x4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000001e80)={r2, 0x9}, &(0x7f0000001ec0)=0x8) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x20, 0x1, 0x81, 0xfffff034}, {0x6}]}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) socket$rxrpc(0x21, 0x2, 0xa) r8 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r8, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r8, &(0x7f0000004100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000040c0)=""/29, 0x1d}, 0x2}], 0x400000000000194, 0x2, 0x0) sendto$inet6(r8, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r9 = socket(0x10, 0x3, 0x0) write(r9, &(0x7f0000000080)="1400000052004f030e789e7ee2ce2fa4ff612d27", 0x14) recvmmsg(r9, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x344, 0x10122, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) socket(0x2, 0x3, 0x6) 7.112185915s ago: executing program 0 (id=3185): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@newlink={0x5c, 0x10, 0x403, 0x300, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1e, 0x1f}}, @IFLA_VLAN_ID={0x6, 0x1, 0xffc}]}}}, @IFLA_ALT_IFNAME={0x14, 0x35, 'vlan0\x00'}]}, 0x5c}}, 0x8000) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000003c0)=0x20) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.idle_time\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000240)=r4, 0x4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000001e80)={r2, 0x9}, &(0x7f0000001ec0)=0x8) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x20, 0x1, 0x81, 0xfffff034}, {0x6}]}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) socket$rxrpc(0x21, 0x2, 0xa) r8 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r8, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r8, &(0x7f0000004100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000040c0)=""/29, 0x1d}, 0x2}], 0x400000000000194, 0x2, 0x0) sendto$inet6(r8, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r9 = socket(0x10, 0x3, 0x0) write(r9, &(0x7f0000000080)="1400000052004f030e789e7ee2ce2fa4ff612d27", 0x14) recvmmsg(r9, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x344, 0x10122, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) socket(0x2, 0x3, 0x6) 6.279205064s ago: executing program 5 (id=3191): r0 = eventfd(0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xa0d81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0xffffffff, 0x4, 0x1, 'queue0\x00'}) (async) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000600)={0x0, 0x7a121, 0x0, {0x3, 0xf7}, 0x1, 0x6}) writev(r0, &(0x7f0000000080)=[{&(0x7f0000001100)="02965d1f5ec3de3d", 0x8}, {&(0x7f0000000100)='\'', 0x1}], 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x0, 0x0, 0x6, 0xfff, 0x8001, 0x3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) clock_gettime(0x0, 0x0) (async) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240"], 0x7c}}, 0x0) (async) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x6, 0x6, 0x2, 0x87, 0xffffffff, 0x2}) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1e, 0x0, &(0x7f0000000400)="e30080670000ec67838717bd86dde148f0630962bb87dd44fe42904bcee1", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10000}, 0x50) (async) r3 = syz_open_dev$sg(&(0x7f0000000140), 0x6f5e, 0x1) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000040)=0x85) (async) r4 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x36, 0x0, 0x0) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) r5 = socket(0x10, 0x3, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) (async) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') (async, rerun: 32) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) (rerun: 32) setresuid(0xee01, r8, r8) (async) quotactl_fd$Q_QUOTAON(0xffffffffffffffff, 0xffffffff80000201, r8, &(0x7f00000001c0)='./file0\x00') bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x94) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) (async, rerun: 32) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00'}) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r6, 0xe0, &(0x7f0000003580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000002500)=[0x0, 0x0], &(0x7f0000002540)=[0x0, 0x0, 0x0], 0x0, 0xe6, 0x0, 0x0, 0x10, &(0x7f00000025c0), 0x0, 0x0, 0xdd, 0x8, 0x8, &(0x7f0000002640)}}, 0x10) (async) sendmsg$nl_route_sched(r5, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) (async) epoll_pwait2(0xffffffffffffffff, &(0x7f00000026c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, &(0x7f0000003680)={0x77359400}, 0x0, 0x0) 6.275514684s ago: executing program 0 (id=3192): socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xeb, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) syz_emit_ethernet(0x6e, &(0x7f0000001840)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6000000000383a00fe880000000001000000000000000001ff020000000000000000000000000001"], 0x0) 6.18569273s ago: executing program 5 (id=3195): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x107200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ffd000/0x2000)=nil) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc3c0000000c0a010100000000000000000a0000070900020073797a31000000000900010073797a3100000000100003800c000080080003400000000214000000110001"], 0xa0}, 0x1, 0x0, 0x0, 0x24000850}, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r1, &(0x7f0000000100)={0x0, 0x20, &(0x7f0000000200)={&(0x7f0000002f40)=ANY=[@ANYBLOB="40000000210a010900000000000000000a0000010900020073797a31000000000900010073797a31"], 0x40}, 0x1, 0x0, 0xa6ffffff, 0x24000801}, 0x8000) 6.18528368s ago: executing program 0 (id=3196): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x1}]}, {0x0, [0x5f, 0x61]}}, 0x0, 0x28, 0x0, 0x1, 0x8, 0x0, @void, @value=0x8000000}, 0x28) 6.162832921s ago: executing program 0 (id=3198): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = fsopen(&(0x7f00000001c0)='bpf\x00', 0x0) r1 = fsmount(r0, 0x1, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0xfffff7fffffff77b, 0x640b9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x0, @perf_bp={&(0x7f00000003c0), 0xc}, 0x0, 0x35, 0x6, 0x7, 0x9, 0x6, 0x2, 0x0, 0x7, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) socket(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x30da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) add_key(&(0x7f0000000240)='asymmetric\x00', 0x0, &(0x7f0000000480)="10", 0x1, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000200), &(0x7f0000000240)=0x4) r4 = socket$netlink(0x10, 0x3, 0x0) close(0x3) r5 = socket(0x2, 0x80805, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), r1) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r5, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r7, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0xf6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008891) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x7a, &(0x7f0000000740)={r8, @in6={{0xa, 0x3, 0x6, @mcast1}}}, &(0x7f0000000040)=0x84) sendmmsg$inet_sctp(r5, &(0x7f00000032c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="30000000000000008400000001000000000000017c"], 0x30}], 0x1, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r5, 0x84, 0x6c, &(0x7f00000002c0)={r8}, &(0x7f0000000400)=0x8) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0xe0, 0x0, {0xffe0}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x4, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x4000c00) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)) 6.159876711s ago: executing program 5 (id=3199): r0 = syz_io_uring_setup(0x1104, &(0x7f0000000300)={0x0, 0x0, 0x80, 0x0, 0x8000021e}, &(0x7f00000001c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) socket(0x25, 0x5, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x44810) sendmsg$NFT_BATCH(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a09000000000000000000020000000900020073797a310000000008000440000000000900010573797a310000000008000340000000011400000011000100000000ee2b1b8c9bc28b5230346ca4a8bf4900000000000000000a"], 0x64}}, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0) unshare(0x24020400) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39dcdb) r5 = gettid() r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000500), r6) sendmsg$NFC_CMD_SE_IO(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010028bd7000fcdbdf251b00001008000100", @ANYRES32=r0, @ANYBLOB="080015000100000004001900"], 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x8010) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x80021, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r8) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)=0x0) timer_settime(r10, 0x0, &(0x7f0000000280)={{}, {0x0, 0x3938700}}, 0x0) close(r4) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r12, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r12, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, &(0x7f0000000140)=0x10) setsockopt(r11, 0x84, 0x80, &(0x7f0000000000)='\x00\x00\x00\x00\t\x00\x00\x00', 0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r11, 0x84, 0x5, &(0x7f00000001c0)={r13, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) open(&(0x7f0000000800)='./file0\x00', 0x1, 0x401ffeb86c113d34) memfd_create(&(0x7f00000002c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9\xd6\x1c\x1b*\x9a!?\x7f\xa5\xad\x9a,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\xe1\xba\x1e\x97uX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06Dg\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xc6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\x00@=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd4\xe7\xf2:u\x8a\b\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{&\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\xb5aJ\xb0\x92\x89\xbc\x80\x1ch\x89\xe7\xdd]q\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+\x02\x00\x00\x00\x00\x00\x00\x00\xa5\x94d9\xaf\xcfq\x8b=\x026\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x98\xc3\xfc`\xa6\xba\x1f\x17\v$\x88g\xb4\xad\b\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc00xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000500)=[@in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e23, 0x8, @private2}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0xa98d, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @in={0x2, 0x4e23, @local}], 0x78) syz_clone3(&(0x7f00000002c0)={0x8040000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xce}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="d4010000400000001800000000000000000000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) socket(0x10, 0x4, 0x20400) socket(0x10, 0x803, 0x0) sendmsg$nl_xfrm(r0, 0x0, 0x844) syz_emit_ethernet(0x46, &(0x7f0000000340)=ANY=[@ANYBLOB="ffffffffffff00000000000086dd61f9f79b490e718b789900000000000000000000000000aafc02000000ffebc2f53fc49ec00000008600907800110e00180c0000325900000dd3416bfbb81eca6b3a847f6491a7a506dc9f5a05aaaf3e2d57730a51a3409a586497de4b991e7584c5146760588a26d77591584334140b373b76b290f1dacc8eed360f16835381550f21b248bb78da07"], 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffe, 0x0, 0x2, 0x80000011, 0x6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r4 = socket(0x840000000002, 0x3, 0x100) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(r4, &(0x7f0000005240), 0x4000095, 0x0) 5.32250138s ago: executing program 0 (id=3203): prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x4d}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x8042, 0x0, 0xe723, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TRIM(r4, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x3f6, 0x20, 0x70bd2b, 0x25dfdbfc}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x40) r5 = dup(r3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r5, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x30, "b5e8600b37ae71b99277b5613df7e0ea4f11c5c713cee10cf54f60e56dc2d028b4c9f0c1a5010c466497d7b8513d38aa"}, &(0x7f0000000100)=0x38) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000001c0)={r6, @in6={{0xa, 0x4e23, 0xdb, @empty}}, 0xffb, 0x203, 0xffff18b6, 0x2, 0x330, 0x80000001, 0xdb}, 0x9c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x85, &(0x7f00000012c0)={0x0, @in={{0x2, 0x4c24, @empty}}, 0x6, 0x6}, 0x90) sendmsg$inet6(r5, &(0x7f0000000540)={&(0x7f0000000000)={0xa, 0x4e24, 0x8004, @ipv4={'\x00', '\xff\xff', @loopback}, 0x7fff}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000040)="f0", 0x1}], 0x1}, 0x40054) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x0, 0x0, 0x0, 0x5}, 0x94) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x1000, 0x10ffff, 0xfffffffd, 0x0, 0x8000}) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r7 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r7, &(0x7f0000000600)={&(0x7f00000001c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000640)="80", 0x26892}], 0x1}, 0xfc) sendmsg$inet(r7, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x64010100}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000300)="f8cc0363", 0x4}], 0x1}, 0x4000091) 4.6459301s ago: executing program 5 (id=3206): r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x4, 0xe, &(0x7f0000000b80)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f00000002c0)=r1, 0x4) sendmsg$inet(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x2, 0x4e28, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x12}, @dev={0xac, 0x14, 0x14, 0x3a}}}}], 0x20}, 0x8840) sendmsg$inet(r0, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x20000840) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.bfq.io_queued\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x4c, &(0x7f0000000000), 0x4) write$cgroup_int(r2, &(0x7f0000000000), 0xffffff6a) sendfile(r3, r2, 0x0, 0xffffffff000) r4 = socket$inet6(0xa, 0x805, 0x0) getsockopt$bt_hci(r4, 0x84, 0x81, &(0x7f0000000080)=""/4060, &(0x7f00000010c0)=0xfdc) r5 = getpid() prlimit64(0x0, 0xe, &(0x7f0000000040)={0x80000007, 0x87}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r6 = getpid() sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r8, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x8, 0xc0148, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_clone3(&(0x7f0000000740)={0x8180080, 0x0, 0x0, 0x0, {0x19}, 0x0, 0x0, 0x0, 0x0}, 0x58) socket$inet6_sctp(0xa, 0x5, 0x84) process_vm_writev(r5, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000080)=""/44, 0x2c}], 0x2, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/86, 0x56}], 0x1, 0x0) r9 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r9, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000001800)=""/212, 0xd4}, {&(0x7f0000000200)=""/186, 0xba}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000180)=""/3, 0x3}, {&(0x7f00000009c0)=""/240, 0xf0}, {&(0x7f0000000ac0)=""/80, 0x50}], 0x6, &(0x7f0000001900)=""/219, 0xdb}, 0x1) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fdinfo\x00') read$eventfd(r10, 0x0, 0x0) 4.079678222s ago: executing program 0 (id=3209): r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup2(r0, r0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x38, 0x1403, 0x1, 0x0, 0x25dfdbfb, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'vxcan1\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x200808e4}, 0x8000) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000080)={0x0, 0x1, 0xfc}, 0xc) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f00000002c0)=@req3={0x10000, 0x1, 0x100, 0x100}, 0x1c) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req3={0xad7f, 0x0, 0x2, 0x0, 0x43, 0x80000000, 0x80000001}, 0x1c) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x4) preadv2(r3, &(0x7f00000015c0)=[{&(0x7f0000000140)=""/54, 0x36}, {&(0x7f0000000180)=""/147, 0x93}, {&(0x7f0000000400)=""/133, 0x85}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/22, 0x16}, {&(0x7f00000014c0)=""/216, 0xd8}], 0x6, 0x3, 0x7, 0x12) setsockopt$MRT6_FLUSH(r3, 0x29, 0xd4, &(0x7f00000000c0)=0x8, 0x4) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f848160000005e140602000000000e000a0010000000028000001294", 0x2e}], 0x1}, 0x80054) socket$nl_rdma(0x10, 0x3, 0x14) (async) dup2(r0, r0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) (async) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x38, 0x1403, 0x1, 0x0, 0x25dfdbfb, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'vxcan1\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x200808e4}, 0x8000) (async) socket$kcm(0x10, 0x2, 0x0) (async) socket(0xa, 0x3, 0x3a) (async) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000080)={0x0, 0x1, 0xfc}, 0xc) (async) socket$packet(0x11, 0x2, 0x300) (async) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) (async) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f00000002c0)=@req3={0x10000, 0x1, 0x100, 0x100}, 0x1c) (async) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req3={0xad7f, 0x0, 0x2, 0x0, 0x43, 0x80000000, 0x80000001}, 0x1c) (async) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x4) (async) preadv2(r3, &(0x7f00000015c0)=[{&(0x7f0000000140)=""/54, 0x36}, {&(0x7f0000000180)=""/147, 0x93}, {&(0x7f0000000400)=""/133, 0x85}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/22, 0x16}, {&(0x7f00000014c0)=""/216, 0xd8}], 0x6, 0x3, 0x7, 0x12) (async) setsockopt$MRT6_FLUSH(r3, 0x29, 0xd4, &(0x7f00000000c0)=0x8, 0x4) (async) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f848160000005e140602000000000e000a0010000000028000001294", 0x2e}], 0x1}, 0x80054) (async) 2.878572242s ago: executing program 1 (id=3214): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1, 0x0, 0x2007, 0x1fd}) fcntl$lock(r0, 0x7, &(0x7f0000000280)={0x1, 0x0, 0x2f, 0x9}) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='mounts\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_pts(r1, 0x101840) io_submit(0x0, 0x3, &(0x7f0000000e40)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x9, r1, &(0x7f0000000b80)="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", 0xfb, 0xfffffffffffeffff, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x7, 0x1000, r2, &(0x7f0000000c80)="48cf4052711c4b4da02943cc1fbe33521aec7c41553def15f7dfa0be386059867729bab2c90cd4550103c4e4454d18c473dbc0ade693ad2fd3b6f42189ebab3f44288b2591228d7cbe2000d4704487925008f022b10bff52506d3a333a6824c847db7b93fbabac84a1df3292abbcacba5cdc36ef8bbe91978fbcbdc69286fbbabc0a9489c649ddadaae06151dccd", 0x8e, 0x9, 0x0, 0x2, r0}, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x3, 0x9, r2, &(0x7f0000000d40)="286116ed04bf2b30050e3ae71903a632ca3a90d5aaeeaaac8b7f3ce0f7c78da55d6ba8ca20cab83428229fe139e61b24b565c8cf85684f55e57e9eecd9a124eeaae6a29f729277655b26069a7704f07339911366f0520eb5ccbc1b045bebaf3d7fa49d086dab7082e06d1898095371b5dacb1aa1a946e85c6d70d0a9f9f7544a5eda83ec774c1a58e647bc532cfc6cfcfa", 0x91, 0x7, 0x0, 0x2, r0}]) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x6, 0xd, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRES32, @ANYRES8=0x0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @xdp=0x25, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000700)={0x448, 0x3f4, 0x20, 0x70bd2d, 0x25dfdbfb, {0x5, 0x0, 0x23, [0x2, 0x8, 0x0, 0x6, 0x750, 0x4, 0x9, 0x3, 0xfffffffa, 0xfff, 0xfffffffc, 0x4, 0x10000, 0x4, 0x7, 0x4, 0x9, 0x8, 0x5f7, 0x4, 0x8, 0x401, 0xdff, 0x0, 0xf2b, 0x7, 0x8, 0x100, 0xa1, 0x8, 0x2, 0x1, 0x7, 0x7, 0x7, 0x4, 0x319f, 0x6, 0x3, 0x3, 0x8, 0x7aa, 0x8, 0x8, 0xfffffffe, 0x81, 0x80, 0x100, 0x401, 0x7f, 0x6, 0x1, 0xdc42, 0x8000, 0x3, 0x0, 0x8, 0x0, 0x6, 0x7, 0x2, 0x8, 0x3], [0x0, 0x7fffffff, 0x1, 0x9e1, 0x45f, 0x80000000, 0x0, 0x1, 0x3, 0x3, 0x2, 0x5, 0x10000, 0x9, 0x9694, 0xfffffff9, 0x80000001, 0x7, 0x34, 0x7, 0x5, 0x7e, 0x5, 0x7, 0x3, 0x0, 0x7fff, 0x194, 0xe5d, 0x6, 0xe, 0x4, 0x84, 0xffffffff, 0x9f, 0x61, 0xfffff800, 0xd, 0x52f1, 0x4, 0x5, 0xd2, 0x1, 0x0, 0x6, 0x4, 0x22cd, 0xe, 0x6, 0xffffffcf, 0x63f0, 0x80000000, 0x3, 0xffffffff, 0x5, 0x5, 0x5, 0x36a4e68d, 0x0, 0x7fff, 0x2, 0x6, 0xc44e, 0x8], [0x10, 0x77, 0x5, 0x2, 0xd, 0x7, 0xc9c, 0x1, 0x8, 0x89b, 0x5d4, 0x6, 0x9, 0x6, 0x3, 0xb6b6, 0x1, 0x1ff, 0x3, 0xbc25, 0x9, 0x9, 0x1ff, 0x3b683983, 0x4, 0x80a1, 0x277582aa, 0x1, 0x3, 0xd, 0x8, 0x81, 0x4, 0x7, 0x4, 0x6479, 0x2c, 0x0, 0x2c, 0x9, 0xfff, 0xfffffffb, 0xf, 0x5, 0x2, 0x5, 0x7, 0x36c00000, 0x10001, 0xca8, 0x0, 0xfff, 0x1, 0x8, 0xffffffee, 0x100, 0x4, 0x1, 0x7, 0x7ff, 0x0, 0x9, 0x1000], [0x5, 0x0, 0x0, 0x4, 0x1ff, 0x0, 0x3, 0x1, 0x3, 0x80000001, 0x0, 0x1, 0x8000, 0x5, 0x8, 0x0, 0x80, 0x1167, 0x0, 0x9, 0x9, 0x9, 0x1ff, 0x2, 0x5, 0xe5, 0x10000, 0x1ff, 0xa, 0x2, 0x0, 0x0, 0xee5e, 0x2, 0xedc, 0x2, 0x1, 0x6aa, 0x0, 0x0, 0x0, 0x8001, 0x100, 0x8001, 0x1000, 0x3, 0x5, 0x7f, 0x3, 0x1, 0x9, 0xffc00000, 0x2, 0x3, 0xfffffffb, 0x7, 0x401, 0x80, 0x9, 0x3, 0x7, 0x6, 0x2, 0x9], 0x25, ['-\x00', '/dev/qrtr-tun\x00', '+)\x00', 'cpuacct.usage_sys\x00']}, [""]}, 0x448}, 0x1, 0x0, 0x0, 0x2}, 0x2000c880) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000640)={0x1, &(0x7f0000000040)=[{0x6, 0x4, 0x8f, 0x7fff0000}]}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0xffffff98) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0x40182103, &(0x7f0000000000)={0x0, 0x3, r6, 0x7}) r7 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r7, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0, 0x18}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5000000010008105e9c51c000000000000000000", @ANYRES32=r8, @ANYBLOB="01000000000000002800128009000100766c616e000000001800028006000100000000000c0002000c0000000d00000008000500", @ANYRES64=r5], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x0) unshare(0x6a040000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0x50, r7, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x94173000) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r9, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x30, 0xd, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4010) socket$inet6_udp(0xa, 0x2, 0x0) r10 = gettid() sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="300000001000010001000000ffdbdf2500000000", @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=r10, @ANYBLOB="08000400f9ffffff"], 0x30}, 0x1, 0x0, 0x0, 0x90}, 0x0) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="03040000b50000000100fefffeefffff"], 0xc8) 2.796562687s ago: executing program 5 (id=3215): prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) write(0xffffffffffffffff, &(0x7f0000000040)="1400000052004f030e789e7e27286d000a4149", 0x13) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@newqdisc={0x6c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x3c, 0x2, {{0x6, 0x2, 0x6, 0x2, 0xffffffff}, [@TCA_NETEM_CORRUPT={0xc, 0x4, {0xfffffffd, 0x1}}, @TCA_NETEM_RATE={0x14, 0x6, {0x4, 0x2, 0x0, 0x4}}]}}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x880}, 0x8010) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'dummy0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x1203, 0x48a4d}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x44}, 0x1, 0x0, 0x0, 0x2004d808}, 0x0) unshare(0x2040400) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000040), 0x1b3, 0x0) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000140)={0x2, 0x0, 0x98, &(0x7f0000000080)={0xffffffff, 0x0, 0xa}}) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt6_stats\x00') getdents64(r8, &(0x7f0000002f40)=""/4098, 0x1002) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r9, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x488, 0x0, 0xffffffff, 0xffffffff, 0x1c8, 0xffffffff, 0x3b8, 0xffffffff, 0xffffffff, 0x3b8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x1a0, 0x1c8, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x9, 0xffff0000, 0xc11270e446e71eb1, 0x0, 'syz1\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x1a, 0x1, 0x5}}}, {{@ipv6={@remote, @private2, [0xffffff00, 0xffffffff, 0x0, 0xffffff00], [0xffffffff, 0xffffff00, 0xffffffff, 0xff000000], 'netpci0\x00', 'bridge_slave_1\x00', {}, {0xff}, 0x2b, 0x2, 0x5, 0x5}, 0x0, 0x1d0, 0x1f0, 0x0, {}, [@common=@srh={{0x30}, {0x2, 0xb7, 0x4, 0xe8, 0x6, 0x1268, 0xb2a}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x6, 0x4, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) 2.054432451s ago: executing program 4 (id=3216): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000811}, 0x0) (async) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) (async, rerun: 32) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file2\x00', 0x8, &(0x7f0000000080)={[{@nodioread_nolock}, {@sb={'sb', 0x3d, 0x1}}]}, 0x4, 0x523, &(0x7f00000018c0)="$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") (async, rerun: 32) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) (async) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) (async, rerun: 32) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) (rerun: 32) dup(0xffffffffffffffff) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r2, 0x65, 0x7, &(0x7f0000000100)=0x6, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) sendmsg$can_raw(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@can={{0x0, 0x0, 0x0, 0x1}, 0xfe, 0x1, 0x4, 0x0, "36e932c486d275cc"}, 0x10}, 0x1, 0x0, 0x0, 0x240c4044}, 0x0) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) (async) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) (async, rerun: 64) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (rerun: 64) r5 = fsopen(&(0x7f0000001340)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) (async) r6 = fsmount(r5, 0x0, 0x80) r7 = openat$cgroup_procs(r6, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000001c00), 0x12) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) (rerun: 64) unshare(0x22020400) socket$pptp(0x18, 0x1, 0x2) (async) syz_open_dev$sg(&(0x7f0000000040), 0x1, 0x0) (async) pselect6(0x40, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, &(0x7f0000000000)={0x1f}, 0x0, 0x0, 0x0) 2.002976013s ago: executing program 4 (id=3217): socket$netlink(0x10, 0x3, 0x0) (async) socket$inet(0x2, 0xa, 0x5) (async) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) (async) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) socket$inet6(0xa, 0x2, 0x0) (async) r2 = socket(0x10, 0x803, 0x0) quotactl$Q_GETNEXTQUOTA(0xffffffff80000901, &(0x7f0000000100)=@nbd={'/dev/nbd', 0x0}, 0xee01, &(0x7f00000002c0)) (async) rmdir(&(0x7f0000000340)='./file0/file0\x00') (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r2) (async) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) setns(r4, 0x24020000) (async) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x9902) (async) set_tid_address(0x0) (async) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_ifreq(r5, 0x8931, &(0x7f0000000000)={'bond0\x00', @ifru_hwaddr}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x5) (async) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r6 = io_uring_setup(0x1b7b, &(0x7f0000000040)={0x0, 0xc89d, 0xc000, 0xa, 0x1fb}) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xfff0}, {0xe, 0xffff}}}, 0x24}}, 0x0) (async) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r6, 0x2219, 0x7721, 0x16, 0x0, 0x0) (async) socket$inet6_mptcp(0xa, 0x1, 0x106) getsockname$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x50483}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x1}, @IFLA_IPTUN_LINK={0x8, 0x1, r8}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x4000010) 1.88847178s ago: executing program 4 (id=3218): socket$inet6(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) listen(r1, 0x5) r2 = socket$unix(0x1, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000040)='./file2\x00', 0x1010051, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x8000}}, {@delalloc}, {@grpquota}, {@nouid32}, {@nouid32}, {@data_writeback}]}, 0x2, 0x55d, &(0x7f0000000e80)="$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") prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0d00010004000000010004000000000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x50) io_uring_enter(0xffffffffffffffff, 0x2219, 0x7721, 0x16, 0x0, 0x0) connect$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x1) sendmmsg$inet6(r3, &(0x7f0000007240)=[{{&(0x7f0000000100)={0xa, 0x4e22, 0x6, @mcast2, 0x7}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f00000012c0)="1ce02c7a", 0xfe60}], 0x1}}, {{0x0, 0x0, &(0x7f0000000000), 0x1}}], 0x3, 0x1c000) ppoll(&(0x7f0000000040)=[{r3, 0x240}], 0x1, 0x0, 0x0, 0x0) shutdown(r3, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_elf32(r4, &(0x7f00000008c0)=ANY=[@ANYBLOB="7f454c4604070003070000000000000002000300030000000903000038000000fcffffff0e0000000000200021"], 0x58) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x46000c48) close(r4) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000001c0)='data=writeback', &(0x7f0000000200)=':\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x2014, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x400000000000d07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x12, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='sched\x00') write$selinux_user(r6, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0\x00', 0xd0939199c36b4d28) 1.71987585s ago: executing program 1 (id=3219): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000580)={'veth0\x00', {0x2, 0x4e24, @multicast2}}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000080)=0x3) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000140)=0x2) r4 = syz_io_uring_setup(0xbdc, &(0x7f00000003c0)={0x0, 0xd20a, 0x10, 0x3, 0x40004331, 0x0, r2}, &(0x7f0000000380)=0x0, &(0x7f0000000240)=0x0) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x3, 0xac5) sendmsg$inet6(r7, &(0x7f00000005c0)={&(0x7f0000000000)={0xa, 0x4e20, 0x2dd, @loopback, 0x401}, 0x1c, &(0x7f0000000640)=[{&(0x7f0000000080)="abde14b6d1e70aae71", 0x9}], 0x1}, 0x4) syz_clone3(&(0x7f0000000900)={0xf3982080, &(0x7f0000000040), 0x0, 0x0, {0x26}, 0x0, 0x0, 0x0, 0x0}, 0x58) io_setup(0x8, &(0x7f0000000600)=0x0) r9 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_ENCAP(r9, 0x113, 0x1, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_POLL_REMOVE={0x7, 0x1, 0x0, 0x0, 0x0, 0x12345}) io_uring_enter(r4, 0x847ba, 0x0, 0x1c, 0x0, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r10, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="c4000000190001002dbd700000000000fe880000000000000000000000000001ac14142500000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000c000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000000000000000000000000000000a000000000000feffffffff7f4000020000000000000800000000000000000100000000000045e6feb46ca504eb5450d9000a"], 0xc4}}, 0x0) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="fc0000001900674c0000000000000000e0000001000000000000000000000000e000000200000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES64=r3], 0xfc}}, 0x0) r14 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r14, &(0x7f0000000100)={&(0x7f0000000040)={0xa, 0x4e24, 0x0, @dev, 0xfffffffd}, 0x1c, 0x0}, 0xfdfe) r15 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x40, 0x0, 0x0, 0x7, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYRES16=r8, @ANYRES32=0x0, @ANYBLOB="001c1d636fc7e182ba8d000007ff130000000000", @ANYRES64=r12, @ANYRES32=0x0, @ANYRES64=r13], 0x50) 1.563059069s ago: executing program 1 (id=3220): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000003c0)='./bus\x00', 0xe, &(0x7f0000000540)={[{@init_itable}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1ff}}, {@stripe}, {@noblock_validity}]}, 0x3, 0x451, &(0x7f0000000f80)="$eJzs3M2PU1UbAPDn3k6HlxdwRsQPPtRRNE78mGEAlYULNZq4wMREF7qczAwEKYxhxkQIUTAGV8aYuDcu/Rdc6cYYVyZudW9IiGEDuKq57b1MW9rCdFqq098vuXDOvedyztNzT3vuPS0BjKyp7I8kYntE/B4RE/Vsc4Gp+l/Xr55fuHH1/EIS1erbfyW1cteunl8oihbnbcsz02lE+lkSe9vUu3L23Mn5SmXpTJ6fXT31wezK2XPPnTg1f3zp+NLpg0eOHD409+ILB5/vS5xZm67t+Xh53+433vvqzaNfNMXfEkefTHU7+GS12ufqhmtHQzoZG2JDWJdSRGTdVa6N/4koxVrnTcTrnw61ccBAVavV6rbOhy9UgU0siea8IQ+jovigz+5/i611EvDy4KYfQ3fllfoNUBb39XyrHxmLNC9Tbrm/7aepiHj3wt/fZFsM5jkEAECTH7L5z7Pt5n9pPNBQ7p58bWgyIu6NiJ0RcV9E7IqI+yNqZR+MiIfWWX/rIsmt85/0ck+B3aFs/vdSvrbVPP8rZn8xWcpzO2rxl5NjJypLB/LXZDrKW7L8XJc6fnztty87HWuc/2VbVn8xF8zbcXlsS/M5i/Or8xuJudGVixF7xtrFn9xcCUgiYndE7OmxjhNPf7ev07Hbx99FH9aZqt9GPFXv/wvREn8h6b4+Ofu/qCwdmC2uilv98uultzrVv6H4+yDr//+3vf5vxj+ZNK7Xrqy/jkt/fN7xnqbX6388eaeWHs/3fTS/unpmLmI8OVpvdOP+g2vnFvmifBb/9P72439nrL0SeyMiu4gfjohHIuLRvO2PRcTjEbG/S/w/v/rE+73HP1hZ/Ivr6v+1xHi07mmfKJ386fumSidvif9G9/4/XEtN53vu5P3vTtrV29UMAAAA/z1pRGyPJJ25mU7TmZn69+V3RaSV5ZXVZ44tf3h6sf4bgckop8WTromG56Fz+W19PX8xIupfLSiOH8qfG39d2lrLzywsVxaHHTyMuG0dxn/mz9KwWwcMnN9rwegy/mF0Gf8wuox/GF1txv/WYbQDuPvaff5/MoR2AHdfy/i37AcjxP0/jK6O438z/88/QI3PfxhJK1vj9j+S75oo/qUeT9+0iSj/K5qx8UQ1adu5kQ67YRKDTAz3fQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKBf/gkAAP//qmHgTw==") r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @short={0x2, 0x0, 0xfffe}}, 0x14) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x6000)=nil, 0x6000, 0x4, 0x88012, r1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000080)=ANY=[@ANYBLOB="66000000000000000000000000000000000000005a000000a4699f90ebcd51b16c069b1dcedbff1bed348bbc8e2a77ea9e167f0c6ebc6d04da609ac49e3ce2023851b8c84500ec5b068ad596884abf9a4009168ea6603bda6d6f4d0e3651703037990da5b91e0d4b0032921faa749a0560"], &(0x7f0000000100)=0x7e) r2 = socket$igmp(0x2, 0x3, 0x2) getsockopt$MRT(r2, 0x0, 0xcf, 0xffffffffffffffff, &(0x7f0000001040)) r3 = epoll_create1(0x0) epoll_pwait(r3, &(0x7f0000000140)=[{}], 0x1, 0x2d516fb6, 0x0, 0x0) epoll_wait(r3, &(0x7f0000000040)=[{}], 0x1, 0x400) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="08000000040000000400000007"], 0x48) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000080)={0x1}) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000083a0000000000906c532aee0000000000ffffac1414aafe8000000000000000000000000000aa0200907800"/61], 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x109342, 0x0) pwrite64(r5, &(0x7f0000000140)='2', 0x1, 0x8080c61) 1.486929863s ago: executing program 4 (id=3221): syz_clone3(&(0x7f0000000280)={0x800000, 0x0, 0x0, 0x0, {0x5}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0x0], 0x1}, 0x58) (fail_nth: 9) 1.311752274s ago: executing program 1 (id=3222): r0 = socket$netlink(0x10, 0x3, 0x6) socket$packet(0x11, 0x3, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x3c, r3, 0x1, 0xffffffff, 0x400000, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x10000000}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}]}, 0x3c}, 0x1, 0x620b}, 0x0) socket$kcm(0x2, 0xa, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='freezer.state\x00', 0x275a, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000080)=0x1, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x42c0, 0x0, 0x400000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r5) socket$xdp(0x2c, 0x3, 0x0) sendmsg$IPVS_CMD_SET_DEST(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="540000001000010400000000000000ffff000000", @ANYRES32=0x0, @ANYBLOB="0380000000000000240012800c0001006d6163766c616e00140002800800010008000000060002000100000008001ad01f6893d02861df0045022f1b5dcc2fb5cde42f79d1dfb069aa815cd0d2a0742506603c4121852ee02665511bc29dbccf8dfb0f5c1fd986d7b12bb3413d124af1b5c43a7d759c2d2c4c2df594a5040d33cefefbd0", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES16=r0], 0x54}}, 0x0) sendmmsg(r4, &(0x7f00000002c0), 0x40000000000009f, 0x0) 1.02386026s ago: executing program 4 (id=3223): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x802, 0xfffffffd) prlimit64(0x0, 0xe, &(0x7f0000000400)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000500)=[@in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e23, 0x8, @private2}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0xa98d, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @in={0x2, 0x4e23, @local}], 0x78) syz_clone3(&(0x7f00000002c0)={0x8040000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xce}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="d4010000400000001800000000000000000000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) socket(0x10, 0x4, 0x20400) socket(0x10, 0x803, 0x0) sendmsg$nl_xfrm(r0, 0x0, 0x844) syz_emit_ethernet(0x46, &(0x7f0000000340)=ANY=[@ANYBLOB="ffffffffffff00000000000086dd61f9f79b490e718b789900000000000000000000000000aafc02000000ffebc2f53fc49ec00000008600907800110e00180c0000325900000dd3416bfbb81eca6b3a847f6491a7a506dc9f5a05aaaf3e2d57730a51a3409a586497de4b991e7584c5146760588a26d77591584334140b373b76b290f1dacc8eed360f16835381550f21b248bb78da07"], 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffe, 0x0, 0x2, 0x80000011, 0x6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r4 = socket(0x840000000002, 0x3, 0x100) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(r4, &(0x7f0000005240), 0x4000095, 0x0) 841.351901ms ago: executing program 1 (id=3224): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1000002, 0x4080172, 0xffffffffffffffff, 0x6acc3000) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000005000/0x4000)=nil) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x80, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3660f}, [@IFLA_MASTER={0x8, 0xa, r5}, @IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x6}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x2000c0c1}, 0x40000) 91.482525ms ago: executing program 4 (id=3225): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=@newlink={0x5c, 0x10, 0x403, 0x300, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1e, 0x1f}}, @IFLA_VLAN_ID={0x6, 0x1, 0xffc}]}}}, @IFLA_ALT_IFNAME={0x14, 0x35, 'vlan0\x00'}]}, 0x5c}}, 0x8000) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000003c0)=0x20) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.idle_time\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000240)=r4, 0x4) sendmsg$inet6(r3, &(0x7f0000003100)={&(0x7f0000000080)={0xa, 0x4e21, 0x74, @dev={0xfe, 0x80, '\x00', 0x1d}, 0xc41}, 0x1c, &(0x7f0000000000)=[{&(0x7f0000000040)="8000e859667fbc13", 0x8}], 0x1}, 0x8050) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000001e80)={r2, 0x9}, &(0x7f0000001ec0)=0x8) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040)=0x2, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x20, 0x1, 0x81, 0xfffff034}, {0x6}]}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) socket$rxrpc(0x21, 0x2, 0xa) r7 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r7, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r7, &(0x7f0000004100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000040c0)=""/29, 0x1d}, 0x2}], 0x400000000000194, 0x2, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r8 = socket(0x10, 0x3, 0x0) write(r8, &(0x7f0000000080)="1400000052004f030e789e7ee2ce2fa4ff612d27", 0x14) recvmmsg(r8, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x344, 0x10122, 0x0) socket(0x2, 0x3, 0x6) 385.86µs ago: executing program 1 (id=3226): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000000c0)={0x1d, r1}, 0x18) connect$can_j1939(r0, &(0x7f0000000140)={0x1d, r1, 0x0, {0x1, 0xf1, 0xa8fe8ad4eea2351f}, 0x2}, 0x18) sendmmsg(r0, &(0x7f0000003e40), 0x3fffffffffffe3d, 0xf5) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'ip6_vti0\x00', 0x0}) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x20, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@ETHTOOL_A_CHANNELS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x20}}, 0x0) 0s ago: executing program 2 (id=3175): r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x1, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x20, 0x2}, {0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x1}}, 0xb8}}, 0x0) sendmmsg$inet(r4, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000}}], 0x300, 0xf1c) write(r1, 0x0, 0x0) write(r1, 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) msync(&(0x7f00004d7000/0x3000)=nil, 0x3000, 0x5) open(&(0x7f0000000200)='./bus\x00', 0x14507e, 0x1) r6 = open(&(0x7f0000000400)='./bus\x00', 0xc40, 0x0) ioctl$BLKROSET(r6, 0x125d, &(0x7f0000000080)=0x3f) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000d00)="8c", 0x1}], 0x1) sendto$inet6(r1, &(0x7f0000000200)='x', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1}, 0x44) kernel console output (not intermixed with test programs): 69] bond5: option active_slave: invalid value (bond_slave_1) [ 344.897754][T12176] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2778'. [ 344.918728][T12169] bond5 (unregistering): Released all slaves [ 344.955976][T12176] vlan2: entered promiscuous mode [ 344.976982][T12176] syz_tun: entered promiscuous mode [ 345.148565][ T28] audit: type=1401 audit(5314360045.366:1364): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 345.259229][T12186] FAULT_INJECTION: forcing a failure. [ 345.259229][T12186] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 345.307736][T12186] CPU: 0 UID: 0 PID: 12186 Comm: syz.1.2782 Tainted: G W syzkaller #0 PREEMPT(full) [ 345.307806][T12186] Tainted: [W]=WARN [ 345.307815][T12186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 345.307830][T12186] Call Trace: [ 345.307837][T12186] [ 345.307846][T12186] __dump_stack+0x1d/0x30 [ 345.307878][T12186] dump_stack_lvl+0x95/0xd0 [ 345.307984][T12186] dump_stack+0x15/0x1b [ 345.308006][T12186] should_fail_ex+0x263/0x280 [ 345.308033][T12186] should_fail_alloc_page+0xf2/0x100 [ 345.308206][T12186] __alloc_frozen_pages_noprof+0x108/0x360 [ 345.308413][T12186] alloc_pages_mpol+0xb3/0x260 [ 345.308438][T12186] vma_alloc_folio_noprof+0x1a9/0x300 [ 345.308468][T12186] do_wp_page+0xf62/0x2590 [ 345.308498][T12186] ? __rcu_read_lock+0x36/0x50 [ 345.308588][T12186] handle_mm_fault+0x8c7/0x3020 [ 345.308620][T12186] ? mt_find+0x291/0x3d0 [ 345.308649][T12186] do_user_addr_fault+0x3fd/0x1050 [ 345.308700][T12186] exc_page_fault+0x62/0xa0 [ 345.308730][T12186] asm_exc_page_fault+0x26/0x30 [ 345.308813][T12186] RIP: 0010:rep_movs_alternative+0x4a/0x90 [ 345.308841][T12186] Code: 19 02 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb c5 a4 c3 cc cc cc cc 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 [ 345.308862][T12186] RSP: 0018:ffffc90002c0f998 EFLAGS: 00050206 [ 345.308883][T12186] RAX: ffff888104f91af8 RBX: ffff888130be00c8 RCX: 00000000000095d0 [ 345.308900][T12186] RDX: 0000000000000000 RSI: ffff888130be6cc8 RDI: 0000200000007000 [ 345.308990][T12186] RBP: 0000200000000400 R08: 0000000000000008 R09: 0000000000000000 [ 345.309003][T12186] R10: 0001888130be00c8 R11: 0001888130bf0297 R12: 00002000000105d0 [ 345.309019][T12186] R13: ffffc90002c0fe70 R14: 00000000000101d0 R15: 00007ffffffff000 [ 345.309042][T12186] _copy_to_iter+0x141/0xea0 [ 345.309118][T12186] ? security_inode_alloc+0x37/0x100 [ 345.309146][T12186] ? _raw_spin_lock_bh+0x56/0xb0 [ 345.309170][T12186] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 345.309257][T12186] __skb_datagram_iter+0xc6/0x680 [ 345.309288][T12186] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 345.309317][T12186] ? tipc_wait_for_rcvmsg+0x307/0x370 [ 345.309345][T12186] skb_copy_datagram_iter+0x3f/0x120 [ 345.309424][T12186] tipc_recvstream+0x4d7/0x780 [ 345.309451][T12186] ? __pfx_tipc_recvstream+0x10/0x10 [ 345.309477][T12186] sock_recvmsg+0x139/0x160 [ 345.309512][T12186] ____sys_recvmsg+0xf5/0x280 [ 345.309595][T12186] ___sys_recvmsg+0x11f/0x3b0 [ 345.309635][T12186] __x64_sys_recvmsg+0xd1/0x160 [ 345.309669][T12186] x64_sys_call+0x2b1a/0x3020 [ 345.309759][T12186] do_syscall_64+0x12c/0x370 [ 345.309796][T12186] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 345.309821][T12186] RIP: 0033:0x7f0b0ba2bf79 [ 345.309840][T12186] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 345.309870][T12186] RSP: 002b:00007f0b0a47f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 345.309894][T12186] RAX: ffffffffffffffda RBX: 00007f0b0bca5fa0 RCX: 00007f0b0ba2bf79 [ 345.309910][T12186] RDX: 0000000000001f00 RSI: 0000200000000500 RDI: 0000000000000003 [ 345.309925][T12186] RBP: 00007f0b0a47f090 R08: 0000000000000000 R09: 0000000000000000 [ 345.309940][T12186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 345.310011][T12186] R13: 00007f0b0bca6038 R14: 00007f0b0bca5fa0 R15: 00007ffec573d3b8 [ 345.310033][T12186] [ 346.209026][T12209] netlink: 'syz.0.2792': attribute type 33 has an invalid length. [ 346.553919][T12209] netlink: 36 bytes leftover after parsing attributes in process `syz.0.2792'. [ 346.801473][T12217] dummy0: Device is already in use. [ 347.186776][T12216] xt_recent: Unsupported userspace flags (000000b1) [ 347.263371][T12220] mapping of prio or/and queue is allowed only from OUTPUT/FORWARD/POSTROUTING chains [ 347.354617][T12224] FAULT_INJECTION: forcing a failure. [ 347.354617][T12224] name failslab, interval 1, probability 0, space 0, times 0 [ 347.369220][T12222] netlink: 'syz.0.2794': attribute type 1 has an invalid length. [ 347.394047][T12222] netlink: 16150 bytes leftover after parsing attributes in process `syz.0.2794'. [ 347.414859][T12224] CPU: 0 UID: 0 PID: 12224 Comm: syz.1.2795 Tainted: G W syzkaller #0 PREEMPT(full) [ 347.414922][T12224] Tainted: [W]=WARN [ 347.414930][T12224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 347.414951][T12224] Call Trace: [ 347.414957][T12224] [ 347.414965][T12224] __dump_stack+0x1d/0x30 [ 347.415016][T12224] dump_stack_lvl+0x95/0xd0 [ 347.415045][T12224] dump_stack+0x15/0x1b [ 347.415068][T12224] should_fail_ex+0x263/0x280 [ 347.415092][T12224] should_failslab+0x8c/0xb0 [ 347.415149][T12224] kmem_cache_alloc_node_noprof+0x6d/0x460 [ 347.415221][T12224] ? __alloc_skb+0x2d6/0x690 [ 347.415247][T12224] __alloc_skb+0x2d6/0x690 [ 347.415266][T12224] ? __alloc_skb+0x200/0x690 [ 347.415286][T12224] netlink_ack+0xfd/0x500 [ 347.415391][T12224] ? security_inode_alloc+0x37/0x100 [ 347.415417][T12224] rdma_nl_rcv+0x280/0x5b0 [ 347.415524][T12224] netlink_unicast+0x5c0/0x690 [ 347.415547][T12224] netlink_sendmsg+0x5c8/0x6f0 [ 347.415620][T12224] ? __pfx_netlink_sendmsg+0x10/0x10 [ 347.415675][T12224] ____sys_sendmsg+0x5af/0x600 [ 347.415708][T12224] ___sys_sendmsg+0x195/0x1e0 [ 347.415743][T12224] __x64_sys_sendmsg+0xd4/0x160 [ 347.415779][T12224] x64_sys_call+0x194c/0x3020 [ 347.415877][T12224] do_syscall_64+0x12c/0x370 [ 347.415908][T12224] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 347.415929][T12224] RIP: 0033:0x7f0b0ba2bf79 [ 347.415952][T12224] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 347.415977][T12224] RSP: 002b:00007f0b0a47f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 347.416003][T12224] RAX: ffffffffffffffda RBX: 00007f0b0bca5fa0 RCX: 00007f0b0ba2bf79 [ 347.416020][T12224] RDX: 000000000004c044 RSI: 0000200000000140 RDI: 0000000000000003 [ 347.416033][T12224] RBP: 00007f0b0a47f090 R08: 0000000000000000 R09: 0000000000000000 [ 347.416050][T12224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 347.416128][T12224] R13: 00007f0b0bca6038 R14: 00007f0b0bca5fa0 R15: 00007ffec573d3b8 [ 347.416149][T12224] [ 348.870904][T12252] FAULT_INJECTION: forcing a failure. [ 348.870904][T12252] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 348.895575][T12252] CPU: 1 UID: 0 PID: 12252 Comm: syz.1.2805 Tainted: G W syzkaller #0 PREEMPT(full) [ 348.895613][T12252] Tainted: [W]=WARN [ 348.895620][T12252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 348.895638][T12252] Call Trace: [ 348.895646][T12252] [ 348.895656][T12252] __dump_stack+0x1d/0x30 [ 348.895688][T12252] dump_stack_lvl+0x95/0xd0 [ 348.895773][T12252] dump_stack+0x15/0x1b [ 348.895798][T12252] should_fail_ex+0x263/0x280 [ 348.895871][T12252] should_fail_alloc_page+0xf2/0x100 [ 348.895983][T12252] __alloc_frozen_pages_noprof+0x108/0x360 [ 348.896013][T12252] alloc_pages_mpol+0xb3/0x260 [ 348.896065][T12252] folio_alloc_mpol_noprof+0x39/0x80 [ 348.896159][T12252] shmem_get_folio_gfp+0x3da/0xd60 [ 348.896189][T12252] shmem_write_begin+0xfc/0x1f0 [ 348.896253][T12252] generic_perform_write+0x183/0x490 [ 348.896340][T12252] shmem_file_write_iter+0xc5/0xf0 [ 348.896371][T12252] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 348.896487][T12252] vfs_write+0x5a6/0x9f0 [ 348.896520][T12252] ksys_write+0xdc/0x1a0 [ 348.896554][T12252] __x64_sys_write+0x40/0x50 [ 348.896622][T12252] x64_sys_call+0x27e1/0x3020 [ 348.896652][T12252] do_syscall_64+0x12c/0x370 [ 348.896687][T12252] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 348.896755][T12252] RIP: 0033:0x7f0b0b9ec84e [ 348.896775][T12252] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 348.896828][T12252] RSP: 002b:00007f0b0a47ecf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 348.896849][T12252] RAX: ffffffffffffffda RBX: 00007f0b0a47f6c0 RCX: 00007f0b0b9ec84e [ 348.896921][T12252] RDX: 0000000000100000 RSI: 00007f0b0205f000 RDI: 0000000000000005 [ 348.896938][T12252] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 348.896954][T12252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 348.897029][T12252] R13: 00007f0b0a47eddc R14: 00007f0b0a47ede0 R15: 00007f0b0205f000 [ 348.897047][T12252] [ 349.143550][ T6222] bond0: (slave syz_tun): Releasing backup interface [ 349.169319][ T6222] syz_tun (unregistering): left promiscuous mode [ 349.200046][T12247] loop2: detected capacity change from 0 to 512 [ 349.274805][T12217] lo speed is unknown, defaulting to 1000 [ 349.288691][T12217] lo speed is unknown, defaulting to 1000 [ 349.435796][T12244] lo speed is unknown, defaulting to 1000 [ 349.465686][T12244] lo speed is unknown, defaulting to 1000 [ 349.473831][ T5817] smc: removing ib device syz1 [ 349.534120][T12272] netlink: 'syz.5.2809': attribute type 10 has an invalid length. [ 349.553053][T12254] lo speed is unknown, defaulting to 1000 [ 349.647902][T12254] lo speed is unknown, defaulting to 1000 [ 350.404523][T12286] dummy0: Device is already in use. [ 350.415169][T12262] lo speed is unknown, defaulting to 1000 [ 350.424340][T12262] lo speed is unknown, defaulting to 1000 [ 350.424612][T12286] lo speed is unknown, defaulting to 1000 [ 350.438059][T12286] lo speed is unknown, defaulting to 1000 [ 350.464144][T12288] xt_recent: Unsupported userspace flags (000000b1) [ 350.545864][ T5810] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 350.708721][T12262] chnl_net:caif_netlink_parms(): no params data found [ 350.720918][ T5810] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 350.753366][ T28] audit: type=1401 audit(5314360050.986:1365): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 350.793640][T12262] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.823999][T12262] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.843997][T12262] bridge_slave_0: entered allmulticast mode [ 350.854702][T12262] bridge_slave_0: entered promiscuous mode [ 350.862017][T12262] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.869724][T12262] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.878086][T12262] bridge_slave_1: entered allmulticast mode [ 350.884761][T12262] bridge_slave_1: entered promiscuous mode [ 350.926498][ T5810] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 350.952022][T12262] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 350.964508][T12262] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 350.986829][T12262] team0: Port device team_slave_0 added [ 350.993824][T12262] team0: Port device team_slave_1 added [ 351.011522][T12262] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 351.018889][T12262] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 351.109042][T12262] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 351.135037][ T5810] netdevsim netdevsim0 netdevsim0 (unregistering): left allmulticast mode [ 351.261621][ T5810] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 351.279618][T12262] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 351.294013][T12262] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 351.351724][T12262] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 351.451222][T12262] hsr_slave_0: entered promiscuous mode [ 351.466710][T12262] hsr_slave_1: entered promiscuous mode [ 351.547839][ T5810] veth0_to_bridge: left allmulticast mode [ 351.565128][ T5810] veth0_to_bridge: left promiscuous mode [ 351.577913][ T5810] bridge0: port 3(veth0_to_bridge) entered disabled state [ 351.602506][ T5810] bridge_slave_1: left allmulticast mode [ 351.616625][ T5810] bridge_slave_1: left promiscuous mode [ 351.643866][ T5810] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.717982][ T5810] bridge_slave_0: left allmulticast mode [ 351.728032][ T5810] bridge_slave_0: left promiscuous mode [ 351.777430][ T5810] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.824063][ T4462] SELinux: failure in sel_netif_sid_slow(), invalid network interface (127) [ 351.836246][ T4462] SELinux: failure in sel_netif_sid_slow(), invalid network interface (112) [ 351.858557][ T5810] bond4 (unregistering): (slave gretap1): Releasing active interface [ 351.927090][ T5810] bond3 (unregistering): (slave bridge1): Releasing backup interface [ 351.935848][ T5810] bridge1 (unregistering): left promiscuous mode [ 352.169131][T12320] loop2: detected capacity change from 0 to 4096 [ 352.200594][ T5810] bond4 (unregistering): (slave bridge3): Releasing active interface [ 352.217731][T12320] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2820'. [ 352.236020][T12320] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2820'. [ 352.270144][ T28] audit: type=1326 audit(5314360052.506:1366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12319 comm="syz.2.2820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa8a60dbf79 code=0x7ffc0000 [ 352.311971][ T28] audit: type=1326 audit(5314360052.506:1367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12319 comm="syz.2.2820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa8a60dbf79 code=0x7ffc0000 [ 352.339408][ T28] audit: type=1326 audit(5314360052.506:1368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12319 comm="syz.2.2820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa8a60dbf79 code=0x7ffc0000 [ 352.364291][ T28] audit: type=1326 audit(5314360052.506:1369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12319 comm="syz.2.2820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa8a60dbf79 code=0x7ffc0000 [ 352.390642][ T28] audit: type=1326 audit(5314360052.506:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12319 comm="syz.2.2820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa8a60dbf79 code=0x7ffc0000 [ 352.419116][ T5810] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 352.420196][ T28] audit: type=1326 audit(5314360052.506:1371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12319 comm="syz.2.2820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fa8a60dbf79 code=0x7ffc0000 [ 352.453741][ T28] audit: type=1326 audit(5314360052.506:1372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12319 comm="syz.2.2820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa8a60dbf79 code=0x7ffc0000 [ 352.470238][T12323] loop4: detected capacity change from 0 to 512 [ 352.478806][ T28] audit: type=1326 audit(5314360052.506:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12319 comm="syz.2.2820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa8a60dbf79 code=0x7ffc0000 [ 352.485150][ T5810] bond_slave_0: left promiscuous mode [ 352.509561][ T28] audit: type=1326 audit(5314360052.506:1374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12319 comm="syz.2.2820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7fa8a60dbf79 code=0x7ffc0000 [ 352.538957][ T5810] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 352.564878][ T5810] bond_slave_1: left promiscuous mode [ 352.577656][ T5810] bond0 (unregistering): Released all slaves [ 352.614481][ T5810] team0: Port device bond1 removed [ 352.625712][ T5810] bond1 (unregistering): Released all slaves [ 352.642185][ T5810] bond2 (unregistering): Released all slaves [ 352.651160][ T5810] bond3 (unregistering): Released all slaves [ 352.660253][ T5810] bond4 (unregistering): Released all slaves [ 352.707718][T12328] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2824'. [ 352.746819][T12316] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 352.894690][ T5810] tipc: Disabling bearer [ 352.900726][ T5810] tipc: Left network mode [ 352.906124][T12340] tipc: Enabling of bearer rejected, failed to enable media [ 352.950440][T12316] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 352.983379][T12352] FAULT_INJECTION: forcing a failure. [ 352.983379][T12352] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 352.997158][T12352] CPU: 1 UID: 0 PID: 12352 Comm: syz.4.2825 Tainted: G W syzkaller #0 PREEMPT(full) [ 352.997261][T12352] Tainted: [W]=WARN [ 352.997268][T12352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 352.997279][T12352] Call Trace: [ 352.997286][T12352] [ 352.997294][T12352] __dump_stack+0x1d/0x30 [ 352.997351][T12352] dump_stack_lvl+0x95/0xd0 [ 352.997379][T12352] dump_stack+0x15/0x1b [ 352.997469][T12352] should_fail_ex+0x263/0x280 [ 352.997494][T12352] should_fail+0xb/0x20 [ 352.997542][T12352] should_fail_usercopy+0x1a/0x20 [ 352.997568][T12352] _copy_from_user+0x1c/0xb0 [ 352.997601][T12352] ___sys_sendmsg+0xc1/0x1e0 [ 352.997629][T12352] ? path_openat+0x1b01/0x2050 [ 352.997750][T12352] __sys_sendmmsg+0x185/0x320 [ 352.997815][T12352] __x64_sys_sendmmsg+0x57/0x70 [ 352.997922][T12352] x64_sys_call+0x27aa/0x3020 [ 352.997948][T12352] do_syscall_64+0x12c/0x370 [ 352.997990][T12352] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 352.998016][T12352] RIP: 0033:0x7f8801b5bf79 [ 352.998033][T12352] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 352.998097][T12352] RSP: 002b:00007f880056d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 352.998122][T12352] RAX: ffffffffffffffda RBX: 00007f8801dd6180 RCX: 00007f8801b5bf79 [ 352.998140][T12352] RDX: 0000000004000095 RSI: 0000200000005240 RDI: 0000000000000006 [ 352.998157][T12352] RBP: 00007f880056d090 R08: 0000000000000000 R09: 0000000000000000 [ 352.998173][T12352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 352.998186][T12352] R13: 00007f8801dd6218 R14: 00007f8801dd6180 R15: 00007ffe49ea1c18 [ 352.998208][T12352] [ 353.234294][ T5810] hsr_slave_0: left promiscuous mode [ 353.243164][ T5810] hsr_slave_1: left promiscuous mode [ 353.265241][ T5810] macvlan0: left allmulticast mode [ 353.375366][ T5810] team0 (unregistering): Port device team_slave_1 removed [ 353.385385][ T5810] team0 (unregistering): Port device team_slave_0 removed [ 353.435912][T12316] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 353.645883][ T4167] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.682063][ T4167] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.707109][ T4167] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.729797][ T4167] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.766168][T12387] lo speed is unknown, defaulting to 1000 [ 353.777818][ T5810] IPVS: stop unused estimator thread 0... [ 353.796960][T12387] lo speed is unknown, defaulting to 1000 [ 353.948436][T12262] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 353.982491][T12262] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 353.999338][T12262] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 354.022917][T12262] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 354.168073][T12262] 8021q: adding VLAN 0 to HW filter on device bond0 [ 354.196405][T12262] 8021q: adding VLAN 0 to HW filter on device team0 [ 354.221174][ T583] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.228716][ T583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.392493][T12431] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2835'. [ 354.403242][ T583] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.410445][ T583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.468659][T12431] loop1: detected capacity change from 0 to 1768 [ 354.565836][T12262] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 354.757859][T12262] veth0_vlan: entered promiscuous mode [ 354.776514][T12262] veth1_vlan: entered promiscuous mode [ 354.809639][T12262] veth0_macvtap: entered promiscuous mode [ 354.823731][T12262] veth1_macvtap: entered promiscuous mode [ 354.839791][T12262] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 354.852907][T12262] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 354.865904][ T5832] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 354.881723][ T5832] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 354.910326][ T5832] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 354.921026][ T5832] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 355.251716][T12475] dummy0: Device is already in use. [ 355.522495][T12475] lo speed is unknown, defaulting to 1000 [ 355.539545][T12475] lo speed is unknown, defaulting to 1000 [ 355.646038][T12474] xt_recent: Unsupported userspace flags (000000b1) [ 355.918569][T12487] loop2: detected capacity change from 0 to 8192 [ 355.941308][T12490] IPv6: addrconf: prefix option has invalid lifetime [ 355.948551][T12490] IPv6: addrconf: prefix option has invalid lifetime [ 356.040934][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 356.040950][ T28] audit: type=1401 audit(5314360056.275:1407): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 356.070268][T12483] lo speed is unknown, defaulting to 1000 [ 356.078529][T12483] lo speed is unknown, defaulting to 1000 [ 356.122970][T12496] tipc: New replicast peer: 255.255.255.255 [ 356.145700][T12496] tipc: Enabled bearer , priority 10 [ 356.492537][ T4684] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 356.534452][ T4684] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 356.662317][T12520] xt_hashlimit: max too large, truncated to 1048576 [ 356.722995][T12520] 9p: Could not find request transport: tc` [ 357.096924][T12535] FAULT_INJECTION: forcing a failure. [ 357.096924][T12535] name failslab, interval 1, probability 0, space 0, times 0 [ 357.121205][T12535] CPU: 0 UID: 0 PID: 12535 Comm: syz.0.2863 Tainted: G W syzkaller #0 PREEMPT(full) [ 357.121245][T12535] Tainted: [W]=WARN [ 357.121254][T12535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 357.121270][T12535] Call Trace: [ 357.121279][T12535] [ 357.121290][T12535] __dump_stack+0x1d/0x30 [ 357.121376][T12535] dump_stack_lvl+0x95/0xd0 [ 357.121521][T12535] dump_stack+0x15/0x1b [ 357.121546][T12535] should_fail_ex+0x263/0x280 [ 357.121611][T12535] ? kobject_uevent_env+0x1c0/0x570 [ 357.121642][T12535] should_failslab+0x8c/0xb0 [ 357.121680][T12535] __kmalloc_cache_noprof+0x5f/0x410 [ 357.121707][T12535] kobject_uevent_env+0x1c0/0x570 [ 357.121780][T12535] ? set_capacity_and_notify+0xce/0x230 [ 357.121822][T12535] kobject_uevent+0x1d/0x30 [ 357.121845][T12535] lo_ioctl+0xcc8/0x13a0 [ 357.121934][T12535] ? ioctl_has_perm+0x27e/0x2d0 [ 357.121964][T12535] ? blkdev_common_ioctl+0xc12/0x20b0 [ 357.121988][T12535] ? do_vfs_ioctl+0x84f/0xe70 [ 357.122100][T12535] ? selinux_file_ioctl+0x5f7/0xcb0 [ 357.122131][T12535] ? __rcu_read_unlock+0x4e/0x70 [ 357.122153][T12535] ? __rcu_read_unlock+0x4e/0x70 [ 357.122177][T12535] ? __pfx_lo_ioctl+0x10/0x10 [ 357.122299][T12535] ? __pfx_blkdev_ioctl+0x10/0x10 [ 357.122319][T12535] blkdev_ioctl+0x387/0x460 [ 357.122338][T12535] ? __pfx_blkdev_ioctl+0x10/0x10 [ 357.122424][T12535] __se_sys_ioctl+0xce/0x140 [ 357.122451][T12535] __x64_sys_ioctl+0x43/0x50 [ 357.122503][T12535] x64_sys_call+0x1563/0x3020 [ 357.122547][T12535] do_syscall_64+0x12c/0x370 [ 357.122596][T12535] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 357.122624][T12535] RIP: 0033:0x7efcca24bf79 [ 357.122707][T12535] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 357.122729][T12535] RSP: 002b:00007efcc8c9f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 357.122763][T12535] RAX: ffffffffffffffda RBX: 00007efcca4c5fa0 RCX: 00007efcca24bf79 [ 357.122780][T12535] RDX: 0000000000000000 RSI: 0000000000004c07 RDI: 0000000000000003 [ 357.122805][T12535] RBP: 00007efcc8c9f090 R08: 0000000000000000 R09: 0000000000000000 [ 357.122820][T12535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 357.122890][T12535] R13: 00007efcca4c6038 R14: 00007efcca4c5fa0 R15: 00007ffe2fa12ec8 [ 357.122919][T12535] [ 357.420064][T12510] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 357.449714][T12510] SELinux: failed to load policy [ 357.772599][T12549] loop2: detected capacity change from 0 to 512 [ 357.920266][T12546] FAULT_INJECTION: forcing a failure. [ 357.920266][T12546] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 357.933955][T12546] CPU: 0 UID: 0 PID: 12546 Comm: syz.0.2867 Tainted: G W syzkaller #0 PREEMPT(full) [ 357.934103][T12546] Tainted: [W]=WARN [ 357.934112][T12546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 357.934126][T12546] Call Trace: [ 357.934135][T12546] [ 357.934145][T12546] __dump_stack+0x1d/0x30 [ 357.934185][T12546] dump_stack_lvl+0x95/0xd0 [ 357.934237][T12546] dump_stack+0x15/0x1b [ 357.934347][T12546] should_fail_ex+0x263/0x280 [ 357.934371][T12546] should_fail+0xb/0x20 [ 357.934392][T12546] should_fail_usercopy+0x1a/0x20 [ 357.934416][T12546] _copy_from_user+0x1c/0xb0 [ 357.934449][T12546] sg_new_write+0x748/0x8c0 [ 357.934494][T12546] ? do_vfs_ioctl+0x84f/0xe70 [ 357.934531][T12546] sg_ioctl+0xbf8/0x1350 [ 357.934684][T12546] ? __pfx___sanitizer_cov_trace_const_cmp4+0x10/0x10 [ 357.934777][T12546] ? __pfx_sg_ioctl+0x10/0x10 [ 357.934811][T12546] __se_sys_ioctl+0xce/0x140 [ 357.934900][T12546] __x64_sys_ioctl+0x43/0x50 [ 357.934934][T12546] x64_sys_call+0x1563/0x3020 [ 357.934966][T12546] do_syscall_64+0x12c/0x370 [ 357.935013][T12546] ? generic_smp_call_function_single_interrupt+0x13/0x20 [ 357.935101][T12546] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 357.935123][T12546] RIP: 0033:0x7efcca24bf79 [ 357.935140][T12546] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 357.935160][T12546] RSP: 002b:00007efcc8c9f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 357.935220][T12546] RAX: ffffffffffffffda RBX: 00007efcca4c5fa0 RCX: 00007efcca24bf79 [ 357.935234][T12546] RDX: 0000200000000040 RSI: 0000000000002285 RDI: 0000000000000007 [ 357.935247][T12546] RBP: 00007efcc8c9f090 R08: 0000000000000000 R09: 0000000000000000 [ 357.935299][T12546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 357.935316][T12546] R13: 00007efcca4c6038 R14: 00007efcca4c5fa0 R15: 00007ffe2fa12ec8 [ 357.935338][T12546] [ 358.431986][T12545] loop1: detected capacity change from 0 to 8192 [ 358.662002][ T28] audit: type=1401 audit(5314360058.895:1408): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 359.222548][T12583] loop5: detected capacity change from 0 to 1024 [ 359.604083][T12588] dummy0: Device is already in use. [ 359.723682][T12589] xt_recent: Unsupported userspace flags (000000b1) [ 359.891736][T12588] lo speed is unknown, defaulting to 1000 [ 359.910893][T12588] lo speed is unknown, defaulting to 1000 [ 360.162002][T12580] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 360.243630][T12594] ip6tnl2: entered allmulticast mode [ 360.253765][T12580] SELinux: failed to load policy [ 360.633250][T12609] loop4: detected capacity change from 0 to 128 [ 360.670956][T12612] loop5: detected capacity change from 0 to 164 [ 360.706643][T12614] netlink: 20 bytes leftover after parsing attributes in process `syz.2.2887'. [ 360.825368][T12618] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2889'. [ 360.911477][T12622] loop0: detected capacity change from 0 to 512 [ 360.990753][T12626] loop5: detected capacity change from 0 to 512 [ 360.992345][ T28] audit: type=1400 audit(5314360061.224:1409): avc: denied { listen } for pid=12623 comm="syz.2.2892" path=0000204E0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 361.005333][T12626] EXT4-fs (loop5): blocks per group (8192) and clusters per group (2304) inconsistent [ 361.122317][T12626] loop5: detected capacity change from 0 to 128 [ 361.215961][ T28] audit: type=1401 audit(5314360061.414:1410): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 361.298626][T12636] loop5: detected capacity change from 0 to 128 [ 361.307951][T12636] FAULT_INJECTION: forcing a failure. [ 361.307951][T12636] name failslab, interval 1, probability 0, space 0, times 0 [ 361.322751][T12636] CPU: 0 UID: 0 PID: 12636 Comm: syz.5.2896 Tainted: G W syzkaller #0 PREEMPT(full) [ 361.322855][T12636] Tainted: [W]=WARN [ 361.322862][T12636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 361.322874][T12636] Call Trace: [ 361.322928][T12636] [ 361.322938][T12636] __dump_stack+0x1d/0x30 [ 361.323089][T12636] dump_stack_lvl+0x95/0xd0 [ 361.323115][T12636] dump_stack+0x15/0x1b [ 361.323135][T12636] should_fail_ex+0x263/0x280 [ 361.323158][T12636] ? __add_metainfo+0x5a/0x220 [ 361.323179][T12636] should_failslab+0x8c/0xb0 [ 361.323254][T12636] __kmalloc_cache_noprof+0x5f/0x410 [ 361.323279][T12636] __add_metainfo+0x5a/0x220 [ 361.323307][T12636] use_all_metadata+0x91/0x140 [ 361.323334][T12636] tcf_ife_init+0x74f/0x8e0 [ 361.323365][T12636] ? __pfx_tcf_ife_init+0x10/0x10 [ 361.323392][T12636] tcf_action_init_1+0x395/0x4d0 [ 361.323503][T12636] tcf_action_init+0x29c/0x700 [ 361.323542][T12636] ? vsnprintf+0x7ee/0x860 [ 361.323664][T12636] tc_ctl_action+0x29b/0x830 [ 361.323714][T12636] ? __pfx_tc_ctl_action+0x10/0x10 [ 361.323806][T12636] rtnetlink_rcv_msg+0x6a7/0x720 [ 361.323906][T12636] netlink_rcv_skb+0x123/0x220 [ 361.324002][T12636] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 361.324110][T12636] rtnetlink_rcv+0x1c/0x30 [ 361.324140][T12636] netlink_unicast+0x5c0/0x690 [ 361.324168][T12636] netlink_sendmsg+0x5c8/0x6f0 [ 361.324201][T12636] ? __pfx_netlink_sendmsg+0x10/0x10 [ 361.324316][T12636] ____sys_sendmsg+0x5af/0x600 [ 361.324344][T12636] ___sys_sendmsg+0x195/0x1e0 [ 361.324387][T12636] __x64_sys_sendmsg+0xd4/0x160 [ 361.324423][T12636] x64_sys_call+0x194c/0x3020 [ 361.324504][T12636] do_syscall_64+0x12c/0x370 [ 361.324539][T12636] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 361.324607][T12636] RIP: 0033:0x7f97b0f4bf79 [ 361.324624][T12636] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 361.324646][T12636] RSP: 002b:00007f97af986028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 361.324729][T12636] RAX: ffffffffffffffda RBX: 00007f97b11c6090 RCX: 00007f97b0f4bf79 [ 361.324746][T12636] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000007 [ 361.324759][T12636] RBP: 00007f97af986090 R08: 0000000000000000 R09: 0000000000000000 [ 361.324794][T12636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 361.324810][T12636] R13: 00007f97b11c6128 R14: 00007f97b11c6090 R15: 00007ffe16a19ec8 [ 361.324904][T12636] [ 361.590216][T12635] loop4: detected capacity change from 0 to 1764 [ 361.705351][T12639] loop4: detected capacity change from 0 to 1764 [ 361.730985][T12639] FAULT_INJECTION: forcing a failure. [ 361.730985][T12639] name failslab, interval 1, probability 0, space 0, times 0 [ 361.765203][T12639] CPU: 0 UID: 0 PID: 12639 Comm: syz.4.2898 Tainted: G W syzkaller #0 PREEMPT(full) [ 361.765241][T12639] Tainted: [W]=WARN [ 361.765248][T12639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 361.765260][T12639] Call Trace: [ 361.765267][T12639] [ 361.765276][T12639] __dump_stack+0x1d/0x30 [ 361.765466][T12639] dump_stack_lvl+0x95/0xd0 [ 361.765487][T12639] dump_stack+0x15/0x1b [ 361.765588][T12639] should_fail_ex+0x263/0x280 [ 361.765617][T12639] ? cgroup_show_path+0x6a/0x2b0 [ 361.765650][T12639] should_failslab+0x8c/0xb0 [ 361.765801][T12639] __kmalloc_cache_noprof+0x5f/0x410 [ 361.765826][T12639] ? __pfx_cgroup_show_path+0x10/0x10 [ 361.765865][T12639] cgroup_show_path+0x6a/0x2b0 [ 361.765904][T12639] ? kernfs_sop_show_path+0xa4/0xf0 [ 361.765925][T12639] ? __pfx_cgroup_show_path+0x10/0x10 [ 361.765959][T12639] kernfs_sop_show_path+0xb6/0xf0 [ 361.766027][T12639] ? __pfx_kernfs_sop_show_path+0x10/0x10 [ 361.766048][T12639] show_path+0x5a/0x80 [ 361.766070][T12639] show_mountinfo+0xe5/0x690 [ 361.766167][T12639] m_show+0x3e/0x50 [ 361.766194][T12639] traverse+0x149/0x3a0 [ 361.766304][T12639] seq_lseek+0xb5/0x170 [ 361.766362][T12639] __x64_sys_lseek+0xe8/0x160 [ 361.766392][T12639] x64_sys_call+0x27ec/0x3020 [ 361.766420][T12639] do_syscall_64+0x12c/0x370 [ 361.766513][T12639] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 361.766540][T12639] RIP: 0033:0x7f8801b5bf79 [ 361.766559][T12639] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 361.766578][T12639] RSP: 002b:00007f88005af028 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 361.766657][T12639] RAX: ffffffffffffffda RBX: 00007f8801dd5fa0 RCX: 00007f8801b5bf79 [ 361.766674][T12639] RDX: 0000000000000000 RSI: 000000000000fffd RDI: 0000000000000004 [ 361.766690][T12639] RBP: 00007f88005af090 R08: 0000000000000000 R09: 0000000000000000 [ 361.766706][T12639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 361.766720][T12639] R13: 00007f8801dd6038 R14: 00007f8801dd5fa0 R15: 00007ffe49ea1c18 [ 361.766743][T12639] [ 362.109676][T12645] loop2: detected capacity change from 0 to 512 [ 362.169940][T12645] loop2: detected capacity change from 0 to 1024 [ 362.231318][T12653] lo speed is unknown, defaulting to 1000 [ 362.278628][T12657] syzkaller0: entered promiscuous mode [ 362.316231][T12657] syzkaller0: entered allmulticast mode [ 362.347015][T12653] lo speed is unknown, defaulting to 1000 [ 362.585503][T12642] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 362.598921][T12642] SELinux: failed to load policy [ 362.784060][T12682] dummy0: Device is already in use. [ 362.902789][T12683] xt_recent: Unsupported userspace flags (000000b1) [ 363.053901][T12682] lo speed is unknown, defaulting to 1000 [ 363.072450][T12682] lo speed is unknown, defaulting to 1000 [ 363.282357][T12681] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 363.290815][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 363.732805][ T28] audit: type=1326 audit(5314360063.964:1411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12691 comm="syz.5.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f97b0f4bf79 code=0x7ffc0000 [ 363.865516][ T28] audit: type=1326 audit(5314360063.964:1412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12691 comm="syz.5.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f97b0f4bf79 code=0x7ffc0000 [ 363.892213][ T28] audit: type=1326 audit(5314360063.964:1413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12691 comm="syz.5.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f97b0f4bf79 code=0x7ffc0000 [ 363.926354][T12705] netlink: 48 bytes leftover after parsing attributes in process `syz.5.2917'. [ 363.960015][T12705] netlink: 48 bytes leftover after parsing attributes in process `syz.5.2917'. [ 363.960725][ T28] audit: type=1326 audit(5314360063.964:1414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12691 comm="syz.5.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f97b0f4bf79 code=0x7ffc0000 [ 364.028353][T12711] netlink: 'syz.5.2921': attribute type 21 has an invalid length. [ 364.036587][ T28] audit: type=1326 audit(5314360063.964:1415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12691 comm="syz.5.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f97b0f4bf79 code=0x7ffc0000 [ 364.036624][ T28] audit: type=1326 audit(5314360063.964:1416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12691 comm="syz.5.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7f97b0f4bf79 code=0x7ffc0000 [ 364.036662][ T28] audit: type=1326 audit(5314360063.964:1417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12691 comm="syz.5.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f97b0f4bf79 code=0x7ffc0000 [ 364.036692][ T28] audit: type=1326 audit(5314360063.964:1418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12691 comm="syz.5.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7f97b0f4bf79 code=0x7ffc0000 [ 364.036719][ T28] audit: type=1326 audit(5314360063.964:1419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12691 comm="syz.5.2914" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f97b0f4bf79 code=0x7ffc0000 [ 364.086870][T12712] FAULT_INJECTION: forcing a failure. [ 364.086870][T12712] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 364.140333][T12711] netlink: 128 bytes leftover after parsing attributes in process `syz.5.2921'. [ 364.162374][T12712] CPU: 1 UID: 0 PID: 12712 Comm: syz.0.2920 Tainted: G W syzkaller #0 PREEMPT(full) [ 364.162409][T12712] Tainted: [W]=WARN [ 364.162466][T12712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 364.162502][T12712] Call Trace: [ 364.162511][T12712] [ 364.162520][T12712] __dump_stack+0x1d/0x30 [ 364.162548][T12712] dump_stack_lvl+0x95/0xd0 [ 364.162571][T12712] dump_stack+0x15/0x1b [ 364.162721][T12712] should_fail_ex+0x263/0x280 [ 364.162884][T12712] should_fail+0xb/0x20 [ 364.162906][T12712] should_fail_usercopy+0x1a/0x20 [ 364.162931][T12712] _copy_to_user+0x20/0xa0 [ 364.162960][T12712] simple_read_from_buffer+0xb5/0x130 [ 364.163074][T12712] proc_fail_nth_read+0x10e/0x150 [ 364.163101][T12712] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 364.163126][T12712] vfs_read+0x1ab/0x7f0 [ 364.163225][T12712] ? __rcu_read_unlock+0x4e/0x70 [ 364.163247][T12712] ? __fget_files+0x184/0x1c0 [ 364.163268][T12712] ? mutex_lock+0x57/0x90 [ 364.163294][T12712] ksys_read+0xdc/0x1a0 [ 364.163323][T12712] __x64_sys_read+0x40/0x50 [ 364.163432][T12712] x64_sys_call+0x2886/0x3020 [ 364.163514][T12712] do_syscall_64+0x12c/0x370 [ 364.163568][T12712] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 364.163591][T12712] RIP: 0033:0x7efcca20c84e [ 364.163620][T12712] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 364.163639][T12712] RSP: 002b:00007efcc8c9efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 364.163662][T12712] RAX: ffffffffffffffda RBX: 00007efcc8c9f6c0 RCX: 00007efcca20c84e [ 364.163677][T12712] RDX: 000000000000000f RSI: 00007efcc8c9f0a0 RDI: 0000000000000003 [ 364.163692][T12712] RBP: 00007efcc8c9f090 R08: 0000000000000000 R09: 0000000000000000 [ 364.163706][T12712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.163720][T12712] R13: 00007efcca4c6038 R14: 00007efcca4c5fa0 R15: 00007ffe2fa12ec8 [ 364.163740][T12712] [ 364.293430][T12719] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12719 comm=syz.1.2911 [ 364.325586][T12711] netlink: 'syz.5.2921': attribute type 5 has an invalid length. [ 364.414827][T12711] netlink: 'syz.5.2921': attribute type 6 has an invalid length. [ 364.422988][T12711] netlink: 3 bytes leftover after parsing attributes in process `syz.5.2921'. [ 364.474060][T12723] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2923'. [ 364.688968][T12717] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 365.224929][T12679] lo speed is unknown, defaulting to 1000 [ 365.233258][T12679] lo speed is unknown, defaulting to 1000 [ 365.327463][T12727] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2561 sclass=netlink_tcpdiag_socket pid=12727 comm=syz.0.2923 [ 365.385436][T12725] vfat: Unknown parameter '˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙01777777777777777777777' [ 365.472441][T12734] netlink: 'syz.4.2928': attribute type 10 has an invalid length. [ 365.502651][T12734] bond0: (slave dummy0): Releasing backup interface [ 365.565933][T12738] netlink: 'syz.4.2928': attribute type 10 has an invalid length. [ 365.603153][T12734] dummy0: entered promiscuous mode [ 365.628168][T12734] team0: Port device dummy0 added [ 365.742007][T12738] dummy0: left promiscuous mode [ 365.928889][T12750] xt_recent: Unsupported userspace flags (000000b1) [ 366.559021][T12738] team0: Port device dummy0 removed [ 366.577685][T12738] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 366.607826][T12747] 9p: Bad value for 'rfdno' [ 366.921474][T12753] ipvlan2: entered allmulticast mode [ 366.966346][T12756] xt_recent: Unsupported userspace flags (000000b1) [ 367.130641][T12744] dummy0: Device is already in use. [ 367.152078][T12745] lo speed is unknown, defaulting to 1000 [ 367.158595][T12745] lo speed is unknown, defaulting to 1000 [ 367.281735][T12752] lo speed is unknown, defaulting to 1000 [ 367.288221][T12752] lo speed is unknown, defaulting to 1000 [ 367.310240][T12768] FAULT_INJECTION: forcing a failure. [ 367.310240][T12768] name failslab, interval 1, probability 0, space 0, times 0 [ 367.409063][T12768] CPU: 0 UID: 0 PID: 12768 Comm: syz.0.2937 Tainted: G W syzkaller #0 PREEMPT(full) [ 367.409097][T12768] Tainted: [W]=WARN [ 367.409105][T12768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 367.409120][T12768] Call Trace: [ 367.409127][T12768] [ 367.409135][T12768] __dump_stack+0x1d/0x30 [ 367.409260][T12768] dump_stack_lvl+0x95/0xd0 [ 367.409289][T12768] dump_stack+0x15/0x1b [ 367.409312][T12768] should_fail_ex+0x263/0x280 [ 367.409382][T12768] ? rtnl_newlink+0x5c/0x1330 [ 367.409409][T12768] should_failslab+0x8c/0xb0 [ 367.409445][T12768] __kmalloc_cache_noprof+0x5f/0x410 [ 367.409520][T12768] ? __pfx_rtnl_newlink+0x10/0x10 [ 367.409548][T12768] rtnl_newlink+0x5c/0x1330 [ 367.409642][T12768] ? perf_trace_run_bpf_submit+0xac/0x110 [ 367.409756][T12768] ? perf_trace_kmem_cache_free+0x130/0x170 [ 367.409865][T12768] ? __memcg_slab_free_hook+0x154/0x250 [ 367.409890][T12768] ? __rcu_read_unlock+0x4e/0x70 [ 367.409909][T12768] ? avc_has_perm_noaudit+0xab/0x130 [ 367.409942][T12768] ? cred_has_capability+0x224/0x2a0 [ 367.410003][T12768] ? selinux_capable+0x31/0x40 [ 367.410031][T12768] ? security_capable+0x7b/0x90 [ 367.410155][T12768] ? ns_capable+0x7c/0xb0 [ 367.410190][T12768] ? __pfx_rtnl_newlink+0x10/0x10 [ 367.410217][T12768] rtnetlink_rcv_msg+0x64b/0x720 [ 367.410256][T12768] netlink_rcv_skb+0x123/0x220 [ 367.410286][T12768] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 367.410337][T12768] rtnetlink_rcv+0x1c/0x30 [ 367.410366][T12768] netlink_unicast+0x5c0/0x690 [ 367.410395][T12768] netlink_sendmsg+0x5c8/0x6f0 [ 367.410429][T12768] ? __pfx_netlink_sendmsg+0x10/0x10 [ 367.410494][T12768] ____sys_sendmsg+0x5af/0x600 [ 367.410538][T12768] ___sys_sendmsg+0x195/0x1e0 [ 367.410665][T12768] __x64_sys_sendmsg+0xd4/0x160 [ 367.410721][T12768] x64_sys_call+0x194c/0x3020 [ 367.410745][T12768] do_syscall_64+0x12c/0x370 [ 367.410775][T12768] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 367.410799][T12768] RIP: 0033:0x7efcca24bf79 [ 367.410853][T12768] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 367.410874][T12768] RSP: 002b:00007efcc8c9f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 367.410900][T12768] RAX: ffffffffffffffda RBX: 00007efcca4c5fa0 RCX: 00007efcca24bf79 [ 367.410917][T12768] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000005 [ 367.410940][T12768] RBP: 00007efcc8c9f090 R08: 0000000000000000 R09: 0000000000000000 [ 367.410956][T12768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 367.410994][T12768] R13: 00007efcca4c6038 R14: 00007efcca4c5fa0 R15: 00007ffe2fa12ec8 [ 367.411016][T12768] [ 367.743878][T12774] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 367.752442][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 367.764478][ T28] kauditd_printk_skb: 25 callbacks suppressed [ 367.764499][ T28] audit: type=1401 audit(5314360067.994:1445): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 367.975533][T12781] set_capacity_and_notify: 4 callbacks suppressed [ 367.975554][T12781] loop4: detected capacity change from 0 to 2048 [ 368.051423][ T8893] Alternate GPT is invalid, using primary GPT. [ 368.066247][ T8893] loop4: p1 p2 p3 [ 368.085804][T12781] Alternate GPT is invalid, using primary GPT. [ 368.093559][T12781] loop4: p1 p2 p3 [ 368.097438][ T28] audit: type=1400 audit(5314360068.314:1447): avc: denied { open } for pid=12778 comm="syz.0.2942" path="/dev/rtc0" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 368.133947][T12779] No such timeout policy "syz1" [ 368.137098][ T28] audit: type=1400 audit(5314360068.314:1446): avc: denied { read } for pid=12778 comm="syz.0.2942" name="rtc0" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 368.141525][T12782] No such timeout policy "syz1" [ 368.174414][T12784] lo speed is unknown, defaulting to 1000 [ 368.182336][T12784] lo speed is unknown, defaulting to 1000 [ 368.403872][T12791] loop0: detected capacity change from 0 to 128 [ 368.409065][ T8893] udevd[8893]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 368.412361][ T8522] udevd[8522]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 368.422422][T11660] udevd[11660]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 368.934112][T12791] loop0: detected capacity change from 0 to 8192 [ 369.073122][T12789] xt_recent: Unsupported userspace flags (000000b1) [ 369.091088][ T8799] udevd[8799]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 369.100663][T11660] udevd[11660]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 369.112999][ T8893] udevd[8893]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 369.144798][T12794] dummy0: Device is already in use. [ 369.190463][T12796] lo speed is unknown, defaulting to 1000 [ 369.196867][T12796] lo speed is unknown, defaulting to 1000 [ 369.506174][ T28] audit: type=1400 audit(5314360069.713:1448): avc: denied { nlmsg_write } for pid=12806 comm="syz.5.2948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 369.576652][T12820] loop0: detected capacity change from 0 to 1024 [ 369.609369][T12814] tipc: Resetting bearer [ 369.784694][ T28] audit: type=1400 audit(5314360069.713:1449): avc: denied { create } for pid=12806 comm="syz.5.2948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 369.833863][T12810] netlink: 20 bytes leftover after parsing attributes in process `syz.0.2946'. [ 369.847275][ T4679] lo speed is unknown, defaulting to 1000 [ 369.897520][ T28] audit: type=1401 audit(5314360069.833:1450): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 370.357661][T12836] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 370.366023][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 370.375482][T12836] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 370.384060][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 370.393358][T12836] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 370.402360][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 370.410796][T12836] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 370.419117][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 370.428404][T12836] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 370.436894][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 371.001930][ T28] audit: type=1400 audit(5314360071.233:1451): avc: denied { create } for pid=12849 comm="syz.1.2960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 371.322223][ T28] audit: type=1400 audit(5314360071.553:1452): avc: denied { ioctl } for pid=12833 comm="syz.5.2955" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 ioctlcmd=0x9425 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 371.691022][T12857] loop2: detected capacity change from 0 to 512 [ 371.726483][ T28] audit: type=1400 audit(5314360071.943:1453): avc: denied { setopt } for pid=12849 comm="syz.1.2960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 371.901726][T12876] macsec0: entered allmulticast mode [ 371.946503][ T28] audit: type=1401 audit(5314360072.143:1454): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 372.055689][T12876] veth1_macvtap: entered allmulticast mode [ 372.076703][T12876] macsec0: entered promiscuous mode [ 372.222997][T12890] netlink: 144 bytes leftover after parsing attributes in process `syz.1.2973'. [ 372.657664][T12898] ipvlan2: entered allmulticast mode [ 372.802303][T12900] xt_recent: Unsupported userspace flags (000000b1) [ 372.825692][T12899] lo speed is unknown, defaulting to 1000 [ 372.832314][T12899] lo speed is unknown, defaulting to 1000 [ 373.172714][T12909] xt_CT: You must specify a L4 protocol and not use inversions on it [ 373.281555][ T28] audit: type=1400 audit(5314360073.513:1455): avc: denied { connect } for pid=12916 comm="syz.5.2980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 373.334216][T12923] audit: audit_lost=7 audit_rate_limit=0 audit_backlog_limit=64 [ 373.352216][T12925] netlink: 144 bytes leftover after parsing attributes in process `syz.5.2984'. [ 373.356053][ T28] audit: type=1326 audit(5314360073.553:1456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12922 comm="syz.4.2983" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8801b5bf79 code=0x7ffc0000 [ 373.388800][T12923] audit: out of memory in audit_log_start [ 373.534251][ T28] audit: type=1326 audit(5314360073.553:1457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12922 comm="syz.4.2983" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8801b5bf79 code=0x7ffc0000 [ 373.575222][ T28] audit: type=1326 audit(5314360073.563:1458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12922 comm="syz.4.2983" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8801b1c84e code=0x7ffc0000 [ 373.581477][T12934] loop5: detected capacity change from 0 to 1024 [ 373.667850][ T28] audit: type=1326 audit(5314360073.563:1459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12922 comm="syz.4.2983" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f8801b1c84e code=0x7ffc0000 [ 373.705378][T12937] dummy0: Device is already in use. [ 374.103799][T12935] xt_recent: Unsupported userspace flags (000000b1) [ 374.112710][T12937] lo speed is unknown, defaulting to 1000 [ 374.144914][T12937] lo speed is unknown, defaulting to 1000 [ 374.152488][ T28] audit: type=1326 audit(5314360073.563:1460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12922 comm="syz.4.2983" exe="/root/syz-executor" sig=0 arch=c000003e syscall=197 compat=0 ip=0x7f8801b5bf79 code=0x7ffc0000 [ 374.250460][ T28] audit: type=1326 audit(5314360073.633:1461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12922 comm="syz.4.2983" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f8801b1c84e code=0x7ffc0000 [ 374.361204][T12943] FAULT_INJECTION: forcing a failure. [ 374.361204][T12943] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 374.422981][ T28] audit: type=1326 audit(5314360073.633:1462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12922 comm="syz.4.2983" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f8801b1c84e code=0x7ffc0000 [ 374.449991][T12943] CPU: 1 UID: 0 PID: 12943 Comm: syz.4.2989 Tainted: G W syzkaller #0 PREEMPT(full) [ 374.450028][T12943] Tainted: [W]=WARN [ 374.450095][T12943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 374.450107][T12943] Call Trace: [ 374.450115][T12943] [ 374.450124][T12943] __dump_stack+0x1d/0x30 [ 374.450155][T12943] dump_stack_lvl+0x95/0xd0 [ 374.450244][T12943] dump_stack+0x15/0x1b [ 374.450268][T12943] should_fail_ex+0x263/0x280 [ 374.450441][T12943] should_fail+0xb/0x20 [ 374.450461][T12943] should_fail_usercopy+0x1a/0x20 [ 374.450489][T12943] _copy_from_user+0x1c/0xb0 [ 374.450537][T12943] ___sys_sendmsg+0xc1/0x1e0 [ 374.450573][T12943] __x64_sys_sendmsg+0xd4/0x160 [ 374.450678][T12943] x64_sys_call+0x194c/0x3020 [ 374.450769][T12943] do_syscall_64+0x12c/0x370 [ 374.450806][T12943] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 374.450831][T12943] RIP: 0033:0x7f8801b5bf79 [ 374.450849][T12943] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 374.450869][T12943] RSP: 002b:00007f88005af028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 374.450896][T12943] RAX: ffffffffffffffda RBX: 00007f8801dd5fa0 RCX: 00007f8801b5bf79 [ 374.450913][T12943] RDX: 0000000020008814 RSI: 0000200000000480 RDI: 0000000000000003 [ 374.450929][T12943] RBP: 00007f88005af090 R08: 0000000000000000 R09: 0000000000000000 [ 374.450944][T12943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 374.450960][T12943] R13: 00007f8801dd6038 R14: 00007f8801dd5fa0 R15: 00007ffe49ea1c18 [ 374.451025][T12943] [ 374.708395][ T5842] Bluetooth: hci0: Frame reassembly failed (-84) [ 375.361893][T12960] loop0: detected capacity change from 0 to 512 [ 375.362243][T12960] EXT4-fs: Ignoring removed nobh option [ 375.421669][T12961] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1792 sclass=netlink_route_socket pid=12961 comm=syz.0.2994 [ 375.421697][T12961] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=12961 comm=syz.0.2994 [ 375.762500][T12978] lo speed is unknown, defaulting to 1000 [ 375.803108][T12978] lo speed is unknown, defaulting to 1000 [ 376.624266][T12992] loop2: detected capacity change from 0 to 1024 [ 376.643789][T12992] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (24670!=35945) [ 376.659078][T12992] EXT4-fs (loop2): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 376.679067][T12994] loop0: detected capacity change from 0 to 1024 [ 376.695648][T12992] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 376.704477][T12992] EXT4-fs (loop2): write access unavailable, skipping orphan cleanup [ 376.713494][T12992] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 376.728053][T12992] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 376.747481][ T4052] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 376.796066][T13001] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3004'. [ 376.882019][T13002] netlink: 'syz.0.3005': attribute type 7 has an invalid length. [ 376.901369][T13002] netlink: 32 bytes leftover after parsing attributes in process `syz.0.3005'. [ 376.946550][T13002] netlink: 108 bytes leftover after parsing attributes in process `syz.0.3005'. [ 377.134451][T13011] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2561 sclass=netlink_tcpdiag_socket pid=13011 comm=syz.2.3004 [ 377.232176][T13012] dummy0: Device is already in use. [ 377.619195][T13010] xt_recent: Unsupported userspace flags (000000b1) [ 377.690887][T13014] loop2: detected capacity change from 0 to 512 [ 377.706756][T13014] vfat: Unknown parameter '˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙01777777777777777777777' [ 377.754382][T13012] lo speed is unknown, defaulting to 1000 [ 377.814714][T13012] lo speed is unknown, defaulting to 1000 [ 378.542533][T13020] xt_recent: Unsupported userspace flags (000000b1) [ 378.823877][T13022] ipvlan2: entered allmulticast mode [ 378.854379][T13022] dummy0: entered allmulticast mode [ 379.096515][T13023] lo speed is unknown, defaulting to 1000 [ 379.103781][T13023] lo speed is unknown, defaulting to 1000 [ 379.217031][T13026] ipvlan2: entered allmulticast mode [ 379.223795][T13026] geneve0: entered allmulticast mode [ 379.501013][T13044] net_ratelimit: 2038 callbacks suppressed [ 379.501071][T13044] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 379.509284][T13046] FAULT_INJECTION: forcing a failure. [ 379.509284][T13046] name failslab, interval 1, probability 0, space 0, times 0 [ 379.525762][T13044] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 379.530062][T13046] CPU: 1 UID: 0 PID: 13046 Comm: syz.0.3024 Tainted: G W syzkaller #0 PREEMPT(full) [ 379.530096][T13046] Tainted: [W]=WARN [ 379.530104][T13046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 379.530116][T13046] Call Trace: [ 379.530124][T13046] [ 379.530186][T13046] __dump_stack+0x1d/0x30 [ 379.530213][T13046] dump_stack_lvl+0x95/0xd0 [ 379.530237][T13046] dump_stack+0x15/0x1b [ 379.530258][T13046] should_fail_ex+0x263/0x280 [ 379.530283][T13046] ? sctp_add_bind_addr+0x71/0x1e0 [ 379.530372][T13046] should_failslab+0x8c/0xb0 [ 379.530403][T13046] __kmalloc_cache_noprof+0x5f/0x410 [ 379.530504][T13046] sctp_add_bind_addr+0x71/0x1e0 [ 379.530532][T13046] sctp_copy_local_addr_list+0x1b3/0x250 [ 379.530567][T13046] sctp_copy_one_addr+0x7f/0x280 [ 379.530619][T13046] sctp_bind_addr_copy+0x79/0x290 [ 379.530679][T13046] sctp_assoc_set_bind_addr_from_ep+0xce/0xe0 [ 379.530786][T13046] sctp_connect_new_asoc+0x1c3/0x3a0 [ 379.530810][T13046] sctp_sendmsg+0xfff/0x1d60 [ 379.530893][T13046] ? selinux_socket_sendmsg+0x192/0x1c0 [ 379.530944][T13046] ? __pfx_sctp_sendmsg+0x10/0x10 [ 379.530975][T13046] inet_sendmsg+0xc5/0xd0 [ 379.531079][T13046] ____sys_sendmsg+0x53a/0x600 [ 379.531109][T13046] ___sys_sendmsg+0x195/0x1e0 [ 379.531146][T13046] __x64_sys_sendmsg+0xd4/0x160 [ 379.531227][T13046] x64_sys_call+0x194c/0x3020 [ 379.531253][T13046] do_syscall_64+0x12c/0x370 [ 379.531285][T13046] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 379.531333][T13046] RIP: 0033:0x7efcca24bf79 [ 379.531352][T13046] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 379.531371][T13046] RSP: 002b:00007efcc8c9f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 379.531395][T13046] RAX: ffffffffffffffda RBX: 00007efcca4c5fa0 RCX: 00007efcca24bf79 [ 379.531474][T13046] RDX: 00000000000003e8 RSI: 00002000000004c0 RDI: 0000000000000006 [ 379.531488][T13046] RBP: 00007efcc8c9f090 R08: 0000000000000000 R09: 0000000000000000 [ 379.531502][T13046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 379.531516][T13046] R13: 00007efcca4c6038 R14: 00007efcca4c5fa0 R15: 00007ffe2fa12ec8 [ 379.531536][T13046] [ 379.614495][T13051] mapping of prio or/and queue is allowed only from OUTPUT/FORWARD/POSTROUTING chains [ 379.648013][T13044] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 379.669493][T13025] lo speed is unknown, defaulting to 1000 [ 379.708108][T13044] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 379.717981][T13025] lo speed is unknown, defaulting to 1000 [ 379.796713][T13044] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 379.834608][T13059] loop2: detected capacity change from 0 to 1024 [ 379.949169][T13044] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 379.960484][T13044] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 379.973963][T13044] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 380.041375][T13044] netlink: 20 bytes leftover after parsing attributes in process `syz.2.3015'. [ 380.051712][T13044] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 380.070872][T13054] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 380.195625][T13068] dummy0: Device is already in use. [ 380.559778][T13068] lo speed is unknown, defaulting to 1000 [ 380.563146][T13066] xt_recent: Unsupported userspace flags (000000b1) [ 380.603762][T13068] lo speed is unknown, defaulting to 1000 [ 381.075391][T13025] chnl_net:caif_netlink_parms(): no params data found [ 381.153613][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 381.153631][ T28] audit: type=1401 audit(5314360081.382:1467): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 382.774804][T13025] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.782876][T13025] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.919426][T13025] bridge_slave_0: entered allmulticast mode [ 382.926682][T13025] bridge_slave_0: entered promiscuous mode [ 382.935779][T13025] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.943210][T13025] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.950880][T13025] bridge_slave_1: entered allmulticast mode [ 382.969445][T13025] bridge_slave_1: entered promiscuous mode [ 383.365224][T13025] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 383.519689][T13025] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 383.550207][T13088] netlink: 52 bytes leftover after parsing attributes in process `syz.4.3026'. [ 383.646712][T13095] veth1_to_bond: entered allmulticast mode [ 383.665842][T13025] team0: Port device team_slave_0 added [ 383.685558][T13025] team0: Port device team_slave_1 added [ 383.765896][T13025] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 383.809069][T13025] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 383.836235][T13025] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 383.850272][T13025] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 383.857543][T13025] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 383.885195][T13025] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 383.896659][T13095] veth1_to_bond: left allmulticast mode [ 383.941444][T13025] hsr_slave_0: entered promiscuous mode [ 383.947619][T13025] hsr_slave_1: entered promiscuous mode [ 383.954200][T13025] debugfs: 'hsr0' already exists in 'hsr' [ 383.960341][T13025] Cannot create hsr debugfs directory [ 384.166029][T13108] ipvlan2: entered allmulticast mode [ 384.318398][T13110] xt_recent: Unsupported userspace flags (000000b1) [ 384.534500][T13109] lo speed is unknown, defaulting to 1000 [ 384.541572][T13109] lo speed is unknown, defaulting to 1000 [ 384.648538][T13025] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 384.693973][ T28] audit: type=1401 audit(5314360084.932:1468): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 384.700387][T13123] FAULT_INJECTION: forcing a failure. [ 384.700387][T13123] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 384.762008][T13123] CPU: 0 UID: 0 PID: 13123 Comm: syz.5.3037 Tainted: G W syzkaller #0 PREEMPT(full) [ 384.762044][T13123] Tainted: [W]=WARN [ 384.762051][T13123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 384.762080][T13123] Call Trace: [ 384.762086][T13123] [ 384.762094][T13123] __dump_stack+0x1d/0x30 [ 384.762170][T13123] dump_stack_lvl+0x95/0xd0 [ 384.762195][T13123] dump_stack+0x15/0x1b [ 384.762247][T13123] should_fail_ex+0x263/0x280 [ 384.762336][T13123] should_fail_alloc_page+0xf2/0x100 [ 384.762372][T13123] __alloc_frozen_pages_noprof+0x108/0x360 [ 384.762408][T13123] alloc_pages_mpol+0xb3/0x260 [ 384.762436][T13123] alloc_pages_noprof+0x8f/0x130 [ 384.762549][T13123] pte_alloc_one+0x1e/0xd0 [ 384.762573][T13123] __pte_alloc+0x32/0x2c0 [ 384.762665][T13123] handle_mm_fault+0x204e/0x3020 [ 384.762699][T13123] ? vma_start_read+0x1c7/0x2c0 [ 384.762759][T13123] do_user_addr_fault+0x62f/0x1050 [ 384.762789][T13123] ? ksys_mmap_pgoff+0xc1/0x310 [ 384.762859][T13123] ? __x64_sys_mmap+0x49/0x70 [ 384.763029][T13123] ? trace_page_fault_user+0x1f/0xe0 [ 384.763062][T13123] exc_page_fault+0x62/0xa0 [ 384.763101][T13123] asm_exc_page_fault+0x26/0x30 [ 384.763133][T13123] RIP: 0033:0x7f97b0e0388e [ 384.763176][T13123] Code: c1 49 39 4f 08 72 54 8d 4d ff 85 ed 74 3b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 <47> 0f b6 0c 08 45 84 c9 74 08 45 88 0c 00 49 8b 47 10 48 83 c0 01 [ 384.763197][T13123] RSP: 002b:00007f97af9a6470 EFLAGS: 00010246 [ 384.763217][T13123] RAX: 0000000000000001 RBX: 00007f97af9a6530 RCX: 0000000000000101 [ 384.763235][T13123] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00007f97af9a65d0 [ 384.763271][T13123] RBP: 0000000000000102 R08: 00007f97a7587000 R09: 0000000000000000 [ 384.763355][T13123] R10: 0000000000000000 R11: 00007f97af9a6540 R12: 0000000000000001 [ 384.763371][T13123] R13: 00007f97b1001ea0 R14: 0000000000000000 R15: 00007f97af9a65d0 [ 384.763469][T13123] [ 384.763482][T13123] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 384.844576][T13124] loop2: detected capacity change from 0 to 512 [ 384.857256][T13123] loop5: detected capacity change from 0 to 512 [ 385.021986][T13124] EXT4-fs (loop2): write access unavailable, skipping orphan cleanup [ 385.031710][T13124] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 385.062083][T13025] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 385.074135][T13123] journal_path: Non-blockdev passed as './file2' [ 385.103340][T13123] EXT4-fs: error: could not find journal device path [ 385.255883][ T3321] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 385.266195][T13025] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 385.348604][ T28] audit: type=1401 audit(5314360085.552:1469): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 385.387874][T13025] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 385.443537][ T28] audit: type=1401 audit(5314360085.682:1470): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 385.557193][T13025] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 385.649611][T13025] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 385.760919][T13025] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 385.772479][T13025] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 386.218400][T13146] ipvlan2: entered allmulticast mode [ 386.257970][T13141] xt_recent: Unsupported userspace flags (000000b1) [ 386.681867][T13145] lo speed is unknown, defaulting to 1000 [ 386.688929][T13145] lo speed is unknown, defaulting to 1000 [ 386.767120][T13025] 8021q: adding VLAN 0 to HW filter on device bond0 [ 386.783291][T13025] 8021q: adding VLAN 0 to HW filter on device team0 [ 386.860930][ T5832] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.864310][T13160] loop0: detected capacity change from 0 to 1024 [ 386.868053][ T5832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 386.939097][ T5832] bridge0: port 2(bridge_slave_1) entered blocking state [ 386.946216][ T5832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 387.132824][T13166] xt_recent: Unsupported userspace flags (000000b1) [ 387.262703][T13025] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 387.298153][T13168] loop0: detected capacity change from 0 to 512 [ 387.454151][T13025] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 387.524309][T13163] dummy0: Device is already in use. [ 387.542431][T13165] lo speed is unknown, defaulting to 1000 [ 387.548810][T13165] lo speed is unknown, defaulting to 1000 [ 387.798989][ T28] audit: type=1401 audit(5314360088.021:1471): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 388.018265][T13025] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 388.088485][T13190] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 388.168802][T13190] team0: Port device batadv1 added [ 388.358694][T13195] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3054'. [ 388.415456][T13025] veth0_vlan: entered promiscuous mode [ 388.430705][T13025] veth1_vlan: entered promiscuous mode [ 388.462249][T13025] veth0_macvtap: entered promiscuous mode [ 388.514884][T13025] veth1_macvtap: entered promiscuous mode [ 389.164768][T13025] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 389.182763][T13208] lo speed is unknown, defaulting to 1000 [ 389.184173][T13025] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 389.228074][T13208] lo speed is unknown, defaulting to 1000 [ 389.234182][ T5848] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 389.244469][ T5848] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 389.285613][ T5848] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 389.317898][ T36] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 389.590258][T13221] loop4: detected capacity change from 0 to 256 [ 389.635236][T13221] vfat: Unknown parameter '0xffffffffffffffff˙˙˙˙˙˙˙˙˙˙18446744073709551615˙˙˙˙˙˙˙˙' [ 389.651048][T13223] FAULT_INJECTION: forcing a failure. [ 389.651048][T13223] name failslab, interval 1, probability 0, space 0, times 0 [ 389.664709][T13223] CPU: 1 UID: 0 PID: 13223 Comm: syz.5.3061 Tainted: G W syzkaller #0 PREEMPT(full) [ 389.664745][T13223] Tainted: [W]=WARN [ 389.664752][T13223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 389.664766][T13223] Call Trace: [ 389.664773][T13223] [ 389.664782][T13223] __dump_stack+0x1d/0x30 [ 389.664820][T13223] dump_stack_lvl+0x95/0xd0 [ 389.664845][T13223] dump_stack+0x15/0x1b [ 389.664869][T13223] should_fail_ex+0x263/0x280 [ 389.664910][T13223] should_failslab+0x8c/0xb0 [ 389.664980][T13223] kmem_cache_alloc_noprof+0x66/0x400 [ 389.665074][T13223] ? skb_clone+0x151/0x1f0 [ 389.665167][T13223] skb_clone+0x151/0x1f0 [ 389.665195][T13223] __netlink_deliver_tap+0x2c9/0x500 [ 389.665229][T13223] netlink_dump+0x836/0x8a0 [ 389.665317][T13223] __netlink_dump_start+0x43e/0x520 [ 389.665346][T13223] ? __pfx_tc_dump_qdisc+0x10/0x10 [ 389.665380][T13223] rtnetlink_rcv_msg+0x59f/0x720 [ 389.665463][T13223] ? __pfx_tc_dump_qdisc+0x10/0x10 [ 389.665497][T13223] ? __pfx_rtnl_dumpit+0x10/0x10 [ 389.665529][T13223] ? __pfx_tc_dump_qdisc+0x10/0x10 [ 389.665630][T13223] netlink_rcv_skb+0x123/0x220 [ 389.665657][T13223] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 389.665767][T13223] rtnetlink_rcv+0x1c/0x30 [ 389.665798][T13223] netlink_unicast+0x5c0/0x690 [ 389.665838][T13223] netlink_sendmsg+0x5c8/0x6f0 [ 389.665870][T13223] ? __pfx_netlink_sendmsg+0x10/0x10 [ 389.665900][T13223] ____sys_sendmsg+0x5af/0x600 [ 389.665968][T13223] ___sys_sendmsg+0x195/0x1e0 [ 389.666009][T13223] __x64_sys_sendmsg+0xd4/0x160 [ 389.666099][T13223] x64_sys_call+0x194c/0x3020 [ 389.666128][T13223] do_syscall_64+0x12c/0x370 [ 389.666164][T13223] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 389.666258][T13223] RIP: 0033:0x7f97b0f4bf79 [ 389.666277][T13223] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 389.666341][T13223] RSP: 002b:00007f97af986028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 389.666366][T13223] RAX: ffffffffffffffda RBX: 00007f97b11c6090 RCX: 00007f97b0f4bf79 [ 389.666383][T13223] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 000000000000000a [ 389.666398][T13223] RBP: 00007f97af986090 R08: 0000000000000000 R09: 0000000000000000 [ 389.666412][T13223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 389.666460][T13223] R13: 00007f97b11c6128 R14: 00007f97b11c6090 R15: 00007ffe16a19ec8 [ 389.666482][T13223] [ 389.966673][T13231] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 389.980812][T13231] team0: Port device batadv1 added [ 390.884616][T13253] loop5: detected capacity change from 0 to 512 [ 390.921801][T13253] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (17031!=33349) [ 390.936488][T13258] loop2: detected capacity change from 0 to 512 [ 391.003844][T13253] EXT4-fs (loop5): revision level too high, forcing read-only mode [ 391.040883][T13253] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=c842e02c, mo2=0002] [ 391.087149][T13253] EXT4-fs (loop5): write access unavailable, skipping orphan cleanup [ 391.152998][T13253] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000007 ro without journal. Quota mode: none. [ 391.154715][T13246] lo speed is unknown, defaulting to 1000 [ 391.208328][T13246] lo speed is unknown, defaulting to 1000 [ 391.320743][ T7530] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000007. [ 391.350878][T13246] chnl_net:caif_netlink_parms(): no params data found [ 391.458044][T13246] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.475485][T13246] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.483892][T13246] bridge_slave_0: entered allmulticast mode [ 391.496860][T13246] bridge_slave_0: entered promiscuous mode [ 391.512778][T13246] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.529195][T13246] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.544939][T13246] bridge_slave_1: entered allmulticast mode [ 391.590490][T13246] bridge_slave_1: entered promiscuous mode [ 391.735897][T13246] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 391.771951][T13246] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 391.922867][T13246] team0: Port device team_slave_0 added [ 391.977296][T13246] team0: Port device team_slave_1 added [ 392.001945][T13246] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 392.010282][T13246] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 392.053592][T13246] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 392.087550][T13290] loop1: detected capacity change from 0 to 8192 [ 392.286439][T13298] xt_recent: Unsupported userspace flags (000000b1) [ 392.638229][T13246] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 392.692119][T13246] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 392.894159][T13246] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 392.971936][T13293] dummy0: Device is already in use. [ 392.988205][T13296] lo speed is unknown, defaulting to 1000 [ 392.995998][T13296] lo speed is unknown, defaulting to 1000 [ 393.311992][ T28] audit: type=1400 audit(5314360093.551:1472): avc: denied { ioctl } for pid=13308 comm="syz.5.3083" path="socket:[43324]" dev="sockfs" ino=43324 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 393.382958][T13246] hsr_slave_0: entered promiscuous mode [ 393.396377][T13246] hsr_slave_1: entered promiscuous mode [ 393.403740][T13246] debugfs: 'hsr0' already exists in 'hsr' [ 393.411074][T13246] Cannot create hsr debugfs directory [ 393.417021][T13295] lo speed is unknown, defaulting to 1000 [ 393.426950][ T28] audit: type=1400 audit(5314360093.651:1473): avc: denied { accept } for pid=13308 comm="syz.5.3083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 393.693367][T13295] lo speed is unknown, defaulting to 1000 [ 393.802155][T13320] netlink: 'syz.1.3085': attribute type 10 has an invalid length. [ 393.892155][T13325] loop1: detected capacity change from 0 to 2048 [ 393.922481][T13327] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3087'. [ 393.963688][ T28] audit: type=1326 audit(5314360094.201:1474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13319 comm="syz.1.3085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f310d24bf79 code=0x7ffc0000 [ 393.991722][ T28] audit: type=1326 audit(5314360094.201:1475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13319 comm="syz.1.3085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f310d24bf79 code=0x7ffc0000 [ 394.016637][ T28] audit: type=1326 audit(5314360094.201:1476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13319 comm="syz.1.3085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f310d24bf79 code=0x7ffc0000 [ 394.030378][T13320] team0: Port device dummy0 added [ 394.043013][ T28] audit: type=1326 audit(5314360094.201:1477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13319 comm="syz.1.3085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=127 compat=0 ip=0x7f310d24bf79 code=0x7ffc0000 [ 394.043074][ T28] audit: type=1326 audit(5314360094.201:1478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13319 comm="syz.1.3085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f310d24bf79 code=0x7ffc0000 [ 394.043110][ T28] audit: type=1326 audit(5314360094.201:1479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13319 comm="syz.1.3085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f310d24bf79 code=0x7ffc0000 [ 394.043161][ T28] audit: type=1326 audit(5314360094.201:1480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13319 comm="syz.1.3085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f310d24bf79 code=0x7ffc0000 [ 394.043211][ T28] audit: type=1326 audit(5314360094.201:1481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13319 comm="syz.1.3085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=426 compat=0 ip=0x7f310d24bf79 code=0x7ffc0000 [ 394.236821][T13327] vlan2: entered promiscuous mode [ 394.314085][ T5842] netdevsim netdevsim4 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 394.340606][ T5842] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 394.392308][ T5842] netdevsim netdevsim4 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 394.405803][ T5842] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 394.486790][T13345] loop0: detected capacity change from 0 to 128 [ 394.521178][T13345] ext4: Unknown parameter 'measure' [ 395.230517][ T5842] netdevsim netdevsim4 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 395.241725][ T5842] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 395.320041][ T5842] netdevsim netdevsim4 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 395.352085][T13358] loop5: detected capacity change from 0 to 2048 [ 395.358829][ T5842] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 395.479930][ T8893] loop5: p3 p4 < > [ 395.488760][ T8893] loop5: p3 start 11362048 is beyond EOD, truncated [ 395.519363][T13358] loop5: p3 p4 < > [ 395.523509][T13358] loop5: p3 start 11362048 is beyond EOD, truncated [ 395.791668][ T8893] udevd[8893]: inotify_add_watch(7, /dev/loop5p4, 10) failed: No such file or directory [ 396.587103][T13389] xt_recent: Unsupported userspace flags (000000b1) [ 396.975266][ T5842] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 397.007929][ T5842] bond0 (unregistering): Released all slaves [ 397.016895][ T5842] bond1 (unregistering): Released all slaves [ 397.027573][ T5842] bond2 (unregistering): Released all slaves [ 397.049412][ T5842] bond3 (unregistering): (slave veth3): Releasing active interface [ 397.064842][ T5842] batadv0: entered promiscuous mode [ 397.138890][ T5842] bond3 (unregistering): (slave batadv0): Releasing active interface [ 397.150471][ T5842] bond3 (unregistering): Released all slaves [ 398.214755][T13395] loop5: detected capacity change from 0 to 512 [ 398.313847][T13385] ipvlan2: entered allmulticast mode [ 398.458614][T13395] loop5: detected capacity change from 0 to 512 [ 398.593289][T13395] EXT4-fs: Ignoring removed bh option [ 398.731566][T13400] program syz.5.3109 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 398.839710][T13400] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 398.969741][T13407] sg_write: data in/out 1848254543/114 bytes for SCSI command 0xe2-- guessing data in; [ 398.969741][T13407] program syz.1.3111 not setting count and/or reply_len properly [ 399.161815][ T28] kauditd_printk_skb: 155 callbacks suppressed [ 399.161832][ T28] audit: type=1401 audit(5314360099.400:1637): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 399.210697][T13388] lo speed is unknown, defaulting to 1000 [ 399.217247][T13388] lo speed is unknown, defaulting to 1000 [ 399.364159][ T5842] tipc: Disabling bearer [ 399.378272][ T5842] tipc: Left network mode [ 399.385683][ T5842] IPVS: stopping master sync thread 4057 ... [ 399.863494][ T5842] veth1_macvtap: left promiscuous mode [ 399.869020][ T5842] veth0_macvtap: left promiscuous mode [ 399.881542][ T5842] veth1_vlan: left promiscuous mode [ 400.056834][ T4468] lo speed is unknown, defaulting to 1000 [ 400.062871][ T4468] infiniband syz2: ib_query_port failed (-19) [ 400.204661][T13440] lo speed is unknown, defaulting to 1000 [ 400.377159][T13448] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3118'. [ 400.415803][T13246] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 400.471507][T13246] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 400.488062][T13246] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 400.502726][T13246] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 400.524200][T13464] netlink: 20 bytes leftover after parsing attributes in process `syz.5.3122'. [ 400.541433][T13467] hsr0: entered promiscuous mode [ 400.547161][T13467] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3121'. [ 400.560519][T13467] hsr_slave_0: left promiscuous mode [ 400.567096][T13467] hsr_slave_1: left promiscuous mode [ 400.575331][T13467] hsr0 (unregistering): left promiscuous mode [ 400.610877][ T5842] IPVS: stop unused estimator thread 0... [ 400.661510][T13246] 8021q: adding VLAN 0 to HW filter on device bond0 [ 400.841682][ T5842] .` (unregistering): Released all slaves [ 400.855353][ T5842] bond1 (unregistering): Released all slaves [ 400.873992][T13246] 8021q: adding VLAN 0 to HW filter on device team0 [ 400.883503][T13495] FAULT_INJECTION: forcing a failure. [ 400.883503][T13495] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 400.905002][ T5832] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.912105][T13495] CPU: 0 UID: 0 PID: 13495 Comm: syz.5.3129 Tainted: G W syzkaller #0 PREEMPT(full) [ 400.912139][T13495] Tainted: [W]=WARN [ 400.912146][T13495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 400.912198][T13495] Call Trace: [ 400.912206][T13495] [ 400.912214][T13495] __dump_stack+0x1d/0x30 [ 400.912242][T13495] dump_stack_lvl+0x95/0xd0 [ 400.912265][T13495] dump_stack+0x15/0x1b [ 400.912340][T13495] should_fail_ex+0x263/0x280 [ 400.912415][T13495] should_fail+0xb/0x20 [ 400.912501][T13495] should_fail_usercopy+0x1a/0x20 [ 400.912534][T13495] _copy_from_user+0x1c/0xb0 [ 400.912563][T13495] do_ip_vs_set_ctl+0x1a4/0xa60 [ 400.912584][T13495] ? path_openat+0x1ab2/0x2050 [ 400.912636][T13495] nf_setsockopt+0x199/0x1b0 [ 400.912668][T13495] ip_setsockopt+0x102/0x110 [ 400.912736][T13495] ipv6_setsockopt+0xfb/0x130 [ 400.912803][T13495] tcp_setsockopt+0x98/0xb0 [ 400.912828][T13495] sock_common_setsockopt+0x69/0x80 [ 400.912901][T13495] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 400.912988][T13495] smc_setsockopt+0x183/0x750 [ 400.913021][T13495] ? __pfx_smc_setsockopt+0x10/0x10 [ 400.913053][T13495] __sys_setsockopt+0x184/0x200 [ 400.913099][T13495] __x64_sys_setsockopt+0x64/0x80 [ 400.913129][T13495] x64_sys_call+0x2327/0x3020 [ 400.913153][T13495] do_syscall_64+0x12c/0x370 [ 400.913185][T13495] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 400.913258][T13495] RIP: 0033:0x7f97b0f4bf79 [ 400.913275][T13495] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 400.913295][T13495] RSP: 002b:00007f97af9a7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 400.913318][T13495] RAX: ffffffffffffffda RBX: 00007f97b11c5fa0 RCX: 00007f97b0f4bf79 [ 400.913382][T13495] RDX: 0000000000000488 RSI: 0000000000000000 RDI: 0000000000000003 [ 400.913442][T13495] RBP: 00007f97af9a7090 R08: 0000000000000044 R09: 0000000000000000 [ 400.913456][T13495] R10: 0000200000000140 R11: 0000000000000246 R12: 0000000000000001 [ 400.913470][T13495] R13: 00007f97b11c6038 R14: 00007f97b11c5fa0 R15: 00007ffe16a19ec8 [ 400.913490][T13495] [ 401.131842][ T5832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.161860][ T5832] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.169373][ T5832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.447537][T13508] xt_recent: Unsupported userspace flags (000000b1) [ 401.461584][ T5842] tipc: Disabling bearer [ 401.476726][ T5842] tipc: Left network mode [ 401.478857][T13503] dummy0: Device is already in use. [ 401.506116][T13506] lo speed is unknown, defaulting to 1000 [ 401.598598][ T5842] IPVS: stopping master sync thread 3505 ... [ 401.653052][T13505] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.660590][T13505] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.906771][T13518] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3137'. [ 401.941319][T13505] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 401.952088][T13505] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 402.014057][ T5842] veth1_macvtap: left allmulticast mode [ 402.025062][ T5842] pimreg (unregistering): left allmulticast mode [ 402.054651][T13527] loop5: detected capacity change from 0 to 512 [ 402.149050][T13519] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 402.163597][T13519] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 402.177559][T13519] batman_adv: batadv0: Removing interface: vlan1 [ 402.188688][ T5810] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 402.215120][ T5810] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 402.297011][T13541] FAULT_INJECTION: forcing a failure. [ 402.297011][T13541] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 402.320820][ T5810] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 402.331226][ T5810] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 402.348657][T13541] CPU: 0 UID: 0 PID: 13541 Comm: syz.5.3144 Tainted: G W syzkaller #0 PREEMPT(full) [ 402.348692][T13541] Tainted: [W]=WARN [ 402.348700][T13541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 402.348713][T13541] Call Trace: [ 402.348798][T13541] [ 402.348808][T13541] __dump_stack+0x1d/0x30 [ 402.348837][T13541] dump_stack_lvl+0x95/0xd0 [ 402.348959][T13541] dump_stack+0x15/0x1b [ 402.348980][T13541] should_fail_ex+0x263/0x280 [ 402.349007][T13541] should_fail_alloc_page+0xf2/0x100 [ 402.349045][T13541] __alloc_frozen_pages_noprof+0x108/0x360 [ 402.349096][T13541] alloc_pages_mpol+0xb3/0x260 [ 402.349126][T13541] vma_alloc_folio_noprof+0x1a9/0x300 [ 402.349157][T13541] do_wp_page+0xf62/0x2590 [ 402.349191][T13541] ? __rcu_read_lock+0x36/0x50 [ 402.349260][T13541] handle_mm_fault+0x8c7/0x3020 [ 402.349291][T13541] ? mt_find+0x291/0x3d0 [ 402.349321][T13541] do_user_addr_fault+0x3fd/0x1050 [ 402.349441][T13541] exc_page_fault+0x62/0xa0 [ 402.349473][T13541] asm_exc_page_fault+0x26/0x30 [ 402.349527][T13541] RIP: 0010:rep_movs_alternative+0x4a/0x90 [ 402.349556][T13541] Code: 19 02 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb c5 a4 c3 cc cc cc cc 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 [ 402.349655][T13541] RSP: 0018:ffffc9000268f868 EFLAGS: 00050206 [ 402.349677][T13541] RAX: ffff888104ea4c78 RBX: ffff888119410000 RCX: 0000000000002b00 [ 402.349694][T13541] RDX: 0000000000000000 RSI: ffff888119415500 RDI: 0000200000008000 [ 402.349710][T13541] RBP: 0000200000002b00 R08: 000000000000052b R09: 0000000000000000 [ 402.349784][T13541] R10: 0001888119410000 R11: 0001888119417fff R12: 000020000000ab00 [ 402.349854][T13541] R13: ffffc9000268fe70 R14: 0000000000008000 R15: 00007ffffffff000 [ 402.349874][T13541] _copy_to_iter+0x141/0xea0 [ 402.349900][T13541] ? save_fpregs_to_fpstate+0x100/0x150 [ 402.350000][T13541] ? _raw_spin_unlock+0x9/0x30 [ 402.350024][T13541] ? finish_task_switch+0x7d/0x280 [ 402.350047][T13541] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 402.350077][T13541] __skb_datagram_iter+0x2f4/0x680 [ 402.350111][T13541] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 402.350144][T13541] skb_copy_datagram_iter+0x3f/0x120 [ 402.350195][T13541] unix_stream_read_actor+0x43/0x70 [ 402.350230][T13541] unix_stream_read_generic+0x6e9/0x1630 [ 402.350282][T13541] ? __pfx_autoremove_wake_function+0x10/0x10 [ 402.350381][T13541] unix_stream_recvmsg+0xff/0x130 [ 402.350403][T13541] ? __pfx_unix_stream_read_actor+0x10/0x10 [ 402.350441][T13541] ? __pfx_unix_stream_recvmsg+0x10/0x10 [ 402.350463][T13541] sock_recvmsg+0x139/0x160 [ 402.350546][T13541] ____sys_recvmsg+0xf5/0x280 [ 402.350580][T13541] ___sys_recvmsg+0x11f/0x3b0 [ 402.350681][T13541] __x64_sys_recvmsg+0xd1/0x160 [ 402.350715][T13541] x64_sys_call+0x2b1a/0x3020 [ 402.350769][T13541] do_syscall_64+0x12c/0x370 [ 402.350806][T13541] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 402.350831][T13541] RIP: 0033:0x7f97b0f4bf79 [ 402.350847][T13541] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 402.350877][T13541] RSP: 002b:00007f97af9a7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 402.350901][T13541] RAX: ffffffffffffffda RBX: 00007f97b11c5fa0 RCX: 00007f97b0f4bf79 [ 402.350915][T13541] RDX: 0000000000000000 RSI: 00002000000004c0 RDI: 0000000000000003 [ 402.350930][T13541] RBP: 00007f97af9a7090 R08: 0000000000000000 R09: 0000000000000000 [ 402.350944][T13541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 402.350959][T13541] R13: 00007f97b11c6038 R14: 00007f97b11c5fa0 R15: 00007ffe16a19ec8 [ 402.350981][T13541] [ 402.467625][T13246] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 403.013384][T13556] FAULT_INJECTION: forcing a failure. [ 403.013384][T13556] name failslab, interval 1, probability 0, space 0, times 0 [ 403.035401][T13556] CPU: 0 UID: 0 PID: 13556 Comm: syz.2.3146 Tainted: G W syzkaller #0 PREEMPT(full) [ 403.035461][T13556] Tainted: [W]=WARN [ 403.035469][T13556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 403.035483][T13556] Call Trace: [ 403.035492][T13556] [ 403.035501][T13556] __dump_stack+0x1d/0x30 [ 403.035608][T13556] dump_stack_lvl+0x95/0xd0 [ 403.035630][T13556] dump_stack+0x15/0x1b [ 403.035652][T13556] should_fail_ex+0x263/0x280 [ 403.035710][T13556] ? ipv6_flowlabel_opt+0x11c8/0x1790 [ 403.035802][T13556] should_failslab+0x8c/0xb0 [ 403.035838][T13556] __kmalloc_cache_noprof+0x5f/0x410 [ 403.035873][T13556] ipv6_flowlabel_opt+0x11c8/0x1790 [ 403.035909][T13556] ? __rcu_read_unlock+0x4e/0x70 [ 403.035934][T13556] ? terminate_walk+0x1e6/0x210 [ 403.036030][T13556] ? _raw_spin_unlock_bh+0x18/0x20 [ 403.036055][T13556] ? lock_sock_nested+0x132/0x160 [ 403.036144][T13556] ? should_fail_ex+0xd9/0x280 [ 403.036170][T13556] do_ipv6_setsockopt+0xb4e/0x21d0 [ 403.036196][T13556] ? kstrtoull+0x111/0x140 [ 403.036220][T13556] ? avc_has_perm_noaudit+0xab/0x130 [ 403.036250][T13556] ? selinux_netlbl_socket_setsockopt+0x20d/0x2f0 [ 403.036301][T13556] ipv6_setsockopt+0x59/0x130 [ 403.036321][T13556] udpv6_setsockopt+0x99/0xb0 [ 403.036350][T13556] sock_common_setsockopt+0x69/0x80 [ 403.036383][T13556] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 403.036497][T13556] __sys_setsockopt+0x184/0x200 [ 403.036537][T13556] __x64_sys_setsockopt+0x64/0x80 [ 403.036561][T13556] x64_sys_call+0x2327/0x3020 [ 403.036663][T13556] do_syscall_64+0x12c/0x370 [ 403.036725][T13556] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 403.036746][T13556] RIP: 0033:0x7fa8a60dbf79 [ 403.036803][T13556] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 403.036821][T13556] RSP: 002b:00007fa8a4b2f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 403.036843][T13556] RAX: ffffffffffffffda RBX: 00007fa8a6355fa0 RCX: 00007fa8a60dbf79 [ 403.036895][T13556] RDX: 0000000000000020 RSI: 0000000000000029 RDI: 0000000000000004 [ 403.036910][T13556] RBP: 00007fa8a4b2f090 R08: 0000000000000020 R09: 0000000000000000 [ 403.036961][T13556] R10: 0000200000000080 R11: 0000000000000246 R12: 0000000000000001 [ 403.036974][T13556] R13: 00007fa8a6356038 R14: 00007fa8a6355fa0 R15: 00007ffdcf06d108 [ 403.036996][T13556] [ 403.308702][T13565] loop5: detected capacity change from 0 to 512 [ 403.347074][T13565] EXT4-fs (loop5): mounted filesystem 00800000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 403.369636][T13570] tipc: Enabling of bearer rejected, failed to enable media [ 403.478878][ T7530] EXT4-fs (loop5): unmounting filesystem 00800000-0000-0000-0000-000000000000. [ 403.503388][ T5842] IPVS: stop unused estimator thread 0... [ 403.514944][T13246] veth0_vlan: entered promiscuous mode [ 403.515085][T13587] siw: device registration error -23 [ 403.555051][T13246] veth1_vlan: entered promiscuous mode [ 403.574567][T13590] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3153'. [ 403.619048][T13246] veth0_macvtap: entered promiscuous mode [ 403.639499][T13246] veth1_macvtap: entered promiscuous mode [ 403.646608][T13594] netlink: 'syz.1.3158': attribute type 1 has an invalid length. [ 403.676776][T13594] 8021q: adding VLAN 0 to HW filter on device bond1 [ 403.687452][T13246] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 403.719305][T13246] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 403.743953][ T5817] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.763684][T13605] FAULT_INJECTION: forcing a failure. [ 403.763684][T13605] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 403.772561][ T5817] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.811848][ T5832] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.814660][T13605] CPU: 0 UID: 0 PID: 13605 Comm: syz.0.3162 Tainted: G W syzkaller #0 PREEMPT(full) [ 403.814733][T13605] Tainted: [W]=WARN [ 403.814740][T13605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 403.814753][T13605] Call Trace: [ 403.814760][T13605] [ 403.814769][T13605] __dump_stack+0x1d/0x30 [ 403.814797][T13605] dump_stack_lvl+0x95/0xd0 [ 403.814896][T13605] dump_stack+0x15/0x1b [ 403.814918][T13605] should_fail_ex+0x263/0x280 [ 403.814945][T13605] should_fail+0xb/0x20 [ 403.814966][T13605] should_fail_usercopy+0x1a/0x20 [ 403.814992][T13605] _copy_to_user+0x20/0xa0 [ 403.815043][T13605] simple_read_from_buffer+0xb5/0x130 [ 403.815077][T13605] proc_fail_nth_read+0x10e/0x150 [ 403.815104][T13605] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 403.815128][T13605] vfs_read+0x1ab/0x7f0 [ 403.815174][T13605] ? __rcu_read_unlock+0x4e/0x70 [ 403.815196][T13605] ? __fget_files+0x184/0x1c0 [ 403.815216][T13605] ? up_write+0x18/0x60 [ 403.815236][T13605] ? mutex_lock+0x57/0x90 [ 403.815262][T13605] ksys_read+0xdc/0x1a0 [ 403.815351][T13605] __x64_sys_read+0x40/0x50 [ 403.815395][T13605] x64_sys_call+0x2886/0x3020 [ 403.815421][T13605] do_syscall_64+0x12c/0x370 [ 403.815454][T13605] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 403.815523][T13605] RIP: 0033:0x7efcca20c84e [ 403.815618][T13605] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 403.815637][T13605] RSP: 002b:00007efcc8c9efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 403.815660][T13605] RAX: ffffffffffffffda RBX: 00007efcc8c9f6c0 RCX: 00007efcca20c84e [ 403.815676][T13605] RDX: 000000000000000f RSI: 00007efcc8c9f0a0 RDI: 0000000000000004 [ 403.815690][T13605] RBP: 00007efcc8c9f090 R08: 0000000000000000 R09: 0000000000000000 [ 403.815775][T13605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 403.815788][T13605] R13: 00007efcca4c6038 R14: 00007efcca4c5fa0 R15: 00007ffe2fa12ec8 [ 403.815809][T13605] [ 404.015680][T13620] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3167'. [ 404.047148][ T5832] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 404.121535][T13610] lo speed is unknown, defaulting to 1000 [ 404.159899][T13624] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3069'. [ 404.263033][ T28] audit: type=1400 audit(5314360104.499:1638): avc: denied { ioctl } for pid=13633 comm="syz.5.3171" path="socket:[45247]" dev="sockfs" ino=45247 ioctlcmd=0xf502 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 404.325836][T13637] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1538 sclass=netlink_tcpdiag_socket pid=13637 comm=syz.5.3172 [ 404.365180][T13637] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=13637 comm=syz.5.3172 [ 404.418677][T13642] loop5: detected capacity change from 0 to 512 [ 404.426220][T13642] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 404.455752][T13642] EXT4-fs error (device loop5): ext4_init_orphan_info:620: comm syz.5.3172: orphan file block 0: bad magic [ 404.470399][T13642] loop5: lost filesystem error report for type 5 error -117 [ 404.470553][T13642] EXT4-fs (loop5): mount failed [ 404.538032][T13645] loop0: detected capacity change from 0 to 512 [ 404.548950][ T28] audit: type=1401 audit(5314360104.779:1639): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 404.807377][T13650] lo speed is unknown, defaulting to 1000 [ 404.939967][T13671] FAULT_INJECTION: forcing a failure. [ 404.939967][T13671] name failslab, interval 1, probability 0, space 0, times 0 [ 404.967461][T13671] CPU: 0 UID: 0 PID: 13671 Comm: syz.4.3182 Tainted: G W syzkaller #0 PREEMPT(full) [ 404.967497][T13671] Tainted: [W]=WARN [ 404.967506][T13671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 404.967525][T13671] Call Trace: [ 404.967532][T13671] [ 404.967541][T13671] __dump_stack+0x1d/0x30 [ 404.967570][T13671] dump_stack_lvl+0x95/0xd0 [ 404.967627][T13671] dump_stack+0x15/0x1b [ 404.967647][T13671] should_fail_ex+0x263/0x280 [ 404.967671][T13671] should_failslab+0x8c/0xb0 [ 404.967739][T13671] __kmalloc_noprof+0xb8/0x4e0 [ 404.967770][T13671] ? security_prepare_creds+0x52/0x120 [ 404.967821][T13671] security_prepare_creds+0x52/0x120 [ 404.967861][T13671] prepare_creds+0x381/0x540 [ 404.967896][T13671] prepare_exec_creds+0x14/0xe0 [ 404.967920][T13671] bprm_execve+0x6f/0x9c0 [ 404.967948][T13671] ? copy_string_kernel+0x37a/0x3b0 [ 404.967978][T13671] do_execveat_common+0x6b7/0x720 [ 404.968072][T13671] __x64_sys_execveat+0x76/0xa0 [ 404.968105][T13671] x64_sys_call+0x2a33/0x3020 [ 404.968129][T13671] do_syscall_64+0x12c/0x370 [ 404.968247][T13671] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 404.968314][T13671] RIP: 0033:0x7f3308b0bf79 [ 404.968330][T13671] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 404.968348][T13671] RSP: 002b:00007f330755f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 404.968371][T13671] RAX: ffffffffffffffda RBX: 00007f3308d85fa0 RCX: 00007f3308b0bf79 [ 404.968423][T13671] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000007 [ 404.968437][T13671] RBP: 00007f330755f090 R08: 0000000000001000 R09: 0000000000000000 [ 404.968451][T13671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 404.968514][T13671] R13: 00007f3308d86038 R14: 00007f3308d85fa0 R15: 00007ffc01c496e8 [ 404.968583][T13671] [ 405.242325][T13650] chnl_net:caif_netlink_parms(): no params data found [ 405.524548][T13705] FAULT_INJECTION: forcing a failure. [ 405.524548][T13705] name failslab, interval 1, probability 0, space 0, times 0 [ 405.553315][T13705] CPU: 0 UID: 0 PID: 13705 Comm: syz.5.3189 Tainted: G W syzkaller #0 PREEMPT(full) [ 405.553358][T13705] Tainted: [W]=WARN [ 405.553367][T13705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 405.553379][T13705] Call Trace: [ 405.553385][T13705] [ 405.553416][T13705] __dump_stack+0x1d/0x30 [ 405.553448][T13705] dump_stack_lvl+0x95/0xd0 [ 405.553476][T13705] dump_stack+0x15/0x1b [ 405.553560][T13705] should_fail_ex+0x263/0x280 [ 405.553591][T13705] should_failslab+0x8c/0xb0 [ 405.553631][T13705] __kmalloc_node_track_caller_noprof+0xc3/0x560 [ 405.553712][T13705] ? kstrdup_const+0x3e/0x50 [ 405.553740][T13705] kstrdup+0x3e/0xd0 [ 405.553782][T13705] kstrdup_const+0x3e/0x50 [ 405.553812][T13705] __kernfs_new_node+0x42/0x3c0 [ 405.553839][T13705] ? pcpu_block_update+0x24e/0x3b0 [ 405.553863][T13705] ? _find_next_zero_bit+0x64/0xa0 [ 405.553997][T13705] ? pcpu_block_refresh_hint+0x157/0x170 [ 405.554023][T13705] kernfs_new_node+0xd0/0x140 [ 405.554050][T13705] __kernfs_create_file+0x4b/0x180 [ 405.554084][T13705] cgroup_addrm_files+0x518/0x670 [ 405.554134][T13705] css_populate_dir+0x1cb/0x230 [ 405.554169][T13705] cgroup_mkdir+0xc08/0xce0 [ 405.554196][T13705] ? __pfx_cgroup_mkdir+0x10/0x10 [ 405.554289][T13705] kernfs_iop_mkdir+0x11e/0x1c0 [ 405.554320][T13705] vfs_mkdir+0x294/0x3e0 [ 405.554348][T13705] filename_mkdirat+0x138/0x300 [ 405.554443][T13705] __se_sys_mkdir+0x31/0xf0 [ 405.554475][T13705] __x64_sys_mkdir+0x31/0x40 [ 405.554502][T13705] x64_sys_call+0x2eab/0x3020 [ 405.554533][T13705] do_syscall_64+0x12c/0x370 [ 405.554590][T13705] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 405.554616][T13705] RIP: 0033:0x7f97b0f4bf79 [ 405.554632][T13705] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 405.554666][T13705] RSP: 002b:00007f97af9a7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 405.554732][T13705] RAX: ffffffffffffffda RBX: 00007f97b11c5fa0 RCX: 00007f97b0f4bf79 [ 405.554748][T13705] RDX: 0000000000000000 RSI: d0939199c36b4d28 RDI: 0000200000000000 [ 405.554765][T13705] RBP: 00007f97af9a7090 R08: 0000000000000000 R09: 0000000000000000 [ 405.554830][T13705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 405.554846][T13705] R13: 00007f97b11c6038 R14: 00007f97b11c5fa0 R15: 00007ffe16a19ec8 [ 405.554867][T13705] [ 405.822378][T13705] cgroup: cgroup_addrm_files: failed to add cgroup.type, err=-12 [ 406.168413][T13732] netlink: 'syz.1.3194': attribute type 1 has an invalid length. [ 406.169792][T13729] netlink: 'syz.0.3198': attribute type 13 has an invalid length. [ 406.187638][ T5842] bridge_slave_1: left allmulticast mode [ 406.194169][ T5842] bridge_slave_1: left promiscuous mode [ 406.200005][ T5842] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.216064][ T5842] bridge_slave_0: left allmulticast mode [ 406.223324][ T5842] bridge_slave_0: left promiscuous mode [ 406.229100][ T5842] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.444358][ T5842] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 406.455672][ T5842] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 406.468964][ T5842] bond0 (unregistering): Released all slaves [ 406.478635][ T5842] bond1 (unregistering): Released all slaves [ 406.755954][ T5842] tipc: Disabling bearer [ 406.763235][ T5842] tipc: Left network mode [ 406.789918][ T5842] pimreg (unregistering): left allmulticast mode [ 406.800867][ T4467] SELinux: failure in sel_netif_sid_slow(), invalid network interface (59) [ 406.927763][ T5842] team_slave_1 (unregistering): left promiscuous mode [ 406.936135][ T5842] team0 (unregistering): Port device team_slave_1 removed [ 406.947821][ T5842] team_slave_0 (unregistering): left promiscuous mode [ 406.958502][ T5842] team0 (unregistering): Port device team_slave_0 removed [ 406.979570][ T5842] wg1 (unregistering): left allmulticast mode [ 407.071751][T13650] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.095461][T13650] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.665616][T13650] bridge_slave_0: entered allmulticast mode [ 407.718927][T13650] bridge_slave_0: entered promiscuous mode [ 407.727040][T13650] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.732320][ T28] audit: type=1326 audit(5314360107.959:1640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13765 comm="syz.4.3205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3308b0bf79 code=0x7ffc0000 [ 407.734801][T13650] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.766517][T13650] bridge_slave_1: entered allmulticast mode [ 407.773005][ T28] audit: type=1326 audit(5314360107.999:1641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13765 comm="syz.4.3205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3308b0bf79 code=0x7ffc0000 [ 407.774941][T13650] bridge_slave_1: entered promiscuous mode [ 407.805265][ T28] audit: type=1326 audit(5314360107.999:1642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13765 comm="syz.4.3205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f3308b0bf79 code=0x7ffc0000 [ 407.841890][T13650] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 407.853377][ T28] audit: type=1326 audit(5314360107.999:1643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13765 comm="syz.4.3205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3308b0bf79 code=0x7ffc0000 [ 407.879102][T13650] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 407.891907][T13783] FAULT_INJECTION: forcing a failure. [ 407.891907][T13783] name failslab, interval 1, probability 0, space 0, times 0 [ 407.917716][T13650] team0: Port device team_slave_0 added [ 407.923650][T13783] CPU: 1 UID: 0 PID: 13783 Comm: syz.4.3207 Tainted: G W syzkaller #0 PREEMPT(full) [ 407.923689][T13783] Tainted: [W]=WARN [ 407.923698][T13783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 407.923772][T13783] Call Trace: [ 407.923780][T13783] [ 407.923788][T13783] __dump_stack+0x1d/0x30 [ 407.923835][T13783] dump_stack_lvl+0x95/0xd0 [ 407.923860][T13783] dump_stack+0x15/0x1b [ 407.923884][T13783] should_fail_ex+0x263/0x280 [ 407.923934][T13783] should_failslab+0x8c/0xb0 [ 407.924048][T13783] __kmalloc_node_track_caller_noprof+0xc3/0x560 [ 407.924074][T13783] ? __request_module+0x1df/0x3f0 [ 407.924098][T13783] ? should_failslab+0x8c/0xb0 [ 407.924136][T13783] kstrdup+0x3e/0xd0 [ 407.924168][T13783] __request_module+0x1df/0x3f0 [ 407.924202][T13783] ? capable+0x7b/0xb0 [ 407.924342][T13783] ? security_capable+0x7b/0x90 [ 407.924446][T13783] dev_load+0x61/0xc0 [ 407.924509][T13783] dev_ioctl+0x776/0x960 [ 407.924595][T13783] sock_ioctl+0x593/0x610 [ 407.924629][T13783] ? __pfx_sock_ioctl+0x10/0x10 [ 407.924661][T13783] __se_sys_ioctl+0xce/0x140 [ 407.924772][T13783] __x64_sys_ioctl+0x43/0x50 [ 407.924803][T13783] x64_sys_call+0x1563/0x3020 [ 407.924926][T13783] do_syscall_64+0x12c/0x370 [ 407.925043][T13783] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 407.925069][T13783] RIP: 0033:0x7f3308b0bf79 [ 407.925090][T13783] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 407.925111][T13783] RSP: 002b:00007f330755f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 407.925135][T13783] RAX: ffffffffffffffda RBX: 00007f3308d85fa0 RCX: 00007f3308b0bf79 [ 407.925172][T13783] RDX: 0000200000000940 RSI: 00000000000089f3 RDI: 0000000000000003 [ 407.925222][T13783] RBP: 00007f330755f090 R08: 0000000000000000 R09: 0000000000000000 [ 407.925235][T13783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 407.925248][T13783] R13: 00007f3308d86038 R14: 00007f3308d85fa0 R15: 00007ffc01c496e8 [ 407.925266][T13783] [ 408.139118][ T28] audit: type=1326 audit(5314360107.999:1644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13765 comm="syz.4.3205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=199 compat=0 ip=0x7f3308b0bf79 code=0x7ffc0000 [ 408.141273][T13650] team0: Port device team_slave_1 added [ 408.179975][T13650] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 408.185808][ T28] audit: type=1326 audit(5314360107.999:1645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13765 comm="syz.4.3205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3308b0bf79 code=0x7ffc0000 [ 408.187179][T13650] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 408.260671][T13650] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 408.272396][ T28] audit: type=1326 audit(5314360107.999:1646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13765 comm="syz.4.3205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3308b0bf79 code=0x7ffc0000 [ 408.319206][T13650] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 408.326466][T13650] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 408.354230][T13650] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 408.369387][T13802] vxcan1 speed is unknown, defaulting to 1000 [ 408.396846][T13650] hsr_slave_0: entered promiscuous mode [ 408.405266][T13650] hsr_slave_1: entered promiscuous mode [ 408.421198][T13650] debugfs: 'hsr0' already exists in 'hsr' [ 408.423035][T13808] FAULT_INJECTION: forcing a failure. [ 408.423035][T13808] name failslab, interval 1, probability 0, space 0, times 0 [ 408.427222][T13650] Cannot create hsr debugfs directory [ 408.446160][T13808] CPU: 0 UID: 0 PID: 13808 Comm: syz.4.3210 Tainted: G W syzkaller #0 PREEMPT(full) [ 408.446220][T13808] Tainted: [W]=WARN [ 408.446228][T13808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 408.446243][T13808] Call Trace: [ 408.446251][T13808] [ 408.446260][T13808] __dump_stack+0x1d/0x30 [ 408.446289][T13808] dump_stack_lvl+0x95/0xd0 [ 408.446351][T13808] dump_stack+0x15/0x1b [ 408.446374][T13808] should_fail_ex+0x263/0x280 [ 408.446481][T13808] should_failslab+0x8c/0xb0 [ 408.446627][T13808] kmem_cache_alloc_bulk_noprof+0x62/0x4c0 [ 408.446682][T13808] ? bpf_test_run_xdp_live+0x85c/0x1360 [ 408.446792][T13808] bpf_test_run_xdp_live+0xf16/0x1360 [ 408.446821][T13808] ? __pfx_wait_rcu_exp_gp+0x10/0x10 [ 408.446855][T13808] ? 0xffffffffa0205240 [ 408.446875][T13808] ? bpf_test_run_xdp_live+0x434/0x1360 [ 408.446927][T13808] bpf_prog_test_run_xdp+0x57b/0xa10 [ 408.446952][T13808] ? __rcu_read_unlock+0x4e/0x70 [ 408.447052][T13808] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 408.447132][T13808] bpf_prog_test_run+0x204/0x340 [ 408.447268][T13808] __sys_bpf+0x52e/0x7e0 [ 408.447311][T13808] __x64_sys_bpf+0x41/0x50 [ 408.447344][T13808] x64_sys_call+0x10cb/0x3020 [ 408.447384][T13808] do_syscall_64+0x12c/0x370 [ 408.447427][T13808] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 408.447450][T13808] RIP: 0033:0x7f3308b0bf79 [ 408.447544][T13808] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 408.447561][T13808] RSP: 002b:00007f330755f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 408.447583][T13808] RAX: ffffffffffffffda RBX: 00007f3308d85fa0 RCX: 00007f3308b0bf79 [ 408.447678][T13808] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 408.447695][T13808] RBP: 00007f330755f090 R08: 0000000000000000 R09: 0000000000000000 [ 408.447711][T13808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 408.447727][T13808] R13: 00007f3308d86038 R14: 00007f3308d85fa0 R15: 00007ffc01c496e8 [ 408.447748][T13808] [ 408.449094][T13802] vxcan1 speed is unknown, defaulting to 1000 [ 408.483835][T13809] pim6reg: entered allmulticast mode [ 408.901532][T13802] vxcan1 speed is unknown, defaulting to 1000 [ 408.916069][T13809] pim6reg: left allmulticast mode [ 408.926294][T13811] netlink: 'syz.0.3209': attribute type 10 has an invalid length. [ 408.992556][T13811] team0: Device vxcan1 is of different type [ 409.049231][T13831] loop4: detected capacity change from 0 to 512 [ 409.066304][T13831] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 409.123504][T13802] infiniband syz2: set down [ 409.132735][T13802] infiniband syz2: added vxcan1 [ 409.152884][ T4467] vxcan1 speed is unknown, defaulting to 1000 [ 409.175294][T13802] RDS/IB: syz2: added [ 409.179417][T13802] smc: adding ib device syz2 with port count 1 [ 409.198427][T13802] smc: ib device syz2 port 1 has no pnetid [ 409.212367][ T5842] IPVS: stop unused estimator thread 0... [ 409.240022][ T4678] vxcan1 speed is unknown, defaulting to 1000 [ 409.246571][T13802] vxcan1 speed is unknown, defaulting to 1000 [ 409.285719][T13650] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 409.321634][T13650] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 409.343873][T13650] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 409.370193][T13650] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 409.379885][T13802] vxcan1 speed is unknown, defaulting to 1000 [ 409.508518][T13802] vxcan1 speed is unknown, defaulting to 1000 [ 409.510426][T13650] 8021q: adding VLAN 0 to HW filter on device bond0 [ 409.544064][T13868] lo speed is unknown, defaulting to 1000 [ 409.544970][T13650] 8021q: adding VLAN 0 to HW filter on device team0 [ 409.589927][ T5810] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.597082][ T5810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 409.628916][T13650] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 409.643722][T13650] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 409.656313][ T5810] bridge0: port 2(bridge_slave_1) entered blocking state [ 409.663533][ T5810] bridge0: port 2(bridge_slave_1) entered forwarding state [ 409.752286][T13802] vxcan1 speed is unknown, defaulting to 1000 [ 409.824834][T13884] dummy0: Device is already in use. [ 409.960052][T13884] lo speed is unknown, defaulting to 1000 [ 409.975098][T13885] xt_recent: Unsupported userspace flags (000000b1) [ 410.089584][T13884] vxcan1 speed is unknown, defaulting to 1000 [ 410.329222][T13650] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 410.343965][T13868] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3214'. [ 410.510473][T13909] loop4: detected capacity change from 0 to 512 [ 410.569414][T13909] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 410.577735][T13909] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=e854e018, mo2=0003] [ 410.585994][T13909] System zones: 0-1, 15-15, 18-18, 34-34 [ 410.593427][T13909] EXT4-fs (loop4): write access unavailable, skipping orphan cleanup [ 410.653431][T13920] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3219'. [ 410.675654][T13920] netlink: 68 bytes leftover after parsing attributes in process `syz.1.3219'. [ 410.693427][T13909] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 410.731658][ T28] audit: type=1400 audit(5314360110.959:1647): avc: denied { watch } for pid=13907 comm="syz.4.3218" path="/17/file2/file0" dev="loop4" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 410.819439][T13925] loop1: detected capacity change from 0 to 512 [ 410.864224][T13650] veth0_vlan: entered promiscuous mode [ 410.894304][T13650] veth1_vlan: entered promiscuous mode [ 410.900901][ T28] audit: type=1400 audit(5314360111.129:1648): avc: denied { bind } for pid=13923 comm="syz.1.3220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 410.943842][T13650] veth0_macvtap: entered promiscuous mode [ 410.955615][T13246] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 410.968654][T13650] veth1_macvtap: entered promiscuous mode [ 411.039353][T13937] FAULT_INJECTION: forcing a failure. [ 411.039353][T13937] name failslab, interval 1, probability 0, space 0, times 0 [ 411.055508][T13650] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 411.066073][T13650] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 411.074231][T13937] CPU: 1 UID: 0 PID: 13937 Comm: syz.4.3221 Tainted: G W syzkaller #0 PREEMPT(full) [ 411.074268][T13937] Tainted: [W]=WARN [ 411.074276][T13937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 411.074288][T13937] Call Trace: [ 411.074295][T13937] [ 411.074304][T13937] __dump_stack+0x1d/0x30 [ 411.074374][T13937] dump_stack_lvl+0x95/0xd0 [ 411.074399][T13937] dump_stack+0x15/0x1b [ 411.074475][T13937] should_fail_ex+0x263/0x280 [ 411.074503][T13937] should_failslab+0x8c/0xb0 [ 411.074604][T13937] __kmalloc_noprof+0xb8/0x4e0 [ 411.074627][T13937] ? security_task_alloc+0x4d/0x110 [ 411.074661][T13937] security_task_alloc+0x4d/0x110 [ 411.074692][T13937] copy_process+0xd0f/0x20c0 [ 411.074802][T13937] kernel_clone+0x16b/0x5d0 [ 411.074830][T13937] __se_sys_clone3+0x1f5/0x230 [ 411.075049][T13937] __x64_sys_clone3+0x31/0x40 [ 411.075078][T13937] x64_sys_call+0x580/0x3020 [ 411.075111][T13937] do_syscall_64+0x12c/0x370 [ 411.075143][T13937] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 411.075173][T13937] RIP: 0033:0x7f3308b0bf79 [ 411.075191][T13937] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 411.075212][T13937] RSP: 002b:00007f330755eef8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 411.075242][T13937] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f3308b0bf79 [ 411.075258][T13937] RDX: 00007f330755ef10 RSI: 0000000000000058 RDI: 00007f330755ef10 [ 411.075274][T13937] RBP: 00007f330755f090 R08: 0000000000000000 R09: 0000000000000058 [ 411.075290][T13937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 411.075304][T13937] R13: 00007f3308d86038 R14: 00007f3308d85fa0 R15: 00007ffc01c496e8 [ 411.075346][T13937] [ 411.268832][T13935] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3222'. [ 411.294508][ T5817] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 411.320352][T13802] vxcan1 speed is unknown, defaulting to 1000 [ 411.335807][ T5817] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 411.588766][T13942] netlink: 'syz.1.3224': attribute type 1 has an invalid length. [ 411.601220][ T5817] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 411.919761][ T5810] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 412.168517][T13802] vxcan1 speed is unknown, defaulting to 1000 [ 412.180788][T13942] 8021q: adding VLAN 0 to HW filter on device bond2 [ 412.501978][ T583] ================================================================== [ 412.510592][ T583] BUG: KCSAN: data-race in rwsem_down_write_slowpath / rwsem_down_write_slowpath [ 412.520333][ T583] [ 412.522858][ T583] write to 0xffffc9000176fae8 of 1 bytes by task 13884 on cpu 0: [ 412.530680][ T583] rwsem_down_write_slowpath+0x3c9/0xa90 [ 412.536358][ T583] down_write+0xab/0xc0 [ 412.540716][ T583] kernfs_remove_by_name_ns+0x5c/0xf0 [ 412.546123][ T583] sysfs_remove_group+0xa5/0x170 SYZFAIL: failed to send rpc [ 412.551252][ T583] sysfs_remove_groups+0x3a/0x80 [ 412.556566][ T583] ib_free_port_attrs+0x8e/0x260 [ 412.561697][ T583] rdma_dev_exit_net+0x1aa/0x290 [ 412.566923][ T583] ops_undo_list+0x285/0x420 [ 412.571710][ T583] setup_net+0x1f2/0x230 [ 412.576206][ T583] copy_net_ns+0x310/0x450 [ 412.580724][ T583] create_new_namespaces+0x20e/0x440 [ 412.586110][ T583] copy_namespaces+0x1ad/0x210 [ 412.590990][ T583] copy_process+0xe4a/0x20c0 [ 412.595933][ T583] kernel_clone+0x16b/0x5d0 [ 412.600748][ T583] __x64_sys_clone+0x143/0x180 [ 412.605748][ T583] x64_sys_call+0x1222/0x3020 [ 412.610439][ T583] do_syscall_64+0x12c/0x370 [ 412.615057][ T583] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 412.621313][ T583] [ 412.623824][ T583] read to 0xffffc9000176fae8 of 1 bytes by task 583 on cpu 1: [ 412.631400][ T583] rwsem_down_write_slowpath+0x43d/0xa90 [ 412.638255][ T583] down_write+0xab/0xc0 [ 412.642629][ T583] kernfs_remove_by_name_ns+0x5c/0xf0 [ 412.648198][ T583] sysfs_remove_group+0xa5/0x170 [ 412.653228][ T583] sysfs_remove_groups+0x3a/0x80 [ 412.658256][ T583] ib_free_port_attrs+0x8e/0x260 [ 412.663478][ T583] rdma_dev_exit_net+0x1aa/0x290 [ 412.668537][ T583] ops_undo_list+0x285/0x420 [ 412.673224][ T583] cleanup_net+0x37c/0x5b0 [ 412.677840][ T583] process_scheduled_works+0x4de/0x9e0 [ 412.683657][ T583] worker_thread+0x581/0x770 [ 412.688270][ T583] kthread+0x22a/0x280 [ 412.692348][ T583] ret_from_fork+0x150/0x360 [ 412.697036][ T583] ret_from_fork_asm+0x1a/0x30 [ 412.701895][ T583] [ 412.704400][ T583] value changed: 0x00 -> 0x01 [ 412.709517][ T583] [ 412.711947][ T583] Reported by Kernel Concurrency Sanitizer on: [ 412.718658][ T583] CPU: 1 UID: 0 PID: 583 Comm: kworker/u8:6 Tainted: G W syzkaller #0 PREEMPT(full) [ 412.729959][ T583] Tainted: [W]=WARN [ 412.733932][ T583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 412.744168][ T583] Workqueue: netns cleanup_net fd=3 want=384 sent=0 n=-1 (errno 32: Broken pipe) [ 412.749022][ T583] ================================================================== [ 412.758082][ T28] audit: type=1400 audit(5314360112.798:1649): avc: denied { write } for pid=3299 comm="syz-executor" path="pipe:[2482]" dev="pipefs" ino=2482 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 412.864230][T13959] loop1: detected capacity change from 0 to 512 [ 413.215640][ T583] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.294208][ T583] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.418251][ T583] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.464032][ T583] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.554586][ T583] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.690996][ T583] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.775216][ T583] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.835147][ T583] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.931816][ T583] bridge_slave_1: left allmulticast mode [ 413.937691][ T583] bridge_slave_1: left promiscuous mode [ 413.943870][ T583] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.952519][ T583] bridge_slave_0: left allmulticast mode [ 413.958372][ T583] bridge_slave_0: left promiscuous mode [ 413.964593][ T583] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.973724][ T583] bridge_slave_1: left allmulticast mode [ 413.979690][ T583] bridge_slave_1: left promiscuous mode [ 413.986341][ T583] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.995343][ T583] bridge_slave_0: left allmulticast mode [ 414.001276][ T583] bridge_slave_0: left promiscuous mode [ 414.007767][ T583] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.133998][ T583] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 414.144688][ T583] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 414.154375][ T583] bond0 (unregistering): Released all slaves [ 414.193840][ T583] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 414.204347][ T583] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 414.214706][ T583] bond0 (unregistering): Released all slaves [ 414.222666][ T583] bond1 (unregistering): Released all slaves [ 414.231243][ T583] bond2 (unregistering): Released all slaves [ 414.297634][ T583] hsr_slave_0: left promiscuous mode [ 414.304630][ T583] hsr_slave_1: left promiscuous mode [ 414.312442][ T583] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 414.321484][ T583] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 414.330660][ T583] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 414.338561][ T583] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 414.348631][ T583] hsr_slave_0: left promiscuous mode [ 414.355050][ T583] hsr_slave_1: left promiscuous mode [ 414.360838][ T583] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 414.369046][ T583] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 414.377329][ T583] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 414.385415][ T583] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 414.400497][ T583] veth1_macvtap: left promiscuous mode [ 414.406421][ T583] veth0_macvtap: left promiscuous mode [ 414.412052][ T583] veth1_vlan: left promiscuous mode [ 414.417699][ T583] veth0_vlan: left promiscuous mode [ 414.423970][ T583] veth1_macvtap: left promiscuous mode [ 414.430122][ T583] veth0_macvtap: left promiscuous mode [ 414.436281][ T583] veth1_vlan: left promiscuous mode [ 414.441764][ T583] veth0_vlan: left promiscuous mode [ 414.535280][ T583] team0 (unregistering): Port device team_slave_1 removed [ 414.544879][ T583] team0 (unregistering): Port device team_slave_0 removed [ 414.575566][ T583] team0 (unregistering): Port device batadv1 removed [ 414.609342][ T583] team0 (unregistering): Port device team_slave_1 removed [ 414.619350][ T583] team0 (unregistering): Port device team_slave_0 removed [ 414.644172][ T583] team0 (unregistering): Port device dummy0 removed [ 415.204084][ T583] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 415.303133][ T583] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 415.362973][ T583] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 415.413361][ T583] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 415.473292][ T583] bridge_slave_0: left allmulticast mode [ 415.480157][ T583] bridge_slave_0: left promiscuous mode [ 415.486475][ T583] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.693387][ T583] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 415.703477][ T583] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 415.715049][ T583] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 415.724336][ T583] bond0 (unregistering): Released all slaves [ 415.732356][ T583] bond1 (unregistering): Released all slaves [ 415.775982][ T583] tipc: Disabling bearer [ 415.781999][ T583] tipc: Left network mode [ 415.812309][ T583] veth1_macvtap: left allmulticast mode [ 415.818052][ T583] veth1_macvtap: left promiscuous mode [ 415.823721][ T583] veth0_macvtap: left promiscuous mode [ 415.829479][ T583] veth1_vlan: left promiscuous mode [ 415.836749][ T583] veth0_vlan: left promiscuous mode [ 415.890863][ T583] team0 (unregistering): Port device team_slave_1 removed [ 415.902165][ T583] team0 (unregistering): Port device team_slave_0 removed [ 415.932280][ T35] lo speed is unknown, defaulting to 1000 [ 415.938084][ T35] infiniband syz0: ib_query_port failed (-19) [ 416.115316][ T583] IPVS: stop unused estimator thread 0... [ 416.185431][ T583] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 416.275806][ T583] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 416.328393][ T583] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 416.404705][ T583] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 416.494535][ T583] bridge_slave_1: left allmulticast mode [ 416.500384][ T583] bridge_slave_1: left promiscuous mode [ 416.506455][ T583] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.514750][ T583] bridge_slave_0: left allmulticast mode [ 416.520444][ T583] bridge_slave_0: left promiscuous mode [ 416.526405][ T583] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.585744][ T583] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 416.597168][ T583] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 416.607266][ T583] bond0 (unregistering): Released all slaves [ 416.675095][ T583] hsr_slave_0: left promiscuous mode [ 416.680853][ T583] hsr_slave_1: left promiscuous mode [ 416.689041][ T583] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 416.696689][ T583] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 416.704515][ T583] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 416.713004][ T583] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 416.724251][ T583] veth1_macvtap: left promiscuous mode [ 416.730150][ T583] veth0_macvtap: left promiscuous mode [ 416.735829][ T583] veth1_vlan: left promiscuous mode [ 416.741136][ T583] veth0_vlan: left promiscuous mode [ 416.806274][ T583] team0 (unregistering): Port device team_slave_1 removed [ 416.815910][ T583] team0 (unregistering): Port device team_slave_0 removed